Skip to content

Commit 79514ed

Browse files
committed
Update readme files
1 parent ad2a65e commit 79514ed

File tree

4 files changed

+60
-16
lines changed

4 files changed

+60
-16
lines changed

Solutions/VirusTotal/Playbooks/Get-VirusTotalDomainReport/readme.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,18 @@ Deploy this playbook to run manually on alerts or attach it to an **analytics ru
2323

2424
## Post Deployment Instructions
2525

26-
**1. Assign Microsoft Sentinel Responder Role to Playbook**
26+
**1. Authorize Connections**
27+
28+
After deployment, authorize all connections:
29+
30+
1. Click the Microsoft Sentinel connection resource
31+
2. Click edit API connection
32+
3. Click Authorize
33+
4. Sign in
34+
5. Click Save
35+
Repeat steps for all connections.
36+
37+
**2. Assign Microsoft Sentinel Responder Role to Playbook**
2738

2839
This playbook uses a managed identity, which must have the Microsoft Sentinel Responder role assigned in the Sentinel instances to enable adding comments.
2940

@@ -35,7 +46,7 @@ This playbook uses a managed identity, which must have the Microsoft Sentinel Re
3546
6. In the Role drop-down list, select the role 'Microsoft Sentinel Responder'.
3647
7. Click Save to assign the role.
3748

38-
**2. Only for Alert Triggered Playbooks - Assign the Log Analytics Reader Role to Playbook**
49+
**3. Only for Alert Triggered Playbooks - Assign the Log Analytics Reader Role to Playbook**
3950

4051
Alert triggered playbooks need to read data from Log Analytics workspace, assign the Log Analytics Reader role to its managed identity:
4152

@@ -46,7 +57,7 @@ Alert triggered playbooks need to read data from Log Analytics workspace, assign
4657
5. In the Members tab, select **Managed identity** and choose the playbook's managed identity.
4758
6. Click **Review + assign** to complete.
4859

49-
**3. Attach the Alert Triggered Playbook to an Automation Rule**
60+
**4. Attach the Alert Triggered Playbook to an Automation Rule**
5061

5162
To run the playbook automatically:
5263

@@ -58,7 +69,7 @@ To run the playbook automatically:
5869

5970
For more details, see the [official documentation on automation rules](https://docs.microsoft.com/azure/sentinel/automate-incident-handling-with-automation-rules#creating-and-managing-automation-rules).
6071

61-
**4. Configure Analytics Rules to run Playbook**
72+
**5. Configure Analytics Rules to run Playbook**
6273

6374
To ensure this playbook is triggered by alerts/incidents containing URL entities, configure your analytics rules as follows:
6475

Solutions/VirusTotal/Playbooks/Get-VirusTotalFileInfo/readme.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,18 @@ Deploy this playbook to run manually on alerts or attach it to an **analytics ru
2323

2424
## Post Deployment Instructions
2525

26-
**1. Assign Microsoft Sentinel Responder Role to Playbook**
26+
**1. Authorize Connections**
27+
28+
After deployment, authorize all connections:
29+
30+
1. Click the Microsoft Sentinel connection resource
31+
2. Click edit API connection
32+
3. Click Authorize
33+
4. Sign in
34+
5. Click Save
35+
Repeat steps for all connections.
36+
37+
**2. Assign Microsoft Sentinel Responder Role to Playbook**
2738

2839
This playbook uses a managed identity, which must have the Microsoft Sentinel Responder role assigned in the Sentinel instances to enable adding comments.
2940

@@ -35,7 +46,7 @@ This playbook uses a managed identity, which must have the Microsoft Sentinel Re
3546
6. In the Role drop-down list, select the role 'Microsoft Sentinel Responder'.
3647
7. Click Save to assign the role.
3748

38-
**2. Only for Alert Triggered Playbooks - Assign the Log Analytics Reader Role to Playbook**
49+
**3. Only for Alert Triggered Playbooks - Assign the Log Analytics Reader Role to Playbook**
3950

4051
Alert triggered playbooks need to read data from Log Analytics workspace, assign the Log Analytics Reader role to its managed identity:
4152

@@ -46,7 +57,7 @@ Alert triggered playbooks need to read data from Log Analytics workspace, assign
4657
5. In the Members tab, select **Managed identity** and choose the playbook's managed identity.
4758
6. Click **Review + assign** to complete.
4859

49-
**3. Attach the Alert Triggered Playbook to an Automation Rule**
60+
**4. Attach the Alert Triggered Playbook to an Automation Rule**
5061

5162
To run the playbook automatically:
5263

@@ -58,7 +69,7 @@ To run the playbook automatically:
5869

5970
For more details, see the [official documentation on automation rules](https://docs.microsoft.com/azure/sentinel/automate-incident-handling-with-automation-rules#creating-and-managing-automation-rules).
6071

61-
**4. Configure Analytics Rules to run Playbook**
72+
**5. Configure Analytics Rules to run Playbook**
6273

