A playbook in Microsoft Sentinel is a collection of actions that can be run as a routine. It can be run manually or set to run automatically in response to specific alerts or incidents. Previously, playbooks designated to run in response to alerts could be automatically invoked only by an analytics rule. Now, you can use automation rules to centrally manage and run your alert-trigger playbooks in addition to your incident-trigger playbooks.
Incident-based or alert-based automation?
Now that both incident automation and alert automation are handled centrally by automation rules in addition to playbooks, how should you choose when to use which?
For most use cases, incident-triggered automation is the preferable approach. In Microsoft Sentinel, an incident is a “case file” – an aggregation of all the relevant evidence for a specific investigation. It’s a container for alerts, entities, comments, collaboration, and other artifacts. Unlike alerts which are single pieces of evidence, incidents are modifiable, have the most updated status, and can be enriched with comments, tags, and bookmarks. The incident allows you to track the attack story which keeps evolving with the addition of new alerts.
For these reasons, it makes more sense to build your automation around incidents. So the most appropriate way to create playbooks is to base them on the Microsoft Sentinel incident trigger in Azure Logic Apps.
The main reason to use alert-triggered automation is for responding to alerts generated by analytics rules which do not create incidents (that is, where incident creation has been disabled in the Incident configuration tab of the analytics rule wizard). A SOC might decide to do this if it wants to use its own logic to determine if and how incidents are created from alerts, as well as if and how alerts are grouped into incidents. For example:
Note: Alert-triggered automation is available only for alerts created by Scheduled analytics rules. Microsoft Security alerts are not supported.
Migrate your alert-triggered playbooks from analytics rules to automation rules
Full details can be found here: Migrate your Microsoft Sentinel alert-trigger playbooks to automation rules
Why to migrate
If you already have configured alert playbooks attached to analytics rules, we strongly encourage you to move these playbooks to automation rules. Doing so will give you the following advantages:
How to migrate
If you’re migrating a playbook invoked by a single analytics rule, follow these instructions.
If you’re migrating a playbook invoked by more than one analytics rule, follow the instructions under Create a new automation rule from portal.
Create a new automation rule from portal
If you’re migrating a playbook invoked by more than one analytics rule, follow these instructions:
Manage automation rules
Three trigger types are now available in the automation rules grid:
You can use the Trigger filter to see only one of them.
Please note that each trigger has its own chain of ordered rules that will run one after the other.
Learn more
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.