You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/automate-responses-with-playbooks.md
+57-16Lines changed: 57 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,11 +14,11 @@ This article explains what Microsoft Sentinel playbooks are, and how to use them
14
14
15
15
## What is a playbook?
16
16
17
-
SIEM/SOC teams are typically inundated with security alerts and incidents on a regular basis, at volumes so large that available personnel are overwhelmed. This results all too often in situations where many alerts are ignored and many incidents aren't investigated, leaving the organization vulnerable to attacks that go unnoticed.
17
+
SOC analysts are typically inundated with security alerts and incidents on a regular basis, at volumes so large that available personnel are overwhelmed. This results all too often in situations where many alerts are ignored and many incidents aren't investigated, leaving the organization vulnerable to attacks that go unnoticed.
18
18
19
-
Many, if not most, of these alerts and incidents conform to recurring patterns that can be addressed by specific and defined sets of remediation actions.
19
+
Many, if not most, of these alerts and incidents conform to recurring patterns that can be addressed by specific and defined sets of remediation actions. Analysts are also tasked with basic remediation and investigation of the incidents they do manage to address. To the extent that these activities can be automated, a SOC can be that much more productive and efficient, allowing analysts to devote more time and energy to investigative activity.
20
20
21
-
A playbook is a collection of these remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help [**automate and orchestrate your threat response**](tutorial-respond-threats-playbook.md); it can be run manually or set to run automatically in response to specific alerts or incidents, when triggered by an analytics rule or an [automation rule](automate-incident-handling-with-automation-rules.md), respectively.
21
+
A playbook is a collection of these remediation actions that can be run from Microsoft Sentinel as a routine. A playbook can help [**automate and orchestrate your threat response**](tutorial-respond-threats-playbook.md); it can be run manually on-demand on entities (in preview - see below) and alerts, or set to run automatically in response to specific alerts or incidents, when triggered by an [automation rule](automate-incident-handling-with-automation-rules.md).
22
22
23
23
For example, if an account and machine are compromised, a playbook can isolate the machine from the network and block the account by the time the SOC team is notified of the incident.
24
24
@@ -61,8 +61,9 @@ Azure Logic Apps communicates with other systems and services using connectors.
61
61
62
62
-**Microsoft Sentinel connector:** To create playbooks that interact with Microsoft Sentinel, use the Microsoft Sentinel connector. For more information, see the [Microsoft Sentinel connector documentation](/connectors/azuresentinel/).
63
63
64
-
-**Trigger:** A connector component that starts a workflow, in this case, a playbook. The Microsoft Sentinel trigger defines the schema that the playbook expects to receive when triggered. The Microsoft Sentinel connector currently has two triggers:
64
+
-**Trigger:** A connector component that starts a workflow, in this case, a playbook. The Microsoft Sentinel trigger defines the schema that the playbook expects to receive when triggered. The Microsoft Sentinel connector currently has three triggers:
65
65
-[Alert trigger](/connectors/azuresentinel/#triggers): The playbook receives the alert as input.
66
+
-[Entity trigger (Preview)](/connectors/azuresentinel/#triggers): The playbook receives an entity as input.
66
67
-[Incident trigger](/connectors/azuresentinel/#triggers): The playbook receives the incident as input, along with all the included alerts and entities.
67
68
68
69
-**Actions:** Actions are all the steps that happen after the trigger. They can be arranged sequentially, in parallel, or in a matrix of complex conditions.
@@ -106,8 +107,9 @@ There are many differences between these two resource types, some of which affec
106
107
107
108
#### Azure roles for Microsoft Sentinel
108
109
109
-
-**Microsoft Sentinel Contributor** role lets you attach a playbook to an analytics rule.
110
-
-**Microsoft Sentinel Responder** role lets you run a playbook manually.
110
+
-**Microsoft Sentinel Contributor** role lets you attach a playbook to an analytics or automation rule.
111
+
-**Microsoft Sentinel Responder** role lets you access an incident in order to run a playbook manually. But to actually run the playbook, you also need...
112
+
-**Microsoft Sentinel Playbook Operator** role lets you run a playbook manually.
111
113
-**Microsoft Sentinel Automation Contributor** allows automation rules to run playbooks. It is not used for any other purpose.
