I am trying to find a way to attach a playbook to the default Microsoft Security alert rules in Azure Sentinel. I am referring to the rules that automatically create Azure Sentinel incidents from alerts in other connected Microsoft security products (e.g. WDATP, Azure ATP, MCAS, etc.). The idea is that we've created a playbook(logic app) which automatically notifies a specific team via email and logs an incident in Service Now, We can attach the playbook to the other alert rules from the "Automated Response" tab when creating the rule from a template.
However, when you create an alert rule from a Microsoft Security default template (e.g. "Create incidents based on Azure Advanced Threat Protection alerts") you do not have this option (the "Automated Response" tab), hence you cannot attach a playbook to run automatically when an incident from this rule is created in Sentinel.
Is there any way to be able to this?
I know that after the incident is created you can run the playbook manually, but the goal would be to run it automatically for this type of incidents as well.
@Cristian Calinescu You will need to create a playbook where trigger is alert in whatever Azure Security tool you want to monitor alerts in, like Azure Security center or Advanced Threat Protection. Then you can trigger playbooks when such alerts are created. For example:
@GunarsL- Thanks for the reply. This works indeed, but only for WDATP and Azure Security Center alerts. There is no trigger connector for Azure ATP, Microsoft Cloud App Security or O365 ATP alerts. Any further advise?