Relate alerts to incident by IP
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
This playbook looks for other alerts with the same IP as the triggered incident. When such an alert is found, this playbook will add the alert to the incident (only if it isn't related to another incident).
Tables Used
This content item queries data from the following tables:
Additional Documentation
📄 Source: relateAlertsToIncident-basedOnIP/readme.md
relateAlertsToIncident-basedOnIP
Summary
This playbook identifies other alerts sharing the same IP address as the triggered Microsoft Sentinel incident. It adds each alert to the incident if it is not already related to another incident, helping to consolidate related security events for more effective investigation.
Prerequisites
- Microsoft Sentinel Workspace Name.
Deployment instructions
- To deploy the Playbook, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
- Fill in the required parameters:
- Playbook Name
- Sentinel Workspace Name
Post-Deployment Instructions
a. Authorize connections
Once deployment is complete, authorize each connection.
- Click the Microsoft Sentinel connection resource
- Click edit API connection
- Click Authorize
- Sign in
- Click Save
- Repeat steps for other connections
- In Microsoft sentinel, analytical rules should be configured to trigger an incident that contains IP Addresses or Hostnames. In the Entity mapping section of the analytics rule creation workflow, IP Address should be mapped to Address identifier of the IP entity type. Check the documentation to learn more about mapping entities.
-
Configure the automation rules to trigger the playbook. Add the playbook as an action to an automation rule.
- Trigger: When incident is created
- Condition: (as needed for your use case)
Check the documentation to learn more about automation rules.
c. Assign Playbook Microsoft Sentinel Responder Role
- Select the Playbook (Logic App) resource
- Click on Identity Blade
- Choose System assigned tab
- Click on Azure role assignments
- Click on Add role assignments
- Select Scope - Resource group
- Select Subscription - where Playbook has been created
- Select Resource group - where Playbook has been created
- Select Role - Microsoft Sentinel Responder
- Click Save (It takes 3-5 minutes to show the added role.)
Screenshots
Incident Trigger

Comment notification

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to SentinelSOARessentials