Learning Path 7 - Lab 1 - Exercise 2 - Create a Playbook
Lab scenario
You are a Security Operations Analyst working at a company that implemented Microsoft Sentinel. You must learn how to detect and mitigate threats using Microsoft Sentinel. Now, you want to respond and reMediate actions that can be run from Microsoft Sentinel as a routine.
With a playbook, you can help automate and orchestrate your threat response, integrate with other systems both internal and external, and can be set to run automatically in response to specific alerts or incidents, when triggered by an analytics rule or an automation rule, respectively.
Task 1: Create a Security Operations Center Team in Microsoft Teams
In this task, you will create a Microsoft Teams team for use in the lab.
-
Log in to WIN1 virtual machine as Admin with the password: Pa55w.rd.
-
In the Edge browser, open a new tab and navigate to the Microsoft Teams portal at (https://teams.microsoft.com).
-
In the Sign in dialog box, copy and paste in the Tenant Email account provided by your lab hosting provider and then select Next.
-
In the Enter password dialog box, copy and paste in the Tenant Password provided by your lab hosting provider and then select Sign in.
-
Close any Teams pop-ups that may appear.
-
If not already selected, select Teams on the left menu, then at the bottom, select Join or create a team.
-
Select the Create Team button in the main window.
-
Select the From scratch button.
-
Select the Private button.
-
Give the team the name: type SOC and select the Create button.
-
In the Add members to SOC screen, select the Skip button.
-
Scroll down the Teams blade to locate the newly created SOC team, select the ellipsis (…) on the right side of the name and select Add channel.
-
Enter a channel name of New Alerts then select the Add button.
Task 2: Create a Playbook in Microsoft Sentinel
In this task, you will create a Logic App that will be used as a Playbook in Microsoft Sentinel.
-
In the Edge browser, navigate to the Azure portal at https://portal.azure.com.
-
In the Sign in dialog box, copy and paste in the Tenant Email account provided by your lab hosting provider and then select Next.
-
In the Enter password dialog box, copy and paste in the Tenant Password provided by your lab hosting provider and then select Sign in.
-
In the Search bar of the Azure portal, type Sentinel, then select Microsoft Sentinel.
-
Select your Microsoft Sentinel Workspace you created earlier.
-
Select the Community page under the Content management area on the left side of the page.
-
On the right pane, select the Onboard community content link. This will open a new tab in the Edge Browser for Microsoft Sentinel GitHub content.
-
Select the Solutions folder.
-
Next select the SentinelSOARessentials folder, then the Playbooks folder.
-
Select the Post-Message-Teams folder.
-
In the readme.md box, scroll down to the second Quick Deployment option, Deploy with alert trigger and select the Deploy to Azure button.
VERY IMPORTANT: Be aware that they are two different Microsoft Sentinel triggers to use, Incident and Alert. Make sure you are selecting the Alert (second) one.
-
Make sure your Azure Subscription is selected.
-
For Resource Group, select Create New, enter RG-Playbooks and select OK.
-
Leave (US) East US as the default value for Region.
-
Make sure the Playbook Name is “PostMessageTeams-OnAlert” and select Review + create. Hint: If the name is different, go back to GitHub and select the Deploy with alert trigger playbook.
-
Now select Create.
Note: Wait for the deployment to finish before proceeding to the next task.
Task 3: Update a Playbook in Microsoft Sentinel
In this task, you will update the new playbook you created with the proper connection information.
-
In the Search bar of the Azure portal, type Sentinel, then select Microsoft Sentinel.
-
Select your Microsoft Sentinel Workspace.
-
Select the Automation under the Configuration area and then select the Active Playbooks tab.
-
Select the PostMessageTeams-OnAlert playbook. Hint: If you do not see the playbook, refresh the Azure portal page by pressing Ctrl+F5.
-
On the Logic App page for PostMessageTeams-OnAlert, in the command menu, select Edit.
-
Select the first block, Microsoft Sentinel alert.
-
Select the Change connection link.
-
Select Add new and select Sign in. In the new window, select your Azure subscription admin credentials when prompted. The last line of the block should now read “Connected to your-admin-username”.
-
Now select the second block, Alert - Get incident.
-
Select the Change connection link.
-
Select the connection that has your Azure admin username under Display Name. Hint: admin@ZZZZZZ.onmicrosoft.com. The last line of the block should now read “Connected to your-admin-username”.
-
Now select the third block, Connections.
-
Select Add new and select your Azure admin credentials when prompted. The last line of the block should now read “Connected to your-admin-username”.
-
The block has now been renamed to Post a message (V3), at the end of the Team field, select the X to clear the contents. The field will be changed to a drop-down with a listing of the available Teams from Microsoft Teams. Select SOC.
-
Do the same for the Channel field, select the X at the end of the field to clear the contents. The field will be changed to a drop-down with a listing of the Channels of the SOC Teams. Select New Alerts.
-
Select Save on the command bar.
The Logic App will be used in a future lab.