Nov 05 2019 02:03 AM
Nov 05 2019 02:03 AM
I am trying to find a way to attach a playbook to the default Microsoft Security alert rules in Azure Sentinel. I am referring to the rules that automatically create Azure Sentinel incidents from alerts in other connected Microsoft security products (e.g. WDATP, Azure ATP, MCAS, etc.). The idea is that we've created a playbook(logic app) which automatically notifies a specific team via email and logs an incident in Service Now, We can attach the playbook to the other alert rules from the "Automated Response" tab when creating the rule from a template.
However, when you create an alert rule from a Microsoft Security default template (e.g. "Create incidents based on Azure Advanced Threat Protection alerts") you do not have this option (the "Automated Response" tab), hence you cannot attach a playbook to run automatically when an incident from this rule is created in Sentinel.
Is there any way to be able to this?
I know that after the incident is created you can run the playbook manually, but the goal would be to run it automatically for this type of incidents as well.
Nov 05 2019 05:00 AM
@Cristian Calinescu You will need to create a playbook where trigger is alert in whatever Azure Security tool you want to monitor alerts in, like Azure Security center or Advanced Threat Protection. Then you can trigger playbooks when such alerts are created. For example:
Nov 06 2019 01:21 AM
@GunarsL- Thanks for the reply. This works indeed, but only for WDATP and Azure Security Center alerts. There is no trigger connector for Azure ATP, Microsoft Cloud App Security or O365 ATP alerts. Any further advise?
Nov 11 2019 05:07 AM
Does anyone have any other ideas in regards to this?
Jul 16 2020 12:28 AM
Hi @Ofer_Shezaf this one has been open a while. Are we likely to get functionality where we can run automated responses for all rule types? It really breaks up workflows where they're intended to be managed in other tools (Jira, SNow). Operators now need to be eyes on glass in Sentinel as well.
The only workaround we're aware of is to write a scheduled rule (for each severity) that searches the SecurityAlert table
Jan 08 2021 04:25 AM
@Ofer_Shezaf Do you have an update on the progress for this feature ?
Jan 10 2021 12:36 AM
@Manvie : still in private preview, I hope we are getting closer to going public. We made major changes based on private preview input.
Aug 27 2021 04:19 AM
@Asaad_Moosa Azure Sentinel Automation is available to everyone. You can create a playbook that uses the Azure Sentinel incident trigger and then create an automation rule that can be run when the rule creates an incident.