Install the Infoblox Data Connector
As part of the Data connector we are going to create/update Threat Intelligence Indicators using Microsoft Sentinel REST APIs. To use these REST APIs we need Azure Client ID(Application ID) and Client Secret. To generate this Client ID and Client Secret follow the steps mentioned in App Registration and Required Access
Go to Microsoft Sentinel Workspace in which you have installed the template, go to Data Connectors, search for the Infoblox Data Connector.
From the list of available components of the Infoblox Data Connector Integration, click on the Infoblox Data Connector via REST API and click on the Open connector page.
From this connector page click on the Deploy to Azure button.
After clicking, you will be redirected to the actual configuration screen of the Data Connector.
You need to provide the below information and click on the “Review + Create” buttonInfoblox Base Url: Base URL of Infoblox (Default value is present)
Infoblox API Token: Infoblox’s API Key
Confidence: To fetch the indicators greater than provided confidence score
ThreatLevel: To fetch the indicators greater than provided threat level
Azure_Client_Id: Azure clientId of your app registered on Microsoft Entra ID
Azure_Client_Secret: Azure clientSecret created in app in Microsoft Entra ID
Azure_Tenant_Id: Azure Tenant ID found in Microsoft Entra ID
Workspace ID: Provide Workspace ID.
Workspace Key :Provide Workspace Key.
You can find Workspace ID and Workspace Key in the Data Connector page itself.Log Level: Log level or log severity value. By default it is set to INFO
AppInsightsWorkspaceResourceID: Use 'Log Analytic Workspace-->Properties' blade having 'Resource ID' property value. This is a fully qualified resourceId which is in format '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}.
Enter all the details in the connector deployment page and click on Review + Create
Now click on the “Create” button to install the Data connector.
6.After that you can see the deployment status as shown in the image below.
Once the data connector gets installed successfully. It can be found under the Function App
Search and go to the “Function App”
This data connector contains a total of 15 function apps. Search installed function apps with the names starting with hist, curr and dossierlook.
To execute all the 15 functions together, please run the playbook Infoblox-Data-Connector-Trigger-Sync. To deploy and configure this playbook, follow the steps mentioned in the Steps to Configure Playbook section.
User needs to manually run the playbook to execute all the function apps. To do so, go to Logic Apps-> Select the playbook and click on Run button.After successfully adding integration settings, you will start receiving Indicators after around 1:15 hours in Microsoft Sentinel via the configured function app. You can see the threat indicators created in the Threat Intelligence section of Microsoft Sentinel.
It can also be viewed in the Log Analytics Workspace table named ThreatIntelligenceIndicator.