Automation in Microsoft Sentinel (2024)

  • Article
  • Applies to:
    Microsoft Sentinel in the Azure portal, Microsoft Sentinel in the Microsoft Defender portal

Security information and event management (SIEM) and security operations center (SOC) teams are typically inundated with security alerts and incidents on a regular basis, at volumes so large that available personnel are overwhelmed. This results all too often in situations where many alerts are ignored and many incidents aren't investigated, leaving the organization vulnerable to attacks that go unnoticed.

Microsoft Sentinel, in addition to being a SIEM system, is also a platform for security orchestration, automation, and response (SOAR). One of its primary purposes is to automate any recurring and predictable enrichment, response, and remediation tasks that are the responsibility of your security operations center and personnel (SOC/SecOps), freeing up time and resources for more in-depth investigation of, and hunting for, advanced threats.

This article describes Microsoft Sentinel's SOAR capabilities, and shows how using automation rules and playbooks in response to security threats increases your SOC's effectiveness and saves you time and resources.

Important

Microsoft Sentinel is now generally available within the Microsoft unified security operations platform in the Microsoft Defender portal. For more information, see Microsoft Sentinel in the Microsoft Defender portal.

Automation rules

Microsoft Sentinel uses automation rules to allow users to manage incident handling automation from a central location. Use automation rules to:

  • Assign more advanced automation to incidents and alerts, using playbooks
  • Automatically tag, assign, or close incidents without a playbook
  • Automate responses for multiple analytics rules at once
  • Create lists of tasks for your analysts to perform when triaging, investigating, and remediating incidents
  • Control the order of actions that are executed

We recommend that you apply automation rules when incidents are created or updated to further streamline the automation and simplify complex workflows for your incident orchestration processes.

For more information, see Automate threat response in Microsoft Sentinel with automation rules.

Playbooks

A playbook is a collection of response and remediation actions and logic that can be run from Microsoft Sentinel as a routine. A playbook can:

  • Help automate and orchestrate your threat response
  • Integrate with other systems, both internal and external
  • Be configured to run automatically in response to specific alerts or incidents, or run manually on-demand, such as in response to new alerts

In Microsoft Sentinel, playbooks are based on workflows built in Azure Logic Apps, a cloud service that helps you schedule, automate, and orchestrate tasks and workflows across systems throughout the enterprise. This means that playbooks can take advantage of all the power and customizability of Logic Apps' integration and orchestration capabilities and easy-to-use design tools, and the scalability, reliability, and service level of a Tier 1 Azure service.

For more information, see Automate threat response with playbooks in Microsoft Sentinel.

Automation with the unified security operations platform

After onboarding your Microsoft Sentinel workspace to the unified security operations platform, note the following differences in the way automation functions in your workspace:

FunctionalityDescription
Automation rules with alert triggersIn the unified security operations platform, automation rules with alert triggers act only on Microsoft Sentinel alerts.

For more information, see Alert create trigger.

Automation rules with incident triggersIn both the Azure portal and the unified security operations platform, the Incident provider condition property is removed, as all incidents have Microsoft Defender XDR as the incident provider (the value in the ProviderName field).

At that point, any existing automation rules run on both Microsoft Sentinel and Microsoft Defender XDR incidents, including those where the Incident provider condition is set to only Microsoft Sentinel or Microsoft 365 Defender.

However, automation rules that specify a specific analytics rule name will run only on the incidents that were created by the specified analytics rule. This means that you can define the Analytic rule name condition property to an analytics rule that exists only in Microsoft Sentinel to limit your rule to run on incidents only in Microsoft Sentinel.

For more information, see Incident trigger conditions.

Changes to existing incident namesIn the unified SOC operations platform, the Defender portal uses a unique engine to correlate incidents and alerts. When onboarding your workspace to the unified SOC operations platform, existing incident names might be changed if the correlation is applied. To ensure that your automation rules always run correctly, we therefore recommend that you avoid using incident titles as condition criteria in your automation rules, and suggest instead to use the name of the analytics rule that created the incident, and tags if more specificity is required.
Updated by field
  • After onboarding your workspace, the Updated by field has a new set of supported values, which no longer include Microsoft 365 Defender. In existing automation rules, Microsoft 365 Defender is replaced by a value of Other after onboarding your workspace.
  • If multiple changes are made to the same incident in a 5-10 minute period, a single update is sent to Microsoft Sentinel, with only the most recent change.

    For more information, see Incident update trigger.

  • Automation rules that add incident tasksIf an automation rule adds an incident task, the task is shown only in the Azure portal.
    Microsoft incident creation rulesMicrosoft incident creation rules aren't supported in the unified security operations platform.

