Skip to content

Commit 97f5802

Browse files
authored
Added info on support for alert based rules in Defender
1 parent a3f2bac commit 97f5802

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

articles/sentinel/create-manage-use-automation-rules.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,9 @@ The following table shows the different possible scenarios that will cause an au
5252

5353
| Trigger type | Events that cause the rule to run |
5454
| --------- | ------------ |
55-
| **When incident is created** | <li>A new incident is created by an analytics rule.<li>An incident is ingested from Microsoft Defender XDR.<li>A new incident is created manually. |
55+
| **When incident is created** | **Unified security operations platform in Microsoft Defender:**<li>A new incident is created in the Microsoft Defender portal.<br><br>**Microsoft Sentinel not onboarded to unified platform:**<li>A new incident is created by an analytics rule.<li>An incident is ingested from Microsoft Defender XDR.<li>A new incident is created manually. |
5656
| **When incident is updated**<br> | <li>An incident's status is changed (closed/reopened/triaged).<li>An incident's owner is assigned or changed.<li>An incident's severity is raised or lowered.<li>Alerts are added to an incident.<li>Comments, tags, or tactics are added to an incident. |
57-
| **When alert is created**<br> | <li>An alert is created by an analytics rule. |
57+
| **When alert is created**<br> | <li>An alert is created by a Microsoft Sentinel **Scheduled** or **NRT** analytics rule. |
5858

5959
## Create your automation rule
6060

@@ -167,6 +167,12 @@ Use the options in the **Conditions** area to define conditions for your automat
167167
| - **Tactics** | - Contains/Does not contain<br>- Added |
168168
| - **Alert product names**<br>- **Custom details value**<br>- **Analytic rule name** | - Contains/Does not contain |
169169

170+
#### Conditions available with the alert trigger
171+
172+
The only condition that can be evaluated by rules based on the alert creation trigger is which Microsoft Sentinel analytics rule created the alert.
173+
174+
Automation rules based on the alert trigger will therefore only run on alerts created by Microsoft Sentinel.
175+
170176
1. Enter a value in the field on the right. Depending on the property you chose, this might be either a text box or a drop-down in which you select from a closed list of values. You might also be able to add several values by selecting the dice icon to the right of the text box.
171177

172178
:::image type="content" source="media/create-manage-use-automation-rules/add-values-to-condition.png" alt-text="Screenshot of adding values to your condition in automation rules.":::

0 commit comments

Comments
 (0)