Skip to content

Commit f88bb3a

Browse files
authored
Merge pull request #218384 from yelevin/yelevin/incident-tasks
Incident tasks
2 parents 8475d0f + c6b7c96 commit f88bb3a

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+475
-6
lines changed

articles/sentinel/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,8 @@
141141
href: notebooks.md
142142
- name: Investigate incidents
143143
items:
144+
- name: Use tasks to manage incident workflow
145+
href: incident-tasks.md
144146
- name: Investigate large datasets
145147
href: investigate-large-datasets.md
146148
- name: Investigate entities with entity pages
@@ -378,6 +380,8 @@
378380
href: livestream.md
379381
- name: Investigate incidents
380382
items:
383+
- name: Use tasks to handle incident workflow
384+
href: work-with-tasks.md
381385
- name: Investigate incidents
382386
href: investigate-cases.md
383387
- name: Relate alerts to incidents
@@ -408,6 +412,10 @@
408412
href: migrate-playbooks-to-automation-rules.md
409413
- name: Customize playbooks from templates
410414
href: use-playbook-templates.md
415+
- name: Create incident tasks using automation rules
416+
href: create-tasks-automation-rule.md
417+
- name: Create and perform advanced incident tasks using playbooks
418+
href: create-tasks-playbook.md
411419
- name: Manage Microsoft Sentinel
412420
items:
413421
- name: Microsoft Sentinel for MSSPs

articles/sentinel/add-advanced-conditions-to-automation-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,15 +107,15 @@ Now we decide we're going to be a little more picky. We want to add more conditi
107107

108108
:::image type="content" source="media/add-advanced-conditions-to-automation-rules/add-a-compound-condition.png" alt-text="Screenshot of adding a compound condition to an automation rule.":::
109109

110-
You'll see a new row added where the **+ Add** link was, separated by an `AND` operator.
110+
You'll see a new row added under the existing condition (in the same blue-shaded area), linked to it by an `AND` operator.
111111

112112
:::image type="content" source="media/add-advanced-conditions-to-automation-rules/empty-new-condition.png" alt-text="Screenshot of empty new condition row in automation rules.":::
113113

114114
1. Fill in the parameters and values of this condition the same way you did the others.
115115

116116
:::image type="content" source="media/add-advanced-conditions-to-automation-rules/fill-in-new-condition.png" alt-text="Screenshot of new condition fields to fill in to add to automation rules.":::
117117

118-
1. Repeat the previous two steps to add an AND condition to the other side of the OR condition group.
118+
1. Repeat the previous two steps to add an AND condition to either side of the OR condition group.
119119

120120
:::image type="content" source="media/add-advanced-conditions-to-automation-rules/add-compound-conditions.png" alt-text="Screenshot of adding multiple compound conditions to an automation rule.":::
121121

articles/sentinel/automate-incident-handling-with-automation-rules.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Automation rules are a way to centrally manage automation in Microsoft Sentinel,
1919
Automation rules apply to the following categories of use cases:
2020

2121
- Perform basic automation tasks for incident handling without using playbooks. For example:
22+
- [Add incident tasks](incident-tasks.md) (in Preview) for analysts to follow.
2223
- Suppress noisy incidents.
2324
- Triage new incidents by changing their status from New to Active and assigning an owner.
2425
- Tag incidents to classify them.
@@ -136,6 +137,8 @@ Currently the only condition that can be configured for the alert creation trigg
136137

137138
Actions can be defined to run when the conditions (see above) are met. You can define many actions in a rule, and you can choose the order in which they’ll run (see below). The following actions can be defined using automation rules, without the need for the [advanced functionality of a playbook](automate-responses-with-playbooks.md):
138139

140+
- Adding a task to an incident - you can create a [checklist of tasks for analysts to follow](incident-tasks.md) throughout the processes of triage, investigation, and remediation of the incident, to ensure that no critical steps are missed.
141+
139142
- Changing the status of an incident, keeping your workflow up to date.
140143

141144
- When changing to “closed,” specifying the [closing reason](investigate-cases.md#closing-an-incident) and adding a comment. This helps you keep track of your performance and effectiveness, and fine-tune to reduce [false positives](false-positives.md).
@@ -160,10 +163,16 @@ You can define the order in which automation rules will run. Later automation ru
160163

161164
For example, if "First Automation Rule" changed an incident's severity from Medium to Low, and "Second Automation Rule" is defined to run only on incidents with Medium or higher severity, it won't run on that incident.
162165

