Automate threat response with playbooks in Microsoft Sentinel (2024)

  • Article
  • Applies to:
    Microsoft Sentinel in the Azure portal, Microsoft Sentinel in the Microsoft Defender portal

SOC analysts deal with numerous security alerts and incidents, and the sheer volume can overwhelm teams, leading to ignored alerts and uninvestigated incidents. Many alerts and incidents can be addressed by the same sets of predefined remediation actions, which can be automated to make the SOC more efficient and free up analysts for deeper investigations.

Use Microsoft Sentinel playbooks to run preconfigured sets of remediation actions to help automate and orchestrate your threat response. Run playbooks automatically, in response to specific alerts and incidents that trigger a configured automation rule, or manually and on-demand for a particular entity or alert.

For example, if an account and machine are compromised, a playbook can automatically isolate the machine from the network and block the account by the time the SOC team is notified of the incident.

Important

Microsoft Sentinel is now generally available within the Microsoft unified security operations platform in the Microsoft Defender portal. For more information, see Microsoft Sentinel in the Microsoft Defender portal.

Recommended use cases

The following table lists high-level use cases where we recommend using Microsoft Sentinel playbooks to automate your threat response:

Use caseDescription
EnrichmentCollect data and attach it to an incident to help your team make smarter decisions.
Bi-directional syncSync Microsoft Sentinel incidents with other ticketing systems. For example, create an automation rule for all incident creations, and attach a playbook that opens a ticket in ServiceNow.
OrchestrationUse the SOC team's chat platform to better control the incidents queue. For example, send a message to your security operations channel in Microsoft Teams or Slack to make sure your security analysts are aware of the incident.
ResponseImmediately respond to threats, with minimal human dependencies, such as when a compromised user or machine is indicated. Alternately, manually trigger a series of automated steps during an investigation or while hunting.

For more information, see Recommended playbook use cases, templates, and examples.

Prerequisites

The following roles are required to use Azure Logic Apps to create and run playbooks in Microsoft Sentinel.

RoleDescription
OwnerLets you grant access to playbooks in the resource group.
Microsoft Sentinel ContributorLets you attach a playbook to an analytics or automation rule.
Microsoft Sentinel ResponderLets you access an incident in order to run a playbook manually, but doesn't allow you to run the playbook.
Microsoft Sentinel Playbook OperatorLets you run a playbook manually.
Microsoft Sentinel Automation ContributorAllows automation rules to run playbooks. This role isn't used for any other purpose.

The following table describes required roles based on whether you select a Consumption or Standard logic app to create your playbook:

Logic appAzure rolesDescription
ConsumptionLogic App ContributorEdit and manage logic apps. Run playbooks. Doesn't allow you to grant access to playbooks.
ConsumptionLogic App OperatorRead, enable, and disable logic apps. Doesn't allow you to edit or update logic apps.
StandardLogic Apps Standard OperatorEnable, resubmit, and disable workflows in a logic app.
StandardLogic Apps Standard DeveloperCreate and edit logic apps.
StandardLogic Apps Standard ContributorManage all aspects of a logic app.

The Active playbooks tab on the Automation page displays all active playbooks available across any selected subscriptions. By default, a playbook can be used only within the subscription to which it belongs, unless you specifically grant Microsoft Sentinel permissions to the playbook's resource group.

Extra permissions required for Microsoft Sentinel to run playbooks

Microsoft Sentinel uses a service account to run playbooks on incidents, to add security and enable the automation rules API to support CI/CD use cases. This service account is used for incident-triggered playbooks, or when you run a playbook manually on a specific incident.

In addition to your own roles and permissions, this Microsoft Sentinel service account must have its own set of permissions on the resource group where the playbook resides, in the form of the Microsoft Sentinel Automation Contributor role. Once Microsoft Sentinel has this role, it can run any playbook in the relevant resource group, manually or from an automation rule.

To grant Microsoft Sentinel with the required permissions, you must have an Owner or User access administrator role. To run the playbooks, you'll also need the Logic App Contributor role on the resource group that contains the playbooks you want to run.

Playbook templates (preview)

Important

Playbook templates are currently in PREVIEW. See the Supplemental Terms of Use for Microsoft Azure Previews for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Playbook templates are prebuilt, tested, and ready-to-use workflows that aren't useable as playbooks themselves, but are ready for you to customize to meet your needs. We also recommend that you use playbook templates as a reference of best practices when developing playbooks from scratch, or as inspiration for new automation scenarios.

Access playbook templates from the following sources:

LocationDescription
Microsoft Sentinel Automation pageThe Playbook templates tab lists all installed playbooks. Create one or more active playbooks using the same template.

