Automate threat response with playbooks in Microsoft Sentinel (2024)

  • Article
  • Applies to:
    Microsoft Sentinel in the Azure portal, Microsoft Sentinel in the Microsoft Defender portal

SOC analysts deal with numerous security alerts and incidents, and the sheer volume can overwhelm teams, leading to ignored alerts and uninvestigated incidents. Many alerts and incidents can be addressed by the same sets of predefined remediation actions, which can be automated to make the SOC more efficient and free up analysts for deeper investigations.

Use Microsoft Sentinel playbooks to run preconfigured sets of remediation actions to help automate and orchestrate your threat response. Run playbooks automatically, in response to specific alerts and incidents that trigger a configured automation rule, or manually and on-demand for a particular entity or alert.

For example, if an account and machine are compromised, a playbook can automatically isolate the machine from the network and block the account by the time the SOC team is notified of the incident.

Important

Microsoft Sentinel is available as part of the unified security operations platform in the Microsoft Defender portal. Microsoft Sentinel in the Defender portal is now supported for production use. For more information, see Microsoft Sentinel in the Microsoft Defender portal.

Recommended use cases

The following table lists high-level use cases where we recommend using Microsoft Sentinel playbooks to automate your threat response:

Use caseDescription
EnrichmentCollect data and attach it to an incident to help your team make smarter decisions.
Bi-directional syncSync Microsoft Sentinel incidents with other ticketing systems. For example, create an automation rule for all incident creations, and attach a playbook that opens a ticket in ServiceNow.
OrchestrationUse the SOC team's chat platform to better control the incidents queue. For example, send a message to your security operations channel in Microsoft Teams or Slack to make sure your security analysts are aware of the incident.
ResponseImmediately respond to threats, with minimal human dependencies, such as when a compromised user or machine is indicated. Alternately, manually trigger a series of automated steps during an investigation or while hunting.

For more information, see Recommended playbook use cases, templates, and examples.

Prerequisites

The following roles are required to use Azure Logic Apps to create and run playbooks in Microsoft Sentinel.

RoleDescription
OwnerLets you grant access to playbooks in the resource group.
Logic App ContributorLets you manage logic apps and run playbooks. Doesn't allow you to grant access to playbooks.
Logic App OperatorLets you read, enable, and disable logic apps. Doesn't allow you to edit or update logic apps.
Microsoft Sentinel ContributorLets you attach a playbook to an analytics or automation rule.
Microsoft Sentinel ResponderLets you access an incident in order to run a playbook manually, but doesn't allow you to run the playbook.
Microsoft Sentinel Playbook OperatorLets you run a playbook manually.
Microsoft Sentinel Automation ContributorAllows automation rules to run playbooks. This role isn't used for any other purpose.

The Active playbooks tab on the Automation page displays all active playbooks available across any selected subscriptions. By default, a playbook can be used only within the subscription to which it belongs, unless you specifically grant Microsoft Sentinel permissions to the playbook's resource group.

Extra permissions required for Microsoft Sentinel to run playbooks

Microsoft Sentinel uses a service account to run playbooks on incidents, to add security and enable the automation rules API to support CI/CD use cases. This service account is used for incident-triggered playbooks, or when you run a playbook manually on a specific incident.

In addition to your own roles and permissions, this Microsoft Sentinel service account must have its own set of permissions on the resource group where the playbook resides, in the form of the Microsoft Sentinel Automation Contributor role. Once Microsoft Sentinel has this role, it can run any playbook in the relevant resource group, manually or from an automation rule.

To grant Microsoft Sentinel with the required permissions, you must have an Owner or User access administrator role. To run the playbooks, you'll also need the Logic App Contributor role on the resource group that contains the playbooks you want to run.

Playbook templates (preview)

Important

Playbook templates are currently in PREVIEW. See the Supplemental Terms of Use for Microsoft Azure Previews for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Playbook templates are prebuilt, tested, and ready-to-use workflows that aren't useable as playbooks themselves, but are ready for you to customize to meet your needs. We also recommend that you use playbook templates as a reference of best practices when developing playbooks from scratch, or as inspiration for new automation scenarios.

Access playbook templates from the following sources:

LocationDescription
Microsoft Sentinel Automation pageThe Playbook templates tab lists all installed playbooks. Create one or more active playbooks using the same template.

When we publish a new version of a template, any active playbooks created from that template have an extra label added in the Active playbooks tab to indicate that an update is available.

