Skip to content

Add Vaikora AI Agent Signals to SentinelOne — Microsoft Sentinel Solution v1.0.0#13985

Open
mazamizo21 wants to merge 50 commits intoAzure:masterfrom
mazamizo21:feature/vaikora-sentinelone-azure-v1.0.0
Open

Add Vaikora AI Agent Signals to SentinelOne — Microsoft Sentinel Solution v1.0.0#13985
mazamizo21 wants to merge 50 commits intoAzure:masterfrom
mazamizo21:feature/vaikora-sentinelone-azure-v1.0.0

Conversation

@mazamizo21
Copy link
Copy Markdown
Contributor

Vaikora AI Agent Signals to SentinelOne — Microsoft Sentinel Solution v1.0.0

This PR adds a Logic App playbook solution that polls Vaikora AI agent behavioral signals and pushes high-severity indicators as Threat Intelligence IOCs to SentinelOne.

What's included

Logic App Playbook (VaikoraToSentinelOne_Playbook.json)

  • Runs on a configurable schedule (default: every 6 hours)
  • Polls Vaikora GET /api/v1/actions for high-risk + anomalous agent actions
  • Authenticates to SentinelOne via API Token header
  • Pushes IOC indicators to POST /web/api/v2.1/threat-intelligence/iocs

Signal Mapping

  • risk_score 75-89 → S1 severity: 5 (high)
  • risk_score 90+ → S1 severity: 7 (critical)
  • is_anomaly: true → description includes anomaly reason
  • threat_detected: true → externalId tagged with threat indicator

Parameters

  • VaikoraApiKey (securestring)
  • VaikoraAgentId
  • SentinelOne_ApiToken (securestring)
  • SentinelOne_BaseUrl (e.g. https://usea1.sentinelone.net)
  • SentinelOne_AccountId

Notes

  • Requires filter.accountIds in POST body (S1 enforcement requirement)
  • IOC type set to IPV4/IPV6 based on Vaikora signal indicators
  • expirationMode: 90 days from signal detection

Publisher

Data443 Risk Mitigation, Inc. — support@data443.com

@mazamizo21 mazamizo21 requested review from a team as code owners April 3, 2026 06:55
@v-shukore v-shukore self-assigned this Apr 3, 2026
@v-shukore v-shukore added the New Solution For new Solutions which are new to Microsoft Sentinel label Apr 3, 2026
@mazamizo21 mazamizo21 force-pushed the feature/vaikora-sentinelone-azure-v1.0.0 branch from d91b17d to f3ea143 Compare April 3, 2026 14:59
@mazamizo21
Copy link
Copy Markdown
Contributor Author

Hi @v-maheshbh — done! Repackaged with version 3.0.0. Package/3.0.0.zip is now included. Thanks!

Taz Jack added 5 commits April 3, 2026 12:13
…ntId1), parentId bracket, arm-ttk clean (47-48/49 matching Cyren baseline)
…ated response

Vaikora API returns a paginated envelope: {"actions": [...], "total": N, ...}
not a bare array. Filter_High_Severity_Or_Anomaly was passing the whole object
to the 'from' property, which expects an array and failed with:
"The 'from' property value in the 'query' action is of type 'Object'."

Fix: changed 'from' to @Body('Get_Vaikora_Actions')?['actions']

Also fixes in same pass:
- Added workspace-name variable (was missing, caused template ref errors)
- playbookContentId1: "Playbooks" -> "VaikoraToSentinelOne_Playbook"
- PlaybookName defaultValue: "pb-vaikora-to-sentinelone" -> "VaikoraToSentinelOne_Playbook"
- Parameter casing: VaikoraApiKey/VaikoraAgentId -> vaikoraApiKey/vaikoraAgentId
- displayName: "Playbooks" -> "VaikoraToSentinelOne_Playbook"
- Rebuilt 3.0.0.zip

E2E tested: Logic App deployed to rg-vaikora-test, triggered, 6 anomaly IOCs
pushed to SentinelOne TI API (source: "Vaikora AI Agent Security (Data443)")
@v-shukore
Copy link
Copy Markdown
Contributor

Hi @mazamizo21, accidently you have added multiple solutions in this PR please remove it all and clean the solution. Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

New Solution For new Solutions which are new to Microsoft Sentinel

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants