Skip to content

Commit 1d0932c

Browse files
authored
Merge pull request #208649 from yelevin/yelevin/manual-incidents
Manual incident creation
2 parents 15960c0 + 7cc567b commit 1d0932c

15 files changed

+293
-12
lines changed

articles/sentinel/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -370,6 +370,10 @@
370370
href: investigate-cases.md
371371
- name: Relate alerts to incidents
372372
href: relate-alerts-to-incidents.md
373+
- name: Create incidents manually
374+
href: create-incident-manually.md
375+
- name: Delete incidents
376+
href: delete-incident.md
373377
- name: Search large datasets
374378
href: search-jobs.md
375379
- name: Restore historical data
Lines changed: 173 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,173 @@
1+
---
2+
title: Create your own incidents manually in Microsoft Sentinel
3+
description: Manually create incidents in Microsoft Sentinel based on data or information received by the SOC through alternate means or channels.
4+
author: yelevin
5+
ms.author: yelevin
6+
ms.topic: how-to
7+
ms.date: 08/17/2022
8+
---
9+
10+
# Create your own incidents manually in Microsoft Sentinel
11+
12+
> [!IMPORTANT]
13+
>
14+
> Manual incident creation, using the portal or Logic Apps, is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15+
>
16+
> Manual incident creation is generally available using the API.
17+
18+
With Microsoft Sentinel as your SIEM, your SOC’s threat detection and response activities are centered on **incidents** that you investigate and remediate. These incidents have two main sources:
19+
20+
- They are generated automatically by detection mechanisms that operate on the logs and alerts that Sentinel ingests from its connected data sources.
21+
22+
- They are ingested directly from other connected Microsoft security services (such as [Microsoft 365 Defender](microsoft-365-defender-sentinel-integration.md)) that created them.
23+
24+
There can, however, be data from other sources *not ingested into Microsoft Sentinel*, or events not recorded in any log, that justify opening an investigation. For example, an employee might witness an unrecognized person engaging in suspicious activity related to your organization’s information assets, and this employee might call or email the SOC to report the activity.
25+
26+
For this reason, Microsoft Sentinel allows your security analysts to manually create incidents for any type of event, regardless of its source or associated data, for the purpose of managing and documenting these investigations.
27+
28+
## Common use cases
29+
30+
### Create an incident for a reported event
31+
32+
This is the scenario described in the introduction above.
33+
34+
### Create incidents out of events from external systems
35+
36+
Create incidents based on events from systems whose logs are not ingested into Microsoft Sentinel. For example, an SMS-based phishing campaign might use your organization's corporate branding and themes to target employees' personal mobile devices. You may want to investigate such an attack, and creating an incident in Microsoft Sentinel gives you a platform to collect and log evidence and record your response and mitigating actions.
37+
38+
### Create incidents based on hunting results
39+
40+
Create incidents based on the observed results of hunting activities. For example, in the course of your threat hunting activities in relation to a particular investigation (or independently), you might come across evidence of a completely unrelated threat that warrants its own separate investigation.
41+
42+
## Manually create an incident
43+
44+
There are three ways to create an incident manually:
45+
46+
- [Create an incident using the Azure portal](#create-an-incident-using-the-azure-portal)
47+
- [Create an incident using Azure Logic Apps](#create-an-incident-using-azure-logic-apps), using the Microsoft Sentinel Incident trigger.
48+
- [Create an incident using the Microsoft Sentinel API](#create-an-incident-using-the-microsoft-sentinel-api), through the [Incidents](/rest/api/securityinsights/preview/incidents) operation group. It allows you to get, create, update, and delete incidents.
49+
50+
### Create an incident using the Azure portal
51+
52+
1. Select **Microsoft Sentinel** and choose your workspace.
53+
54+
1. From the Microsoft Sentinel navigation menu, select **Incidents**.
55+
56+
1. On the **Incidents** page, select **+ Create incident (Preview)** from the button bar.
57+
58+
:::image type="content" source="media/create-incident-manually/create-incident-main-page.png" alt-text="Screenshot of main incident screen, locating the button to create a new incident manually." lightbox="media/create-incident-manually/create-incident-main-page.png":::
59+
60+
The **Create incident (Preview)** panel will open on the right side of the screen.
61+
62+
:::image type="content" source="media/create-incident-manually/create-incident-panel.png" alt-text="Screenshot of manual incident creation panel, all fields blank.":::
63+
64+
1. Fill in the fields in the panel accordingly.
65+
66+
- **Title**
67+
- Enter a title of your choosing for the incident. The incident will appear in the queue with this title.
68+
- Required. Free text of unlimited length. Spaces will be trimmed.
69+
70+
- **Description**
71+
- Enter descriptive information about the incident, including details such as the origin of the incident, any entities involved, relation to other events, who was informed, and so on.
72+
- Optional. Free text up to 5000 characters.
73+
74+
- **Severity**
75+
- Choose a severity from the drop-down list. All Microsoft Sentinel-supported severities are available.
76+
- Required. Defaults to "Medium."
77+
78+
- **Status**
79+
- Choose a status from the drop-down list. All Microsoft Sentinel-supported statuses are available.
80+
- Required. Defaults to "New."
81+
