Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
Send a webhook request to a Blink workflow trigger whenever a new Incident is created in Microsoft Sentinel
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | BlinkOps |
| Source | View on GitHub |
📄 Source: Sentinel-Incident-Handler/readme.md
This playbook automatically triggers when a Microsoft Sentinel incident is created or updated, and sends a structured HTTPS POST request to Blink. The integration enables seamless coordination between Sentinel Incident and Blink automation workflows, allowing for rapid incident response, ticketing, notification dispatch, or any custom workflow configured in Blink.

Before deploying this playbook, ensure the following prerequisites are completed:



To deploy the playbook into your Azure environment:
Playbook-Name: Choose a clear and descriptive name for the Logic App (e.g., Blink_Sentinel_Incident_Trigger).
- Blink-Webhook-Full-URL: Paste the full webhook URL from your Blink workflow.Once the playbook is deployed successfully, follow these steps to connect it with Microsoft Sentinel's automation rules:
Notify Blink when new incident is created.When incident is created.Run playbook.Blink_Sentinel_Incident_Trigger).When incident is updated.For guidance on integrating Blink with other tools and services, visit the official Blink Documentation.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