Learning Path 9 - Lab 1 - Exercise 2 - Create a Playbook in Microsoft Sentinel
Lab scenario
You’re a Security Operations Analyst working at a company that implemented Microsoft Sentinel. You must learn how to detect and mitigate threats using Microsoft Sentinel. Now, you want to respond and reMediate actions that can be run from Microsoft Sentinel as a routine.
With a playbook, you can help automate and orchestrate your threat response, integrate with other systems both internal and external, and can be set to run automatically in response to specific alerts or incidents, when triggered by an analytics rule or an automation rule, respectively.
Important: The lab exercises for Learning Path #9 are in a standalone environment. If you exit the lab before completing it, you will be required to re-run the configurations again.
Task 1: Create a Playbook in Microsoft Sentinel
In this task, you’ll create a Logic App that is used as a Playbook in Microsoft Sentinel.
-
Log in to WIN1 virtual machine as Admin with the password: Pa55w.rd.
-
In the Sign in dialog box, copy and paste in the Tenant Email account provided by your lab hosting provider and then select Next.
-
In the Enter password dialog box, copy and paste in the Tenant Password provided by your lab hosting provider and then select Sign in.
-
In the Search bar of the Azure portal, type Sentinel, then select Microsoft Sentinel.
-
Select your Microsoft Sentinel Workspace.
-
In Microsoft Sentinel, navigate to Content Hub.
-
Within the search bar, look for Sentinel SOAR Essentials.
-
Select the solution that appears in the results.
-
Within the solution details, select Manage.
-
Find the Defender_XDR_Ransomware_Playbook_for_SecOps-Tasks playbook and select the name.
-
Select the Incident tasks - Microsoft Defender XDR Ransomware Playbook for SecOps template.
-
On the details pane, select Create playbook.
-
For Resource Group, select Create New, enter RG-Playbooks and select OK.
-
Remove for from the playbook name (would exceed limit of 64 characters).
-
Select Connections.
-
Select Next: Review and create.
-
Now select Create Playbook.
Note: Wait for the deployment to finish before proceeding to the next task.
Task 2: Update a Playbook in Microsoft Sentinel
In this task, you’ll update the new playbook you created with the proper connection information.
-
In the Search bar of the Azure portal, type Sentinel, then select Microsoft Sentinel.
-
Select your Microsoft Sentinel Workspace.
-
Select Automation under the Configuration area and then select the Active Playbooks tab.
-
Select Refresh from the command bar in case you don’t see any playbooks. You should see the playbook created from the previous step.
-
Select the Defender_XDR_Ransomware_Playbook_SecOps_Tasks playbook name.
-
On the Logic App page for Defender_XDR_Ransomware_Playbook_SecOps_Tasks, in the command menu, select Edit.
Note: You may need to refresh the page.
-
Select the first block, Microsoft Sentinel incident.
-
Select the Change connection link.
-
Select Add new and select Sign in. In the new window, select your Azure subscription admin credentials when prompted. The last line of the block should now read “Connected to your-admin-username”.
-
Below within the logic split, select Add task to incident.
-
Select Save on the command bar. The Logic App will be used in a future lab.
Task 3: Create an Automation Rule
-
Within Microsoft Sentinel, go to Automation under Configuration.
-
Select Create and choose Automation Rule.
-
Give the rule a name
-
Leave the incident provider as All.
-
Leave the Analytic rule name as All.
-
Click Add and choose And.
-
From the drop down, select Tactics.
-
Select the Contains operator from the dropdown.
- Select the following tactics:
- Reconnaissance
- Execution
- Persistence
- Command and Control
- Exfiltration
- PreAttack
-
Under Actions, select Run Playbook.
-
Select the link to Manage playbook permissions.
-
On the Manage Permissions page, select the RG-Playbooks resource group you created in the previous lab, and select Apply.
-
From the drop down list, select the Defender_XDR_Ransomware_Playbook_SecOps_Tasks playbook.
- Select Apply at the bottom.
From here, depending on your role, you will either continue doing more architect exercises or you will pivot to the analyst exercises.