Skip to content

Commit 1c36cfe

Browse files
Merge pull request #220775 from yelevin/yelevin/entity-trigger
Adding entity trigger for playbooks
2 parents 8a9904c + 35f561b commit 1c36cfe

20 files changed

+250
-57
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -392,6 +392,8 @@
392392
href: create-incident-manually.md
393393
- name: Delete incidents
394394
href: delete-incident.md
395+
- name: Remediate threats while investigating
396+
href: respond-threats-during-investigation.md
395397
- name: Search large datasets
396398
href: search-jobs.md
397399
- name: Restore historical data

articles/sentinel/automate-responses-with-playbooks.md

Lines changed: 57 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ This article explains what Microsoft Sentinel playbooks are, and how to use them
1414

1515
## What is a playbook?
1616

17-
SIEM/SOC teams are typically inundated with security alerts and incidents on a regular basis, at volumes so large that available personnel are overwhelmed. This results all too often in situations where many alerts are ignored and many incidents aren't investigated, leaving the organization vulnerable to attacks that go unnoticed.
17+
SOC analysts are typically inundated with security alerts and incidents on a regular basis, at volumes so large that available personnel are overwhelmed. This results all too often in situations where many alerts are ignored and many incidents aren't investigated, leaving the organization vulnerable to attacks that go unnoticed.
1818

19-
Many, if not most, of these alerts and incidents conform to recurring patterns that can be addressed by specific and defined sets of remediation actions.
19+
Many, if not most, of these alerts and incidents conform to recurring patterns that can be addressed by specific and defined sets of remediation actions. Analysts are also tasked with basic remediation and investigation of the incidents they do manage to address. To the extent that these activities can be automated, a SOC can be that much more productive and efficient, allowing analysts to devote more time and energy to investigative activity.
2020

21-
A playbook is a collection of these remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help [**automate and orchestrate your threat response**](tutorial-respond-threats-playbook.md); it can be run manually or set to run automatically in response to specific alerts or incidents, when triggered by an analytics rule or an [automation rule](automate-incident-handling-with-automation-rules.md), respectively.
21+
A playbook is a collection of these remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help [**automate and orchestrate your threat response**](tutorial-respond-threats-playbook.md); it can be run manually on-demand on entities (in preview - see below) and alerts, or set to run automatically in response to specific alerts or incidents, when triggered by an [automation rule](automate-incident-handling-with-automation-rules.md).
2222

2323
For example, if an account and machine are compromised, a playbook can isolate the machine from the network and block the account by the time the SOC team is notified of the incident.
2424

@@ -61,8 +61,9 @@ Azure Logic Apps communicates with other systems and services using connectors.
6161

6262
- **Microsoft Sentinel connector:** To create playbooks that interact with Microsoft Sentinel, use the Microsoft Sentinel connector. For more information, see the [Microsoft Sentinel connector documentation](/connectors/azuresentinel/).
6363

64-
- **Trigger:** A connector component that starts a workflow, in this case, a playbook. The Microsoft Sentinel trigger defines the schema that the playbook expects to receive when triggered. The Microsoft Sentinel connector currently has two triggers:
64+
- **Trigger:** A connector component that starts a workflow, in this case, a playbook. The Microsoft Sentinel trigger defines the schema that the playbook expects to receive when triggered. The Microsoft Sentinel connector currently has three triggers:
6565
- [Alert trigger](/connectors/azuresentinel/#triggers): The playbook receives the alert as input.
66+
- [Entity trigger (Preview)](/connectors/azuresentinel/#triggers): The playbook receives an entity as input.
6667
- [Incident trigger](/connectors/azuresentinel/#triggers): The playbook receives the incident as input, along with all the included alerts and entities.
6768

6869
- **Actions:** Actions are all the steps that happen after the trigger. They can be arranged sequentially, in parallel, or in a matrix of complex conditions.
@@ -106,8 +107,9 @@ There are many differences between these two resource types, some of which affec
106107

107108
#### Azure roles for Microsoft Sentinel
108109

109-
- **Microsoft Sentinel Contributor** role lets you attach a playbook to an analytics rule.
110-
- **Microsoft Sentinel Responder** role lets you run a playbook manually.
110+
- **Microsoft Sentinel Contributor** role lets you attach a playbook to an analytics or automation rule.
111+
- **Microsoft Sentinel Responder** role lets you access an incident in order to run a playbook manually. But to actually run the playbook, you also need...
112+
- **Microsoft Sentinel Playbook Operator** role lets you run a playbook manually.
111113
- **Microsoft Sentinel Automation Contributor** allows automation rules to run playbooks. It is not used for any other purpose.
112114