Microsoft Sentinel Content hub pagePlaybook templates are available as part of product solutions or standalone content installed from the Content hub.

For more information, see:
About Microsoft Sentinel content and solutions
Discover and manage Microsoft Sentinel out-of-the-box content

GitHubThe Microsoft Sentinel GitHub repository contains many other playbook templates. Select Deploy to Azure to deploy a template to your Azure subscription.

Technically, a playbook template is an Azure Resource Manager (ARM) template, which consists of several resources: an Azure Logic Apps workflow and API connections for each connection involved.

For more information, see:

  • Create and customize Microsoft Sentinel playbooks from content templates
  • Recommended playbook templates
  • Azure Logic Apps for Microsoft Sentinel playbooks

Playbook creation and usage workflow

Use the following workflow to create and run Microsoft Sentinel playbooks:

  1. Define your automation scenario. We recommend that you review recommended playbooks use cases and playbook templates to start.

  2. If you're not using a template, create your playbook and build your logic app. For more information, see Create and manage Microsoft Sentinel playbooks.

    Test your logic app by running it manually. For more information, see Run a playbook manually, on demand.

  3. Configure your playbook to run automatically on a new alert or incident creation, or run it manually as needed for your processes. For more information, see Respond to threats with Microsoft Sentinel playbooks.

Related content

  • Create and customize Microsoft Sentinel playbooks from content templates
  • Create and manage Microsoft Sentinel playbooks
  • Respond to threats with Microsoft Sentinel playbooks
  • Azure Logic Apps for Microsoft Sentinel playbooks
Automate threat response with playbooks in Microsoft Sentinel (2024)

FAQs

How do you automate the response to the threat found by Microsoft Sentinel? ›

Use Microsoft Sentinel playbooks to run preconfigured sets of remediation actions to help automate and orchestrate your threat response. Run playbooks automatically, in response to specific alerts and incidents that trigger a configured automation rule, or manually and on-demand for a particular entity or alert.

Which capability of Microsoft Sentinel can help automate and orchestrate your response to incidents and common security tasks? ›

Playbooks. A playbook is a collection of response and remediation actions and logic that can be run from Microsoft Sentinel as a routine. A playbook can: Help automate and orchestrate your threat response.

What is the difference between sentinel automation rules and playbooks? ›

Re: Automation Rule and Playbooks

Automation Rule: Set conditions to send Sentinel Incidents to an automation workflow or playbook. Playbook: Execute course of action (require API integrations with connectors). They are more complex and require deep knowledge.

What is a playbook in automation? ›

A playbook is a predefined set of actions and conditional statements that run in an automated workflow to respond to a certain event or incident type. Playbooks can allow your organization's teams to respond to an incident in a consistent, focused, and repeatable fashion.

Which solution allows cybersecurity incident response teams to automate incident responses? ›

SOAR tools allow security teams to define standardized automation steps and a decision-making workflow, with enforcement, status tracking and auditing capabilities.

Which of these solutions is Microsoft's security orchestration automation and response product? ›

Microsoft Sentinel is a scalable, cloud-native SecOps solution that comes with built-in orchestration and automation, as well as the ability to provide visibility across your entire enterprise.

Which Microsoft cloud service should you use to automate threat prevention detection and response for all of the workloads? ›

Microsoft Defender for Cloud is a multicloud security solution. It provides native CSPM capabilities for Azure, AWS, and Google Cloud environments and supports threat protection across these platforms.

What is the use of playbooks in the incident response process? ›

Playbooks are a key component of DevOps and IT Ops incident management, as well as cybersecurity. They set the organization's policies and practices for responding to unplanned outages, help teams bring order to chaos and make sure everyone's responding to incidents and security threats consistently.

What is the workbook and playbook in Sentinel? ›

Workbooks are used to visualize the data, potential issues and trends, and help create specific queries. These queries can help create rules called analytics. After creating analytic rules, you start to see Incidents, as well as process automated actions via Playbooks.

What is runbook vs playbook incident response? ›

Runbooks provide detailed instructions for specific tasks, while playbooks offer strategic guidance and cover the bigger picture. Multiple runbooks and playbooks can be assigned to a single incident, ensuring the right level of automation and orchestration for each situation.

How would you configure a playbook so that it is automatically attached to a particular alert name? ›

Add a playbook or playbook block to an alert

Navigate to the Cases page. Click the alert, within a case, that the playbook or playbook block needs to be attached to. In the Playbooks tab, click add Add Playbook on the right side of the screen. Choose the playbook or the playbook block to be added.

