Creating Playbooks & Logic Apps (part 1)
Introduction to Microsoft Sentinel Playbooks
The Microsoft Sentinel playbooks already have a rich ecosystem of connectors as well as actions with the help of Azure Logic Apps as the backend technology, that they can call upon to perform their activities.
Overview of the Microsoft Sentinel Connector
All the current actions for the Microsoft Sentinel connector are as follows:
Name |
Description |
Add
comment to incident (V2) |
Adds
a comment to the selected incident. |
Add
labels to incident |
Adds
a label to the selected incident. |
Alert
– Get accounts |
Returns
a list of all the accounts associated with the alert. This is the account
entity of the incident. Use it for each action to loop through all the
individual accounts. |
Alert
– Get hosts |
Returns
a list of all the hosts associated with the alert. This is the host entity of
the incident. Use it for each action to loop through all the individual
hosts. |
Alert
– Get incident |
Returns
the incident associated with the selected alert. |
Alert
– Get Ips |
Returns
a list of all the IP addresses associated with the alert. This is the IP
entity of the incident. Use it for each action to loop through all the
individual IP addresses. |
Change
incident description (V2) |
Changes
the description of the selected incident. |
Change
incident severity |
Changes
the severity of the selected incident. |
Change
incident status |
Changes
the status of the selected incident. |
Change
incident title (V2) |
Changes
the title of the selected incident. |
Remove
labels from incident |
Removes
the labels from the selected incident. |
Comments
Post a Comment