When we publish a new version of a template, any active playbooks created from that template have an extra label added in the Active playbooks tab to indicate that an update is available.

Microsoft Sentinel Content hub pagePlaybook templates are available as part of product solutions or standalone content installed from the Content hub.

For more information, see:
About Microsoft Sentinel content and solutions
Discover and manage Microsoft Sentinel out-of-the-box content

GitHubThe Microsoft Sentinel GitHub repository contains many other playbook templates. Select Deploy to Azure to deploy a template to your Azure subscription.

Technically, a playbook template is an Azure Resource Manager (ARM) template, which consists of several resources: an Azure Logic Apps workflow and API connections for each connection involved.

For more information, see:

  • Create and customize Microsoft Sentinel playbooks from content templates
  • Recommended playbook templates
  • Azure Logic Apps for Microsoft Sentinel playbooks

Playbook creation and usage workflow

Use the following workflow to create and run Microsoft Sentinel playbooks:

  1. Define your automation scenario. We recommend that you review recommended playbooks use cases and playbook templates to start.

  2. If you're not using a template, create your playbook and build your logic app. For more information, see Create and manage Microsoft Sentinel playbooks.

    Test your logic app by running it manually. For more information, see Run a playbook manually, on demand.

  3. Configure your playbook to run automatically on a new alert or incident creation, or run it manually as needed for your processes. For more information, see Respond to threats with Microsoft Sentinel playbooks.

Related content

  • Create and customize Microsoft Sentinel playbooks from content templates
  • Create and manage Microsoft Sentinel playbooks
  • Respond to threats with Microsoft Sentinel playbooks
  • Azure Logic Apps for Microsoft Sentinel playbooks
Automate threat response with playbooks in Microsoft Sentinel (2024)

FAQs

How does Microsoft Sentinel use playbook to automatically respond to threats? ›

Use Microsoft Sentinel playbooks to run preconfigured sets of remediation actions to help automate and orchestrate your threat response. Run playbooks automatically, in response to specific alerts and incidents that trigger a configured automation rule, or manually and on-demand for a particular entity or alert.

What is the difference between sentinel automation rules and playbooks? ›

Automation Rule: Set conditions to send Sentinel Incidents to an automation workflow or playbook. Playbook: Execute course of action (require API integrations with connectors). They are more complex and require deep knowledge.

Which capability of Microsoft Sentinel can help automate and orchestrate your response to incidents and common security tasks? ›

Playbooks. A playbook is a collection of response and remediation actions and logic that can be run from Microsoft Sentinel as a routine. A playbook can: Help automate and orchestrate your threat response.

How to run playbook in Sentinel? ›

The Alert playbooks pane opens. You see a list of all playbooks configured with the Microsoft Sentinel Alert Logic Apps trigger that you have access to. Select Run on the line of a specific playbook to run it immediately.

What is a playbook automation? ›

Automation and Orchestration

Playbooks are used to automate complex, repetitive workflows. They define the sequence of actions your incident response plan should execute and orchestrate them.

What are the 4 primary capabilities of Microsoft Sentinel? ›

It provides threat intelligence and intelligent security analytic capabilities that facilitate threat visibility, alert detection, threat response, and proactive hunting.

What is the use of playbooks in the incident response process? ›

Playbooks are a key component of DevOps and IT Ops incident management, as well as cybersecurity. They set the organization's policies and practices for responding to unplanned outages, help teams bring order to chaos and make sure everyone's responding to incidents and security threats consistently.

What is the workbook and playbook in Sentinel? ›

Workbooks, playbooks, and notebooks are key resources in Microsoft Sentinel that help you automate responses, visualize data, and analyze data, respectively. Sometimes it can be challenging to track which type of resource is right for your task.

What is the primary mechanism for generating incidents in Microsoft Sentinel? ›

Connect a Microsoft security solution data source. Under Create incidents – Recommended, select Enable to enable the default analytics rule that creates incidents automatically from alerts generated in the connected security service. You can then edit this rule under Analytics and then Active rules.

Is Microsoft Sentinel a SIEM or SOAR? ›

Microsoft Sentinel is a scalable, cloud-native security information and event management (SIEM) that delivers an intelligent and comprehensive solution for SIEM and security orchestration, automation, and response (SOAR).

What is the primary purpose of using playbooks in security orchestration? ›

Question: What is the primary purpose of using playbooks in Security Orchestration? To visualize and coordinate processes across security productsTo maintain an inventory of security toolsTo store and manage security policiesTo detect malware in real-time.

What is the difference between Microsoft Sentinel and Azure Sentinel? ›

As previously mentioned, both names refer to the same product. Microsoft renamed Azure Sentinel to Microsoft Sentinel in November 2021.

