Playbook management prerequisites
Last updated on:
Overview
This document outlines the prerequisites for executing playbook actions, including supported OS platforms, necessary ports, protocols, and permission settings. It details the configurations required across Windows, Linux, AD, and firewall devices to ensure seamless response execution during security events.
Prerequisites
List of devices supported
- All types of Windows operating system.
- Linux operating systems:
- Ubuntu
- Debian
- Fedora
- CentOS
- Red Hat Enterprise Linux (RHEL)
- Arch Linux
- SUSE Linux Enterprise Server (SLES)
- openSUSE
- Gentoo OS
Below are the necessary configurations to be made in order to access the playbook capability
Guide:
Port: Used for communication (this port should be open, free, and allowed in firewall)
Inbound: To which device/application the action is targeted towards.
Outbound: From where the action is raised.
Service: Which service/protocol will be used to execute this action.
NETWORK ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND |
|---|---|---|---|
| PING DEVICE | ICMP/No ports | Audited Windows / Linux Device | EventLog Analyzer Server |
| TRACE ROUTE WINDOWS | ICMP/No ports | Audited Windows Device | EventLog Analyzer Server |
| TRACE ROUTE LINUX | UDP/33434 -33534 | Audited Linux Device | EventLog Analyzer Server |
WINDOWS ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| LogOff | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups: Distributed COM Users User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Shutdown and Restart | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups: Distributed COM Users User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Execute Windows Script | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups: Distributed COM Users User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Disable USB | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups: Distributed COM Users User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| ALL SERVICE BLOCK | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC | UserGroups:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| START PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups: Distributed COM Users User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| STOP PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC | UserGroups: Distributed COM Users User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| TEST PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups: Distributed COM Users User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports |
LINUX ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| Shutdown and Restart | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission : The user should be the root user. |
| Execute Windows Script | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission : Sudo permission for user. |
| ALL SERVICE BLOCK | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission : Sudo permission. |
| START PROCESS | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission : The permission to execute the command should be available for the user whose credentials are provided. |
| STOP PROCESS | Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission : The permission to execute the command should be available for the user whose credentials are provided. |
| TEST PROCESS | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | - |
NOTIFICATIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| Pop Up WINDOWS | TCP/135 | Audited Linux Device | EventLog Analyzer Server | RPC |
UserGroups: Distributed COM Users User Permissions For root\cim v2 In WMI Properties:
|
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Pop Up LINUX | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission for user. |
| Send Email WINDOWS & LINUX | TCP/Port mentioned while config using SMTP server | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: SMTP server should be configured on Event log analyzer server |
| Send SMS WINDOWS & LINUX | - | - | - | - | Environment Permission: SMS Server should be configured in the product. |
| Send SNMP Trap WINDOWS & LINUX | UDP/Port specified in workflow block | Audited Windows / Linux Device | EventLog Analyzer Server | - | Environment Permission: The port mentioned in workflow configuration should be open. |
AD ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| DELETE AD USER WINDOWS | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP | User Permissions:
|
| DISABLE AD USER WINDOWS | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP | User Permissions: The User account provided should have "Read","Write ","modify owners" and "modify permissions" permissions enabled. |
| DISABLE USER COMPUTER WINDOWS & LINUX | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP | User Permission: The User account provided should have "Read", "Write" , "modify owners" and "modify permissions" permissions enabled. |
MISCELLANEOUS ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|---|
| WRITE TO FILE WINDOWS | TCP/135 | Audited Windows Device | EventLog Analyzer Server |
UserGroups: Distributed COM Users User Rights:
User Permissions: For root\cim v2 In Properties:
|
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | ||
| WRITE TO FILE LINUX | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | Environment Permission: Sudo permission for user |
| HTTP WebHook | - | - | - | Environment Permission: A "connect" Socket Permission to the host/port combination of the destination URL or a "URL Permission" that permits this request. |
| FORWARD LOGS | TCP/Specified Port | Audited Windows / Linux Device | EventLog Analyzer Server | - |
| CSV LOOKUP | TCP/Specified Port | Audited Windows / Linux Device | EventLog Analyzer Server | User Permissions: Read permission to the specified CSV file. |
FIREWALL ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|---|
| Cisco ASA deny inbound/Outbound rules | https/443 | Firewall Device | EventLog Analyzer Server | Ports User Customizable Additional Rights: Refer to this page |
| Fortigate deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server | Ports User Customizable Additional Rights: Refer to this page |
| Palo Alto deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server | Ports User Customizable Additional Rights: Refer to this page |
| Sophos XG deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server | Ports User Customizable Additional Rights: Refer to this page |
| Barracuda deny Access rules | https/8443 | Firewall Device | EventLog Analyzer Server | Ports User Customizable Additional Rights: Refer to this page |
Read also
This guide covers the groundwork for executing playbooks. For a deeper understanding of automation and orchestration in security response, refer to: