Skip to content

Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.

License

Notifications You must be signed in to change notification settings

Bert-JanP/Sentinel-Automation

Repository files navigation

Sentinel Automation

This repository provides automation solutions for Microsoft Sentinel. The repository is focused on Logic Apps/Playbooks. The solutions are aimed to:

  • Enrich Incidents
  • Perform Incident Response Steps
  • Create new detections

Presenting this material as your own is illegal and forbidden. A reference to Twitter @BertJanCyber or Github @Bert-JanP is much appreciated when sharing or using the content.

Related Blogs

How to use the automation flows?

Automation Rule

Automation rules can be used to automatically run a playbook once an incident is created or changed.

  1. Go to Automation in Microsoft Sentinel.
  2. Create
  3. Automation Rule (or Playbook depending on trigger)
  4. Select your playbook
  5. Apply

Alt text

Manual Trigger

After the first triage of an incident a security analyst may determine that more information is needed, Playbooks can be used to provide the analyst with this information. There are different options to trigger the Playbook for execution, one is shown below.

  1. Open a Sentinel Incident
  2. Incident Actions
  3. Run Playbook
  4. Select the Playbook you want to run
  5. Run

Alt text

About

Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published