Splunk SOAR

How to block outgoing traffic with the SOAR app for Microsoft Defender for Endpoint

1var
Engager

We're looking to block outgoing traffic from a specific client or group, using the Microsoft Defender for Endpoint-app.

If we were to implement this ourselves using the MS api, it would be something like:

POST https://api.securitycenter.microsoft.com/api/machines/{machineId}/restrict
Authorization: Bearer {your_access_token}
Content-Type: application/json
{
"action": "Block",
"destination": "IP_ADDRESS_OR_DOMAIN",
"protocol": "TCP",
"port": "443"
}


However, I haven't been able to find a corresponding call in the app source code. Am I missing something, or isn't this currently supported?

Labels (1)
0 Karma
1 Solution

1var
Engager

It looks as if the app-functions "Submit indicator" will be able to solve this for us: 

{
  "indicatorValue": "9.9.9.9",
  "indicatorType": "IpAddress",
  "action": "Block",
  "title": "Block outbound traffic to 9.9.9.9",
  "description": "Referanse: JIRA-XYZ",
  "generateAlert": true
}

View solution in original post

0 Karma

1var
Engager

It looks as if the app-functions "Submit indicator" will be able to solve this for us: 

{
  "indicatorValue": "9.9.9.9",
  "indicatorType": "IpAddress",
  "action": "Block",
  "title": "Block outbound traffic to 9.9.9.9",
  "description": "Referanse: JIRA-XYZ",
  "generateAlert": true
}
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security(ES) 7.3 is approaching the end of support. Get ready for ...

Hi friends!    At Splunk, your product success is our top priority. With Enterprise Security (ES), we're here ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...