Needs-Review-Incident-Email-Notification

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook will send an email notification when a new incident is created in Microsoft Sentinel.

Attribute Value
Type Playbook
Solution Armorblox
Source View on GitHub

Additional Documentation

📄 Source: Needs-Review-Incident-Email-Notification/readme.md

Author: Armorblox

This playbook will send an email notification when a new incident is created in Microsoft Sentinel.

Pre-requisites

An O365 account to be used to send email notification. The user account will be used in O365 connector (Send an email).

Parameters

Notification Email - The receiver's mail address.

Deployment

Deploy to Azure Deploy to Azure Gov

Post-deployment

Configure connections

Once this Playbooks template is deployed, you will need to go into the Logic App, edit it and click on each of the steps that require an authenticated connection to your tenant and complete the connection process. These steps will have an exclamation mark showing that the connection needs to be completed. Make sure to also open the "For each" step which also contains a step that requires an authenticated connection.
Note: Emails sent with this playbook will be from the user that creates the connection.

Attach the playbook

After deployment, attach this playbook to the Armorblox Needs Review analytic rule so it runs when the alert is created.
Note: Playbook is disabled by default. Please enable it before assigning to the Automation rule.

Screenshots

Playbook screenshot

Playbook


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to Armorblox