Skip to content

Commit 06e3407

Browse files
Merge pull request #50844 from KenMAG/main
Updated exercise unit for Server 2022 and fixed markdown in unit 3.
2 parents e9c768f + 1cb88f9 commit 06e3407

File tree

6 files changed

+12
-60
lines changed

6 files changed

+12
-60
lines changed

learn-pr/wwl-sci/threat-response-sentinel-playbooks/2-exercise-setup.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: Exercise - Create a Microsoft Sentinel playbook
44
metadata:
55
title: Exercise - Create a Microsoft Sentinel playbook
66
description: "Create a Microsoft Sentinel playbook."
7-
ms.date: 01/25/2023
8-
author: wwlpublish
7+
ms.date: 06/09/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
durationInMinutes: 15

learn-pr/wwl-sci/threat-response-sentinel-playbooks/3-playbook-overview.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ title: What are Microsoft Sentinel playbooks?
44
metadata:
55
title: What are Microsoft Sentinel playbooks?
66
description: "Explore Microsoft Sentinel playbooks."
7-
ms.date: 01/25/2023
8-
author: wwlpublish
7+
ms.date: 06/09/2025
8+
author: KenMAG
99
ms.author: kelawson
1010
ms.topic: unit
1111
durationInMinutes: 10

learn-pr/wwl-sci/threat-response-sentinel-playbooks/includes/2-exercise-setup.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ To deploy the prerequisites for the exercise, perform the following tasks.
2424
| Workspace name | Provide a unique name for the Microsoft Sentinel workspace such as `<yourName>-Sentinel`, where *\<yourName>* represents the workspace name that you chose in the previous task. |
2525
| Location | Accept the default value of **[resourceGroup().location]**. |
2626
| Simplevm Name | Accept the default value of **simple-vm**.|
27-
| Simplevm Windows OS Version | Accept the default value of **2016-Datacenter**.|
27+
| Simplevm Windows OS Version | Accept the default value of **2022-Datacenter**.|
2828

2929
:::image type="content" source="../media/02-custom-deployment.png" alt-text="Screenshot of the custom deployment inputs for a Microsoft template." border="true":::
3030

@@ -57,7 +57,7 @@ To deploy the prerequisites for the exercise, perform the following tasks.
5757
| `vnet1` |Virtual network|Virtual network for the VM. |
5858

5959
> [!NOTE]
60-
> The resources deployed and configuration steps completed in this exercise are required in the next exercise. If you intended completing the next exercise do not delete the resources from this exercise.
60+
> The resources deployed and configuration steps completed in this exercise are required in the next exercise. If you intended to complete the next exercise, don't delete the resources from this exercise.
6161
6262
## Task 3: Configure Microsoft Sentinel Connectors
6363

@@ -87,7 +87,7 @@ To deploy the prerequisites for the exercise, perform the following tasks.
8787
1. Select the **Review + Create** button to review the configuration, and then select **Create**.
8888

8989
> [!NOTE]
90-
> The connector for Azure Activity uses policy assignments, you need to have role permissions that allow you to create policy assignments. And, it typically take 15 minutes to display a status of **Connected**. While the connector deploys, you can continue performing the rest of the steps in this unit and subsequent units in this module.
90+
> The connector for Azure Activity uses policy assignments. You need to have role permissions that allow you to create policy assignments. And, it typically takes 15 minutes to display a status of **Connected**. While the connector deploys, you can continue performing the rest of the steps in this unit and subsequent units in this module.
9191
9292
:::image type="content" source="../media/06-azure-activity-content-hub-solution.png" alt-text="Screenshot that displays the Microsoft Sentinel Azure Activity Content Hub solution." border="true":::
9393

Lines changed: 3 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -1,101 +1,57 @@
11

22
In addition to assessing and addressing problems with their security configuration, Contoso must also monitor for new problems and threats, and then respond appropriately.
33

4-
5-
64
## Microsoft Sentinel as a SIEM and SOAR solution
75

8-
9-
106
Microsoft Sentinel is both a Security Information and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) solution that's designed for hybrid environments.
117

12-
13-
148
> [!NOTE]
159
> SIEM solutions provide storage and analysis of logs, events, and alerts that other systems generate. You can configure these solutions to raise their own alerts. SOAR solutions support the remediation of vulnerabilities and the overall automation of security processes.
1610
17-
18-
1911
Microsoft Sentinel uses built-in and custom detections to alert you to potential security threats such as attempts to access Contoso&#39;s resources from outside its infrastructure or when data from Contoso appears to be sent to a known malicious IP address. You can also create incidents based on these alerts.
2012

21-
22-
2313
## Microsoft Sentinel playbooks
2414

25-
26-
2715
You can create security playbooks in Microsoft Sentinel to respond to alerts. *Security playbooks* are collections of procedures based on Azure Logic Apps that run in response to an alert. You can run these security playbooks manually in response to your investigation of an incident or you can configure an alert to run a playbook automatically.
2816

