Rediģēt

Kopīgot, izmantojot


Respond to threat actors while investigating or threat hunting in Microsoft Sentinel

This article shows you how to take response actions against threat actors on the spot, during the course of an incident investigation or threat hunt, without pivoting or context switching out of the investigation or hunt. You accomplish this using playbooks based on the new entity trigger.

The entity trigger currently supports the following entity types:

Important

The entity trigger is currently in PREVIEW. See the Supplemental Terms of Use for Microsoft Azure Previews for additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Run playbooks with the entity trigger

When you're investigating an incident, and you determine that a given entity - a user account, a host, an IP address, a file, and so on - represents a threat, you can take immediate remediation actions on that threat by running a playbook on-demand. You can do likewise if you encounter suspicious entities while proactively hunting for threats outside the context of incidents.

  1. Select the entity in whichever context you encounter it, and choose the appropriate means to run a playbook, as follows:

    • In the Entities widget on the Overview tab of an incident in the new incident details page (now in Preview), or in its Entities tab, choose an entity from the list, select the three dots next to the entity, and select Run playbook (Preview) from the pop-up menu.

      Screenshot of incident details page.

      Screenshot of entities tab on incident details page.

    • In the Entities tab of an incident, choose the entity from the list and select the Run playbook (Preview) link at the end of its line in the list.

      Screenshot of selecting entity from incident details page to run a playbook on it.

    • From the Investigation graph, select an entity and select the Run playbook (Preview) button in the entity side panel.

      Screenshot of selecting an entity from the investigation graph to run a playbook on it.

    • From the Entity behavior page, select an entity. From the resulting entity page, select the Run playbook (Preview) button in the left-hand panel.

      Screenshot of selecting an entity from the entity behavior page to run a playbook on it.

      Screenshot of the selected entity page to run a playbook on an entity.

  2. These will all open the Run playbook on <entity type> panel.

    Screenshot of Run playbook on entity panel.

    In any of these panels, you'll see two tabs: Playbooks and Runs.

  3. In the Playbooks tab, you'll see a list of all the playbooks that you have access to and that use the Microsoft Sentinel Entity trigger for that entity type (in this case, user accounts). Select the Run button for the playbook you want to run it immediately.

    If you don't see the playbook you want to run in the list, it means Microsoft Sentinel doesn't have permissions to run playbooks in that resource group.

    To grant those permissions, select Settings > Settings > Playbooks permissions > Configure permissions. In the Manage permissions panel, mark the check boxes of the resource groups containing the playbooks you want to run, and select Apply.

    For more information, see Extra permissions required for Microsoft Sentinel to run playbooks.

  4. You can audit the activity of your entity-trigger playbooks in the Runs tab. You'll see a list of all the times any playbook has been run on the entity you selected. It might take a few seconds for any just-completed run to appear in this list. Selecting a specific run will open the full run log in Azure Logic Apps.

Next steps

In this article, you learned how to run playbooks manually to remediate threats from entities while in the middle of investigating an incident or hunting for threats.