You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/automate-incident-handling-with-automation-rules.md
+22-17Lines changed: 22 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Automate threat response in Microsoft Sentinel with automation rules | Microsoft Docs
3
-
description: This article explains what Microsoft Sentinel automation rules are, and how to use them to implement your Security Orchestration, Automation and Response (SOAR) operations, increasing your SOC's effectiveness and saving you time and resources.
3
+
description: This article explains what Microsoft Sentinel automation rules are, and how to use them to implement your Security Orchestration, Automation and Response (SOAR) operations. Automation rules increase your SOC's effectiveness and save you time and resources.
4
4
author: batamig
5
5
ms.author: bagol
6
6
ms.topic: conceptual
@@ -14,7 +14,7 @@ ms.collection: usx-security
14
14
15
15
# Automate threat response in Microsoft Sentinel with automation rules
16
16
17
-
This article explains what Microsoft Sentinel automation rules are, and how to use them to implement your Security Orchestration, Automation and Response (SOAR) operations, increasing your SOC's effectiveness and saving you time and resources.
17
+
This article explains what Microsoft Sentinel automation rules are, and how to use them to implement your Security Orchestration, Automation and Response (SOAR) operations. Automation rules increase your SOC's effectiveness and save you time and resources.
@@ -52,7 +52,7 @@ Automation rules are made up of several components:
52
52
53
53
### Triggers
54
54
55
-
Automation rules are triggered **when an incident is created or updated** or **when an alert is created**. Recall that incidents include alerts, and that both alerts and incidents can be created by analytics rules, of which there are several types, as explained in [Threat detection in Microsoft Sentinel](threat-detection.md).
55
+
Automation rules are triggered **when an incident is created or updated** or **when an alert is created**. Recall that incidents include alerts, and that both alerts and incidents can be created by analytics rules, as explained in [Threat detection in Microsoft Sentinel](threat-detection.md).
56
56
57
57
The following table shows the different possible scenarios that cause an automation rule to run.
58
58
@@ -64,25 +64,25 @@ The following table shows the different possible scenarios that cause an automat
64
64
65
65
#### Incident-based or alert-based automation?
66
66
67
-
Now that both incident automation and alert automation are handled centrally by automation rules as well as playbooks, how should you choose when to use which?
67
+
With automation rules centrally handling the response to both incidents and alerts, how should you choose which to automate, and in which circumstances?
68
68
69
69
For most use cases, **incident-triggered automation** is the preferable approach. In Microsoft Sentinel, an **incident** is a “case file” – an aggregation of all the relevant evidence for a specific investigation. It’s a container for alerts, entities, comments, collaboration, and other artifacts. Unlike **alerts** which are single pieces of evidence, incidents are modifiable, have the most updated status, and can be enriched with comments, tags, and bookmarks. The incident allows you to track the attack story that keeps evolving with the addition of new alerts.
70
70
71
71
For these reasons, it makes more sense to build your automation around incidents. So the most appropriate way to create playbooks is to base them on the Microsoft Sentinel incident trigger in Azure Logic Apps.
72
72
73
-
The main reason to use **alert-triggered automation** is for responding to alerts generated by analytics rules that *do not create incidents* (that is, where incident creation has been*disabled* in the **Incident settings** tab of the [analytics rule wizard](detect-threats-custom.md#configure-the-incident-creation-settings)).
73
+
The main reason to use **alert-triggered automation** is for responding to alerts generated by analytics rules that *do not create incidents* (that is, where incident creation is*disabled* in the **Incident settings** tab of the [analytics rule wizard](detect-threats-custom.md#configure-the-incident-creation-settings)).
74
74
75
-
This reason is especially relevant when your Microsoft Sentinel workspace is onboarded to the unified security operations platform, as all incident creation happens in Microsoft Defender XDR, and therefore the incident creation rules in Microsoft Sentinel *must be disabled*.
