You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| **Incident trigger** | "When Microsoft Sentinel incident creation rule was triggered (Preview)" | Recommended for most incident automation scenarios.<br><br>The playbook receives incident objects, including entities and alerts. Using this trigger allows the playbook to be attached to an **Automation rule**, so it can be triggered when an incident is created in Microsoft Sentinel, and all the [benefits of automation rules](./automate-incident-handling-with-automation-rules.md) can be applied to the incident. | Playbooks with this trigger can't be run manually from Microsoft Sentinel.<br><br>Playbooks with this trigger do not support alert grouping, meaning they will receive only the first alert sent with each incident.
40
-
|**Alert trigger**| "When a response to a Microsoft Sentinel alert is triggered" | Advisable for playbooks that need to be run on alerts manually from the Microsoft Sentinel portal, or for **scheduled** analytics rules that don't generate incidents for their alerts. | This trigger cannot be used to automate responses for alerts generated by **Microsoft security** analytics rules.<br><br>Playbooks using this trigger cannot be called by **automation rules**. |
39
+
| **Incident trigger** | "Microsoft Sentinel incident (Preview)" | Recommended for most incident automation scenarios.<br><br>The playbook receives incident objects, including entities and alerts. Using this trigger allows the playbook to be attached to an **Automation rule**, so it can be triggered when an incident is created in Microsoft Sentinel, and all the [benefits of automation rules](./automate-incident-handling-with-automation-rules.md) can be applied to the incident. | Playbooks with this trigger do not support alert grouping, meaning they will receive only the first alert sent with each incident.
40
+
|**Alert trigger**| "Microsoft Sentinel alert" | Advisable for playbooks that need to be run on alerts manually from the Microsoft Sentinel portal, or for **scheduled** analytics rules that don't generate incidents for their alerts. | This trigger cannot be used to automate responses for alerts generated by **Microsoft security** analytics rules.<br><br>Playbooks using this trigger cannot be called by **automation rules**. |
41
41
|
42
42
43
43
The schemas used by these two flows are not identical. The recommended practice is to use the **Microsoft Sentinel incident trigger** flow, which is applicable to most scenarios.
44
44
45
45
### Incident dynamic fields
46
46
47
-
The **Incident** object received from **When Microsoft Sentinel incident creation rule was triggered** includes the following dynamic fields:
47
+
The **Incident** object received from **Microsoft Sentinel incident** includes the following dynamic fields:
48
48
49
49
- Incident properties (Shown as "Incident: field name")
50
50
@@ -81,32 +81,32 @@ The **Incident** object received from **When Microsoft Sentinel incident creatio
81
81
> Use the **Alert - Get Incident** action beforehand to get the **Incident ARM ID**.
82
82
83
83
### Update an incident
84
-
- Playbook is triggered **when an incident is created**
84
+
- Playbook is triggered by **Microsoft Sentinel incident**
0 commit comments