Skip to content

Commit 6be8b87

Browse files
committed
Final for publishing
1 parent 85a7d90 commit 6be8b87

File tree

3 files changed

+7
-1
lines changed

3 files changed

+7
-1
lines changed

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -302,6 +302,8 @@
302302
items:
303303
- name: Investigate incidents
304304
href: investigate-cases.md
305+
- name: Relate alerts to incidents
306+
href: relate-alerts-to-incidents.md
305307
- name: Search large datasets
306308
href: search-jobs.md
307309
- name: Restore historical data
75.1 KB
Loading

articles/sentinel/relate-alerts-to-incidents.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,11 @@ When adding an alert to an incident, depending on the circumstances, you might b
9797

9898
Adding and removing alerts to incidents are also available as Logic Apps actions in the Microsoft Sentinel connector, and therefore in Microsoft Sentinel playbooks. You need to supply the **incident ARM ID** and the **system alert ID** as parameters, and you can find them both in the playbook schema for both the alert and incident triggers.
9999

100-
Here's an example of using the **Add alert to incident (Preview)** action in a playbook:
100+
Microsoft Sentinel supplies a sample playbook template in the templates gallery, that shows you how to work with this capability:
101+
102+
:::image type="content" source="media/relate-alerts-to-incidents/playbook.png" alt-text="Screenshot of playbook template for relating alerts to incidents.":::
103+
104+
Here's how the **Add alert to incident (Preview)** action is used in this playbook, as an example for how you can use it elsewhere:
101105

102106
:::image type="content" source="media/relate-alerts-to-incidents/add-alert-using-playbook.png" alt-text="Screenshot of adding an alert to an incident using a playbook action.":::
103107

0 commit comments

Comments
 (0)