166+
The order of automation rules that add [incident tasks](incident-tasks.md) determines the order in which the tasks will appear in a given incident.
167+
163168
Rules based on the update trigger have their own separate order queue. If such rules are triggered to run on a just-created incident (by a change made by another automation rule), they will run only after all the applicable rules based on the create trigger have run.
164169

165170
## Common use cases and scenarios
166171

172+
### Incident tasks
173+
174+
Automation rules allow you to standardize and formalize the steps required for the triaging, investigation, and remediation of incidents, by [creating tasks](incident-tasks.md) that can be applied to a single incident, across groups of incidents, or to all incidents, according to the conditions you set in the automation rule and the threat detection logic in the underlying analytics rules. Tasks applied to an incident appear in the incident's page, so your analysts have the entire list of actions they need to take, right in front of them, and won't miss any critical steps.
175+
167176
### Incident- and alert-triggered automation
168177

169178
Automation rules can be triggered by the creation or updating of incidents and also (in Preview) by the creation of alerts. These occurrences can all trigger automated response chains, which can include playbooks ([special permissions are required](#permissions-for-automation-rules-to-run-playbooks)).
@@ -294,5 +303,6 @@ You can [create and manage automation rules](create-manage-use-automation-rules.
294303
In this document, you learned about how automation rules can help you to centrally manage response automation for Microsoft Sentinel incidents and alerts.
295304

296305
- [Create and use Microsoft Sentinel automation rules to manage incidents](create-manage-use-automation-rules.md).
306+
- [Use automation rules to create lists of tasks for analysts](create-tasks-automation-rule.md).
297307
- To learn more about advanced automation options, see [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md).
298308
- For help in implementing playbooks, see [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md).

articles/sentinel/automate-responses-with-playbooks.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -331,3 +331,4 @@ The following recommended playbooks, and other similar playbooks are available t
331331
## Next steps
332332

333333
- [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md)
334+
- [Create and perform incident tasks in Microsoft Sentinel using playbooks](create-tasks-playbook.md)

articles/sentinel/automation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Microsoft Sentinel, in addition to being a Security Information and Event Manage
2626

2727
## Automation rules
2828

29-
Automation rules (now generally available!) allow users to centrally manage the automation of incident handling. Besides letting you assign playbooks to incidents (not just to alerts as before), automation rules also allow you to automate responses for multiple analytics rules at once, automatically tag, assign, or close incidents without the need for playbooks, and control the order of actions that are executed. Automation rules also allow you to apply automations when an incident is **updated** (now in **Preview**), as well as when it's created. This new capability will further streamline automation use in Microsoft Sentinel and will enable you to simplify complex workflows for your incident orchestration processes.
29+
Automation rules allow users to centrally manage the automation of incident handling. Besides letting you assign playbooks to incidents and alerts, automation rules also allow you to automate responses for multiple analytics rules at once, automatically tag, assign, or close incidents without the need for playbooks, create lists of tasks for your analysts to perform when triaging, investigating, and remediating incidents, and control the order of actions that are executed. Automation rules also allow you to apply automations when an incident is **updated** (now in **Preview**), as well as when it's created. This new capability will further streamline automation use in Microsoft Sentinel and will enable you to simplify complex workflows for your incident orchestration processes.
3030

3131
Learn more with this [complete explanation of automation rules](automate-incident-handling-with-automation-rules.md).
3232

@@ -45,4 +45,4 @@ In this document, you learned how Microsoft Sentinel uses automation to help you
4545
- To learn about automation of incident handling, see [Automate incident handling in Microsoft Sentinel](automate-incident-handling-with-automation-rules.md).
4646
- To learn more about advanced automation options, see [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md).
4747
- To get started creating automation rules, see [Create and use Microsoft Sentinel automation rules to manage incidents](create-manage-use-automation-rules.md)
48-
- For help in implementing advanced automation with playbooks, see [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md).
48+
- For help with implementing advanced automation with playbooks, see [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md).

articles/sentinel/create-manage-use-automation-rules.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ The first step in designing and defining your automation rule is figuring out wh
2727

2828
You also want to determine your use case. What are you trying to accomplish with this automation? Consider the following options:
2929

30+
- (**Preview**) Create tasks for your analysts to follow in triaging, investigating, and remediating incidents.
3031
- Suppress noisy incidents (see [this article on handling false positives](false-positives.md#add-exceptions-by-using-automation-rules) instead)
3132
- Triage new incidents by changing their status from New to Active and assigning an owner.
3233
- Tag incidents to classify them.
@@ -37,7 +38,7 @@ You also want to determine your use case. What are you trying to accomplish with
3738

