Microsoft Secure Tech Accelerator
Apr 03 2024, 07:00 AM - 11:00 AM (PDT)
Microsoft Tech Community

Playbook Triggering

Brass Contributor

Hi everyone!

 

I'm working with playbooks and we want to get a copy of every Incident created in Sentinel sent to a centralised location. I originally implemented this with every Alert that fired, but that does not give every Incident; the Incidents created from other Sentinel components (MCAS, O365, PIM, etc) do not have the ability to launch a playbook like a regular Analytics Rule.

 

I recently saw the following option for a Playbook Trigger:

 

Screenshot 2020-11-23 at 16.13.15.png

 

However, I cannot figure out how to reference it within any Analytics Rule or anywhere within Sentinel! It does not seem to fire on its own when Incidents are created. How is this supposed to work?

3 Replies

@JKatzmandu This feature is still in private preview and, as far as I know, there is no official date for it to go to public preview.  It is a bit confusing that the trigger shows up without being able to use it.

 

 

@Gary Bushey That's good to know. It is mentioned in documentation, but scantly. I'm back to running a query every 5 minutes against the "SecurityIncident" table to search for "New" incidents and then forwarding them via e-mail. I have a Condition that checks for the existence of the "IncidentUrl" string in the query results. If it's there, send the e-mail. If not, nada.

Also doing the same but with one analytic per severity. Can't wait until this has a first class solution!