6374
To ensure this playbook is triggered by alerts/incidents containing File Hash entities, configure your analytics rules as follows:
6475

Solutions/VirusTotal/Playbooks/Get-VirusTotalIPReport/readme.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,18 @@ Deploy this playbook to run manually from an entity context in the incident.
2929

3030
## Post Deployment Instructions
3131

32-
**1. Assign Microsoft Sentinel Responder Role to Playbook**
32+
**1. Authorize Connections**
33+
34+
After deployment, authorize all connections:
35+
36+
1. Click the Microsoft Sentinel connection resource
37+
2. Click edit API connection
38+
3. Click Authorize
39+
4. Sign in
40+
5. Click Save
41+
Repeat steps for all connections.
42+
43+
**2. Assign Microsoft Sentinel Responder Role to Playbook**
3344

3445
This playbook uses a managed identity, which must have the Microsoft Sentinel Responder role assigned in the Sentinel instances to enable adding comments.
3546

@@ -41,7 +52,7 @@ This playbook uses a managed identity, which must have the Microsoft Sentinel Re
4152
6. In the Role drop-down list, select the role 'Microsoft Sentinel Responder'.
4253
7. Click Save to assign the role.
4354

44-
**2. Only for Alert Triggered Playbooks - Assign the Log Analytics Reader Role to Playbook**
55+
**3. Only for Alert Triggered Playbooks - Assign the Log Analytics Reader Role to Playbook**
4556

4657
Alert triggered playbooks need to read data from Log Analytics workspace, assign the Log Analytics Reader role to its managed identity:
4758

@@ -52,7 +63,7 @@ Alert triggered playbooks need to read data from Log Analytics workspace, assign
5263
5. In the Members tab, select **Managed identity** and choose the playbook's managed identity.
5364
6. Click **Review + assign** to complete.
5465

55-
**3. Attach the Alert Triggered Playbook to an Automation Rule**
66+
**4. Attach the Alert Triggered Playbook to an Automation Rule**
5667

5768
To run the playbook automatically:
5869

@@ -64,7 +75,7 @@ To run the playbook automatically:
6475

6576
For more details, see the [official documentation on automation rules](https://docs.microsoft.com/azure/sentinel/automate-incident-handling-with-automation-rules#creating-and-managing-automation-rules).
6677

67-
**4. Configure Analytics Rules to run Playbook**
78+
**5. Configure Analytics Rules to run Playbook**
6879

6980
To ensure this playbook is triggered by alerts/incidents containing IP entities, configure your analytics rules as follows:
7081

Solutions/VirusTotal/Playbooks/Get-VirusTotalURLReport/readme.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,18 @@ Deploy this playbook to run manually on alerts or attach it to an **analytics ru
2323

2424
## Post Deployment Instructions
2525

26-
**1. Assign Microsoft Sentinel Responder Role to Playbook**
26+
**1. Authorize Connections**
27+
28+
After deployment, authorize all connections:
29+
30+
1. Click the Microsoft Sentinel connection resource
31+
2. Click edit API connection
32+
3. Click Authorize
33+
4. Sign in
34+
5. Click Save
35+
Repeat steps for all connections.
36+
37+
**2. Assign Microsoft Sentinel Responder Role to Playbook**
2738

2839
This playbook uses a managed identity, which must have the Microsoft Sentinel Responder role assigned in the Sentinel instances to enable adding comments.
2940

@@ -35,7 +46,7 @@ This playbook uses a managed identity, which must have the Microsoft Sentinel Re
3546
6. In the Role drop-down list, select the role 'Microsoft Sentinel Responder'.
3647
7. Click Save to assign the role.
3748

38-
**2. Only for Alert Triggered Playbooks - Assign the Log Analytics Reader Role to Playbook**
49+
**3. Only for Alert Triggered Playbooks - Assign the Log Analytics Reader Role to Playbook**
3950

4051
Alert triggered playbooks need to read data from Log Analytics workspace, assign the Log Analytics Reader role to its managed identity:
4152

@@ -46,7 +57,7 @@ Alert triggered playbooks need to read data from Log Analytics workspace, assign
4657
5. In the Members tab, select **Managed identity** and choose the playbook's managed identity.
4758
6. Click **Review + assign** to complete.
4859

49-
**3. Attach the Alert Triggered Playbook to an Automation Rule**
60+
**4. Attach the Alert Triggered Playbook to an Automation Rule**
5061

5162
To run the playbook automatically:
5263

@@ -58,7 +69,7 @@ To run the playbook automatically:
5869

5970
For more details, see the [official documentation on automation rules](https://docs.microsoft.com/azure/sentinel/automate-incident-handling-with-automation-rules#creating-and-managing-automation-rules).
6071

61-
**4. Configure Analytics Rules to run Playbook**
72+
**5. Configure Analytics Rules to run Playbook**
6273

6374
To ensure this playbook is triggered by alerts/incidents containing URL entities, configure your analytics rules as follows:
6475

0 commit comments

Comments
 (0)