Skip to content

Latest commit

 

History

History
75 lines (55 loc) · 1.74 KB

playbook-Block_Account_-_Generic_v2_README.md

File metadata and controls

75 lines (55 loc) · 1.74 KB

This playbook blocks malicious usernames using all integrations that you have enabled.

Supported integrations for this playbook:

  • Active Directory
  • PAN-OS - This requires PAN-OS 9.1 or higher.
  • SailPoint
  • PingOne
  • AWS IAM
  • Clarizen IAM
  • Envoy IAM
  • ExceedLMS IAM
  • Okta
  • Microsoft Graph User (Azure Active Directory Users)
  • Google Workspace Admin
  • Slack IAM
  • ServiceNow IAM
  • Prisma Cloud IAM
  • Zoom IAM
  • Atlassian IAM
  • GitHub IAM.

Dependencies

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks

This playbook does not use any sub-playbooks.

Integrations

  • Active Directory Query v2

Scripts

  • IsIntegrationAvailable
  • SetAndHandleEmpty

Commands

  • iam-disable-user
  • gsuite-user-update
  • identityiq-disable-account
  • pingone-deactivate-user
  • msgraph-user-account-disable
  • pan-os-register-user-tag
  • ad-get-user
  • msgraph-user-get
  • ad-disable-account
  • identityiq-get-accounts

Playbook Inputs


Name Description Default Value Required
Username Array of malicious usernames to block. Optional
Tag PAN-OS Tag name to apply to the username that you want to block. Bad Account Optional
NamingConvention In case you are using naming convention in your IDP, please specify a prefix for special/service accounts (use comma separated) Optional
UserVerification Possible values:True/False. Default:True.
Specify if User Verification is Requrired
True Optional

Playbook Outputs


Path Description Type
Blocklist.Final Blocked accounts unknown

Playbook Image


Block Account - Generic v2