You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/automate-incident-handling-with-automation-rules.md
+9-15Lines changed: 9 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,9 +58,9 @@ The following table shows the different possible scenarios that will cause an au
58
58
59
59
| Trigger type | Events that cause the rule to run |
60
60
| --------- | ------------ |
61
-
|**When incident is created**|- A new incident is created by an analytics rule.<br>- An incident is ingested from Microsoft Defender XDR.<br>- A new incident is created manually. |
62
-
|**When incident is updated**<br>|- An incident's status is changed (closed/reopened/triaged).<br>- An incident's owner is assigned or changed.<br>- An incident's severity is raised or lowered.<br>- Alerts are added to an incident.<br>- Comments, tags, or tactics are added to an incident. |
63
-
|**When alert is created**<br>|- An alert is created by a scheduled analytics rule. |
61
+
|**When incident is created**|<li>A new incident is created by an analytics rule.<li>An incident is ingested from Microsoft Defender XDR.<li>A new incident is created manually. |
62
+
|**When incident is updated**|<li>An incident's status is changed (closed/reopened/triaged).<li>An incident's owner is assigned or changed.<li>An incident's severity is raised or lowered.<li>Alerts are added to an incident.<li>Comments, tags, or tactics are added to an incident. |
63
+
|**When alert is created**|<li>An alert is created by an analytics rule. |
64
64
65
65
#### Incident-based or alert-based automation?
66
66
@@ -81,7 +81,9 @@ The main reason to use **alert-triggered automation** is for responding to alert
81
81
- A playbook can be triggered by an alert and send the alert to an external ticketing system for incident creation and management, creating a new ticket for each alert.
82
82
83
83
> [!NOTE]
84
-
> Alert-triggered automation is available only for [alerts](detect-threats-built-in.md) created by **Scheduled** analytics rules. Alerts created by **Microsoft Security** analytics rules are not supported.
84
+
> - Alert-triggered automation is available only for [alerts](detect-threats-built-in.md) created by **Scheduled** analytics rules. Alerts created by **Microsoft Security** analytics rules are not supported.
85
+
>
86
+
> - Alert-triggered automation is not currently available in the unified security operations platform in the Microsoft Defender portal.
85
87
86
88
### Conditions
87
89
@@ -159,17 +161,6 @@ In this example, in *Incident 1*:
159
161
160
162
In *Incident 2*, the outcome will be the same, regardless of which type of condition is defined.
161
163
162
-
#### When triggers collide
163
-
164
-
- An automation rule, based on the update trigger, can run on an incident that was updated by another automation rule, based on the incident creation trigger, that ran on the incident.
165
-
166
-
- Also, if an incident is updated by an automation rule that ran on the incident's creation, the incident can be evaluated by *both* a subsequent *incident-creation* automation rule *and* an *incident-update* automation rule, both of which will run if the incident satisfies the rules' conditions.
167
-
168
-
- If an incident triggers both create-trigger and update-trigger automation rules, the create-trigger rules will run first, according to their **[Order](#order)** numbers, and then the update-trigger rules will run, according to *their***Order** numbers.
169
-
170
-
> [!NOTE]
171
-
> After onboarding to the unified security operations platform, if multiple changes are made to the same incident in a five to ten minute period, a single update is sent to Microsoft Sentinel, with only the most recent change.
172
-
173
164
#### Alert create trigger
174
165
175
166
Currently the only condition that can be configured for the alert creation trigger is the set of analytics rules for which the automation rule will run.
@@ -220,6 +211,9 @@ Rules based on the update trigger have their own separate order queue. If such r
220
211
- For rules of different *incident trigger* types, all applicable rules with the *incident creation* trigger type will run first (according to their order numbers), and only then the rules with the *incident update* trigger type (according to *their* order numbers).
221
212
- Rules always run sequentially, never in parallel.
222
213
214
+
> [!NOTE]
215
+
> After onboarding to the unified security operations platform, if multiple changes are made to the same incident in a five to ten minute period, a single update is sent to Microsoft Sentinel, with only the most recent change.
1. Enter a value in the field on the right. Depending on the property you chose, this might be either a text box or a drop-down in which you select from a closed list of values. You might also be able to add several values by selecting the dice icon to the right of the text box.
171
+
172
+
:::image type="content" source="media/create-manage-use-automation-rules/add-values-to-condition.png" alt-text="Screenshot of adding values to your condition in automation rules.":::
173
+
174
+
Again, for setting complex **Or** conditions with different fields, see [Add advanced conditions to automation rules](add-advanced-conditions-to-automation-rules.md).
170
175
171
176
#### Conditions based on tags
172
177
@@ -187,11 +192,11 @@ To add one of these conditions based on an incident's tags, take the following s
187
192
188
193
##### [Onboarded workspaces](#tab/onboarded)
189
194
190
-
:::image type="content" source="media/create-manage-use-automation-rules/tag-create-condition-defender.png" alt-text="Screenshot of list of operators for tag condition in create trigger rule--for onboarded workspaces.":::
195
+
:::image type="content" source="media/create-manage-use-automation-rules/tag-create-condition-defender.png" alt-text="Screenshot of list of operators for tag condition in create trigger rule--for onboarded workspaces." lightbox="media/create-manage-use-automation-rules/tag-create-condition-defender.png":::
191
196
192
197
##### [Workspaces not onboarded](#tab/not-onboarded)
193
198
194
-
:::image type="content" source="media/create-manage-use-automation-rules/tag-create-condition-azure.png" alt-text="Screenshot of list of operators for tag condition in create trigger rule--for non-onboarded workspaces.":::
199
+
:::image type="content" source="media/create-manage-use-automation-rules/tag-create-condition-azure.png" alt-text="Screenshot of list of operators for tag condition in create trigger rule--for non-onboarded workspaces." lightbox="media/create-manage-use-automation-rules/tag-create-condition-azure.png":::
195
200
196
201
---
197
202
@@ -215,7 +220,7 @@ You can set the value of a [custom detail surfaced in an incident](surface-custo
215
220
216
221
:::image type="content" source="media/create-manage-use-automation-rules/custom-detail-key-condition.png" alt-text="Screenshot of adding a custom detail key as a condition.":::
217
222
218
-
1. You've now chosen the field you want to evaluate for this condition. Now you have to specify the value appearing in that field that will make this condition evaluate to *true*.
223
+
1. You chose the field you want to evaluate for this condition. Now specify the value appearing in that field that makes this condition evaluate to *true*.
219
224
Select **+ Add item condition**.
220
225
221
226
:::image type="content" source="media/create-manage-use-automation-rules/add-item-condition.png" alt-text="Screenshot of selecting add item condition for automation rules.":::
0 commit comments