Skip to content

Commit 734306c

Browse files
authored
Merge pull request #185254 from lior-tamir/patch-11
Update playbook-triggers-actions.md
2 parents 0960aa2 + 1b77a59 commit 734306c

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/sentinel/playbook-triggers-actions.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,15 +36,15 @@ Though the Microsoft Sentinel connector can be used in a variety of ways, the co
3636

3737
| Trigger | Full trigger name in<br>Logic Apps Designer | When to use it | Known limitations
3838
| --------- | ------------ | -------------- | -------------- |
39-
| **Incident trigger** | "When Microsoft Sentinel incident creation rule was triggered (Preview)" | Recommended for most incident automation scenarios.<br><br>The playbook receives incident objects, including entities and alerts. Using this trigger allows the playbook to be attached to an **Automation rule**, so it can be triggered when an incident is created in Microsoft Sentinel, and all the [benefits of automation rules](./automate-incident-handling-with-automation-rules.md) can be applied to the incident. | Playbooks with this trigger can't be run manually from Microsoft Sentinel.<br><br>Playbooks with this trigger do not support alert grouping, meaning they will receive only the first alert sent with each incident.
40-
| **Alert trigger** | "When a response to a Microsoft Sentinel alert is triggered" | Advisable for playbooks that need to be run on alerts manually from the Microsoft Sentinel portal, or for **scheduled** analytics rules that don't generate incidents for their alerts. | This trigger cannot be used to automate responses for alerts generated by **Microsoft security** analytics rules.<br><br>Playbooks using this trigger cannot be called by **automation rules**. |
39+
| **Incident trigger** | "Microsoft Sentinel incident (Preview)" | Recommended for most incident automation scenarios.<br><br>The playbook receives incident objects, including entities and alerts. Using this trigger allows the playbook to be attached to an **Automation rule**, so it can be triggered when an incident is created in Microsoft Sentinel, and all the [benefits of automation rules](./automate-incident-handling-with-automation-rules.md) can be applied to the incident. | Playbooks with this trigger do not support alert grouping, meaning they will receive only the first alert sent with each incident.
40+
| **Alert trigger** | "Microsoft Sentinel alert" | Advisable for playbooks that need to be run on alerts manually from the Microsoft Sentinel portal, or for **scheduled** analytics rules that don't generate incidents for their alerts. | This trigger cannot be used to automate responses for alerts generated by **Microsoft security** analytics rules.<br><br>Playbooks using this trigger cannot be called by **automation rules**. |
4141
|
4242

4343
The schemas used by these two flows are not identical. The recommended practice is to use the **Microsoft Sentinel incident trigger** flow, which is applicable to most scenarios.
4444

4545
### Incident dynamic fields
4646

47-
The **Incident** object received from **When Microsoft Sentinel incident creation rule was triggered** includes the following dynamic fields:
47+
The **Incident** object received from **Microsoft Sentinel incident** includes the following dynamic fields:
4848

4949
- Incident properties (Shown as "Incident: field name")
5050

@@ -81,32 +81,32 @@ The **Incident** object received from **When Microsoft Sentinel incident creatio
8181
> Use the **Alert - Get Incident** action beforehand to get the **Incident ARM ID**.
8282
8383
### Update an incident
84-
- Playbook is triggered **when an incident is created**
84+
- Playbook is triggered by **Microsoft Sentinel incident**
8585

8686
![Incident trigger simple Update flow example](media/playbook-triggers-actions/incident-simple-flow.png)
8787

88-
- Playbook is triggered **when an alert is generated**
88+
- Playbook is triggered by **Microsoft Sentinel alert**
8989

9090
![Alert trigger simple Update Incident flow example](media/playbook-triggers-actions/alert-update-flow.png)
9191

9292
### Use Incident Information
9393

9494
Basic playbook to send incident details over mail:
95-
- Playbook is triggered **when an incident is created**
95+
- Playbook is triggered by **Microsoft Sentinel incident**
9696

9797
![Incident trigger simple Get flow example](media/playbook-triggers-actions/incident-simple-mail-flow.png)
9898

99-
- Playbook is triggered **when an alert is generated**
99+
- Playbook is triggered by **Microsoft Sentinel alert**
100100

101101
![Alert trigger simple Get Incident flow example](media/playbook-triggers-actions/alert-simple-mail-flow.png)
102102

103103
### Add a comment to the incident
104104

105-
- Playbook is triggered **when an incident is created**
105+
- Playbook is triggered by **Microsoft Sentinel incident**
106106

107107
![Incident trigger simple add comment example](media/playbook-triggers-actions/incident-comment.png)
108108

109-
- Playbook is triggered **when an alert is generated**
109+
- Playbook is triggered by **Microsoft Sentinel alert**
110110

111111
!["Alert trigger simple add comment example"](media/playbook-triggers-actions/alert-comment.png)
112112

0 commit comments

Comments
 (0)