Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
The playbooks automate the SOC workflow by automatically emailing the incident details to the right IoT/OT device owner (based on Defender for IoT dafinition) and allowing him to respond by email. The incident is automatically updated based on the email response from the device owner
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | IoTOTThreatMonitoringwithDefenderforIoT |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
SecurityAlert |
✓ | ✗ | ? |
📄 Source: SendEmailToIoTOwner/readme.md
This playbook send an email with the incident details to the IoT/OT device owner (as defined in Defender for IoT) to validate the incident and initiate incident response directly from the email. The incident is automatically updated based on the email response from the device owner.
Email response options:
Yes this is expected - the incident will be closed automatically
No this is not expected - the incident will remain active, severity level will increase, and a confirmation tag will be added.
The playbook require the following in order to connect and use the playbook:
To add the Security Admin role to the Azure subscription where the playbook is installed:
1.Open the playbook from the Microsoft Sentinel Automation page.
2.With the playbook opened as a Logic app, select Identity > System assigned, and then in the Permissions area, select the Azure role assignments button.
3.In the Azure role assignments page, select Add role assignment.
4.In the Add role assignment pane:
** To ensure that you have valid connections for each of your connection steps in the playbook:** 1. Open the playbook from the Microsoft Sentinel Automation page. 2. With the playbook opened as a Logic app, select Logic app designer. If you have invalid connection details, you may have warning signs in both of the Connections steps. For example:
Screenshot of the default AD4IOT AutoAlertStatusSync playbook.
To connect your incidents, relevant analytics rules, and the playbook: Add a new Microsoft Sentinel analytics rule, defined as follows:
You may be using out-of-the-box analytics rules, or you may have modified the out-of-the-box content, or created your own. For more information, see Detect threats out-of-the-box with Defender for IoT data.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to IoTOTThreatMonitoringwithDefenderforIoT