Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New Playbook - Isolate-AzureVMtoNSG #532

Merged
merged 2 commits into from
Mar 23, 2020

Conversation

swiftsolves-msft
Copy link
Contributor

This playbook will take host entites from triggered incident and search for matches in the enterprises subscriptions. An email for approval will be sent to isolate Azure VM. Upon approval a new NSG Deny All is created and applied to the Azure VM, The Azure VM is restarted to remove any persisted connections.

Fixes #

Proposed Changes

This playbook will take host entites from triggered incident and search for matches in the enterprises subscriptions. An email for approval will be sent to isolate Azure VM. Upon approval a new NSG Deny All is created and applied to the Azure VM, The Azure VM is restarted to remove any persisted connections.
@ThijsLecomte
Copy link
Contributor

Hi @swiftsolves-msft

Just wanted to check out your Playbook as the functionality looks really great, but I got an error because the LogicApp tried to deploy before the API connection was fully configured.

It is possible you forgot a dependsOn?

added depends on to ensure logic app deploys after web connections
@swiftsolves-msft
Copy link
Contributor Author

Thank you for testing this, I did indeed, updated with dependsOn

@dicolanl
Copy link
Contributor

@swiftsolves-msft Great Stuff. One Note... Host Entities (depending on alert source) should have Azure Resource ID as a property. This could make this workflow easier.

@dicolanl dicolanl merged commit 2e1acbc into Azure:master Mar 23, 2020
@swiftsolves-msft
Copy link
Contributor Author

@swiftsolves-msft Great Stuff. One Note... Host Entities (depending on alert source) should have Azure Resource ID as a property. This could make this workflow easier.

@dicolanl Thanks, I should make a conditional check at beginning for the ASC enriched ResourceID field, if none available then move into the Host based lookup method. Another concept I was thinking to use was if no Host entity then check and take the entity IP search for it in Azure whether PubIP or PrivIP and associate it with the AzureResource ID - could be useful from CommonSecurityLogs or other NVA based alerts they may not have a Host entity produced or correlated ?

@preetikr preetikr linked an issue Mar 23, 2020 that may be closed by this pull request
@neogeek3110
Copy link

@swiftsolves-msft Where does that email go? To the end user? I don’t see that action anywhere in the playbook. Why would it depends on the end user to take action, If we don’t want the end use to have a say when the device is isolated, then? Because When we are Isolating from MDE portal – there is no user notification is generated.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Playbook - Isolate an Azure VM
4 participants