Microsoft Secure Tech Accelerator
Apr 03 2024, 07:00 AM - 11:00 AM (PDT)
Microsoft Tech Community

Azure Sentinel Email Alert Escaltion process

Copper Contributor

Hello

I am trying achieve the following actions using Azure playbooks/log apps. In Sentinel when an incident is generated

1.)Send an email to a User

2.) If within 30 mins the User actions on the incident and changes the status of the incident from new to active or closed. 

3.)If Yes for step 2 do nothing

4.) If false, send an email to the user manager

I am okay steps 1 ,3 and 4, but I am not sure how to check the status of the sentinel incident. 

Thanks

 

 

 

1 Reply

@MalliBoppe As of now you cannot have a Playbook kicked off when an Incident is created, only an Alert which is probably what you are doing for step 1.   Note that this will be changing in the future

 

You also cannot get information about the incident through a KQL query, again this will be changing in the future.  You would need to make a REST API call to get the incident's information to see if it has any changes.  There are plenty of Blog posts about that, including one that I wrote on populating incidents into a custom log where you can use KQL against it.   This Azure Sentinel blog post talks about using the REST APIs: https://techcommunity.microsoft.com/t5/azure-sentinel/azure-sentinel-api-101/ba-p/1438928