3839
### Determine the trigger
3940

40-
Do you want this automation to be activated when new incidents (or alerts, in preview) are created? Or any time an incident gets updated?
41+
Do you want this automation to be activated when new incidents (or alerts, in preview) are created? Or anytime an incident gets updated?
4142

4243
Automation rules are triggered **when an incident is created or updated** (the update trigger is now in **Preview**) or **when an alert is created** (also in **Preview**). Recall that incidents include alerts, and that both alerts and incidents are created by analytics rules, of which there are several types, as explained in [Detect threats with built-in analytics rules in Microsoft Sentinel](detect-threats-built-in.md).
4344

@@ -208,5 +209,6 @@ In this document, you learned how to use automation rules to centrally manage re
208209
- To learn how to add advanced conditions with `OR` operators to automation rules, see [Add advanced conditions to Microsoft Sentinel automation rules](add-advanced-conditions-to-automation-rules.md).
209210
- To learn more about automation rules, see [Automate incident handling in Microsoft Sentinel with automation rules](automate-incident-handling-with-automation-rules.md)
210211
- To learn more about advanced automation options, see [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md).
212+
- To learn how to use automation rules to add tasks to incidents, see [Create incident tasks in Microsoft Sentinel using automation rules](create-tasks-automation-rule.md).
211213
- To migrate alert-trigger playbooks to be invoked by automation rules, see [Migrate your Microsoft Sentinel alert-trigger playbooks to automation rules](migrate-playbooks-to-automation-rules.md)
212-
- For help in implementing automation rules and playbooks, see [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md).
214+
- For help with implementing automation rules and playbooks, see [Tutorial: Use playbooks to automate threat responses in Microsoft Sentinel](tutorial-respond-threats-playbook.md).
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: Create incident tasks in Microsoft Sentinel using automation rules
3+
description: This article explains how to use automation rules to create lists of incident tasks, in order to standardize analyst workflow processes in Microsoft Sentinel.
4+
author: yelevin
5+
ms.author: yelevin
6+
ms.topic: how-to
7+
ms.date: 11/24/2022
8+
---
9+
10+
# Create incident tasks in Microsoft Sentinel using automation rules
11+
12+
This article explains how to use automation rules to create lists of incident tasks, in order to standardize analyst workflow processes in Microsoft Sentinel.
13+
14+
[Incident tasks](incident-tasks.md) can be created automatically not only by automation rules, but also by playbooks, and also manually, ad-hoc, from within an incident.
15+
16+
> [!IMPORTANT]
17+
>
18+
> The **Incident tasks** feature is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
19+
20+
## Use cases for different roles
21+
22+
This article addresses the following scenarios that apply to SOC managers, senior analysts, and automation engineers:
23+
24+
- [View automation rules with incident task actions](#view-automation-rules-with-incident-task-actions)
25+
- [Add tasks to incidents with automation rules](#add-tasks-to-incidents-with-automation-rules)
26+
27+
Another such scenario is addressed in the following companion article:
28+
29+
- [Add tasks to incidents with playbooks](create-tasks-playbook.md)
30+
31+
Another article, at the following links, addresses scenarios that apply more to SOC analysts:
32+
33+
- [View and follow incident tasks](work-with-tasks.md#view-and-follow-incident-tasks)
34+
- [Manually add an ad-hoc task to an incident](work-with-tasks.md#manually-add-an-ad-hoc-task-to-an-incident)
35+
36+
## Prerequisites
37+
38+
The **Microsoft Sentinel Responder** role is required to create automation rules and to view and edit incidents, both of which are necessary to add, view, and edit tasks.
39+
40+
41+
## View automation rules with incident task actions
42+
43+
In the **Automation** page, you can filter the view of automation rules to see only the ones that have **Add task** actions defined.
44+
45+
:::image type="content" source="media/create-tasks-automation-rule/filter-grid-on-actions.png" alt-text="Screenshot showing how to filter automation rules grid.":::
46+
47+
1. Select the **Actions** filter.
48+
49+
1. Unmark the **Select all** checkbox.
50+
51+
1. Scroll down and mark the **Add task (Preview)** checkbox.
52+
53+
1. Select **OK** and see the results.
54+
55+
:::image type="content" source="media/create-tasks-automation-rule/filtered-grid-on-actions.png" alt-text="Screenshot showing the results of the filter on the automation rules grid.":::
56+
57+