75
+
This reason is especially relevant when your Microsoft Sentinel workspace is onboarded to the unified security operations platform. In this scenario, all incident creation happens in Microsoft Defender XDR, and therefore the incident creation rules in Microsoft Sentinel *must be disabled*.
76
76
77
-
Even without being onboarded to the unified portal, you might anyway decide to use alert-triggered automation if you want to use other external logic to determine if and how incidents are created from alerts, as well as if and how alerts are grouped into incidents. For example:
77
+
Even without being onboarded to the unified portal, you might anyway decide to use alert-triggered automation if you want to use other external logic to decide if and when to create incidents from alerts, and how alerts are grouped together. For example:
78
78
79
-
- A playbook can be triggered by an alert that doesn’t have an associated incident, enrich the alert with information from other sources, and based on some external logic decide whether to create an incident or not.
79
+
- A playbook, triggered by an alert that doesn’t have an associated incident, can enrich the alert with information from other sources, and based on some external logic decide whether to create an incident or not.
80
80
81
-
- A playbook can be triggered by an alert and, instead of creating an incident, look for an appropriate existing incident to add the alert to. Learn more about [incident expansion](relate-alerts-to-incidents.md).
81
+
- A playbook, triggered by an alert, can, instead of creating an incident, look for an appropriate existing incident to add the alert to. Learn more about [incident expansion](relate-alerts-to-incidents.md).
82
82
83
-
- A playbook can be triggered by an alert and notify SOC personnel of the alert, so the team can decide whether or not to create an incident.
83
+
- A playbook, triggered by an alert, can notify SOC personnel of the alert so the team can decide whether or not to create an incident.
84
84
85
-
- A playbook can be triggered by an alert and send the alert to an external ticketing system for incident creation and management, creating a new ticket for each alert.
85
+
- A playbook, triggered by an alert, can send the alert to an external ticketing system for incident creation and management, and that system creates a new ticket for each alert.
86
86
87
87
> [!NOTE]
88
88
> - Alert-triggered automation is available only for alerts created by [**Scheduled**, **NRT**, and **Microsoft security** analytics rules](threat-detection.md).
@@ -91,7 +91,7 @@ Even without being onboarded to the unified portal, you might anyway decide to u
91
91
92
92
### Conditions
93
93
94
-
Complex sets of conditions can be defined to govern when actions (see below) should run. These conditions include the event that triggers the rule (incident created or updated, or alert created), the states or values of the incident's properties and [entity properties](entities-reference.md) (for incident trigger only), and also the analytics rule or rules that generated the incident or alert.
94
+
Complex sets of conditions can be defined to govern when actions (see below) should run. These conditions include the event that triggers the rule (incident created or updated, or alert created), the states or values of the incident's properties and [entity properties](#supported-entity-properties) (for incident trigger only), and also the analytics rule or rules that generated the incident or alert.
95
95
96
96
When an automation rule is triggered, it checks the triggering incident or alert against the conditions defined in the rule. For incidents, the property-based conditions are evaluated according to **the current state** of the property at the moment the evaluation occurs, or according to **changes in the state** of the property (see below for details). Since a single incident creation or update event could trigger several automation rules, the **order** in which they run (see below) makes a difference in determining the outcome of the conditions' evaluation. The **actions** defined in the rule are executed only if all the conditions are satisfied.
97
97
@@ -114,7 +114,7 @@ For example, if you define **Analytic rule name** as **Contains == Brute force a
114
114
115
115
The conditions evaluated in rules defined using the trigger **When an incident is updated** include all of those listed for the incident creation trigger. But the update trigger includes more properties that can be evaluated.
