Azure Temporary Access Pass (TAP) registered to an account
#
This Playbook is part of the Cortex Response And Remediation Pack.Supported versions
Supported Cortex XSOAR versions: 8.9.0 and later.
This playbook addresses the following alerts:
- Abnormal Azure Temporary Access Pass (TAP) account registration
Playbook Stages:
Triage:
- Retrieve additional data about the TAP registration including start/end times, usage type, and user details
Investigation:
- Analyze the reputation of the caller IP address
- Examine alerts from Microsoft Defender 365 related to the TAP assigner
- Check Azure AD risky user status and risk detections
- Review Cortex Core risk level for the user
- Verify creation date of the user account in Azure AD to identify recently created accounts
- Correlate evidence across multiple sources to determine potential compromise
Containment:
- For alerts determined to be true positives, automatically revoke the user's session in Microsoft applications
- Upon analyst approval, disable the user account that granted the TAP
Requirements: For response actions, you need the following integrations:
- Microsoft Graph User.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
IntegrationsThis playbook does not use any integrations.
#
Scripts- GetTime
- Set
- SetAndHandleEmpty
#
Commands- azure-risky-users-list
- azure-risky-users-risk-detections-list
- closeInvestigation
- core-get-cloud-original-alerts
- core-list-risky-users
- ip
- microsoft-365-defender-advanced-hunting
- msgraph-user-account-disable
- msgraph-user-get
- msgraph-user-session-revoke
#
Playbook InputsThere are no inputs for this playbook.
#
Playbook OutputsThere are no outputs for this playbook.