Skip to content

Add Microsoft Defender machine logon users to a Microsoft Sentinel incident comment

Notifications You must be signed in to change notification settings

Accelerynt-Security/AS-Add-Machine-Logon-Users-to-Incident

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 

Repository files navigation

AS-Add-Machine-Logon-Users-to-Incident

Author: Accelerynt

For any technical questions, please contact info@accelerynt.com

Deploy to Azure Deploy to Azure Gov

This playbook is intended to be run from a Microsoft Sentinel incident. It will match the hosts from a Microsoft Sentinel incident with Microsoft Defender machines and add the logon users for each machine as a comment on the Microsoft Sentinel incident.

MachineLogonUsers_Demo_1

Requirements

The following items are required under the template settings during deployment:

  • A Microsoft Azure Active Directory app registration with admin consent granted for "Users.Read.All" in the "WindowsDefenderATP" API
  • An Azure key vault secret containing your app registration client secret

Setup

Create an App Registration

Navigate to the Microsoft Azure Active Directory app registration page: https://portal.azure.com/#view/Microsoft_AAD_RegisteredApps/ApplicationsListBlade

Click "New registration".

MachineLogonUsers_App_Registration_1

Enter "AS-Add-Machine-Logon-Users-to-Incident" for the name, all else can be left as is. Click "Register"

MachineLogonUsers_App_Registration_2

Once the app registration is created, you will be redirected to the "Overview" page. Under the "Essentials" section, take note of the "Application (client) ID", as this will be needed for deployment.

MachineLogonUsers_App_Registration_3

Next, you will need to add permissions for the app registration to call the Microsoft Defender logonusers endpoint. From the left menu blade, click "API permissions" under the "Manage" section. Then, click "Add a permission".

MachineLogonUsers_App_Registration_4

From the "Select an API" pane, click the "APIs my organization uses" tab, then paste "WindowsDefenderATP" in the search bar. Click the option matching the search.

MachineLogonUsers_App_Registration_5

Click "Application permissions", then type "User.Read.All" into the search bar and select the result. Click "Add permissions".

MachineLogonUsers_App_Registration_6

Admin consent will be needed before your app registration can use the assigned permission. Click "Grant admin consent for (name)".

MachineLogonUsers_App_Registration_7

Lastly, a client secret will need to be generated for the app registration. From the left menu blade, click "Certificates & secrets" under the "Manage" section. Then, click "New client secret".

MachineLogonUsers_App_Registration_8

Enter a description and select the desired expiration date, then click "Add".

MachineLogonUsers_App_Registration_9

Copy the value of the secret that is generated, as this will be needed for Create an Azure Key Vault Secret.

MachineLogonUsers_App_Registration_10

Create an Azure Key Vault Secret

Navigate to the Azure key vaults page: https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.KeyVault%2Fvaults

Navigate to an existing key vault or create a new one. From the key vault overview page, click the "Secrets" menu option, found under the "Settings" section. Click "Generate/Import".

MachineLogonUsers_Key_Vault_1

Choose a name for the secret, such as "AS-Add-Machine-Logon-Users-to-Incident-AR-Client-Secret", and enter the client secret copied in the previous section. All other settings can be left as is. Click "Create".

MachineLogonUsers_Key_Vault_2

Once your secret has been added to the vault, navigate to the "Access policies" menu option. Leave this page open, as you will need to return to it once the playbook has been deployed. See Granting Access to Azure Key Vault.

MachineLogonUsers_Key_Vault_3

Deployment

To configure and deploy this playbook:

Open your browser and ensure you are logged into your Microsoft Sentinel workspace. In a separate tab, open the link to our playbook on the Accelerynt Security GitHub repository:

https://github.com/Accelerynt-Security/AS-Add-Machine-Logon-Users-to-Incident

Deploy to Azure Deploy to Azure Gov

Click the "Deploy to Azure" button at the bottom and it will bring you to the custom deployment template.

In the Project Details section:

  • Select the "Subscription" and "Resource Group" from the dropdown boxes you would like the playbook deployed to.

In the Instance Details section:

Towards the bottom, click on "Review + create".

MachineLogonUsers_Deploy_1

Once the resources have validated, click on "Create".

MachineLogonUsers_Deploy_2

The resources should take around a minute to deploy. Once the deployment is complete, you can expand the "Deployment details" section to view them. Click the one corresponding to the Logic App.

MachineLogonUsers_Deploy_3

Microsoft Sentinel Contributor Role

After deployment, you will need to give the system assigned managed identity the "Microsoft Sentinel Contributor" role. This will enable it to add comments to incidents. Navigate to the Log Analytics Workspaces page and select the same workspace the playbook is located in:

https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces

Select the "Access control (IAM)" option from the menu blade, then click "Add role assignment".

MachineLogonUsers_Add_Contributor_Role_1

Select the "Microsoft Sentinel Contributor" role, then click "Next".

MachineLogonUsers_Add_Contributor_Role_2

Select the "Managed identity" option, then click "Select Members". Under the subscription the logic app is located, set the value of "Managed identity" to "Logic app". Next, enter "AS-Add-Machine-Logon-Users-to-Incident", or the alternative playbook name used during deployment, in the field labeled "Select". Select the playbook, then click "Select".

MachineLogonUsers_Add_Contributor_Role_3

Continue on to the "Review + assign" tab and click "Review + assign".

MachineLogonUsers_Add_Contributor_Role_4

Alternatively, if you wish to do this through PowerShell, run the following commands, replacing the managed identity object id and resource group name. You can find the managed identity object id on the Identity blade under Settings for the Logic App.

MachineLogonUsers_Add_Contributor_Role_5

You will not need to run the Install-Module if this has been done before. More documentation on this module can be found here:

https://learn.microsoft.com/en-us/powershell/azure/install-az-ps?view=azps-9.3.0

Install-Module -Name Az
Connect-AzAccount
New-AzRoleAssignment -ObjectId <logic app managed identity object id> -RoleDefinitionName "Microsoft Sentinel Contributor" -ResourceGroupName "<logic app resource group name>"

Granting Access to Azure Key Vault

Before the Logic App can run successfully, the key vault connection created during deployment must be granted access to the key vault storing your app registration client secret.

From the key vault "Access policies" page, click "Create".

MachineLogonUsers_Key_Vault_Access_1

Select the "Get" checkbox under "Secret permissions", then click "Next".

MachineLogonUsers_Key_Vault_Access_2

Paste "AS-Add-Machine-Logon-Users-to-Incident" into the principal search box and click the option that appears. Click "Next" towards the bottom of the page.

MachineLogonUsers_Key_Vault_Access_3

Navigate to the "Review + create" section and click "Create".

MachineLogonUsers_Key_Vault_Access_4

Running the Playbook

To run this playbook from a Microsoft Sentinel incident, navigate to Microsoft Sentinel:

https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/microsoft.securityinsightsarg%2Fsentinel

Select a workspace and then click the "Incidents" menu option located under "Threat management". Select an incident with compromised host entities.

Click on the "Action" list button on the bottom right of the screen and select "Run playbook".

MachineLogonUsers_Run_1

From the "Run playbook on incident" view, type "AS-Add-Machine-Logon-Users-to-Incident" into the search bar, then click run.

MachineLogonUsers_Run_2

About

Add Microsoft Defender machine logon users to a Microsoft Sentinel incident comment

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published