Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit bd97063

Browse files
committedMay 26, 2022
Continued work 8
1 parent 471b969 commit bd97063

File tree

4 files changed

+16
-20
lines changed

4 files changed

+16
-20
lines changed
 

‎articles/sentinel/create-manage-use-automation-rules.md

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -43,15 +43,15 @@ The following table shows the different possible ways that incidents can be crea
4343
| **An incident was created** | - A new incident is created by an analytics rule.<br>- An incident is ingested from Microsoft 365 Defender.<br>- A new incident is created manually. |
4444
| **An incident was updated** | - An incident's status is changed (closed/reopened/triaged).<br>- An incident's owner is assigned or changed.<br>- An incident's severity is raised or lowered.<br>- Alerts are added to an incident.<br>- Comments, tags, or tactics are added to an incident. |
4545

46-
## Begin creating an automation rule
46+
## Create your automation rule
4747

4848
Depending on your choice of scope and use case, choose a location from which to begin creating your rule:
4949

5050
| Use case | Goal of automation rule | Start from here |
5151
| - | - | - |
52-
| **Suppression** | Ignore and close noisy incidents | **Incidents** blade |
53-
| **Detection-based triage** | Handle incidents based on the rules that created them<br>Create an automation rule that will apply only to one analytics rule | **Analytics** blade |
54-
| **Entity-based triage**<br>or anything else | Handle incidents based on criteria in the incident<br>Create a single automation rule that will apply to many or all detections | **Automation** blade |
52+
| **Suppression** | - Ignore and close noisy incidents | **Incidents** blade |
53+
| **Detection-based triage** | - Handle incidents based on the rules that created them<br>- Create an automation rule that will apply only to one analytics rule | **Analytics** blade |
54+
| **Entity-based triage**<br>or anything else | - Handle incidents based on criteria in the incident<br>- Create a single automation rule that will apply to detections made by many or all analytics rules | **Automation** blade |
5555

5656
### Choose a starting point
5757

@@ -63,6 +63,8 @@ Depending on your choice of scope and use case, choose a location from which to
6363

6464
1. Select **Actions** at the bottom of the incident details pane, and then **Create automation rule**.
6565

66+
:::image type="content" source="media/create-manage-use-automation-rules/select-create-automation-rule.png" alt-text="Screenshot of pop up menu to select automation rule.":::
67+
6668
- The identifying fields in the **Create new automation rule** panel are automatically populated with values from the incident:
6769

6870
- **Automation rule name:** the incident name
@@ -75,7 +77,9 @@ Depending on your choice of scope and use case, choose a location from which to
7577
- **Actions:** Change status to **Closed**, with the reason **Benign Positive - suspicious but expected**.
7678
- **Rule expiration:** 24 hours from when the rule creation wizard was opened.
7779

78-
You can change any of these values, and add or remove conditions and actions, as you wish.
80+
Depending on your needs for this rule, you can select the **When incident is updated** trigger instead, add or remove conditions and actions, or change any of the other values, as necessary.
81+
82+
:::image type="content" source="media/create-manage-use-automation-rules/incident-automation-rule-populated.png" alt-text="Screenshot of automation rule wizard launched from incident panel.":::
7983

8084
# [Analytics](#tab/analytics)
8185

@@ -86,12 +90,9 @@ Depending on your choice of scope and use case, choose a location from which to
8690

8791
1. In the **Automated response** tab of the **Analytics rule wizard**, under **Incident automation**, select **+ Add new**.
8892

89-
In the **Create new automation rule** panel, the **Analytics rule condition** is set to the analytics rule being edited, and this can't be changed.
90-
91-
Only two other fields are populated:
93+
In the **Create new automation rule** panel, the **Analytics rule condition** is set to the analytics rule being edited, and the **Trigger** is set to **When incident is created**. These settings are locked and can't be changed.
9294

93-
- **Trigger:** When incident is created
94-
- **Order:** a number higher than any automation rule already defined in this analytics rule. This ensures that the current automation rule will be the last to run.
95+
The only other field populated is **Order**, set to a number higher than any automation rule already defined in this analytics rule. This ensures that the current automation rule will be the last to run. You can change this number if necessary.
9596

9697
All the other fields in the panel are open and unpopulated, and you can add conditions and actions as you wish.
9798

@@ -109,7 +110,11 @@ Depending on your choice of scope and use case, choose a location from which to
109110

110111
---
111112

112-
### Continue here
113+
### Choose your trigger
114+
115+
From the **Trigger** drop-down, select **When incident is created** or **When incident is updated (Preview)** according to what you decided when designing your rule.
116+
117+
### Add conditions
113118

114119
1. Add any other conditions you want this automation rule's activation to depend on. Click **Add condition** and choose conditions from the drop-down list. The list of conditions is populated by alert detail and entity identifier fields.
115120

‎articles/sentinel/detect-threats-custom.md

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -84,9 +84,6 @@ In the **Set rule logic** tab, you can either write a query directly in the **Ru
8484
8585
### Alert enrichment
8686
87-
> [!IMPORTANT]
88-
> The alert enrichment features are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
89-
9087
- Use the **Entity mapping** configuration section to map parameters from your query results to Microsoft Sentinel-recognized entities. Entities enrich the rules' output (alerts and incidents) with essential information that serves as the building blocks of any investigative processes and remedial actions that follow. They are also the criteria by which you can group alerts together into incidents in the **Incident settings** tab.
9188
9289
Learn more about [entities in Microsoft Sentinel](entities.md).
@@ -144,9 +141,6 @@ If you see that your query would trigger too many or too frequent alerts, you ca
144141
145142
### Event grouping and rule suppression
146143
147-
> [!IMPORTANT]
148-
> Event grouping is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
149-
150144
- Under **Event grouping**, choose one of two ways to handle the grouping of **events** into **alerts**:
151145
152146
- **Group all events into a single alert** (the default setting). The rule generates a single alert every time it runs, as long as the query returns more results than the specified **alert threshold** above. The alert includes a summary of all the events returned in the results.
@@ -181,9 +175,6 @@ If you see that your query would trigger too many or too frequent alerts, you ca
181175
182176
In the **Incident Settings** tab, you can choose whether and how Microsoft Sentinel turns alerts into actionable incidents. If this tab is left alone, Microsoft Sentinel will create a single, separate incident from each and every alert. You can choose to have no incidents created, or to group several alerts into a single incident, by changing the settings in this tab.
183177
184-
> [!IMPORTANT]
185-
> The incident settings tab is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
186-
187178
For example:
188179
189180
:::image type="content" source="media/tutorial-detect-threats-custom/incident-settings-tab.png" alt-text="Define the incident creation and alert grouping settings":::
Loading
Loading

0 commit comments

Comments
 (0)
Please sign in to comment.