Which automation tool uses logic referred to as a playbook? ›

A playbook template is a prebuilt, tested, and ready-to-use automation workflow for Microsoft Sentinel that can be customized to meet your needs. Templates can also serve as a reference for best practices when developing playbooks from scratch, or as inspiration for new automation scenarios.

What is Sentinel Soar Essentials? ›

The Microsoft Sentinel SOAR Essentials solution for Microsoft Sentinel contains Playbooks that can help you get started with basic notification and orchestration scenarios for common use cases. These include Playbooks for sending notifications over email and/or collaboration platforms such as MS Teams, Slack, etc.

How do I use workbooks in Sentinel? ›

For Microsoft Sentinel in the Defender portal, select Microsoft Sentinel > Threat management > Workbooks. Select Add workbook. To edit the workbook, select Edit, and then add text, queries, and parameters as necessary.

How would you configure a playbook so that it is automatically attached to a particular alert name? ›

Add a playbook or playbook block to an alert

Navigate to the Cases page. Click the alert, within a case, that the playbook or playbook block needs to be attached to. In the Playbooks tab, click add Add Playbook on the right side of the screen. Choose the playbook or the playbook block to be added.

What is the mechanism for generating incidents in Microsoft Sentinel? ›

Create an incident using the Azure portal. Select Microsoft Sentinel and choose your workspace. From the Microsoft Sentinel navigation menu, select Incidents. On the Incidents page, select + Create incident (Preview) from the button bar.

Is a playbook a manual that only provides details about how to respond to an incident? ›

Explanation: Not necessarily. While playbooks often include detailed response procedures for specific incidents, they can also encompass a broader scope. Playbooks may include guidelines, best practices, and procedures for various scenarios, not just incident response.

Top Articles
What is MIL-STD-810G and Why It Matters
Not At Fault in Car Accident: Who Pays?
Po Box 7250 Sioux Falls Sd
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Tesla Supercharger La Crosse Photos
Kokichi's Day At The Zoo
Kansas Craigslist Free Stuff
Shorthand: The Write Way to Speed Up Communication
Obituary (Binghamton Press & Sun-Bulletin): Tully Area Historical Society
Best Theia Builds (Talent | Skill Order | Pairing + Pets) In Call of Dragons - AllClash
Acbl Homeport
123 Movies Babylon
Mercy MyPay (Online Pay Stubs) / mercy-mypay-online-pay-stubs.pdf / PDF4PRO
Springfield Mo Craiglist
Love In The Air Ep 9 Eng Sub Dailymotion
Midlife Crisis F95Zone
065106619
Craftology East Peoria Il
Eva Mastromatteo Erie Pa
Palm Coast Permits Online
Bj Alex Mangabuddy
Best Nail Salons Open Near Me
What Is The Lineup For Nascar Race Today
Jordan Poyer Wiki
Prot Pally Wrath Pre Patch
Walmart Pharmacy Near Me Open
Beaufort 72 Hour
Bleacher Report Philadelphia Flyers
4Oxfun
JVID Rina sauce set1
Marokko houdt honderden mensen tegen die illegaal grens met Spaanse stad Ceuta wilden oversteken
Ou Football Brainiacs
Miles City Montana Craigslist
Hrconnect Kp Login
Angel Haynes Dropbox
Publix Christmas Dinner 2022
Mini-Mental State Examination (MMSE) – Strokengine
Motor Mounts
Kamzz Llc
4083519708
Second Chance Apartments, 2nd Chance Apartments Locators for Bad Credit
Kutty Movie Net
6576771660
30 Years Of Adonis Eng Sub
Port Huron Newspaper
Devotion Showtimes Near Showplace Icon At Valley Fair
Headlining Hip Hopper Crossword Clue
552 Bus Schedule To Atlantic City
Germany’s intensely private and immensely wealthy Reimann family
Roller Znen ZN50QT-E
Sam's Club Fountain Valley Gas Prices
Latest Posts
Article information

Author: Edmund Hettinger DC

Last Updated:

Views: 6510

Rating: 4.8 / 5 (78 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Edmund Hettinger DC

Birthday: 1994-08-17

Address: 2033 Gerhold Pine, Port Jocelyn, VA 12101-5654

Phone: +8524399971620

Job: Central Manufacturing Supervisor

Hobby: Jogging, Metalworking, Tai chi, Shopping, Puzzles, Rock climbing, Crocheting

Introduction: My name is Edmund Hettinger DC, I am a adventurous, colorful, gifted, determined, precious, open, colorful person who loves writing and wants to share my knowledge and understanding with you.