You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/create-manage-use-automation-rules.md
+16-11Lines changed: 16 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -43,15 +43,15 @@ The following table shows the different possible ways that incidents can be crea
43
43
|**An incident was created**| - A new incident is created by an analytics rule.<br>- An incident is ingested from Microsoft 365 Defender.<br>- A new incident is created manually. |
44
44
|**An incident was updated**| - An incident's status is changed (closed/reopened/triaged).<br>- An incident's owner is assigned or changed.<br>- An incident's severity is raised or lowered.<br>- Alerts are added to an incident.<br>- Comments, tags, or tactics are added to an incident. |
45
45
46
-
## Begin creating an automation rule
46
+
## Create your automation rule
47
47
48
48
Depending on your choice of scope and use case, choose a location from which to begin creating your rule:
49
49
50
50
| Use case | Goal of automation rule | Start from here |
51
51
| - | - | - |
52
-
|**Suppression**| Ignore and close noisy incidents |**Incidents** blade |
53
-
|**Detection-based triage**| Handle incidents based on the rules that created them<br>Create an automation rule that will apply only to one analytics rule |**Analytics** blade |
54
-
|**Entity-based triage**<br>or anything else | Handle incidents based on criteria in the incident<br>Create a single automation rule that will apply to many or all detections|**Automation** blade |
52
+
|**Suppression**|- Ignore and close noisy incidents |**Incidents** blade |
53
+
|**Detection-based triage**|- Handle incidents based on the rules that created them<br>- Create an automation rule that will apply only to one analytics rule |**Analytics** blade |
54
+
|**Entity-based triage**<br>or anything else |- Handle incidents based on criteria in the incident<br>- Create a single automation rule that will apply to detections made by many or all analytics rules|**Automation** blade |
55
55
56
56
### Choose a starting point
57
57
@@ -63,6 +63,8 @@ Depending on your choice of scope and use case, choose a location from which to
63
63
64
64
1. Select **Actions** at the bottom of the incident details pane, and then **Create automation rule**.
65
65
66
+
:::image type="content" source="media/create-manage-use-automation-rules/select-create-automation-rule.png" alt-text="Screenshot of pop up menu to select automation rule.":::
67
+
66
68
- The identifying fields in the **Create new automation rule** panel are automatically populated with values from the incident:
67
69
68
70
-**Automation rule name:** the incident name
@@ -75,7 +77,9 @@ Depending on your choice of scope and use case, choose a location from which to
75
77
-**Actions:** Change status to **Closed**, with the reason **Benign Positive - suspicious but expected**.
76
78
-**Rule expiration:** 24 hours from when the rule creation wizard was opened.
77
79
78
-
You can change any of these values, and add or remove conditions and actions, as you wish.
80
+
Depending on your needs for this rule, you can select the **When incident is updated** trigger instead, add or remove conditions and actions, or change any of the other values, as necessary.
81
+
82
+
:::image type="content" source="media/create-manage-use-automation-rules/incident-automation-rule-populated.png" alt-text="Screenshot of automation rule wizard launched from incident panel.":::
79
83
80
84
# [Analytics](#tab/analytics)
81
85
@@ -86,12 +90,9 @@ Depending on your choice of scope and use case, choose a location from which to
86
90
87
91
1. In the **Automated response** tab of the **Analytics rule wizard**, under **Incident automation**, select **+ Add new**.
88
92
89
-
In the **Create new automation rule** panel, the **Analytics rule condition** is set to the analytics rule being edited, and this can't be changed.
90
-
91
-
Only two other fields are populated:
93
+
In the **Create new automation rule** panel, the **Analytics rule condition** is set to the analytics rule being edited, and the **Trigger** is set to **When incident is created**. These settings are locked and can't be changed.
92
94
93
-
-**Trigger:** When incident is created
94
-
-**Order:** a number higher than any automation rule already defined in this analytics rule. This ensures that the current automation rule will be the last to run.
95
+
The only other field populated is **Order**, set to a number higher than any automation rule already defined in this analytics rule. This ensures that the current automation rule will be the last to run. You can change this number if necessary.
95
96
96
97
All the other fields in the panel are open and unpopulated, and you can add conditions and actions as you wish.
97
98
@@ -109,7 +110,11 @@ Depending on your choice of scope and use case, choose a location from which to
109
110
110
111
---
111
112
112
-
### Continue here
113
+
### Choose your trigger
114
+
115
+
From the **Trigger** drop-down, select **When incident is created** or **When incident is updated (Preview)** according to what you decided when designing your rule.
116
+
117
+
### Add conditions
113
118
114
119
1. Add any other conditions you want this automation rule's activation to depend on. Click **Add condition** and choose conditions from the drop-down list. The list of conditions is populated by alert detail and entity identifier fields.
Copy file name to clipboardExpand all lines: articles/sentinel/detect-threats-custom.md
-9Lines changed: 0 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -84,9 +84,6 @@ In the **Set rule logic** tab, you can either write a query directly in the **Ru
84
84
85
85
### Alert enrichment
86
86
87
-
> [!IMPORTANT]
88
-
> The alert enrichment features are currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
89
-
90
87
- Use the **Entity mapping** configuration section to map parameters from your query results to Microsoft Sentinel-recognized entities. Entities enrich the rules' output (alerts and incidents) with essential information that serves as the building blocks of any investigative processes and remedial actions that follow. They are also the criteria by which you can group alerts together into incidents in the **Incident settings** tab.
91
88
92
89
Learn more about [entities in Microsoft Sentinel](entities.md).
@@ -144,9 +141,6 @@ If you see that your query would trigger too many or too frequent alerts, you ca
144
141
145
142
### Event grouping and rule suppression
146
143
147
-
> [!IMPORTANT]
148
-
> Event grouping is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
149
-
150
144
- Under **Event grouping**, choose one of two ways to handle the grouping of **events** into **alerts**:
151
145
152
146
- **Group all events into a single alert** (the default setting). The rule generates a single alert every time it runs, as long as the query returns more results than the specified **alert threshold** above. The alert includes a summary of all the events returned in the results.
@@ -181,9 +175,6 @@ If you see that your query would trigger too many or too frequent alerts, you ca
181
175
182
176
In the **Incident Settings** tab, you can choose whether and how Microsoft Sentinel turns alerts into actionable incidents. If this tab is left alone, Microsoft Sentinel will create a single, separate incident from each and every alert. You can choose to have no incidents created, or to group several alerts into a single incident, by changing the settings in this tab.
183
177
184
-
> [!IMPORTANT]
185
-
> The incident settings tab is currently in **PREVIEW**. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
186
-
187
178
For example:
188
179
189
180
:::image type="content" source="media/tutorial-detect-threats-custom/incident-settings-tab.png" alt-text="Define the incident creation and alert grouping settings":::
0 commit comments