Skip to content

Commit c73108d

Browse files
Merge pull request #49731 from KenMAG/main
Revising module units for Sentinel in the Defender portal
2 parents cfb1a37 + 993f4b2 commit c73108d

File tree

5 files changed

+20
-19
lines changed

5 files changed

+20
-19
lines changed

learn-pr/wwl-sci/automation-microsoft-sentinel/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Introduction"
7-
ms.date: 11/21/2022
7+
ms.date: 03/28/2025
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit
Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,11 @@
1-
21
Microsoft Sentinel, in addition to being a Security Information and Event Management (SIEM) system, is also a platform for Security Orchestration, Automation, and Response (SOAR). One of its primary purposes is to automate any recurring and predictable enrichment, response, and remediation tasks that are the responsibility of your Security Operations Center and personnel (SOC/SecOps)
32

3+
You're a Security Operations Analyst working at a company that implemented Microsoft Sentinel in Microsoft Azure. You're preparing to onboard Sentinel workspaces into Microsoft Defender, and you need to understand any differences with Automation rules and Playbooks. You identified an analytical rule that generates incidents that are considered Benign Positive. You would like to implement automation that would automatically close these incidents after generation.
44

5-
You're a Security Operations Analyst working at a company that implemented Microsoft Sentinel. You've identified an analytical rule that generates incidents that are considered Benign Positive. You would like to automatically close these incidents after generation.
6-
7-
By the end of this module, you'll be able to use automation rules in Microsoft Sentinel to automated incident management.
5+
By the end of this module, you are able to use automation rules in Microsoft Sentinel in Azure and the Defender portal to automated incident management.
86

97
After completing this module, you'll be able to:
108

119
- Explain automation options in Microsoft Sentinel
12-
- Create automation rules in Microsoft Sentinel
10+
- Create automation rules in Microsoft Sentinel in Azure and the Defender portal
11+
- Create playbooks in Microsoft Sentinel in Azure and the Defender portal
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
1-
21
Automation takes a few different forms in Microsoft Sentinel. From automation rules that centrally manage the automation of incident handling and response, to playbooks that run predetermined sequences of actions to provide powerful and flexible advanced automation to your threat response tasks.
32

43
## Automation rules
5-
Automation rules allow users to centrally manage the automation of incident handling. Automation rules also allow you to automate responses for multiple analytics rules at once. Automatically tag, assign, or close incidents without the need for playbooks, and control the order of actions that are executed. Automation rules will streamline automation use in Microsoft Sentinel and will enable you to simplify complex workflows for your incident orchestration processes.
64

5+
Automation rules allow users to centrally manage the automation of incident handling. Automation rules also allow you to automate responses for multiple analytics rules at once. Automatically tag, assign, or close incidents without the need for playbooks, and control the order of actions that are executed. Automation rules will streamline automation use in Microsoft Sentinel and will enable you to simplify complex workflows for your incident orchestration processes.
76

87
## Playbooks
8+
99
A playbook is a collection of response and remediation actions and logic that can be run from Microsoft Sentinel as a routine. A playbook can help automate and orchestrate your threat response. It can integrate with other systems both internal and external, and it can be set to run automatically in response to specific alerts or incidents, when triggered by an analytics rule or an automation rule, respectively. It can also be run manually on-demand, in response to alerts, from the incidents page.
1010

1111
Playbooks in Microsoft Sentinel are based on workflows built in Azure Logic Apps, a cloud service that helps you schedule, automate, and orchestrate tasks and workflows across systems throughout the enterprise. This means that playbooks can take advantage of all the power and customizability of Logic Apps' integration and orchestration capabilities and easy-to-use design tools, and the scalability, reliability, and service level of a Tier 1 Azure service.

learn-pr/wwl-sci/automation-microsoft-sentinel/includes/3-create-automation-rules.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Automation rules are a way to centrally manage the automation of incident handling, allowing you to perform simple automation tasks without using playbooks. For example, automation rules allow you to automatically assign incidents to the proper personnel, tag incidents to classify them, and change the status of incidents and close them. Automation rules can also automate responses for multiple analytics rules at once, control the order of actions that are executed, and run playbooks for those cases where more complex automation tasks are necessary. In short, automation rules streamline the use of automation in Microsoft Sentinel, enabling you to simplify complex workflows for your incident orchestration processes.
22

