Latest Version: beta - Release Date:
- Microsoft Sentinel.
- VMRay Analyzer, VMRay FinalVerdict, VMRay TotalInsight.
- Microsoft Azure
-
Azure functions with Flex Consumption plan. Reference: https://learn.microsoft.com/en-us/azure/azure-functions/flex-consumption-plan
Note: Flex Consumption plans are not available in all regions, please check if the region your are deploying the function is supported, if not we suggest you to deploy the function app with premium plan. Reference: https://learn.microsoft.com/en-us/azure/azure-functions/flex-consumption-how-to?tabs=azure-cli%2Cvs-code-publish&pivots=programming-language-python#view-currently-supported-regions
-
Azure functions Premium plan. Reference: https://learn.microsoft.com/en-us/azure/azure-functions/functions-premium-plan
-
Azure Logic App with Consumption plan. Reference: https://learn.microsoft.com/en-us/azure/logic-apps/logic-apps-pricing#consumption-multitenant
-
Azure storage with Standard general-purpose v2.
-
-
In VMRay Console, you must create a Connector API key.Create it by following the steps below:
- Create a user dedicated for this API key (to avoid that the API key is deleted if an employee leaves)
- Create a role that allows to "View shared submission, analysis and sample" and "Submit sample, manage own jobs, reanalyse old analyses and regenerate analysis reports".
- Assign this role to the created user
- Login as this user and create an API key by opening Settings > Analysis > API Keys.
- Please save the keys, which will be used in configuring the Azure Function.
- Open https://portal.azure.com/ and search
Microsoft Entra IDservice.
- Click
Add->App registration.
- Enter the name of application and select supported account types and click on
Register.
- In the application overview you can see
Application Name,Application IDandTenant ID.
- After creating the application, we need to set API permissions for connector. For this purpose,
- Click
Manage->API permissionstab - Click
Microsoft Graphbutton - Search
indicatorand click on theThreatIndicators.ReadWrite.OwnedBy, clickAdd permissionsbutton below. - Click on
Grant admin consent
- Click
- We need secrets to access programmatically. For creating secrets
- Click
Manage->Certificates & secretstab - Click
Client secretstab - Click
New client secretbutton - Enter description and set expiration date for secret
- Click
- Use Secret
Valueto configure connector.
- Open https://portal.azure.com/ and search
Microsoft Sentinelservice. - Goto
Settings->Workspace Setting
- Goto
Access Control(IAM)->Add
- Search for
Microsoft Sentinel Contributorand clickNext
- Select
User,group or service principleand click onselect members. - Search for the app name created above and click on
select. - Click on
Next
- Click on
Review + assign
-
Click on below button to deploy with Premium plan:
-
Please provide the values accordingly.
| Fields | Description |
|---|---|
| Subscription | Select the appropriate Azure Subscription |
| Resource Group | Select the appropriate Resource Group |
| Region | Based on Resource Group this will be uto populated |
| Function Name | Please provide a function name if needed to change the default value |
| Vmray Base URL | VMRay Base URL |
| Vmray API Key | VMRay API Key |
| Azure Client ID | Enter the Azure Client ID created in the App Registration Step |
| Azure Client Secret | Enter the Azure Client Secret created in the App Registration Step |
| Azure Tenant ID | Enter the Azure Tenant ID of the App Registration |
| Azure Workspacse ID | Enter the Azure Workspacse ID. Go to Log Analytics workspace -> Overview, Copy Workspace ID, refer below image. |
| App Insights Workspace Resource ID | Go to Log Analytics workspace -> Settings -> Properties, Copy Resource ID and paste here |
-
Once you provide the above values, please click on
Review + createbutton. -
Once the threat intelligence function app connector is succussefully deployed, the connector saves the IOCS into the Microsoft Sentinel Threat Intelligence.
- Please provide the values accordingly
| Fields | Description |
|---|---|
| Subscription | Select the appropriate Azure Subscription |
| Resource Group | Select the appropriate Resource Group |
| Region | Based on Resource Group this will be uto populated |
| Function Name | Please provide a function name if needed to change the default value |
| Vmray Base URL | VMRay Base URL |
| Vmray API Key | VMRay API Key |
| Resubmit | If true file will be resubmitted to VMRay |
| App Insights Workspace Resource ID | Go to Log Analytics workspace -> Settings -> Properties, Copy Resource ID and paste here |
- Once you provide the above values, please click on
Review + createbutton.
-
This playbook can be used to enrich sentinel incidents, this playbook when configured to trigger on seninel incidents, the playbook will collect all the
URLentities from the Incident and submits them to VMRay analyzer, once the submission is completed, it will add the VMRay Analysis report to the Incident and creates the IOCs in the microsoft seninel threat intelligence. -
Click on below button to deploy
- It will redirect to configuration page
- Please provide the values accordingly
| Fields | Description |
|---|---|
| Subscription | Select the appropriate Azure Subscription |
| Resource Group | Select the appropriate Resource Group |
| Region | Based on Resource Group this will be uto populated |
| Playbook Name | Please provide a playbook name, if needed |
| Workspace ID | Please provide Log Analytics Workspace ID |
| Function App Name | Please provide the VMRay enrichment function app name |
- Once you provide the above values, please click on
Review + createbutton.
-
This playbook can be used to enrich outlook attachements, this playbook when configured will collect all the
attachementsfrom the email and submits them to VMRay analyzer, once the submission is completed, it will add the VMRay Analysis report by creating an Incident and creates the IOCs in the microsoft seninel threat intelligence. -
Click on below button to deploy
- It will redirect to configuration page
- Please provide the values accordingly
| Fields | Description |
|---|---|
| Subscription | Select the appropriate Azure Subscription |
| Resource Group | Select the appropriate Resource Group |
| Region | Based on Resource Group this will be uto populated |
| Playbook Name | Please provide a playbook name, if needed |
| Workspace Name | Please provide Log Analytics Workspace Name |
| Workspace ID | Please provide Log Analytics Workspace ID |
| Function App Name | Please provide the VMRay enrichment function app name |
- Once you provide the above values, please click on
Review + createbutton.
- Open https://portal.azure.com/ and search
Microsoft Sentinelservice. - Goto
Settings->Workspace Setting
- Goto
Access Control(IAM)->Add
- Search for
Microsoft Sentinel Contributorand clickNext
- Select
Managed Identityand click onselect members. - Search for the Logic app name deployed above and click on
select. - Click on
Next
- Click on
Review + assign


