29-
30-
3117
With the ability to respond to incidents automatically, you can automate some of your security operations and make your Security Operations Center (SOC) more productive.
3218

33-
34-
35-
For example, to address Contoso's concerns, you can develop a workflow with defined steps that can block a suspicious username from accessing resources from a non-secure IP address. Alternatively, you can configure the playbook to perform an operation such as notifying the SecOps team about a high-level security alert.
36-
37-
19+
For example, to address Contoso's concerns, you can develop a workflow with defined steps that can block a suspicious username from accessing resources from a nonsecure IP address. Alternatively, you can configure the playbook to perform an operation such as notifying the SecOps team about a high-level security alert.
3820

3921
## Azure Logic Apps
4022

41-
42-
4323
Azure Logic Apps is a cloud service that automates the operation of your business processes. You use a graphical design tool called the *Logic Apps Designer* to arrange prebuilt components into the sequence you need. You can also use the code view and write your automated process in the JSON file.
4424

45-
46-
4725
## Logic Apps Connector
4826

49-
50-
5127
Logic apps use connectors to connect to hundreds of services. A *connector* is a component that provides an interface to an external service.
5228

53-
54-
5529
> [!NOTE]
56-
> A Microsoft Sentinel data connector and a Logic Apps connector are not the same thing. A Microsoft Sentinel data connector connects Microsoft Sentinel with Microsoft security products and security ecosystems for non-Microsoft solutions. A Logic Apps connector is a component that provides an API connection for an external service and allows integration of events, data, and actions across other apps, services, systems, protocols, and platforms.
57-
58-
30+
> A Microsoft Sentinel data connector and a Logic Apps connector aren't the same thing. A Microsoft Sentinel data connector connects Microsoft Sentinel with Microsoft security products and security ecosystems for non-Microsoft solutions. A Logic Apps connector is a component that provides an API connection for an external service and allows integration of events, data, and actions across other apps, services, systems, protocols, and platforms.
5931
6032
## What are triggers and actions
6133

62-
63-
6434
Azure Logic Apps use triggers and actions, which are defined as follows:
6535

66-
67-
6836
- A *trigger* is an event that occurs when a specific set of conditions is satisfied. Triggers activate automatically when conditions are met. For example, a security incident occurs in Microsoft Sentinel, which is a trigger for an automated action.
6937

7038
- An *action* is an operation that performs a task in the Logic Apps workflow. Actions run when a trigger activates, another action completes, or a condition is met.
7139

72-
73-
7440
## Microsoft Sentinel Logic Apps connector
7541

76-
77-
7842
A Microsoft Sentinel playbook uses a Microsoft Sentinel Logic Apps connector. It provides the triggers and actions that can start the playbook and perform defined actions.
7943

8044
Currently, there are two triggers from Microsoft Sentinel Logic Apps connector:
8145

82-
83-
8446
- When a response to a Microsoft Sentinel alert is triggered
8547

8648
- When Microsoft Sentinel incident creation rule is triggered
8749

88-
89-
9050
> [!NOTE]
9151
> Because Microsoft Sentinel Logic App connector is in preview, the features described in this module might change in the future.
9252
93-
94-
9553
The following table lists all the current actions for the Microsoft Sentinel connector.
9654

97-
98-
9955
| Name | Description |
10056
| --- | --- |
10157
| Add comment to incident | Adds comments to the selected incident. |
@@ -112,11 +68,7 @@ The following table lists all the current actions for the Microsoft Sentinel con
11268
| Entities - Get URLs | Returns a list of URLs associated with the alert. |
11369
| Remove labels from incident | Removes the labels for the selected incident. |
11470

115-
116-
11771
> [!NOTE]
11872
> Actions that have **(V2)** or a higher number provide a new version of the action and might differ from the old functionality of the action.
11973
120-
121-
122-
Some actions require integration with actions from another connectors. For example, if Contoso wants to identify all suspicious accounts returned in the alert from the defined entities, you must combine the **Entities - Get Accounts** action with the **For Each** action. Similarly, to get all individual hosts in an incident that detect suspicious hosts, you must combine the **Entities - Get Hosts** action with the **For Each** action.
74+
Some actions require integration with actions from another connectors. For example, if Contoso wants to identify all suspicious accounts returned in the alert from the defined entities, you must combine the **Entities - Get Accounts** action with the **For Each** action. Similarly, to get all individual hosts in an incident that detect suspicious hosts, you must combine the **Entities - Get Hosts** action with the **For Each** action.

learn-pr/wwl-sci/threat-response-sentinel-playbooks/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ uid: learn.azure.threat-response-sentinel-playbooks
33
metadata:
44
title: Threat response with Microsoft Sentinel playbooks
55
description: "Provide an introduction to implementing threat response with Microsoft Sentinel playbooks."
6-
ms.date: 01/25/2023
7-
author: wwlpublish
6+
ms.date: 06/09/2025
7+
author: KenMAG
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
933 Bytes
Loading

0 commit comments

Comments
 (0)