Send basic email

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook will be sending email with basic incidents details (Incident title, severity, tactics, link,…) when incident is created in Microsoft Sentinel.

Attribute Value
Type Playbook
Solution SentinelSOARessentials
Source View on GitHub

Additional Documentation

📄 Source: Send-basic-email/readme.md

Send-basic-email

author: Benjamin Kovacevic

Summary

This playbook sends an email with basic incident details (such as incident title, severity, tactics, and a direct link) when an incident is created in Microsoft Sentinel.

Prerequisites

Deployment instructions

  1. To deploy the playbook, click the Deploy to Azure button below. This will launch the ARM Template deployment wizard.
  2. Fill in the required parameters:
    • Playbook Name
    • M365 Email Address

Deploy to Azure Deploy to Azure Gov

Post-deployment Instructions

a. Authorize connections

Once deployment is complete, authorize each connection.

  1. Open the Logic App in the Azure portal.
  2. Click O365 connector resource
  3. Click edit API connection
  4. Click Authorize
  5. Sign in
  6. Click Save
  7. Repeat steps for other connections

Note: The email will be sent from the user who creates the connection.

b. Attach the playbook

  1. In Microsoft Sentinel, configure an automation rule to trigger this playbook when an incident is created. - Learn more about automation rules
  2. Enable the playbook if it is disabled by default before assigning it to the automation rule.

Screenshots

Playbook
Playbook Playbook

Email
Email Email


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to SentinelSOARessentials