113115
#### Learn more
@@ -127,7 +129,7 @@ There are many differences between these two resource types, some of which affec
127129

128130
### Use cases for playbooks
129131

130-
The Azure Logic Apps platform offers hundreds of actions and triggers, so almost any automation scenario can be created. Microsoft Sentinel recommends starting with the following SOC scenarios:
132+
The Azure Logic Apps platform offers hundreds of actions and triggers, so almost any automation scenario can be created. Microsoft Sentinel recommends starting with the following SOC scenarios, for which ready-made playbook templates are available out of the box:
131133

132134
#### Enrichment
133135

@@ -196,7 +198,7 @@ Two examples:
196198
- Check with Azure AD Identity Protection to [confirm the user's status as compromised](/connectors/azureadip/#confirm-a-risky-user-as-compromised). Azure AD Identity Protection will label the user as **risky**, and apply any enforcement policy already configured - for example, to require the user to use MFA when next signing in.
197199

198200
> [!NOTE]
199-
> The playbook does not initiate any enforcement action on the user, nor does it initiate any configuration of enforcement policy. It only tells Azure AD Identity Protection to apply any already defined policies as appropriate. Any enforcement depends entirely on the appropriate policies being defined in Azure AD Identity Protection.
201+
> This particular Azure AD action does not initiate any enforcement activity on the user, nor does it initiate any configuration of enforcement policy. It only tells Azure AD Identity Protection to apply any already defined policies as appropriate. Any enforcement depends entirely on the appropriate policies being defined in Azure AD Identity Protection.
200202
201203
**Example 2:** Respond to an analytics rule that indicates a compromised machine, as discovered by [Microsoft Defender for Endpoint](/windows/security/threat-protection/):
202204

@@ -206,13 +208,33 @@ Two examples:
206208

207209
- Issue a command to Microsoft Defender for Endpoint to [isolate the machines](/connectors/wdatp/#actions---isolate-machine) in the alert.
208210

211+
#### Manual response during investigation or while hunting
212+
213+
**Respond to threats in the course of active investigative activity without pivoting out of context.**
214+
215+
Thanks to the new [entity trigger (now in Preview)](/connectors/azuresentinel/#triggers), you can take immediate action on individual threat actors you discover during an investigation, one at a time, right from within the investigation. This option is also available in the threat hunting context, unconnected to any particular incident. You can select an entity in context and perform actions on it right there, saving time and reducing complexity.
216+
217+
The actions you can take on entities using this playbook type include:
218+
- Blocking a compromised user.
219+
- Blocking traffic from a malicious IP address in your firewall.
220+
- Isolating a compromised host on your network.
221+
- Adding an IP address to a safe/unsafe address watchlist, or to your external CMDB.
222+
- Getting a file hash report from an external threat intelligence source and adding it to an incident as a comment.
223+
209224
## How to run a playbook
210225

211226
Playbooks can be run either **manually** or **automatically**.
212227

213228
They are designed to be run automatically, and ideally that is how they should be run in the normal course of operations. You [run a playbook automatically](tutorial-respond-threats-playbook.md#automate-threat-responses) by defining it as an [automated response in an analytics rule](detect-threats-custom.md#set-automated-responses-and-create-the-rule) (for alerts), or as an [action in an automation rule](automate-incident-handling-with-automation-rules.md) (for incidents).
214229

215-
There are circumstances, though, that call for running playbooks manually. For example, when creating a new playbook, you'll want to test it before putting it in production. Or, there may be situations where you'll want to have more control and human input into when and whether a certain playbook runs. You [run a playbook manually](tutorial-respond-threats-playbook.md#run-a-playbook-on-demand) by opening an incident or alert and selecting and running the associated playbook displayed there. Currently this feature is generally available for alerts, and in preview for incidents.
230+
There are circumstances, though, that call for running playbooks manually. For example:
231+
232+
- When creating a new playbook, you'll want to test it before putting it in production.
233+
- There may be situations where you'll want to have more control and human input into when and whether a certain playbook runs.
234+
235+
236+
You [run a playbook manually](tutorial-respond-threats-playbook.md#run-a-playbook-on-demand) by opening an incident, alert, or entity and selecting and running the associated playbook displayed there. Currently this feature is generally available for alerts, and in preview for incidents and entities.
237+
216238

217239

218240
### Set an automated response
@@ -256,17 +278,36 @@ See the [complete instructions for creating automation rules](tutorial-respond-t
256278