- You can create an incident with a status of "closed," and then open it manually afterward to make changes and choose a different status. Choosing "closed" from the drop-down will activate **classification reason** fields for you to choose a reason for closing the incident and add comments.
82+
:::image type="content" source="media/create-incident-manually/classification-reason.png" alt-text="Screenshot of classification reason fields for closing an incident.":::
83+
84+
- **Owner**
85+
- Choose from the available users or groups in your tenant. Begin typing a name to search for users and groups. Select the field (click or tap) to display a list of suggestions. Choose "assign to me" at the top of the list to assign the incident to yourself.
86+
- Optional.
87+
88+
- **Tags**
89+
- Use tags to classify incidents and to filter and locate them in the queue.
90+
- Create tags by selecting the **plus sign icon**, entering text in the dialog box, and selecting **OK**. Auto-completion will suggest tags used within the workspace over the prior two weeks.
91+
- Optional. Free text.
92+
93+
1. Select **Create** at the bottom of the panel. After a few seconds, the incident will be created and will appear in the incidents queue.
94+
95+
If you assign an incident a status of "Closed," it will not appear in the queue until you change the **status** filter to show closed incidents as well. The filter is set by default to display only incidents with a status of "New" or "Active."
96+
97+
Select the incident in the queue to see its full details, add bookmarks, change its owner and status, and more.
98+
99+
If for some reason you change your mind after the fact about creating the incident, you can [delete it](delete-incident.md) from the queue grid, or from within the incident itself.
100+
101+
### Create an incident using Azure Logic Apps
102+
103+
Creating an incident is also available as a Logic Apps action in the Microsoft Sentinel connector, and therefore in Microsoft Sentinel [playbooks](tutorial-respond-threats-playbook.md).
104+
105+
You can find the **Create incident (preview)** action in the playbook schema for the incident trigger.
106+
107+
:::image type="content" source="media/create-incident-manually/create-incident-logicapp-action.png" alt-text="Screenshot of create incident logic app action in Microsoft Sentinel connector.":::
108+
109+
You need to supply parameters as described below:
110+
111+
- Select your **Subscription**, **Resource group**, and **Workspace name** from their respective drop-downs.
112+
113+
- For the remaining fields, see the explanations above (under [Create an incident using the Azure portal](#create-an-incident-using-the-azure-portal)).
114+
115+
:::image type="content" source="media/create-incident-manually/create-incident-logicapp-parameters.png" alt-text="Screenshot of create incident action parameters in Microsoft Sentinel connector.":::
116+
117+
Microsoft Sentinel supplies some sample playbook templates that show you how to work with this capability:
118+
119+
- **Create incident with Microsoft Form**
120+
- **Create incident from shared email inbox**
121+
122+
You can find them in the playbook templates gallery on the Microsoft Sentinel **Automation** page.
123+
124+
### Create an incident using the Microsoft Sentinel API
125+
126+
The [Incidents](/rest/api/securityinsights/preview/incidents) operation group allows you not only to create, but also to [update (edit)](/rest/api/securityinsights/preview/incidents/create-or-update), [get (retrieve)](/rest/api/securityinsights/preview/incidents/get), [list](/rest/api/securityinsights/preview/incidents/list), and [delete](/rest/api/securityinsights/preview/incidents/delete) incidents.
127+
128+
You [create an incident](/rest/api/securityinsights/preview/incidents/create-or-update) using the following endpoint. After this request is made, the incident will be visible in the incident queue in the portal.
129+
130+
```http
131+
PUT https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}/providers/Microsoft.SecurityInsights/incidents/{incidentId}?api-version=2022-07-01-preview
132+
```
133+
134+
Here's an example of what a request body might look like:
135+
136+
```json
137+
{
138+
"etag": "\"0300bf09-0000-0000-0000-5c37296e0000\"",
139+
"properties": {
140+
"lastActivityTimeUtc": "2019-01-01T13:05:30Z",
141+
"firstActivityTimeUtc": "2019-01-01T13:00:30Z",
142+
"description": "This is a demo incident",
143+
"title": "My incident",
144+
"owner": {
145+
"objectId": "2046feea-040d-4a46-9e2b-91c2941bfa70"
146+
},
147+
"severity": "High",
148+
"classification": "FalsePositive",
149+
"classificationComment": "Not a malicious activity",
150+
"classificationReason": "IncorrectAlertLogic",
151+
"status": "Closed"
152+
}
153+
}
154+
```
155+
156+
## Notes
157+
158+
- Incidents created manually do not contain any entities or alerts. Therefore, the **Alerts** tab in the incident page will remain empty until you [relate existing alerts to your incident](relate-alerts-to-incidents.md).
159+
160+
The **Entities** tab will also remain empty, as adding entities *directly* to manually created incidents is not currently supported. (If you relate an alert to this incident, entities from the alert will appear in the incident.)
161+
162+
- Manually created incidents will also not display any **Product name** in the queue.
163+
164+
- The incidents queue is filtered by default to display only incidents with a status of "New" or "Active." If you create an incident with a status of "Closed," it will not appear in the queue until you change the status filter to show closed incidents as well.
165+
166+
167+
## Next steps
168+
169+
For more information, see:
170+
- [Relate alerts to incidents in Microsoft Sentinel](relate-alerts-to-incidents.md)
171+
- [Delete incidents in Microsoft Sentinel](delete-incident.md)
172+
- [Investigate incidents with Microsoft Sentinel](investigate-cases.md)
173+
- [Create custom analytics rules to detect threats](detect-threats-custom.md)

