Skip to content

Commit 17c4f2a

Browse files
authored
Merge pull request #271872 from batamig/playbooks-entity-incident-ga
Sentinel playbooks incidents / entities to GA
2 parents 09799b3 + b5d05b9 commit 17c4f2a

File tree

10 files changed

+16
-7
lines changed

10 files changed

+16
-7
lines changed

articles/sentinel/automation/create-playbooks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,11 +90,11 @@ Do the following to create your playbook:
9090

9191
1. In the **Review and create** tab, review the configuration choices you made, and select **Create and continue to designer**.
9292

93-
Your playbook will take a few minutes to be created and deployed, after which you see the message "Your deployment is complete" and you're taken to your new playbook's [Logic App Designer](/azure/logic-apps/logic-apps-overview). The trigger you chose at the beginning is automatically been added as the first step, and you can continue designing the workflow from there.
93+
Your playbook will take a few minutes to be created and deployed, after which you see the message "Your deployment is complete" and you're taken to your new playbook's [Logic App Designer](/azure/logic-apps/logic-apps-overview). The trigger you chose at the beginning is automatically added as the first step, and you can continue designing the workflow from there.
9494

9595
:::image type="content" source="../media/tutorial-respond-threats-playbook/logic-app-blank.png" alt-text="Screenshot of logic app designer screen with opening trigger." lightbox="../media/tutorial-respond-threats-playbook/logic-app-blank.png":::
9696

97-
1. If you chose the **Microsoft Sentinel entity (Preview)** trigger, select the type of entity you want this playbook to receive as an input.
97+
1. If you chose the **Microsoft Sentinel entity** trigger, select the type of entity you want this playbook to receive as an input.
9898

9999
:::image type="content" source="../media/tutorial-respond-threats-playbook/entity-trigger-types.png" alt-text="Screenshot of drop-down list of entity types to choose from to set playbook schema.":::
100100

articles/sentinel/automation/playbook-triggers-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ For more information, see [Roles and permissions in Microsoft Sentinel](../roles
3535

3636
The Microsoft Sentinel connector, and therefore Microsoft Sentinel playbooks, support the following triggers:
3737

38-
- **Microsoft Sentinel incident (Preview)**. Recommended for most incident automation scenarios.
38+
- **Microsoft Sentinel incident**. Recommended for most incident automation scenarios.
3939

4040
The playbook receives incident objects, including both entities and alerts. This trigger allows you to attach a playbook to an automation rule that can be triggered whenever an incident is created or updated in Microsoft Sentinel, applying all the [benefits of automation rules](../automate-incident-handling-with-automation-rules.md) to the incident.
4141

@@ -44,7 +44,7 @@ The Microsoft Sentinel connector, and therefore Microsoft Sentinel playbooks, su
4444
- This trigger can't be used to automate responses for alerts generated by *Microsoft security* analytics rules.
4545
- Playbooks using this trigger can't be called by automation rules.
4646

47-
- **Microsoft Sentinel entity (Preview)**. Recommended for playbooks that must be run manually on specific entities from an investigation or threat hunting context. Playbooks using this trigger can't be called by automation rules.
47+
- **Microsoft Sentinel entity**. Recommended for playbooks that must be run manually on specific entities from an investigation or threat hunting context. Playbooks using this trigger can't be called by automation rules.
4848

4949
The schemas used by these flows aren't identical. We recommend using the **Microsoft Sentinel incident trigger** flow for most scenarios.
5050

articles/sentinel/feature-availability.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,8 +102,8 @@ This article describes the features available in Microsoft Sentinel across diffe
102102
|[Microsoft 365 Defender incident integration](microsoft-365-defender-sentinel-integration.md#working-with-microsoft-defender-xdr-incidents-in-microsoft-sentinel-and-bi-directional-sync) |GA |✅ |✅| ❌ |
103103
|[Microsoft Teams integrations](collaborate-in-microsoft-teams.md) |Public preview |✅ |✅| ❌ |
104104
|[Playbook template gallery](use-playbook-templates.md) |Public preview |✅ |✅| ❌ |
105-
|[Run playbooks on entities](respond-threats-during-investigation.md) |Public preview |✅ |✅ |✅ |
106-
|[Run playbooks on incidents](automate-responses-with-playbooks.md) |Public preview |✅ |✅| ✅ |
105+
|[Run playbooks on entities](respond-threats-during-investigation.md) |GA |✅ |✅ |✅ |
106+
|[Run playbooks on incidents](automate-responses-with-playbooks.md) |GA |✅ |✅| ✅ |
107107
|[SOC incident audit metrics](manage-soc-with-incident-metrics.md) |GA |✅ |✅| ✅ |
108108

109109
## Machine Learning
-1.24 KB
Loading
-738 Bytes
Loading
1.99 KB
Loading
-4.68 KB
Loading
-1.6 KB
Loading
20.3 KB
Loading

articles/sentinel/whats-new.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the latest new features and announcement in Microsoft S
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: concept
7-
ms.date: 04/30/2024
7+
ms.date: 05/21/2024
88
---
99

1010
# What's new in Microsoft Sentinel
@@ -20,8 +20,17 @@ The listed features were released in the last three months. For information abou
2020

2121
## May 2024
2222

23+
- [Incident and entity triggers in playbooks are now Generally Available (GA)](#incident-and-entity-triggers-in-playbooks-are-now-generally-available-ga)
2324
- [Optimize your security operations with SOC optimizations](#optimize-your-security-operations-with-soc-optimizations-preview)
2425

26+
### Incident and entity triggers in playbooks are now Generally Available (GA)
27+
28+
The ability to use incident and entity triggers is playbooks is now supported as GA.
29+
30+
:::image type="content" source="media/whats-new/sentinel-triggers-ga.png" alt-text="Screenshot of the Microsoft Sentinel incident and entity options with no preview notice.":::
31+
32+
For more information, see [Create a playbook](tutorial-respond-threats-playbook.md#create-a-playbook).
33+
2534
### Optimize your security operations with SOC optimizations (preview)
2635

2736
Microsoft Sentinel now provides SOC optimizations, which are high-fidelity and actionable recommendations that help you identify areas where you can reduce costs, without affecting SOC needs or coverage, or where you can add security controls and data where its found to be missing.

0 commit comments

Comments
 (0)