Azure Sentinel News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
Azure Sentinel News
No Result
View All Result
Home Incident Response

Azure Sentinel: Sending an Email Each Morning with the List of Daily Incidents Created

Azure Sentinel News Editor by Azure Sentinel News Editor
December 29, 2020
in Incident Response
0
Introducing the Microsoft Azure Modular Datacenter
4.3kViews
817 Shares Share on Facebook Share on Twitter

Overnight you may have noticed that our new SecurityIncident table was finally released out of preview. The data contained in this new table is part of a huge ask by customers. It gives Azure Sentinel analysts the ability to query against Security Incident data and generate Workbooks and reports based off the data.

I’ve been using this table for a while and have found the data extremely useful. One of the more valuable abilities this has given me has been to generate a daily email that shows up in my inbox around 7am each morning that includes the list of Incidents created since last checked.

The email includes time the incident was created, the title, description, severity, and URL that links directly to the incident. This is a huge timesaver for those security teams that need to get a quick handle on the daily workload first thing each morning.

Daily New Incidents Email

The email is generated using a Logic App. The Logic App is NOT an Azure Sentinel Playbook because it needs to run on a schedule instead of being based off an Azure Sentinel trigger.

The SecurityIncident table also finally exposes the URL in a much easier manner than how it had to be done before through additional parsing and querying against AzureActivity.

So, here’s what the logic looks like:

Step 1: Recurrence Trigger – set for 7am every day
Step 2: Run query against the Azure Sentinel Log Analytics workspace (query below) and create an HTML table
Step 3: Send the email and include the HTML table created in Step 2

The query looks like the following:

SecurityIncident
| where TimeGenerated > ago(1d) 
| where Status == "Active"
| project TimeGenerated, Title, Description, Severity, IncidentUrl

And, you can always snag the latest version of this query from my GitHub repo: https://github.com/rod-trent/SentinelKQL/blob/master/SecurityIndicentsCreatedinLastDay.txt

I’ll be building this Logic App out to share soon to my GitHub repo.

Reference: https://azurecloudai.blog/2020/08/04/azure-sentinel-sending-an-email-each-morning-with-the-list-of-daily-incidents-created/

Azure Sentinel News Editor

Azure Sentinel News Editor

Related Posts

Wipro launches advanced cloud SOC services using Microsoft Azure Sentinel
Incident Response

Azure Sentinel Rare Occurrences Incidents Generated After Setup

December 30, 2020
What’s new: Microsoft Teams connector in Public Preview
Incident Response

Adding MBAM/Bitlocker Logs to Azure Sentinel

December 30, 2020
RiskIQ Joins Microsoft Intelligent Security Association
Incident Response

How to Add Geographical Data for IP Addresses to an Azure Sentinel Incident

December 28, 2020
Next Post
What’s new: Microsoft Teams connector in Public Preview

Adding MBAM/Bitlocker Logs to Azure Sentinel

With new release, CrowdStrike targets Google Cloud, Azure and container adopters

Managing Disconnected Azure VMs for Azure Sentinel

Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

Modified IP Address to GEO to Tags Azure Sentinel Playbook

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow Us

  • 21.8M Fans
  • 81 Followers

Recommended

What’s new: Microsoft Teams connector in Public Preview

How to Connect the New Intune Devices Log Azure Sentinel

1 month ago
Microsoft and Docker collaborate on new ways to deploy containers on Azure

SolarWinds Post-Compromise Hunting with Azure Sentinel

2 months ago
CRITICALSTART Adds Support for Microsoft Azure Sentinel to MDR Services

Azure Security Center Auto-connect to Sentinel

3 months ago
Watching the Watchers: Monitoring Azure Sentinel Query Activity for Malicious Activity.

Securing Remote Virtual Machines Using Azure Bastion

3 months ago

Instagram

    Please install/update and activate JNews Instagram plugin.

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

Topics

anomaly automation Azure Azure DevOps Azure Security Center Azure Sentinel Azure Sentinel API Azure Sentinel Connector BlueVoyant Call cybersecurity Detection file GitHub Hunting Huntingy IAC incident response Incident Triage infrastructure as code Investigation jupyter LAQueryLogs MDR Microsoft microsoft 365 mssp Multitenancy Notebooks Pester Playbooks PowerShell python Records Security Sentinel Sharing SIEM signin Supply Chain teams Threat hunting Watchlists Workbooks XDR
No Result
View All Result

Highlights

New Items of Note on the Azure Sentinel GitHub Repo

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

New Search Capability for Azure Sentinel Incidents

Follow-up: Microsoft Tech Talks Practical Sentinel : A Day in the Life of a Sentinel Analyst

Changes in How Running Hunting Queries Works in Azure Sentinel

Azure Sentinel can now Analyze All Available Azure Active Directory Log Files

Trending

What’s new: Microsoft Teams connector in Public Preview
IR

How to Generate Azure Sentinel Incidents for Testing

by Azure Sentinel News Editor
February 26, 2021
0

Do you want to generate an Incident in Azure Sentinel for testing/demoing? Here’s a couple easy ways...

What’s new: Microsoft Teams connector in Public Preview

Azure Sentinel Notebooks Loses It’s Preview Tag

February 25, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting

February 22, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

New Items of Note on the Azure Sentinel GitHub Repo

February 18, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

February 17, 2021

We bring you the best, latest and perfect Azure Sentinel News, Magazine, Personal Blogs, etc. Visit our landing page to see all features & demos.
LEARN MORE »

Recent News

  • How to Generate Azure Sentinel Incidents for Testing February 26, 2021
  • Azure Sentinel Notebooks Loses It’s Preview Tag February 25, 2021
  • The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting February 22, 2021

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

[mc4wp_form]

Copyright © 2020 - Azure Sentinel News

No Result
View All Result
  • Home
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence

Copyright © 2020 Azure Sentinel News