    For more information, see Microsoft Defender XDR incidents and Microsoft incident creation rules.

    Running automation rules from the Defender portalIt might take up to 10 minutes from the time that an alert is triggered and an incident is created or updated in the Defender portal to when an automation rule is run. This time lag is because the incident is created in the Defender portal and then forwarded to Microsoft Sentinel for the automation rule.
    Active playbooks tabAfter onboarding to the unified security operations platform, by default the Active playbooks tab shows a predefined filter with onboarded workspace's subscription. In the Azure portal, add data for other subscriptions using the subscription filter.

    For more information, see Create and customize Microsoft Sentinel playbooks from content templates.

    Running playbooks manually on demandThe following procedures aren't currently supported in the unified security operations platform:
  • Run a playbook manually on an alert
  • Run a playbook manually on an entity
  • Running playbooks on incidents requires Microsoft Sentinel syncIf you try to run a playbook on an incident from the unified security operations platform and see the message "Can't access data related to this action. Refresh the screen in a few minutes." message, this means that the incident isn't yet synchronized to Microsoft Sentinel.

    Refresh the incident page after the incident is synchronized to run the playbook successfully.

    Incidents: Adding alerts to incidents /
    Removing alerts from incidents
    Since adding alerts to, or removing alerts from incidents isn't supported after onboarding your workspace to the unified security operations platform, these actions are also not supported from within playbooks. For more information, see Capability differences between portals.

    Related content

    • Automate threat response in Microsoft Sentinel with automation rules
    • Automate threat response with playbooks in Microsoft Sentinel
    • Create and use Microsoft Sentinel automation rules to manage response
    Automation in Microsoft Sentinel (2024)
    Top Articles
    Create Developer ID certificates - Create certificates - Account - Help
    Self-Employed Tax Deductions In Canada - Maximize Your Tax Return
    Funny Roblox Id Codes 2023
    Pieology Nutrition Calculator Mobile
    Dollywood's Smoky Mountain Christmas - Pigeon Forge, TN
    Www Thechristhospital Billpay
    Call of Duty: NEXT Event Intel, How to Watch, and Tune In Rewards
    Western Razor David Angelo Net Worth
    What is IXL and How Does it Work?
    WK Kellogg Co (KLG) Dividends
    Mycarolinas Login
    Med First James City
    Help with Choosing Parts
    Binghamton Ny Cars Craigslist
    سریال رویای شیرین جوانی قسمت 338
    Abortion Bans Have Delayed Emergency Medical Care. In Georgia, Experts Say This Mother’s Death Was Preventable.
    How To Cancel Goodnotes Subscription
    E22 Ultipro Desktop Version
    Lonesome Valley Barber
    Google Doodle Baseball 76
    Uconn Health Outlook
    Pjs Obits
    Optum Urgent Care - Nutley Photos
    ‘The Boogeyman’ Review: A Minor But Effectively Nerve-Jangling Stephen King Adaptation
    Drug Test 35765N
    Craigslistodessa
    پنل کاربری سایت همسریابی هلو
    Hesburgh Library Catalog
    Villano Antillano Desnuda
    Marilyn Seipt Obituary
    3 Ways to Drive Employee Engagement with Recognition Programs | UKG
    4.231 Rounded To The Nearest Hundred
    Stickley Furniture
    Pay Stub Portal
    Lininii
    Issue Monday, September 23, 2024
    Willys Pickup For Sale Craigslist
    Spy School Secrets - Canada's History
    Play 1v1 LOL 66 EZ → UNBLOCKED on 66games.io
    Collier Urgent Care Park Shore
    Dmitri Wartranslated
    Fifty Shades Of Gray 123Movies
    Prior Authorization Requirements for Health Insurance Marketplace
    Conan Exiles Armor Flexibility Kit
    Levi Ackerman Tattoo Ideas
    Yourcuteelena
    Human Resources / Payroll Information
    Aurora Southeast Recreation Center And Fieldhouse Reviews
    Bedbathandbeyond Flemington Nj
    Acuity Eye Group - La Quinta Photos
    Jeep Forum Cj
    Elvis Costello announces King Of America & Other Realms
    Latest Posts
    Article information

    Author: Terrell Hackett

    Last Updated:

    Views: 6082

    Rating: 4.1 / 5 (72 voted)

    Reviews: 95% of readers found this page helpful

    Author information

    Name: Terrell Hackett

    Birthday: 1992-03-17

    Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

    Phone: +21811810803470

    Job: Chief Representative

    Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

    Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.