112
114
113
115
#### Learn more
@@ -127,7 +129,7 @@ There are many differences between these two resource types, some of which affec
127
129
128
130
### Use cases for playbooks
129
131
130
-
The Azure Logic Apps platform offers hundreds of actions and triggers, so almost any automation scenario can be created. Microsoft Sentinel recommends starting with the following SOC scenarios:
132
+
The Azure Logic Apps platform offers hundreds of actions and triggers, so almost any automation scenario can be created. Microsoft Sentinel recommends starting with the following SOC scenarios, for which ready-made playbook templates are available out of the box:
131
133
132
134
#### Enrichment
133
135
@@ -196,7 +198,7 @@ Two examples:
196
198
- Check with Azure AD Identity Protection to [confirm the user's status as compromised](/connectors/azureadip/#confirm-a-risky-user-as-compromised). Azure AD Identity Protection will label the user as **risky**, and apply any enforcement policy already configured - for example, to require the user to use MFA when next signing in.
197
199
198
200
> [!NOTE]
199
-
> The playbook does not initiate any enforcement action on the user, nor does it initiate any configuration of enforcement policy. It only tells Azure AD Identity Protection to apply any already defined policies as appropriate. Any enforcement depends entirely on the appropriate policies being defined in Azure AD Identity Protection.
201
+
> This particular Azure AD action does not initiate any enforcement activity on the user, nor does it initiate any configuration of enforcement policy. It only tells Azure AD Identity Protection to apply any already defined policies as appropriate. Any enforcement depends entirely on the appropriate policies being defined in Azure AD Identity Protection.
200
202
201
203
**Example 2:** Respond to an analytics rule that indicates a compromised machine, as discovered by [Microsoft Defender for Endpoint](/windows/security/threat-protection/):
202
204
@@ -206,13 +208,33 @@ Two examples:
206
208
207
209
- Issue a command to Microsoft Defender for Endpoint to [isolate the machines](/connectors/wdatp/#actions---isolate-machine) in the alert.
208
210
211
+
#### Manual response during investigation or while hunting
212
+
213
+
**Respond to threats in the course of active investigative activity without pivoting out of context.**
214
+
215
+
Thanks to the new [entity trigger (now in Preview)](/connectors/azuresentinel/#triggers), you can take immediate action on individual threat actors you discover during an investigation, one at a time, right from within the investigation. This option is also available in the threat hunting context, unconnected to any particular incident. You can select an entity in context and perform actions on it right there, saving time and reducing complexity.
216
+
217
+
The actions you can take on entities using this playbook type include:
218
+
- Blocking a compromised user.
219
+
- Blocking traffic from a malicious IP address in your firewall.
220
+
- Isolating a compromised host on your network.
221
+
- Adding an IP address to a safe/unsafe address watchlist, or to your external CMDB.
222
+
- Getting a file hash report from an external threat intelligence source and adding it to an incident as a comment.
223
+
209
224
## How to run a playbook
210
225
211
226
Playbooks can be run either **manually** or **automatically**.
212
227
213
228
They are designed to be run automatically, and ideally that is how they should be run in the normal course of operations. You [run a playbook automatically](tutorial-respond-threats-playbook.md#automate-threat-responses) by defining it as an [automated response in an analytics rule](detect-threats-custom.md#set-automated-responses-and-create-the-rule) (for alerts), or as an [action in an automation rule](automate-incident-handling-with-automation-rules.md) (for incidents).
214
229
215
-
There are circumstances, though, that call for running playbooks manually. For example, when creating a new playbook, you'll want to test it before putting it in production. Or, there may be situations where you'll want to have more control and human input into when and whether a certain playbook runs. You [run a playbook manually](tutorial-respond-threats-playbook.md#run-a-playbook-on-demand) by opening an incident or alert and selecting and running the associated playbook displayed there. Currently this feature is generally available for alerts, and in preview for incidents.
230
+
There are circumstances, though, that call for running playbooks manually. For example:
231
+
232
+
- When creating a new playbook, you'll want to test it before putting it in production.
233
+
- There may be situations where you'll want to have more control and human input into when and whether a certain playbook runs.
234
+
235
+
236
+
You [run a playbook manually](tutorial-respond-threats-playbook.md#run-a-playbook-on-demand) by opening an incident, alert, or entity and selecting and running the associated playbook displayed there. Currently this feature is generally available for alerts, and in preview for incidents and entities.
237
+
216
238
217
239
218
240
### Set an automated response
@@ -256,17 +278,36 @@ See the [complete instructions for creating automation rules](tutorial-respond-t
256
278
257
279
### Run a playbook manually
258
280
259
-
While full automation is the best solution for many incident-handling, investigation, and mitigation tasks, there may often be cases where you would prefer your analysts have more human input and control over the situation. Also, you may want your SOC engineers to be able to test the playbooks they write before fully deploying them in automation rules.
