Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
SOC and OT engineers can stream their workflows using the playbook, which automatically updates the incident severity based on the devices involved in the incident and their importance.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | IoTOTThreatMonitoringwithDefenderforIoT |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
SecurityAlert |
✓ | ✗ | ? |
📄 Source: AutoTriageIncident/readme.md
This playbook updates the incident severity according to the importance of the devices involved, and creates a comment on the IoT Device entity page.
The playbook require the following in order to connect and use the playbook:
To add the Security Admin role to the Azure subscription where the playbook is installed:
1.Open the playbook from the Microsoft Sentinel Automation page.
2.With the playbook opened as a Logic app, select Identity > System assigned, and then in the Permissions area, select the Azure role assignments button.
3.In the Azure role assignments page, select Add role assignment.
4.In the Add role assignment pane: - Define the Scope as Subscription \ resource group - From the Subscription dropdown, select the subscription where your playbook is installed. - From the Role dropdown, select the Security Admin role, and then select Save.
** To ensure that you have valid connections for each of your connection steps in the playbook:** 1. Open the playbook from the Microsoft Sentinel Automation page.
With the playbook opened as a Logic app, select Logic app designer. If you have invalid connection details, you may have warning signs in both of the Connections steps.
Select a Connections step to expand it and add a valid connection as needed.
To connect your incidents, relevant analytics rules, and the playbook: Add a new Microsoft Sentinel analytics rule, defined as follows:
You may be using out-of-the-box analytics rules, or you may have modified the out-of-the-box content, or created your own. For more information, see Detect threats out-of-the-box with Defender for IoT data.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to IoTOTThreatMonitoringwithDefenderforIoT