IronNet_UpdateIronDefenseAlerts
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
author: IronNet
⚠️ Not listed in Solution JSON: This content item was discovered by scanning the solution folder but is not included in the official Solution JSON file. It may be a legacy item, under development, or excluded from the official solution package.
Additional Documentation
📄 Source: IronNet_UpdateIronDefenseAlerts/readme.md
author: IronNet
This playbook is used to keep IronDefense and Azure Sentinel in sync by
receiving Sentinel incident updates to update the corresponding IronDefense
alert workflow status and analyst rating through IronAPI. The playbook
should be set to run when a new alert is generated by the "Create Incidents from
IronDefense" analytic rule.
Prerequisites
- Create an IronVue user with the following permissions:
* Access IronAPI
* View Alert
* Edit Alert
* Manage Threat Intelligence Rules
- Configure the IronNet IronDefense data connector.
- Create an analytic rule using the "Create Incidents from IronDefense" rule
template.
Deployment Instructions
- Click the "Deploy to Azure" button to open the ARM template wizard to deploy
this playbook.

- Enter template parameters. Use the IronVue user credentials for IronAPI.
Post-deployment Instructions
- Edit the "Create Incidents from IronDefense" analytic rule in your Azure
Sentinel workspace.
- Click the "Automated Response" tab and select this playbook to run when new
alerts are generated.
Playbook Execution
- The Playbook execution begins at configured intervals to check if the Sentinel
Incidents has been updated
- Using the IronAPI for an updated Sentinel Incident, the status along with its
classification will be updated to the corresponding IronDefense Alert
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to IronNet IronDefense