Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook is triggered manually when a URL entity is selected in a Microsoft Sentinel incident and provides detailed security insights including classification, analysis results, and recommendations.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | SentinelSOARessentials |
| Source | View on GitHub |
📄 Source: Url-Trigger-Entity-Analyzer/readme.md
Activating the 'Deploy' button initiates the deployment of an Azure Logic App integrated with Microsoft Sentinel MCP Actions, utilizing a Microsoft Sentinel entity trigger. The Logic App is configured to run manually when a URL entity is selected in a Sentinel incident. This Logic App analyzes suspicious URLs and provides detailed security insights including classification, analysis results, and recommendations.

Important Note: As of now, this playbook only works when triggered from the Microsoft Sentinel portal in Azure. It is not currently supported in the Defender portal.
The playbook can be manually triggered when: - A URL entity is identified in a Microsoft Sentinel incident - Security analysts need detailed analysis of suspicious URLs - Automated threat intelligence is required for URL-based investigations
After the analysis is complete, the MCP Entity Analyzer conducts a comprehensive investigation of the URL entity and automatically adds a detailed comment to the incident with: - Classification: Security classification of the URL - Entity Type: Confirmation of the URL entity type - Analysis Result: Detailed security analysis findings - Recommendation: Security recommendations based on the analysis - Disclaimer: AI-generated analysis disclaimer - Data Sources: List of data sources used in the analysis
Prior to beginning the installation process, it's crucial to confirm that you have met the following prerequisites: - The user deploying this Logic App needs to have a Contributor Role - The user has permissions to access Microsoft Sentinel workspace - You have the Workspace ID for your Sentinel environment - The SentinelMCP connector is available in your environment - Access to Microsoft Sentinel portal in Azure (not Defender portal)
During deployment, you'll need to provide: - PlaybookName: Name for the Logic App (default: "Entity-analyzer-Url-Trigger") - lookBackDays: Number of days to look back for entity analysis (default: 10 days) - workspaceId: Your Microsoft Sentinel workspace ID (required)
To deploy the URL Entity Analyzer Logic App: 1. Press on the Deploy button below 2. Select your subscription and resource group (use the same tenant where Microsoft Sentinel is configured) 3. Provide the required Workspace ID parameter 4. Configure the lookBackDays parameter if needed (default is 10 days)
After successful deployment: - The Logic App will be automatically enabled and ready to use - Authenticate the connections: Go to the Logic App → API connections and authenticate: - Microsoft Sentinel connection: Authenticate with a user that has Sentinel permissions - SentinelMCP connection: Authenticate with Microsoft Sentinel MCP permissions - The playbook will be available to run manually from incident entities - Results will be automatically added as comments to the relevant incidents

To manually trigger the URL Entity Analyzer:

[Content truncated...]
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