You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/automate-incident-handling-with-automation-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Automate threat response in Microsoft Sentinel with automation rules | Mi
3
3
description: This article explains what Microsoft Sentinel automation rules are, and how to use them to implement your Security Orchestration, Automation and Response (SOAR) operations, increasing your SOC's effectiveness and saving you time and resources.
Copy file name to clipboardExpand all lines: articles/sentinel/create-manage-use-automation-rules.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article explains how to create and use automation rules in Mic
4
4
author: yelevin
5
5
ms.author: yelevin
6
6
ms.topic: how-to
7
-
ms.date: 05/09/2023
7
+
ms.date: 03/27/2024
8
8
---
9
9
10
10
# Create and use Microsoft Sentinel automation rules to manage response
@@ -46,9 +46,9 @@ The following table shows the different possible scenarios that will cause an au
46
46
47
47
| Trigger type | Events that cause the rule to run |
48
48
| --------- | ------------ |
49
-
|**When incident is created**|- A new incident is created by an analytics rule.<br>- An incident is ingested from Microsoft Defender XDR.<br>- A new incident is created manually. |
50
-
|**When incident is updated**<br> |- An incident's status is changed (closed/reopened/triaged).<br>- An incident's owner is assigned or changed.<br>- An incident's severity is raised or lowered.<br>- Alerts are added to an incident.<br>- Comments, tags, or tactics are added to an incident. |
51
-
| **When alert is created**<br> | - An alert is created by a scheduled analytics rule.
49
+
|**When incident is created**|<li>A new incident is created by an analytics rule.<li>An incident is ingested from Microsoft Defender XDR.<li>A new incident is created manually. |
50
+
|**When incident is updated**<br> |<li>An incident's status is changed (closed/reopened/triaged).<li>An incident's owner is assigned or changed.<li>An incident's severity is raised or lowered.<li>Alerts are added to an incident.<li>Comments, tags, or tactics are added to an incident. |
51
+
| **When alert is created**<br> | <li>An alert is created by a scheduled analytics rule.
52
52
53
53
## Create your automation rule
54
54
@@ -106,9 +106,10 @@ Select the **+ Add** expander and choose **Condition (And)** from the drop-down
106
106
107
107
| Property | Operator set |
108
108
| -------- | -------- |
109
-
| - Title<br>- Description<br>- Tag<br>- All listed entity properties | - Equals/Does not equal<br>- Contains/Does not contain<br>- Starts with/Does not start with<br>- Ends with/Does not end with |
| - Tactics<br>- Alert product names<br>- Custom details value (Preview) | - Contains/Does not contain |
109
+
| <ul><li>Title<li>Description<li>All listed entity properties | <ul><li>Equals/Does not equal<li>Contains/Does not contain<li>Starts with/Does not start with<li>Ends with/Does not end with |
| <ul><li>Tactics<li>Alert product names<li>Custom details value (Preview) | <ul><li>Contains/Does not contain |
112
+
| <ul><li>Tag<br>(See [Items vs. collections](automate-incident-handling-with-automation-rules.md#items-vs-collections)) | Any individual tag:<ul><li>Equals/Does not equal<li>Contains/Does not contain<li>Starts with/Does not start with<li>Ends with/Does not end with</ul><br>Collection of all tags:<ul><li>Equals/Does not equal<li>Contains/Does not contain<li>Starts with/Does not start with<li>Ends with/Does not end with |
112
113
113
114
##### Conditions available with the update trigger
0 commit comments