Skip to content

Commit ac0ddea

Browse files
committed
Updated Revoke-AADSignInSessions Playbooks Instructions
1 parent 788ae90 commit ac0ddea

File tree

7 files changed

+148
-147
lines changed

7 files changed

+148
-147
lines changed
97.8 KB
Binary file not shown.

Solutions/Microsoft Entra ID/Package/mainTemplate.json

Lines changed: 142 additions & 142 deletions
Large diffs are not rendered by default.

Solutions/Microsoft Entra ID/Playbooks/Revoke-AADSignInSessions/alert-trigger/azuredeploy.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
"title": "Revoke-Entra ID SignInSessions alert trigger",
66
"description": "This playbook will revoke all signin sessions for the user using Graph API. It will send an email to the user's manager.",
77
"prerequisites": ["1. You must create an app registration for graph api with appropriate permissions.", "2. You will need to add the managed identity that is created by the logic app to the Password Administrator role in Microsoft Entra ID."],
8-
"postDeployment": ["1. Add Microsoft Sentinel Responder role to the managed identity.", "2. Assign User.ReadWrite.All and Directory.ReadWrite.All API permissions to the managed identity.","3. For more detailed steps [click Here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/Playbooks/Revoke-AADSignInSessions/readme.md)"],
8+
"postDeployment": ["1. Add Microsoft Sentinel Responder role to the managed identity.", "2. Assign User.RevokeSessions.All API permissions to the managed identity.","3. For more detailed steps [click Here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/Playbooks/Revoke-AADSignInSessions/readme.md)"],
99
"comments": "This playbook will revoke all signin sessions for the user using Graph API using a Beta API. It will send and email to the user's manager.",
1010

1111
"lastUpdateTime": "2021-07-14T00:00:00.000Z",

Solutions/Microsoft Entra ID/Playbooks/Revoke-AADSignInSessions/entity-trigger/azuredeploy.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
"title": "Revoke Entra ID Sign-in session using entity trigger",
66
"description": "This playbook will revoke user's sign-in sessions and user will have to perform authentication again. It invalidates all the refresh tokens issued to applications for a user (as well as session cookies in a user's browser), by resetting the signInSessionsValidFromDateTime user property to the current date-time.",
77
"prerequisites": "",
8-
"postDeployment": ["1. Add Microsoft Sentinel Responder role to the managed identity.", "2. Assign User.ReadWrite.All and Directory.ReadWrite.All API permissions to the managed identity.","3. For more detailed steps [click Here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/Playbooks/Revoke-AADSignInSessions/readme.md)"],
8+
"postDeployment": ["1. Add Microsoft Sentinel Responder role to the managed identity.", "2. Assign User.RevokeSessions.All API permissions to the managed identity.","3. For more detailed steps [click Here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/Playbooks/Revoke-AADSignInSessions/readme.md)"],
99
"prerequisitesDeployTemplateFile": "",
1010
"lastUpdateTime": "2022-12-22T00:00:00.000Z",
1111
"entities": ["Account"],

Solutions/Microsoft Entra ID/Playbooks/Revoke-AADSignInSessions/incident-trigger/azuredeploy.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
"metadata": {
55
"title": "Revoke Entra ID SignIn Sessions - incident trigger",
66
"description": "This playbook will revoke all signin sessions for the user using Graph API. It will send an email to the user's manager.",
7-
"postDeployment": ["1. Add Microsoft Sentinel Responder role to the managed identity.", "2. Assign User.ReadWrite.All and Directory.ReadWrite.All API permissions to the managed identity.","3. For more detailed steps [click Here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/Playbooks/Revoke-AADSignInSessions/readme.md)"],
7+
"postDeployment": ["1. Add Microsoft Sentinel Responder role to the managed identity.", "2. Assign User.RevokeSessions.All API permissions to the managed identity.","3. For more detailed steps [click Here](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/Playbooks/Revoke-AADSignInSessions/readme.md)"],
88
"lastUpdateTime": "2024-01-08T00:00:00.000Z",
99
"entities": [
1010
"Account"

Solutions/Microsoft Entra ID/Playbooks/Revoke-AADSignInSessions/readme.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,13 @@ After deployment, you can run this playbook manually on an alert or attach it to
3939
- Select Resource group - where Playbook has been created
4040
- Select Role - Microsoft Sentinel Responder
4141
- Click Save (It takes 3-5 minutes to show the added role.)
42-
3. You will need to grant User.ReadWrite.All permissions to the managed identity. Run the following code replacing the managed identity object id. You find the managed identity object id on the Identity blade under Settings for the Logic App.
42+
3. You will need to grant User.RevokeSessions.All permissions to the managed identity. Run the following code replacing the managed identity object id. You find the managed identity object id on the Identity blade under Settings for the Logic App.
4343
```powershell
4444
$MIGuid = "<Enter your managed identity guid here>"
4545
$MI = Get-AzureADServicePrincipal -ObjectId $MIGuid
4646
4747
$GraphAppId = "00000003-0000-0000-c000-000000000000"
48-
$PermissionName = "User.ReadWrite.All"
48+
$PermissionName = "User.RevokeSessions.All"
4949
5050
$GraphServicePrincipal = Get-AzureADServicePrincipal -Filter "appId eq '$GraphAppId'"
5151
$AppRole = $GraphServicePrincipal.AppRoles | Where-Object {$_.Value -eq $PermissionName -and $_.AllowedMemberTypes -contains "Application"}

Solutions/Microsoft Entra ID/ReleaseNotes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** |
22
| ----------- | ------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
3+
| 3.3.7 | 04-12-2025 | Updated Revoke-AADSignInSessions **Playbooks** Instructions |
34
| 3.3.6 | 23-09-2025 | Updated **Analytical Rule** to fix the rule saving issue. <br/> Removed Preview Designation from **Microsoft Entra ID Connector** Data Types. |
45
| 3.3.5 | 25-07-2025 | Updated Entra id Conditional Access (prefix) **Analytical Rule** |
56
| 3.3.4 | 10-07-2025 | Updated **Analytical Rule** NRT_UseraddedtoPrivilgedGroups.yaml and UseraddedtoPrivilgedGroups.yaml

0 commit comments

Comments
 (0)