Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/bert-janp/sentinel-automation
Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.
https://github.com/bert-janp/sentinel-automation
defenderforendpoint logicapps sentinel
Last synced: 7 days ago
JSON representation
Sentinel Logic Apps/Playbooks to automate enrichment, incident analysis and more.
- Host: GitHub
- URL: https://github.com/bert-janp/sentinel-automation
- Owner: Bert-JanP
- License: bsd-3-clause
- Created: 2024-03-31T09:15:21.000Z (9 months ago)
- Default Branch: main
- Last Pushed: 2024-04-11T15:25:31.000Z (9 months ago)
- Last Synced: 2024-04-12T07:23:12.910Z (9 months ago)
- Topics: defenderforendpoint, logicapps, sentinel
- Homepage: https://kqlquery.com
- Size: 422 KB
- Stars: 15
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Sentinel Automation
This repository provides automation solutions for Microsoft Sentinel. The repository is focused on Logic Apps/Playbooks. The solutions are aimed to:
- Enrich Incidents
- Perform Incident Response Steps
- Create new detections**Presenting this material as your own is illegal and forbidden. A reference to Twitter [@BertJanCyber](https://twitter.com/BertJanCyber) or Github [@Bert-JanP](https://github.com/Bert-JanP) is much appreciated when sharing or using the content.**
## Related Blogs
- [Sentinel Automation Part 1: Enriching Sentinel Incidents with KQL Results](https://kqlquery.com/posts/sentinel-automation-part1/)
- [Sentinel Automation Part 2: Automate CISA Known Exploited Vulnerability Notifications](https://kqlquery.com/posts/automatic-cisa-vulnerability-notifications/)# How to use the automation flows?
## Automation Rule
Automation rules can be used to automatically run a playbook once an incident is created or changed.
1. Go to Automation in Microsoft Sentinel.
2. Create
3. Automation Rule (or Playbook depending on trigger)
4. Select your playbook
5. Apply![Alt text](./Images/AutomationRuleCreation.png "Automation Rule Creation")
## Manual Trigger
After the first triage of an incident a security analyst may determine that more information is needed, Playbooks can be used to provide the analyst with this information. There are different options to trigger the Playbook for execution, one is shown below.
1. Open a Sentinel Incident
2. Incident Actions
3. Run Playbook
4. Select the Playbook you want to run
5. Run![Alt text](./Images/IncidentTrigger.png "Incident Playbook Trigger")