What are playbooks in Azure? ›

Technically, a playbook template is an Azure Resource Manager (ARM) template, which consists of several resources: an Azure Logic Apps workflow and API connections for each connection involved. This article focuses on deploying a playbook template from the Playbook templates tab under Automation.

How do I use workbooks in Sentinel? ›

For Microsoft Sentinel in the Azure portal, under Threat management, select Workbooks. For Microsoft Sentinel in the Defender portal, select Microsoft Sentinel > Threat management > Workbooks. Select Add workbook. To edit the workbook, select Edit, and then add text, queries, and parameters as necessary.

How automated investigation and response works in Microsoft Defender for Office 365? ›

AIR enables your security operations team to operate more efficiently and effectively. AIR capabilities include automated investigation processes in response to well-known threats that exist today. Appropriate remediation actions await approval, enabling your security operations team to respond to detected threats.

Which Microsoft Cloud service should you use to automate threat prevention detection and response for all of the workloads? ›

Microsoft Defender for Cloud is a multicloud security solution. It provides native CSPM capabilities for Azure, AWS, and Google Cloud environments and supports threat protection across these platforms.

Which type of security solution is used to automate security triage and incident response? ›

SOAR—for security orchestration, automation and response—is a software solution that enables security teams to integrate and coordinate separate security tools, automate repetitive tasks and streamline incident and threat response workflows.

Top Articles
Difference between pure and hybrid E-commerce payment models
How Much Internet Data Do I Need? - Guides
Great Clips Mount Airy Nc
Voorraad - Foodtrailers
Craigslist In South Carolina - Craigslist Near You
Flights to Miami (MIA)
Category: Star Wars: Galaxy of Heroes | EA Forums
Minn Kota Paws
Catsweb Tx State
U.S. Nuclear Weapons Complex: Y-12 and Oak Ridge National Laboratory…
Gt Transfer Equivalency
Elle Daily Horoscope Virgo
2016 Hyundai Sonata Price, Value, Depreciation & Reviews | Kelley Blue Book
ExploreLearning on LinkedIn: This month's featured product is our ExploreLearning Gizmos Pen Pack, the…
Labor Gigs On Craigslist
National Office Liquidators Llc
No Hard Feelings Showtimes Near Cinemark At Harlingen
Craiglist Tulsa Ok
Craigslist West Valley
Race Karts For Sale Near Me
Gayla Glenn Harris County Texas Update
Lisas Stamp Studio
How To Find Free Stuff On Craigslist San Diego | Tips, Popular Items, Safety Precautions | RoamBliss
Craigslist Panama City Beach Fl Pets
Piedmont Healthstream Sign In
Bay Area Craigslist Cars For Sale By Owner
Publix Christmas Dinner 2022
Insidious 5 Showtimes Near Cinemark Southland Center And Xd
Bursar.okstate.edu
Haley Gifts :: Stardew Valley
Atlantic Broadband Email Login Pronto
Honda Ruckus Fuse Box Diagram
Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
1v1.LOL Game [Unblocked] | Play Online
Legit Ticket Sites - Seatgeek vs Stubhub [Fees, Customer Service, Security]
Fifty Shades Of Gray 123Movies
Gateway Bible Passage Lookup
5A Division 1 Playoff Bracket
Sarahbustani Boobs
Haunted Mansion (2023) | Rotten Tomatoes
My Gsu Portal
Paradise leaked: An analysis of offshore data leaks
What your eye doctor knows about your health
2000 Fortnite Symbols
Jigidi Jigsaw Puzzles Free
Prologistix Ein Number
Thrift Stores In Burlingame Ca
Worlds Hardest Game Tyrone
Island Vibes Cafe Exeter Nh
Latest Posts
Article information

Author: Delena Feil

Last Updated:

Views: 5395

Rating: 4.4 / 5 (65 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Delena Feil

Birthday: 1998-08-29

Address: 747 Lubowitz Run, Sidmouth, HI 90646-5543

Phone: +99513241752844

Job: Design Supervisor

Hobby: Digital arts, Lacemaking, Air sports, Running, Scouting, Shooting, Puzzles

Introduction: My name is Delena Feil, I am a clean, splendid, calm, fancy, jolly, bright, faithful person who loves writing and wants to share my knowledge and understanding with you.