Vectra Incident Timeline Update
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
This playbook will update the incident timeline by keeping most recent alerts and adding most recent detections and defender alerts from entities timeline to the incident timeline.
Tables Used
This content item queries data from the following tables:
Additional Documentation
📄 Source: VectraIncidentTimelineUpdate/readme.md
Summary
This playbook will update the incident timeline by keeping most recent alerts and adding most recent detections from entities timeline to the incident timeline.
Prerequisites
- The Vectra XDR data connector should be configured to create alerts and generate an incident based on entity data in Microsoft Sentinel.
Deployment Instructions
- To deploy the Playbook, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
- Fill in the required parameters:
* PlaybookName: Enter the playbook name here.
* WorkspaceName: Enter name of the log analytics workspace where incidents are available using generated using analytic rule.

Post-Deployment Instructions
a. Authorize connections
Once deployment is complete, authorize each connection.
1. Go to your logic app → API connections → Select keyvault connection resource.
2. Go to General → Edit API connection.
3. Click Authorize.
4. Sign in.
5. Click Save.
6. Repeat steps for other connections.
b. Assign Role to update incident
After authorizing each connection, assign role to this playbook.
1. Go to Log Analytics Workspace → your workspace → Access Control → Add.
2. Add role assignment.
3. Assignment type: Job function roles.
4. Role: Microsoft Sentinel Contributor.
5. Members: select managed identity for assigned access to and add your logic app as member as shown in screenshot below.
6. Click on review+assign.
c. Configurations in Microsoft Sentinel
- In Microsoft sentinel, below analytical rules should be configured to trigger an incident.
* Vectra Detection Account Alerts
* Vectra Detection Host Alerts
* Vectra Priority Account Incidents
* Vectra Priority Host Incidents
* Vectra Create Incident Based On Tag For Entity Type Account
* Vectra Create Incident Based On Tag For Entity Type Host
- In Microsoft Sentinel, Configure the automation rules to trigger the playbook.
- Go to Microsoft Sentinel → your workspace → Automation
- Click on Create → Automation rule
- Provide name for your rule
- In Analytic rule name condition, select analytic rule which you have created.
- In Actions dropdown select Run playbook
- In second dropdown select your deployed playbook,
- Click on Apply,
- Save the Automation rule.
NOTE: If you want to manually run the playbook on a particular incident follow the below steps:,
- Go to Microsoft Sentinel → your workspace → Incidents,
- Select an incident.,
- In the right pane, click on Actions, and from the dropdown select the 'Run Playbook' option.,
- Click on the Run button beside this playbook.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to Vectra XDR