Creating Playbooks & Logic Apps (part 1)
Introduction to Microsoft Sentinel Playbooks
The Microsoft Sentinel playbooks already have a rich ecosystem of connectors as well as actions with the help of Azure Logic Apps as the backend technology, that they can call upon to perform their activities.
Overview of the Microsoft Sentinel Connector
All the current actions for the Microsoft Sentinel connector are as follows:
| Name | Description | 
| Add
  comment to incident (V2) | Adds
  a comment to the selected incident. | 
| Add
  labels to incident | Adds
  a label to the selected incident. | 
| Alert
  – Get accounts | Returns
  a list of all the accounts associated with the alert. This is the account
  entity of the incident. Use it for each action to loop through all the
  individual accounts.  | 
| Alert
  – Get hosts | Returns
  a list of all the hosts associated with the alert. This is the host entity of
  the incident. Use it for each action to loop through all the individual
  hosts. | 
| Alert
  – Get incident | Returns
  the incident associated with the selected alert. | 
| Alert
  – Get Ips | Returns
  a list of all the IP addresses associated with the alert. This is the IP
  entity of the incident. Use it for each action to loop through all the
  individual IP addresses. | 
| Change
  incident description (V2) | Changes
  the description of the selected incident. | 
| Change
  incident severity | Changes
  the severity of the selected incident. | 
| Change
  incident status | Changes
  the status of the selected incident. | 
| Change
  incident title (V2) | Changes
  the title of the selected incident. | 
| Remove
  labels from incident | Removes
  the labels from the selected incident. | 

 
 
Comments
Post a Comment