Latest Version: 1.0.0 - Release Date: 15/09/2025
- Microsoft Sentinel.
- JoeSandbox API Key.
- Microsoft Azure
-
Azure functions with Flex Consumption plan. Reference: https://learn.microsoft.com/en-us/azure/azure-functions/flex-consumption-plan
Note: Flex Consumption plans are not available in all regions, please check if the region you are deploying the function is supported, if not we suggest you to deploy the function app with premium plan. Reference: https://learn.microsoft.com/en-us/azure/azure-functions/flex-consumption-how-to?tabs=azure-cli%2Cvs-code-publish&pivots=programming-language-python#view-currently-supported-regions
-
Azure functions Premium plan. Reference: https://learn.microsoft.com/en-us/azure/azure-functions/functions-premium-plan
-
Azure Logic App with Consumption plan. Reference: https://learn.microsoft.com/en-us/azure/logic-apps/logic-apps-pricing#consumption-multitenant
-
Azure storage with Standard general-purpose v2.
-
- Open https://portal.azure.com/ and search
Microsoft Entra IDservice.
- Click
Add->App registration.
- Enter the name of application and select supported account types and click on
Register.
- In the application overview you can see
Application Name,Application IDandTenant ID.
- After creating the application, we need to set API permissions for connector. For this purpose,
- Click
Manage->API permissionstab - Click
Microsoft Graphbutton - Search
indicatorand click on theThreatIndicators.ReadWrite.OwnedBy, clickAdd permissionsbutton below. - Click on
Grant admin consent
- Click
- We need secrets to access programmatically. For creating secrets
- Click
Manage->Certificates & secretstab - Click
Client secretstab - Click
New client secretbutton - Enter description and set expiration date for secret
- Click
- Use Secret
Valueto configure connector.
- Open https://portal.azure.com/ and search
Microsoft Sentinelservice. - Goto
Settings->Workspace Setting
- Goto
Access Control(IAM)->Add
- Search for
Microsoft Sentinel Contributorand clickNext
- Select
User,group or service principleand click onselect members. - Search for the app name created above and click on
select. - Click on
Next
- Click on
Review + assign
- Click on below button to deploy with Flex Consumption plan:
- Click on below button to deploy with Premium plan:
| Fields | Description |
|---|---|
| Subscription | Select the appropriate Azure Subscription |
| Resource Group | Select the appropriate Resource Group |
| Region | Based on Resource Group this will be uto populated |
| Function Name | Please provide a function name if needed to change the default value |
| Joe Sandbox Base URL | Joe Sandbox Base URL |
| Joe Sandbox API Key | Joe Sandbox API Key |
| Azure Client ID | Enter the Azure Client ID created in the App Registration Step |
| Azure Client Secret | Enter the Azure Client Secret created in the App Registration Step |
| Azure Tenant ID | Enter the Azure Tenant ID of the App Registration |
| Azure Workspacse ID | Enter the Azure Workspacse ID. Go to Log Analytics workspace -> Overview, Copy Workspace ID |
| App Insights Workspace Resource ID | Go to Log Analytics workspace -> Settings -> Properties, Copy Resource ID and paste here |
-
Once you provide the above values, please click on
Review + createbutton. -
Once the threat intelligence function app connector is successfully deployed, the connector saves the IOCS into the Microsoft Sentinel Threat Intelligence.
- Please provide the values accordingly
| Fields | Description |
|---|---|
| Subscription | Select the appropriate Azure Subscription |
| Resource Group | Select the appropriate Resource Group |
| Region | Based on Resource Group this will be uto populated |
| Function Name | Please provide a function name if needed to change the default value |
| Joe Sandbox Base URL | Joe Sandbox Base URL |
| Joe Sandbox API Key | Joe Sandbox API Key |
| Resubmit | If true file will be resubmitted to JoeSandbox |
| App Insights Workspace Resource ID | Go to Log Analytics workspace -> Settings -> Properties, Copy Resource ID and paste here |
- Once you provide the above values, please click on
Review + createbutton.
-
This playbook can be used to enrich sentinel incidents, this playbook when configured to trigger on seninel incidents, the playbook will collect all the
URLentities from the Incident and submits them to JoeSandbox, once the submission is completed, it will add the JoeSandbox Analysis report to the Incident and creates the IOCs in the microsoft seninel threat intelligence. -
Click on below button to deploy
- It will redirect to configuration page
- Please provide the values accordingly
| Fields | Description |
|---|---|
| Subscription | Select the appropriate Azure Subscription |
| Resource Group | Select the appropriate Resource Group |
| Region | Based on Resource Group this will be uto populated |
| Playbook Name | Please provide a playbook name, if needed |
| Workspace ID | Please provide Log Analytics Workspace ID |
| Function App Name | Please provide the JoeSandbox enrichment function app name |
- Once you provide the above values, please click on
Review + createbutton.
-
This playbook can be used to enrich outlook attachments, this playbook when configured will collect all the
attachementsfrom the email and submits them to JoeSandbox, once the submission is completed, it will add the JoeSandbox Analysis report by creating an Incident and creates the IOCs in the microsoft seninel threat intelligence. -
Click on below button to deploy
- It will redirect to configuration page
- Please provide the values accordingly
| Fields | Description |
|---|---|
| Subscription | Select the appropriate Azure Subscription |
| Resource Group | Select the appropriate Resource Group |
| Region | Based on Resource Group this will be uto populated |
| Playbook Name | Please provide a playbook name, if needed |
| Workspace Name | Please provide Log Analytics Workspace Name |
| Workspace ID | Please provide Log Analytics Workspace ID |
| Function App Name | Please provide the JoeSandbox enrichment function app name |
- Once you provide the above values, please click on
Review + createbutton.
- Open https://portal.azure.com/ and search
Microsoft Sentinelservice. - Goto
Settings->Workspace Setting
- Goto
Access Control(IAM)->Add
- Search for
Microsoft Sentinel Contributorand clickNext
- Select
Managed Identityand click onselect members. - Search for the Logic app name deployed above and click on
select. - Click on
Next
- Click on
Review + assign

