116
116
117
-
One of these properties is **Updated by**. This property lets you track the type of source that made the change in the incident. You can create a condition evaluating whether the incident was updated by one of the following values, depending on whether you've onboarded your workspace to the unified security operations platform:
117
+
One of these properties is **Updated by**. This property lets you track the type of source that made the change in the incident. You can create a condition evaluating whether the incident was updated by one of the following values, depending on whether you onboarded your workspace to the unified security operations platform:
118
118
119
119
##### [Onboarded workspaces](#tab/onboarded)
120
120
@@ -136,6 +136,7 @@ One of these properties is **Updated by**. This property lets you track the type
136
136
- Microsoft Defender XDR
137
137
138
138
---
139
+
139
140
Using this condition, for example, you can instruct this automation rule to run on any change made to an incident, except if it was made by another automation rule.
140
141
141
142
More to the point, the update trigger also uses other operators that check **state changes** in the values of incident properties as well as their current state. A **state change** condition would be satisfied if:
@@ -168,13 +169,17 @@ In this example, in *Incident 1*:
168
169
169
170
In *Incident 2*, the outcome is the same, regardless of which type of condition is defined.
170
171
172
+
#### Supported entity properties
173
+
174
+
For the list of entity properties supported as conditions for automation rules, see [Microsoft Sentinel automation rules reference](automation-rule-reference.md).
175
+
171
176
#### Alert create trigger
172
177
173
178
Currently the only condition that can be configured for the alert creation trigger is the set of analytics rules for which the automation rule is run.
174
179
175
180
### Actions
176
181
177
-
Actions can be defined to run when the conditions (see above) are met. You can define many actions in a rule, and you can choose the order in which they’ll run (see below). The following actions can be defined using automation rules, without the need for the [advanced functionality of a playbook](automate-responses-with-playbooks.md):
182
+
Actions can be defined to run when the conditions (see above) are met. You can define many actions in a rule, and you can choose the order in which they run (see below). The following actions can be defined using automation rules, without the need for the [advanced functionality of a playbook](automate-responses-with-playbooks.md):
178
183
179
184
- Adding a task to an incident – you can create a [checklist of tasks for analysts to follow](incident-tasks.md) throughout the processes of triage, investigation, and remediation of the incident, to ensure that no critical steps are missed.
180
185
@@ -212,7 +217,7 @@ Rules based on the update trigger have their own separate order queue. If such r
212
217
- Each trigger type maintains its own queue.
213
218
- For rules created in the Azure portal, the **order** field is automatically populated with the number following the highest number used by existing rules of the same trigger type.
214
219
- However, for rules created in other ways (command line, API, etc.), the **order** number must be assigned manually.
215
-
- There is no validation mechanism preventing multiple rules from having the same order number, even within the same trigger type.
220
+
- There is no validation mechanism that prevents multiple rules from having the same order number, even within the same trigger type.
216
221
- You can allow two or more rules of the same trigger type to have the same order number, if you don't care which order they run in.
217
222
- For rules of the same trigger type with the same order number, the execution engine randomly selects which rules run in which order.
218
223
- For rules of different *incident trigger* types, all applicable rules with the *incident creation* trigger type run first (according to their order numbers), and only then the rules with the *incident update* trigger type (according to *their* order numbers).
@@ -283,7 +288,7 @@ Notify your various teams and other personnel when changes are made to incidents
283
288
284
289
### Maintain synchronization with external systems
285
290
286
-
If you've used playbooks to create tickets in external systems when incidents are created, you can use an update-trigger automation rule to call a playbook that updates those tickets.
291
+
If you used playbooks to create tickets in external systems when incidents are created, you can use an update-trigger automation rule to call a playbook that updates those tickets.
287
292
288
293
## Automation rules execution
289
294
@@ -368,4 +373,4 @@ In this document, you learned about how automation rules can help you to central
368
373
-[Create and use Microsoft Sentinel automation rules to manage incidents](create-manage-use-automation-rules.md).
369
374
-[Use automation rules to create lists of tasks for analysts](create-tasks-automation-rule.md).
370
375
- To learn more about advanced automation options, see [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md).
371
-
- For help in implementing playbooks, see [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md).
376
+
- For help with implementing playbooks, see [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md).
0 commit comments