Adding playbooks to Microsoft Security out-of-the-box alert rule templates

Brass Contributor

Hi all,

I am trying to find a way to attach a playbook to the default Microsoft Security alert rules in Azure Sentinel. I am referring to the rules that automatically create Azure Sentinel incidents from alerts in other connected Microsoft security products (e.g. WDATP, Azure ATP, MCAS, etc.). The idea is that we've created a playbook(logic app) which automatically notifies a specific team via email and logs an incident in Service Now, We can attach the playbook to the other alert rules from the "Automated Response" tab when creating the rule from a template.Capture.PNG

 

However, when you create an alert rule from a Microsoft Security default template (e.g. "Create incidents based on Azure Advanced Threat Protection alerts") you do not have this option (the "Automated Response" tab), hence you cannot attach a playbook to run automatically when an incident from this rule is created in Sentinel.

Is there any way to be able to this? 

I know that after the incident is created you can run the playbook manually, but the goal would be to run it automatically for this type of incidents as well.

9 Replies

@Cristian Calinescu You will need to create a playbook where trigger is alert in whatever Azure Security tool you want to monitor alerts in, like Azure Security center or Advanced Threat Protection. Then you can trigger playbooks when such alerts are created. For example:

clipboard_image_0.png

@GunarsL- Thanks for the reply. This works indeed, but only for WDATP and Azure Security Center alerts. There is no trigger connector for Azure ATP, Microsoft Cloud App Security or O365 ATP alerts. Any further advise?

Does anyone have any other ideas in regards to this?

Hi @Ofer_Shezaf this one has been open a while. Are we likely to get functionality where we can run automated responses for all rule types? It really breaks up workflows where they're intended to be managed in other tools (Jira, SNow). Operators now need to be eyes on glass in Sentinel as well.

 

The only workaround we're aware of is to write a scheduled rule (for each severity) that searches the SecurityAlert table :sad:

@pemontto : the feature is currently in private preview.

@Ofer_Shezaf Do you have an update on the progress for this feature ?

Thanks

@Manvie : still in private preview, I hope we are getting closer to going public. We made major changes based on private preview input.

@Asaad_Moosa Azure Sentinel Automation is available to everyone.  You can create a playbook that uses the Azure Sentinel incident trigger and then create an automation rule that can be run when the rule creates an incident.

 

https://docs.microsoft.com/en-us/azure/sentinel/automate-incident-handling-with-automation-rules