281
+
Full automation is the best solution for as many incident-handling, investigation, and mitigation tasks as you're comfortable automating. Having said that, there can be good reasons for a sort of hybrid automation: using playbooks to consolidate a string of activities against a range of systems into a single command, but running the playbooks only when and where you decide. For example:
282
+
283
+
- You may prefer your SOC analysts have more human input and control over some situations.
284
+
285
+
- You may also want them to be able to take action against specific threat actors (entities) on-demand, in the course of an investigation or a threat hunt, in context without having to pivot to another screen. (This ability is now in Preview.)
286
+
287
+
- You may want your SOC engineers to write playbooks that act on specific entities (now in Preview) and that can only be run manually.
288
+
289
+
- You would probably like your engineers to be able to test the playbooks they write before fully deploying them in automation rules.
290
+
291
+
For these and other reasons, Microsoft Sentinel allows you to **run playbooks manually** on-demand for entities and incidents (both now in Preview), as well as for alerts.
292
+
293
+
-**To run a playbook on a specific incident,** select the incident from the grid in the **Incidents** blade. Select **Actions** from the incident details pane, and choose **Run playbook (Preview)** from the context menu.
294
+
295
+
This opens the **Run playbook on incident** panel.
296
+
297
+
-**To run a playbook on an alert,** select an incident, enter the incident details, and from the **Alerts** tab, choose an alert and select **View playbooks**.
260
298
261
-
For these and other reasons, Microsoft Sentinel allows you to **run playbooks manually**on-demand for both incidents (now in Preview) and alerts.
299
+
This opens the **Alert playbooks**panel.
262
300
263
-
-**To run a playbook on a specific incident,** select the incident from the grid in the **Incidents** blade. Select **Actions** from the incident details pane, and choose **Run playbook (Preview)** from the context menu. This opens the **Run playbook on incident** panel.
301
+
-**To run a playbook on an entity,** select an entity in any of the following ways:
302
+
- From the **Entities** tab of an incident, choose an entity from the list and select the **Run playbook (Preview)** link at the end of its line in the list.
303
+
- From the **Investigation graph**, select an entity and select the **Run playbook (Preview)** button in the entity side panel.
304
+
- From **Entity behavior**, select an entity and from the entity page, select the **Run playbook (Preview)** button in the left-hand panel.
264
305
265
-
-**To run a playbook on an alert,** select an incident, enter the incident details, and from the **Alerts** tab, choose an alert and select **View playbooks**. This opens the **Alert playbooks** panel.
306
+
These will all open the **Run playbook on *\<entity type>*** panel.
266
307
267
-
In either of these panels, you'll see two tabs: **Playbooks** and **Runs**.
308
+
In any of these panels, you'll see two tabs: **Playbooks** and **Runs**.
268
309
269
-
- In the **Playbooks** tab, you'll see a list of all the playbooks that you have access to and that use the appropriate trigger - the**Microsoft Sentinel Incident** trigger for incident playbooks and the **Microsoft Sentinel Alert** trigger for alert playbooks. Each playbook in the list has a **Run** button which you select to run the playbook immediately.
310
+
- In the **Playbooks** tab, you'll see a list of all the playbooks that you have access to and that use the appropriate trigger - whether**Microsoft Sentinel Incident**, **Microsoft Sentinel Alert**, or **Microsoft Sentinel Entity**. Each playbook in the list has a **Run** button which you select to run the playbook immediately.
270
311
If you want to run an incident-trigger playbook that you don't see in the list, [see the note about Microsoft Sentinel permissions above](#incident-creation-automated-response).
271
312
272
313
- In the **Runs** tab, you'll see a list of all the times any playbook has been run on the incident or alert you selected. It might take a few seconds for any just-completed run to appear in this list. Selecting a specific run will open the full run log in Azure Logic Apps.
@@ -283,7 +324,7 @@ The **Plan** column indicates whether the playbook uses the **Standard** or **Co
283
324
284
325
| Trigger kind | Indicates component types in playbook |
285
326
|-|-|
286
-
|**Microsoft Sentinel Incident/Alert**| The playbook is started with one of the Sentinel triggers (alert, incident) |
327
+
|**Microsoft Sentinel Incident/Alert/Entity**| The playbook is started with one of the Sentinel triggers (incident, alert, entity) |
287
328
|**Using Microsoft Sentinel Action**| The playbook is started with a non-Sentinel trigger but uses a Microsoft Sentinel action |
288
329
|**Other**| The playbook does not include any Sentinel components |
289
330
|**Not initialized**| The playbook has been created, but contains no components (triggers or actions). |
0 commit comments