This site contains technical information to onboard to WA HoneyTraps program.
- Refer to information and instructions provided in WASOC Honey Trap (Pilot) get onboard to WA Honeytraps Program.
- Verify that a Canary group has been provisioned for agency by WA SOC.
- Deploy integration webhook logic-apps Azure Logic App Deployment Guide
- Deploy analytic rules for Microsoft Sentinel Analytic Rules Deployment Guide
- Ensure analytic rules and Logic Apps have been enabled
- Initiate end-to-end test to generate alert
For questions or feedback, please contact [email protected]
The following steps will guide you on utilising Azure ARM templates to deploy logic-app resource(s) to send canary alerts from the canary platform to the agency's Sentinel workspace.
- Requires an Azure Log Analytics Workspace (to ingest the data from Canary platform)
- Required permissions to deploy the logic app and resources
- A Canary group that has been provisioned by WASOC
To start the deployment of the logic app to Azure, click on the Deploy to 'Azure button' shown below.
You will be redirected to the custom deployment screen in azure portal. Select/ fill-in the required information.
Field description:
- Subscription: The subscriptions where the Logic apps will be deployed to
- Resource Group: The resource group where the Logic apps will be deployed to
- Log Analytics Workspace ID: The workspaceId of Sentinel log analytics workspace, where the canary/ canary-token logs will be send to
- Log Analytics Workspace Key: The primary key of the agent for Sentinel log analytics workspace, where the canary/ canary-token will be send to
Note: Do not replace or change the value in the 'Unique Key' field as this will be used to generate a unique key for the webhook header.
Reference:
Review and ensure all details provided in the deployment are correct and proceed with creating the resources. Otherwise, select the 'previous' button to go back and make any changes.
Navigate to your resource group from the deployment details page, and select your deployed Logic App (containing the name that you provided in the Step 2).
Your deployed Logic App under the Logic App designer, should look similar to the image shown below.
Capture the following information from your Logic App deployment for setting up a webhook with the Canary platform.
- Select the 'manual' action on the Logic App.
- Copy/note down the value under the 'HTTP URL' section, as shown below.
- Select the 'Condition' action from the Logic App.
- Copy/note down the 'key' value in the right side of the 'is equal to' condition. (This is a GUID that is unique to you and will be used in setting up the webhook with the Canary platform)
Provide the two pieces of information collected in Step 5 and Step 6 to the WASOC team for completing the integration of the Canary platform with your Sentinel environment.
- Webhook URL from Step 5
- GUID value from Step 6
The following steps will guide you on deploying analytic-rules to generate alerts and incident in your Microsoft Sentinel workspace.
- You must have set up send-canary-alert-webhook logic-apps prior to deploying the analytic rules
- The analytic rule uses the following default table name: CanaryLogs_CL
To start the deployment of the Azure Analytic Rules for each type of canary, click on the 'Deploy to Azure' buttons shown below.
Canary Tokens - Analytic Rules | |
---|---|
Canary - Analytic Rules |
Note: Please deploy each analytic rule template one at a time.
You will be redirected to the custom deployment screen in azure portal. Select/ fill-in the required information
Field description:
- Subscription: The subscriptions where the Sentinel workspace is located
- Resource Group: The resource group where the Sentinel workspace is located
- Region: The region where the Sentinel workspace is located
- Workspace Name: The workspaceId of Sentinel log analytics workspace, where the analytic rule will be deployed to
- Rule Id: Value to obtain a new Rule Id using the newGuid function in Azure
- Domain: The domain name for the canary platform, to be provided by WASOC.
Note: Do not replace or change the value in the 'Rule Id' field, this is to generate unique Id for your analytic rules.
Review and ensure all details provided in the deployment are correct and proceed with creating the resources. Otherwise, select the 'previous' button to go back and make any changes.
Navigate to Analytics blade inside the Microsoft Sentinel, and verify that the analytics rules has been created and enabled.
Initiate test to generate incident from the canary platform, and verify that incidents were generated in Microsoft Sentinel.
To initiate an end-to-end test the integration of the canary platform and the SIEM, you could do the following.
- You must have a canary group provisioned by WA SOC.
- You must have completed the Azure Logic App Deployment and have Analytic Rules Deployed.
Create a new canary token within your canary group.
Trigger the canary token by interacting with it.
Navigate to your Log Analytics Workspace to check if any alerts have been ingested.
It may take up to 5 minutes for the alerts to ingest
If you have alerts being ingested into your Log Analytics Workspace, you have successfully completed your canary platform and SIEM integration.
For questions or feedback, please contact [email protected]