IncidentUpdate-GetSentinelAlertsEvidence

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook will run on a time schedule base (every hour) and it will check for any incident that was updated (in the last hour) in your Sentinel workspace by Sentinel Alerts.
It will then automatically attach the new alert evidence from the updated Azure Sentinel incident (from the last hour) and send the evidence to an Event Hub that can be consumed by a 3rd party SIEM solution.

Attribute Value
Type Playbook
Solution Standalone Content
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
SecurityAlert ?
SecurityIncident ?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
AzureActiveDirectoryIdentityProtection Microsoft Entra ID Protection
AzureAdvancedThreatProtection Microsoft Defender for Identity
AzureSecurityCenter Microsoft Defender for Cloud
DerdackSIGNL4 SIGNL4
IoT IoTOTThreatMonitoringwithDefenderforIoT
MicrosoftCloudAppSecurity Microsoft Defender for Cloud Apps
MicrosoftDefenderAdvancedThreatProtection MicrosoftDefenderForEndpoint
MicrosoftDefenderForCloudTenantBased Microsoft Defender for Cloud
OfficeATP Microsoft Defender for Office 365
OfficeIRM MicrosoftPurviewInsiderRiskManagement

Solutions: IoTOTThreatMonitoringwithDefenderforIoT, Microsoft Defender for Cloud, Microsoft Defender for Cloud Apps, Microsoft Defender for Identity, Microsoft Defender for Office 365, Microsoft Entra ID Protection, MicrosoftDefenderForEndpoint, MicrosoftPurviewInsiderRiskManagement, SIGNL4


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks