Using Logic Apps to automate enrichment of Sentinel incidents

Cloudsec 150 Reputation points
2024-02-21T17:28:21.03+00:00

I am exploring automation options for enriching Sentinel incidents and would like to use my threat intel pane in Sentinel via Defender intel feeds. Is there a way to use Logic Apps to accomplish this instead of relying on multiple separate threat intel feeds and Logic Apps?

Azure Logic Apps
Azure Logic Apps
An Azure service that automates the access and use of data across clouds without writing code.
2,851 questions
Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
980 questions
{count} votes

Accepted answer
  1. Luis Arias 4,721 Reputation points
    2024-02-23T10:32:39.6033333+00:00

    Hi Cloudsec, Yes, you can use Azure Logic Apps to automate the enrichment of Sentinel incidents. With Microsoft Sentinel playbooks, based on workflows built in Azure Logic Apps, can be used for your SOAR operations. Also you can connect directly to the Microsoft Defender Threat Intelligence feed.

    A good example and tutorial connecting threat intelligence sources from playbooks is this one: https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/enrich-azure-sentinel-security-incidents-with-the-riskiq/ba-p/1534412

    In essence, a playbook is a specialized Logic App designed to respond to Azure Sentinel triggers.

    Reference:

    I hope this information help you. Regards, Luis


    If the information helped address your question, please Accept the answer.


0 additional answers

Sort by: Most helpful