Incomplete Entity Information in Incident Automation Rule?

Max 1 Reputation point
2022-01-13T16:46:57.587+00:00

We have an analytics rule that merges reports from our malware detection software - it frequently reports several files for the same host as malicious at once, and we use alert grouping to only create a single incident for this. This works wonderfully, but it means that we have more than one file / hash entity associated with a single incident. This is displayed fine in the frontend and seems to work as intended.

164817-sentinel.png

However, if we then build a playbook with incident trigger, the incident object (down to the level of the JSON representation) only contains a single entity of each type (one file, one hash, even if five of each are present).

164789-json.png

Since we want to send email notifications containing all the file paths and hashes, this is insufficient. Is there any way to get access to the complete data?

Azure Logic Apps
Azure Logic Apps
An Azure service that automates the access and use of data across clouds without writing code.
2,999 questions
Microsoft Sentinel
Microsoft Sentinel
A scalable, cloud-native solution for security information event management and security orchestration automated response. Previously known as Azure Sentinel.
1,065 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Andrew Blumhardt 9,776 Reputation points Microsoft Employee
    2022-01-17T20:16:52.33+00:00

    I agree the incident trigger is too early in the process. I think there may be an option to add a delay or wait. Maybe that will give time for the alert data to be collected.

    Have you considered using Event Grouping under the Rule Logic to create a new alert for each row returned. The alerts would still be grouped by incident. You could then use an alert-based trigger (rather than an alert rule) to trigger a response on each individual IOC.

    You may be able to loop through the events related to an incident ID to add the IOCs to a variable or table.

    You could also log the IOCs to a file or custom table with the main logic app. Then a secondary logic app could report on the collected IOCs on a schedule.

    0 comments No comments