Skip to content

Commit 682b8b9

Browse files
author
yelevin
committed
Final
1 parent 9a7c8ba commit 682b8b9

File tree

7 files changed

+17
-18
lines changed

7 files changed

+17
-18
lines changed

articles/sentinel/automate-incident-handling-with-automation-rules.md

Lines changed: 9 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -58,9 +58,9 @@ The following table shows the different possible scenarios that will cause an au
5858

5959
| Trigger type | Events that cause the rule to run |
6060
| --------- | ------------ |
61-
| **When incident is created** | - A new incident is created by an analytics rule.<br>- An incident is ingested from Microsoft Defender XDR.<br>- A new incident is created manually. |
62-
| **When incident is updated**<br> | - An incident's status is changed (closed/reopened/triaged).<br>- An incident's owner is assigned or changed.<br>- An incident's severity is raised or lowered.<br>- Alerts are added to an incident.<br>- Comments, tags, or tactics are added to an incident. |
63-
| **When alert is created**<br> | - An alert is created by a scheduled analytics rule. |
61+
| **When incident is created** | <li>A new incident is created by an analytics rule.<li>An incident is ingested from Microsoft Defender XDR.<li>A new incident is created manually. |
62+
| **When incident is updated** | <li>An incident's status is changed (closed/reopened/triaged).<li>An incident's owner is assigned or changed.<li>An incident's severity is raised or lowered.<li>Alerts are added to an incident.<li>Comments, tags, or tactics are added to an incident. |
63+
| **When alert is created** | <li>An alert is created by an analytics rule. |
6464

6565
#### Incident-based or alert-based automation?
6666

@@ -81,7 +81,9 @@ The main reason to use **alert-triggered automation** is for responding to alert
8181
- A playbook can be triggered by an alert and send the alert to an external ticketing system for incident creation and management, creating a new ticket for each alert.
8282

8383
> [!NOTE]
84-
> Alert-triggered automation is available only for [alerts](detect-threats-built-in.md) created by **Scheduled** analytics rules. Alerts created by **Microsoft Security** analytics rules are not supported.
84+
> - Alert-triggered automation is available only for [alerts](detect-threats-built-in.md) created by **Scheduled** analytics rules. Alerts created by **Microsoft Security** analytics rules are not supported.
85+
>
86+
> - Alert-triggered automation is not currently available in the unified security operations platform in the Microsoft Defender portal.
8587
8688
### Conditions
8789

@@ -159,17 +161,6 @@ In this example, in *Incident 1*:
159161

160162
In *Incident 2*, the outcome will be the same, regardless of which type of condition is defined.
161163

162-
#### When triggers collide
163-
164-
- An automation rule, based on the update trigger, can run on an incident that was updated by another automation rule, based on the incident creation trigger, that ran on the incident.
165-
166-
- Also, if an incident is updated by an automation rule that ran on the incident's creation, the incident can be evaluated by *both* a subsequent *incident-creation* automation rule *and* an *incident-update* automation rule, both of which will run if the incident satisfies the rules' conditions.
167-
168-
- If an incident triggers both create-trigger and update-trigger automation rules, the create-trigger rules will run first, according to their **[Order](#order)** numbers, and then the update-trigger rules will run, according to *their* **Order** numbers.
169-
170-
> [!NOTE]
171-
> After onboarding to the unified security operations platform, if multiple changes are made to the same incident in a five to ten minute period, a single update is sent to Microsoft Sentinel, with only the most recent change.
172-
173164
#### Alert create trigger
174165

175166
Currently the only condition that can be configured for the alert creation trigger is the set of analytics rules for which the automation rule will run.
@@ -220,6 +211,9 @@ Rules based on the update trigger have their own separate order queue. If such r
220211
- For rules of different *incident trigger* types, all applicable rules with the *incident creation* trigger type will run first (according to their order numbers), and only then the rules with the *incident update* trigger type (according to *their* order numbers).
221212
- Rules always run sequentially, never in parallel.
222213

214+
> [!NOTE]
215+
> After onboarding to the unified security operations platform, if multiple changes are made to the same incident in a five to ten minute period, a single update is sent to Microsoft Sentinel, with only the most recent change.
216+
223217
## Common use cases and scenarios
224218

225219
### Incident tasks

articles/sentinel/create-manage-use-automation-rules.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -167,6 +167,11 @@ Use the options in the **Conditions** area to define conditions for your automat
167167
| - **Tactics** | - Contains/Does not contain<br>- Added |
168168
| - **Alert product names**<br>- **Custom details value**<br>- **Analytic rule name** | - Contains/Does not contain |
169169

170+
1. Enter a value in the field on the right. Depending on the property you chose, this might be either a text box or a drop-down in which you select from a closed list of values. You might also be able to add several values by selecting the dice icon to the right of the text box.
171+
172+
:::image type="content" source="media/create-manage-use-automation-rules/add-values-to-condition.png" alt-text="Screenshot of adding values to your condition in automation rules.":::
173+
174+
Again, for setting complex **Or** conditions with different fields, see [Add advanced conditions to automation rules](add-advanced-conditions-to-automation-rules.md).
170175

171176
#### Conditions based on tags
172177

@@ -187,11 +192,11 @@ To add one of these conditions based on an incident's tags, take the following s
187192

188193
##### [Onboarded workspaces](#tab/onboarded)
189194

190-
:::image type="content" source="media/create-manage-use-automation-rules/tag-create-condition-defender.png" alt-text="Screenshot of list of operators for tag condition in create trigger rule--for onboarded workspaces.":::
195+
:::image type="content" source="media/create-manage-use-automation-rules/tag-create-condition-defender.png" alt-text="Screenshot of list of operators for tag condition in create trigger rule--for onboarded workspaces." lightbox="media/create-manage-use-automation-rules/tag-create-condition-defender.png":::
191196

192197
##### [Workspaces not onboarded](#tab/not-onboarded)
193198

194-
:::image type="content" source="media/create-manage-use-automation-rules/tag-create-condition-azure.png" alt-text="Screenshot of list of operators for tag condition in create trigger rule--for non-onboarded workspaces.":::
199+
:::image type="content" source="media/create-manage-use-automation-rules/tag-create-condition-azure.png" alt-text="Screenshot of list of operators for tag condition in create trigger rule--for non-onboarded workspaces." lightbox="media/create-manage-use-automation-rules/tag-create-condition-azure.png":::
195200

196201
---
197202

@@ -215,7 +220,7 @@ You can set the value of a [custom detail surfaced in an incident](surface-custo
215220

216221
:::image type="content" source="media/create-manage-use-automation-rules/custom-detail-key-condition.png" alt-text="Screenshot of adding a custom detail key as a condition.":::
217222

218-
1. You've now chosen the field you want to evaluate for this condition. Now you have to specify the value appearing in that field that will make this condition evaluate to *true*.
223+
1. You chose the field you want to evaluate for this condition. Now specify the value appearing in that field that makes this condition evaluate to *true*.
219224
Select **+ Add item condition**.
220225

221226
:::image type="content" source="media/create-manage-use-automation-rules/add-item-condition.png" alt-text="Screenshot of selecting add item condition for automation rules.":::
-1.16 KB
Loading
1016 Bytes
Loading
-1.97 KB
Loading
-392 Bytes
Loading
-25.6 KB
Loading

0 commit comments

Comments
 (0)