These are the automation rules that add tasks to incidents. The **Analytics rule names** column tells you which analytics rules these automation rules are conditioned on, so you'll have a general idea of which incidents are affected.
58+
59+
> [!NOTE]
60+
> To have exact knowledge of whether an automation rule will apply to a particular incident, you must open the rule to see if any additional conditions are defined, besides the analytics rule condition. If other conditions are defined, the scope of the affected incidents will be accordingly narrowed.
61+
62+
## Add tasks to incidents with automation rules
63+
64+
1. In the **Automation** page, select **+ Create** and select **Automation rule**.
65+
66+
1. The **Create new automation rule** panel will open on the right side.
67+
Give your automation rule a name that describes what it does.
68+
69+
1. Select **When incident is created** as the trigger (you can also use **When incident is updated**).
70+
71+
1. Add **Conditions** to determine to which incidents new tasks will be added.
72+
73+
For example, filter by **Analytics rule name**:
74+
75+
- You may want to add tasks to incidents based on the types of threats detected by an analytics rule or a group of analytics rules, that need to be handled according to a certain workflow. Search for and select the relevant analytics rules from the drop-down list.
76+
77+
- Or, you may want to add tasks that are relevant for incidents across all types of threats (in this case, leave the default selection of **All** as is).
78+
79+
In either case, you can add more conditions to narrow the scope of incidents to which your automation rule will apply. Learn more about [adding advanced conditions to automation rules](add-advanced-conditions-to-automation-rules.md).
80+
81+
One thing you'll need to consider is that the order in which tasks appear in your incident is determined by the tasks' creation time. You can set the order of automation rules so that rules that add tasks required for all incidents will run first, and only afterwards any rules that add tasks required for incidents generated by specific analytics rules.
82+
83+
:::image type="content" source="media/create-tasks-automation-rule/create-new-automation-rule.png" alt-text="Screenshot of first part of automation rule wizard.":::
84+
85+
1. Under **Actions**, select **Add task (preview)**.
86+
87+
:::image type="content" source="media/create-tasks-automation-rule/add-task-action.png" alt-text="Screenshot of choosing the Add Task action in an automation rule.":::
88+
89+
1. For each task, enter a title in the **Task title** field, and then (optionally) select **+ Add description** to open a description field.
90+
Only task titles appear by default in the incident's task list panel. A task's description appears only when the task item is expanded.
91+
92+
:::image type="content" source="media/create-tasks-automation-rule/add-title-description.png" alt-text="Screenshot showing how to add a title and a description to a task.":::
93+
94+
1. In the description field you can add a free-form description for the task, including images, links and rich-text formatting (see the hyperlinks, numbered lists, and code-block-formatted text in the examples below).
95+
96+
:::image type="content" source="media/create-tasks-automation-rule/add-task-description.png" alt-text="Screenshot showing how to add a description to a task.":::
97+
98+
1. Add more tasks to the same group of incidents by selecting **+ Add action** and repeating the last three steps.
99+
100+
Tasks will be created and added to the incident according to the order of the **Add task** actions in your automation rule.
101+
102+
:::image type="content" source="media/create-tasks-automation-rule/create-more-tasks.png" alt-text="Screenshot showing how to add more tasks to an automation rule.":::
103+
104+
1. Finish creating the automation rule by completing the remaining steps, **Rule expiration** and **Order**, and selecting **Apply** at the end. See [Create and use Microsoft Sentinel automation rules to manage response](create-manage-use-automation-rules.md) for full details.
105+
106+
Regarding the **Order** setting: The order in which tasks appear in your incidents depends on two things:
107+
1. The order of execution of the automation rules, as determined by the number in the **Order** setting, and...
108+
1. The order of the **Add task** actions defined within each automation rule.
109+
110+
## Next steps
111+
112+
- Learn more about [incident tasks](incident-tasks.md).
113+
- Learn how to [investigate incidents](investigate-cases.md).
114+
- Learn how to add tasks to groups of incidents automatically using [playbooks](create-tasks-playbook.md).
115+
- Learn how to [use tasks to handle incident workflow in Microsoft Sentinel](work-with-tasks.md).
116+
- Learn more about [automation rules](automate-incident-handling-with-automation-rules.md) and how to [create them](./create-manage-use-automation-rules.md).

0 commit comments

Comments
 (0)