Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
This playbook will be sending email with formated incidents report (Incident title, severity, tactics, link,…) when incident is created in Microsoft Sentinel. Email notification is made in HTML.
Additional Documentation
📄 Source: Send-email-with-formatted-incident-report/readme.md
author: Benjamin Kovacevic
Summary
This playbook sends an email with a formatted incident report (including incident title, severity, tactics, link, and more) in HTML format when an incident is created in Microsoft Sentinel.
Prerequisites
- A Microsoft 365 (M365) account to send email notifications (the user account will be used in the O365 connector for sending emails).
- A link to your company logo (no formatting needed, as size is defined in the playbook). Example: https://azure.microsoft.com/svghandler/azure-sentinel
Deployment instructions
- To deploy the playbook, click the Deploy to Azure button below. This will launch the ARM Template deployment wizard.
- Fill in the required parameters:
- Playbook Name
- M365 Email Address
- Company Logo URL (if available)
- Company Name
Post-deployment Instructions
a. Authorize connections
Once deployment is complete, authorize each connection.
- Open the Logic App in the Azure portal.
- Click the O365 connector resource.
- Click Edit API connection.
- Click Authorize.
- Sign in.
- Click Save.
- Repeat steps for other connections as needed.
Note: The email will be sent from the user who creates the connection.
b. Attach the playbook
- In Microsoft Sentinel, configure an automation rule to trigger this playbook when an incident is created.
- Learn more about automation rules
- Enable the playbook if it is disabled by default before assigning it to the automation rule.
Screenshots
Playbook

Email

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to SentinelSOARessentials