Have you tried enabling the M365 Defender analytic rule in Sentinel and then configure it for automation?
Then if the logic within that automation was not sufficient you could still call a playbook and perform additional customized workflows.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
How to create Playbook and automation rules for M365 Defender for Identity, Endpoint, Cloud Apps, and Data as we wanted to do some automation around it to let SOAR work on the alerts which are on "Low", "Medium" severity alerts?
For example: if we have many alerts those should be verified by that respective automation rule and take the appropriate actions like close those alerts or mark as no action needed.
Have you tried enabling the M365 Defender analytic rule in Sentinel and then configure it for automation?
Then if the logic within that automation was not sufficient you could still call a playbook and perform additional customized workflows.