articles/sentinel/create-incidents-from-alerts.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ ms.author: yelevin
1010

1111
# Automatically create incidents from Microsoft security alerts
1212

13-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14-
1513
Alerts triggered in Microsoft security solutions that are connected to Microsoft Sentinel, such as Microsoft Defender for Cloud Apps and Microsoft Defender for Identity (formerly Azure ATP), do not automatically create incidents in Microsoft Sentinel. By default, when you connect a Microsoft solution to Microsoft Sentinel, any alert generated in that service will be stored as raw data in Microsoft Sentinel, in the Security Alert table in your Microsoft Sentinel workspace. You can then use that data like any other raw data you connect into Microsoft Sentinel.
1614

1715
You can easily configure Microsoft Sentinel to automatically create incidents every time an alert is triggered in a connected Microsoft security solution, by following the instructions in this article.
@@ -22,7 +20,7 @@ You must [connect Microsoft security solutions](connect-data-sources.md#data-con
2220

2321
## Using Microsoft Security incident creation analytics rules
2422

25-
Use the built-in rules available in Microsoft Sentinel to choose which connected Microsoft security solutions should create Microsoft Sentinel incidents automatically in real time. You can also edit the rules to define more specific options for filtering which of the alerts generated by the Microsoft security solution should create incidents in Microsoft Sentinel. For example, you can choose to create Microsoft Sentinel incidents automatically only from high-severity Microsoft Defender for Cloud (formerly Azure Security Center) alerts.
23+
Use the built-in rules available in Microsoft Sentinel to choose which connected Microsoft security solutions should create Microsoft Sentinel incidents automatically in real time. You can also edit the rules to define more specific options for filtering which of the alerts generated by the Microsoft security solution should create incidents in Microsoft Sentinel. For example, you can choose to create Microsoft Sentinel incidents automatically only from high-severity Microsoft Defender for Cloud alerts.
2624

2725
1. In the Azure portal under Microsoft Sentinel, select **Analytics**.
2826

@@ -36,7 +34,7 @@ Use the built-in rules available in Microsoft Sentinel to choose which connected
3634

3735
1. You can modify the rule details, and choose to filter the alerts that will create incidents by alert severity or by text contained in the alert’s name.
3836

39-
For example, if you choose **Microsoft Defender for Cloud** (may still be called *Microsoft Defender for Cloud*) in the **Microsoft security service** field and choose **High** in the **Filter by severity** field, only high severity security alerts will automatically create incidents in Microsoft Sentinel.
37+
For example, if you choose **Microsoft Defender for Cloud** in the **Microsoft security service** field and choose **High** in the **Filter by severity** field, only high severity security alerts will automatically create incidents in Microsoft Sentinel.
4038

4139
![Create rule wizard](media/incidents-from-alerts/create-rule-wizard.png)
4240

0 commit comments

Comments
 (0)