Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook is triggered by Microsoft Sentinel incidents and performs automated investigation and enrichment of URL and User entities associated with the incident. It includes intelligent user identifier detection supporting objectGuid, aadUserId, UPN, and Name+UPNSuffix combinations.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | SentinelSOARessentials |
| Source | View on GitHub |
Activating the 'Deploy' button initiates the deployment of an Azure Logic App integrated with Microsoft Sentinel MCP Actions, utilizing a Microsoft Sentinel incident trigger. The Logic App is configured to run when a new incident is created in Sentinel. This Logic App automatically analyzes all URL and User entities within the incident and provides detailed security insights including classification, analysis results, and recommendations for each entity type.

The playbook automatically triggers when: - A new incident is created in Microsoft Sentinel - The incident contains URL entities that need security analysis - The incident contains User/Account entities that require behavioral analysis - Security analysts need comprehensive automated analysis of multiple entity types
After the analysis is complete, the MCP Entity Analyzer conducts a comprehensive investigation of each entity type and automatically adds detailed comments to the incident with: - URL Analysis: Security classification, threat intelligence, and URL reputation analysis - User Analysis: Behavioral analysis, risk assessment, and user activity patterns - Classification: Security classification for each entity - Analysis Results: Detailed security analysis findings for each entity - Recommendations: Security recommendations based on the analysis - Disclaimer: AI-generated analysis disclaimer
Prior to beginning the installation process, it's crucial to confirm that you have met the following prerequisites: - The user deploying this Logic App needs to have a Contributor Role - The user has permissions to access Microsoft Sentinel workspace - The SentinelMCP connector is available in your environment - The Logic App will automatically use the workspace ID from the incident trigger
During deployment, you'll need to provide: - PlaybookName: Name for the Logic App (default: "Entity-Analyzer-Incident-Trigger") - lookBackDays: Number of days to look back for entity analysis (default: 60 days)
To deploy the Multi-Entity Analyzer Logic App: 1. Press on the Deploy button below 2. Select your subscription and resource group (use the same tenant where Microsoft Sentinel is configured) 3. Configure the lookBackDays parameter if needed (default is 60 days) 4. The workspace ID will be automatically retrieved from the incident
After successful deployment: - The Logic App will be automatically enabled and ready to use - Authenticate the connections: Go to the Logic App → API connections and authenticate: - Microsoft Sentinel connection: Authenticate with a user that has Sentinel permissions - SentinelMCP connection: Authenticate with Microsoft Sentinel MCP permissions - The playbook will automatically trigger when new incidents are created - Manual execution: You can also run this playbook manually from the incident page - Automation Rule: Consider creating an automation rule to run this playbook automatically on specific incident types

The playbook generates formatted comments in the incident for each entity type:
URL Analysis Output: ``` 🔗 URL Analysis for: https://example.com
[Content truncated...]
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