3-
43
## Creating and managing automation rules
4+
55
You can create and manage automation rules from different points in the Microsoft Sentinel experience, depending on your particular need and use case.
66

77
### Automation blade
@@ -26,9 +26,8 @@ You can also create an automation rule from the Incidents blade, in order to res
2626

2727
You'll notice that the Create new automation rule panel has populated all the fields with values from the incident. It names the rule the same name as the incident, applies it to the analytics rule that generated the incident, and uses all the available entities in the incident as conditions of the rule. It also suggests a suppression (closing) action by default, and suggests an expiration date for the rule. You can add or remove conditions and actions, and change the expiration date, as you wish.
2828

29-
30-
3129
## Components of an Automation Rule
30+
3231
Automation rules are made up of several components:
3332

3433
- **Trigger:** Automation rules are triggered by the creation of an incident.
@@ -41,15 +40,15 @@ Complex sets of conditions can be defined to govern when actions (see below) sho
4140
- **Actions:**
4241
Actions can be defined to run when the conditions (see above) are met. You can define many actions in a rule, and you can choose the order in which they’ll run (see below). The following actions can be defined using automation rules, without the need for the advanced functionality of a playbook:
4342

44-
- **Changing the status of an incident**, keeping your workflow up to date.
43+
- **Changing the status of an incident**, keeping your workflow up to date.
4544

4645
When changing to “closed,” specifying the closing reason and adding a comment. This helps you keep track of your performance and effectiveness, and fine-tune to reduce false positives.
4746

48-
- **Changing the severity of an incident** – you can reevaluate and reprioritize based on the presence, absence, values, or attributes of entities involved in the incident.
47+
- **Changing the severity of an incident** – you can reevaluate and reprioritize based on the presence, absence, values, or attributes of entities involved in the incident.
4948

50-
- **Assigning an incident to an owner** – this helps you direct types of incidents to the personnel best suited to deal with them, or to the most available personnel.
49+
- **Assigning an incident to an owner** – this helps you direct types of incidents to the personnel best suited to deal with them, or to the most available personnel.
5150

52-
- **Adding a tag to an incident** – this is useful for classifying incidents by subject, by attacker, or by any other common denominator.
51+
- **Adding a tag to an incident** – this is useful for classifying incidents by subject, by attacker, or by any other common denominator.
5352

5453
Also, you can define an action to **run a playbook**, in order to take more complex response actions, including any that involve external systems. Only playbooks activated by the incident trigger are available to be used in automation rules. You can define an action to include multiple playbooks, or combinations of playbooks and other actions, and the order in which they'll run.
5554

learn-pr/wwl-sci/automation-microsoft-sentinel/index.yml

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,20 @@ uid: learn.wwl.automation-microsoft-sentinel
33
metadata:
44
title: Automation in Microsoft Sentinel
55
description: "Automation in Microsoft Sentinel"
6-
ms.date: 11/21/2022
6+
ms.date: 03/28/2025
77
author: wwlpublish
88
ms.author: kelawson
99
ms.topic: module
1010
ms.service: microsoft-sentinel
1111
title: Automation in Microsoft Sentinel
12-
summary: By the end of this module, you'll be able to use automation rules in Microsoft Sentinel to automated incident management.
12+
summary: By the end of this module, you're able to use automation rules in Microsoft Sentinel to automated incident management.
1313
abstract: |
14-
After completing this module, you'll be able to:
14+
After completing this module, you're able to:
1515
* Explain automation options in Microsoft Sentinel
1616
* Create automation rules in Microsoft Sentinel
1717
prerequisites: |
18-
None
18+
- Familiarity with Microsoft Sentinel and its components
19+
- Familiarity with the Microsoft Defender portal
1920
iconUrl: /training/achievements/automation-microsoft-sentinel.svg
2021
levels:
2122
- intermediate
@@ -24,8 +25,10 @@ roles:
2425
products:
2526
- azure
2627
- microsoft-sentinel
28+
- defender-xdr
2729
subjects:
2830
- automation
31+
- cloud-security
2932
units:
3033
- learn.wwl.automation-microsoft-sentinel.introduction
3134
- learn.wwl.automation-microsoft-sentinel.understand-automation-options

0 commit comments

Comments
 (0)