257279
### Run a playbook manually
258280

259-
While full automation is the best solution for many incident-handling, investigation, and mitigation tasks, there may often be cases where you would prefer your analysts have more human input and control over the situation. Also, you may want your SOC engineers to be able to test the playbooks they write before fully deploying them in automation rules.
281+
Full automation is the best solution for as many incident-handling, investigation, and mitigation tasks as you're comfortable automating. Having said that, there can be good reasons for a sort of hybrid automation: using playbooks to consolidate a string of activities against a range of systems into a single command, but running the playbooks only when and where you decide. For example:
282+
283+
- You may prefer your SOC analysts have more human input and control over some situations.
284+
285+
- You may also want them to be able to take action against specific threat actors (entities) on-demand, in the course of an investigation or a threat hunt, in context without having to pivot to another screen. (This ability is now in Preview.)
286+
287+
- You may want your SOC engineers to write playbooks that act on specific entities (now in Preview) and that can only be run manually.
288+
289+
- You would probably like your engineers to be able to test the playbooks they write before fully deploying them in automation rules.
290+
291+
For these and other reasons, Microsoft Sentinel allows you to **run playbooks manually** on-demand for entities and incidents (both now in Preview), as well as for alerts.
292+
293+
- **To run a playbook on a specific incident,** select the incident from the grid in the **Incidents** blade. Select **Actions** from the incident details pane, and choose **Run playbook (Preview)** from the context menu.
294+
295+
This opens the **Run playbook on incident** panel.
296+
297+
- **To run a playbook on an alert,** select an incident, enter the incident details, and from the **Alerts** tab, choose an alert and select **View playbooks**.
260298

261-
For these and other reasons, Microsoft Sentinel allows you to **run playbooks manually** on-demand for both incidents (now in Preview) and alerts.
299+
This opens the **Alert playbooks** panel.
262300

263-
- **To run a playbook on a specific incident,** select the incident from the grid in the **Incidents** blade. Select **Actions** from the incident details pane, and choose **Run playbook (Preview)** from the context menu. This opens the **Run playbook on incident** panel.
301+
- **To run a playbook on an entity,** select an entity in any of the following ways:
302+
- From the **Entities** tab of an incident, choose an entity from the list and select the **Run playbook (Preview)** link at the end of its line in the list.
303+
- From the **Investigation graph**, select an entity and select the **Run playbook (Preview)** button in the entity side panel.
304+
- From **Entity behavior**, select an entity and from the entity page, select the **Run playbook (Preview)** button in the left-hand panel.
264305

265-
- **To run a playbook on an alert,** select an incident, enter the incident details, and from the **Alerts** tab, choose an alert and select **View playbooks**. This opens the **Alert playbooks** panel.
306+
These will all open the **Run playbook on *\<entity type>*** panel.
266307

267-
In either of these panels, you'll see two tabs: **Playbooks** and **Runs**.
308+
In any of these panels, you'll see two tabs: **Playbooks** and **Runs**.
268309

269-
- In the **Playbooks** tab, you'll see a list of all the playbooks that you have access to and that use the appropriate trigger - the **Microsoft Sentinel Incident** trigger for incident playbooks and the **Microsoft Sentinel Alert** trigger for alert playbooks. Each playbook in the list has a **Run** button which you select to run the playbook immediately.
310+
- In the **Playbooks** tab, you'll see a list of all the playbooks that you have access to and that use the appropriate trigger - whether **Microsoft Sentinel Incident**, **Microsoft Sentinel Alert**, or **Microsoft Sentinel Entity**. Each playbook in the list has a **Run** button which you select to run the playbook immediately.
270311
If you want to run an incident-trigger playbook that you don't see in the list, [see the note about Microsoft Sentinel permissions above](#incident-creation-automated-response).
271312

272313
- In the **Runs** tab, you'll see a list of all the times any playbook has been run on the incident or alert you selected. It might take a few seconds for any just-completed run to appear in this list. Selecting a specific run will open the full run log in Azure Logic Apps.
@@ -283,7 +324,7 @@ The **Plan** column indicates whether the playbook uses the **Standard** or **Co
283324

284325
| Trigger kind | Indicates component types in playbook |
285326
|-|-|
286-
| **Microsoft Sentinel Incident/Alert** | The playbook is started with one of the Sentinel triggers (alert, incident) |
327+
| **Microsoft Sentinel Incident/Alert/Entity** | The playbook is started with one of the Sentinel triggers (incident, alert, entity) |
287328
| **Using Microsoft Sentinel Action** | The playbook is started with a non-Sentinel trigger but uses a Microsoft Sentinel action |
288329
| **Other** | The playbook does not include any Sentinel components |
289330
| **Not initialized** | The playbook has been created, but contains no components (triggers or actions). |
56.9 KB
Loading
6.74 KB
Loading
37.1 KB
Loading
90.3 KB
Loading
83.9 KB
Loading
41.6 KB
Loading
69.7 KB
Loading
62.2 KB
Loading

0 commit comments

Comments
 (0)