Skip to content

joesecurity/ms-sentinel

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

JoeSandbox Threat Intelligence Feed and Enrichment Integration - Microsoft Sentinel

Latest Version: 1.0.0 - Release Date: 15/09/2025

Overview

Requirements

Microsoft Sentinel

Creating Application for API Access

01

  • Click Add->App registration.

02a

  • Enter the name of application and select supported account types and click on Register.

02

  • In the application overview you can see Application Name, Application ID and Tenant ID.

03

  • After creating the application, we need to set API permissions for connector. For this purpose,
    • Click Manage->API permissions tab
    • Click Microsoft Graph button
    • Search indicator and click on the ThreatIndicators.ReadWrite.OwnedBy, click Add permissions button below.
    • Click on Grant admin consent

app_per

  • We need secrets to access programmatically. For creating secrets
    • Click Manage->Certificates & secrets tab
    • Click Client secrets tab
    • Click New client secret button
    • Enter description and set expiration date for secret

10

  • Use Secret Value to configure connector.

11

Provide Permission To App Created Above

04

  • Goto Access Control(IAM) -> Add

05

  • Search for Microsoft Sentinel Contributor and click Next

06

  • Select User,group or service principle and click on select members.
  • Search for the app name created above and click on select.
  • Click on Next

07

  • Click on Review + assign

08

Deploy JoeSandbox Threat Intelligence Feed Function App Connector

Flex Consumption Plan

  • Click on below button to deploy with Flex Consumption plan:

Deploy to Azure

Premium Plan

  • Click on below button to deploy with Premium plan:

Deploy to Azure

  • It will redirect to feed Configuration page. 09
  • Please provide the values accordingly.
Fields Description
Subscription Select the appropriate Azure Subscription
Resource Group Select the appropriate Resource Group
Region Based on Resource Group this will be uto populated
Function Name Please provide a function name if needed to change the default value
Joe Sandbox Base URL Joe Sandbox Base URL
Joe Sandbox API Key Joe Sandbox API Key
Azure Client ID Enter the Azure Client ID created in the App Registration Step
Azure Client Secret Enter the Azure Client Secret created in the App Registration Step
Azure Tenant ID Enter the Azure Tenant ID of the App Registration
Azure Workspacse ID Enter the Azure Workspacse ID. Go to Log Analytics workspace -> Overview, Copy Workspace ID
App Insights Workspace Resource ID Go to Log Analytics workspace -> Settings -> Properties, Copy Resource ID and paste here
  • Once you provide the above values, please click on Review + create button.

  • Once the threat intelligence function app connector is successfully deployed, the connector saves the IOCS into the Microsoft Sentinel Threat Intelligence.

ti_feed

Deploy JoeSandbox Enrichment Function App Connector

  • Click on below button to deploy

    Deploy to Azure

  • It will redirect to feed Configuration page.

13

  • Please provide the values accordingly
Fields Description
Subscription Select the appropriate Azure Subscription
Resource Group Select the appropriate Resource Group
Region Based on Resource Group this will be uto populated
Function Name Please provide a function name if needed to change the default value
Joe Sandbox Base URL Joe Sandbox Base URL
Joe Sandbox API Key Joe Sandbox API Key
Resubmit If true file will be resubmitted to JoeSandbox
App Insights Workspace Resource ID Go to Log Analytics workspace -> Settings -> Properties, Copy Resource ID and paste here
  • Once you provide the above values, please click on Review + create button.

Deploy JoeSandbox Enrichment Logic Apps

JoeSandbox-Submit-Url-Sentinel-Incident Logic App

  • This playbook can be used to enrich sentinel incidents, this playbook when configured to trigger on seninel incidents, the playbook will collect all the URL entities from the Incident and submits them to JoeSandbox, once the submission is completed, it will add the JoeSandbox Analysis report to the Incident and creates the IOCs in the microsoft seninel threat intelligence.

  • Click on below button to deploy

Deploy to Azure

  • It will redirect to configuration page

url_playbook

  • Please provide the values accordingly
Fields Description
Subscription Select the appropriate Azure Subscription
Resource Group Select the appropriate Resource Group
Region Based on Resource Group this will be uto populated
Playbook Name Please provide a playbook name, if needed
Workspace ID Please provide Log Analytics Workspace ID
Function App Name Please provide the JoeSandbox enrichment function app name
  • Once you provide the above values, please click on Review + create button.

JoeSandbox-Submit-File-Outlook-Attachment Logic App

  • This playbook can be used to enrich outlook attachments, this playbook when configured will collect all the attachements from the email and submits them to JoeSandbox, once the submission is completed, it will add the JoeSandbox Analysis report by creating an Incident and creates the IOCs in the microsoft seninel threat intelligence.

  • Click on below button to deploy

Deploy to Azure

  • It will redirect to configuration page

email_playbook

  • Please provide the values accordingly
Fields Description
Subscription Select the appropriate Azure Subscription
Resource Group Select the appropriate Resource Group
Region Based on Resource Group this will be uto populated
Playbook Name Please provide a playbook name, if needed
Workspace Name Please provide Log Analytics Workspace Name
Workspace ID Please provide Log Analytics Workspace ID
Function App Name Please provide the JoeSandbox enrichment function app name
  • Once you provide the above values, please click on Review + create button.

Provide Permission to Logic app

04

  • Goto Access Control(IAM) -> Add

05

  • Search for Microsoft Sentinel Contributor and click Next

06

  • Select Managed Identity and click on select members .
  • Search for the Logic app name deployed above and click on select.
  • Click on Next

38

  • Click on Review + assign

About

Microsoft Sentinel Integration for Joe Sandbox

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages