Go to Microsoft Sentinel Workspace in which you have installed the template, go to Data Connectors, search for the Infoblox Data Connector.
From the list of available components of the Infoblox Data Connector Integration, click on the Infoblox Data Connector via REST API and click on the Open connector page.
From this connector page click on the Deploy to Azure button.
After clicking, you will be redirected to the actual configuration screen of the Data Connector.
You need to provide the below information and click on the “Review + Create” buttonInfoblox Base Url: Base URL of Infoblox (Default value is present)
Infoblox API Token: API Token of Infoblox
Confidence: To fetch the indicators greater than provided confidence score
ThreatLevel: To fetch the indicators greater than provided threat level
Azure_Client_Id: Azure clientId of your app registered on Microsoft Entra ID
Azure_Client_Secret: Azure clientSecret created in app in Microsoft Entra ID
Azure_Tenant_Id: Azure Tenant ID found in Microsoft Entra ID
Workspace ID: Provide Workspace ID.
Workspace Key :Provide Workspace Key.
You can find Workspace ID and Workspace Key in the Data Connector page itself.Log Level: Log level or log severity value. By default it is set to INFO
AppInsightsWorkspaceResourceID: Use 'Log Analytic Workspace-->Properties' blade having 'Resource ID' property value. This is a fully qualified resourceId which is in format '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}.
NOTE: In this integration, We are going to create/update Threat Intelligence Indicators using Microsoft Sentinel REST APIs. To use these REST APIs we need Azure Client ID(Application ID) and Client Secret. To generate this Client ID and Client Secret follow below steps
App Registration steps for the Application in Microsoft Entra ID
This integration requires an App registration in the Azure portal. Follow the steps in this section to create a new application in Microsoft Entra ID:Sign in to the Azure portal.
Search for and select Microsoft Entra ID.
Under Manage, select App registrations
Click on New Registration
Enter a display Name for your application.
Select Register to complete the initial app registration.
When registration finishes, the Azure portal displays the app registration's Overview pane.
You see the Application (client) ID and Tenant ID. The client ID and Tenant ID are required as configuration parameters for the execution of Infoblox MS Sentinel Data Connector.
Add a client secret for application in Microsoft Entra ID
Sometimes called an application password, a client secret is a string value required for the execution of Infoblox MS Sentinel Data Connector. Follow the steps in this section to create a new Client Secret
In the Azure portal, in App registrations, select your application.
From Manage, Select Certificates & secrets > Client secrets > New client secret.
Add a Description for your client secret.
Select an expiration for the secret or specify a custom lifetime. Limit is 24 months.
Select Add.
Record the secret's value for use in your client application code. This secret value is never displayed again after you leave this page. The secret value is required as a configuration parameter for the execution of Infoblox MS Sentinel Data Connector.
Assign role of Contributor to application in Microsoft Entra ID
In the Azure portal, Go to Resource Group and select your resource group.
Go to Access control (IAM) from left panel.
Click on Add, and then select Add role assignment.
Select Contributor as role from Privileged administrator roles and click on next.
In Assign access to, select User, group, or service principal.
Click on add members and type your app name that you have created and Select it. Now click on Review + assign and then again click on Review + assign.
Once, the application is created, enter the details in the connector deployment page and click on Review + Create
Now click on the “Create” button to install the Data connector.
6.After that you can see the deployment status as shown in the image below.
Once the data connector gets installed successfully. It can be found under the Function App
Search and go to the “Function App”
This data connector contains a total of 15 function apps. Search installed function apps with the names starting with hist, curr and dossierlook.
To execute all the 15 functions together, please run the playbook Infoblox-Data-Connector-Trigger-Sync. To deploy and configure this playbook, follow the steps mentioned in the Steps to Configure Playbook section.
User needs to manually run the playbook to execute all the function apps. To do so, go to Logic Apps-> Select the playbook and click on Run button.After successfully adding integration settings, you will start receiving Indicators after around 1:15 hours in Microsoft Sentinel via the configured function app. You can see the threat indicators created in the Threat Intelligence section of Microsoft Sentinel.
It can also be viewed in the Log Analytics Workspace table named ThreatIntelligenceIndicator.