Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Task 3.5: Add automation to the Windows Security event log clear incident

In this task, you’ll configure the Windows data connector to be linked to the modified Logic app. Automation rules streamline the use of automation in Microsoft Sentinel, enabling you to simplify complex workflows for your threat response orchestration processes.

The following document may help you complete this task.


  1. In the upper left, select the hamburger icon Hamburger-Menu.png, then select Home to return to the Microsoft Azure home page.

  2. On the Microsoft Azure Home page, under Azure services, select Microsoft Sentinel.

    azureservicesmicrosoftsentinel.png

  3. On the Microsoft Sentinel page, select LogAnalytics-workspace.

  4. On the left navigation, under Configuration select Analytics.

  5. From the list of Active rules, select the Medium severity rule named NRT Security Event log cleared.

    If necessary, open the Active rules details panel on the right by selecting the « icon.

    activerulesdetails.png

  6. On the Security Event log cleared details panel, select Edit.

    activerulesdetailsedit.png

  7. On the Analytics rule wizard - Edit existing scheduled rule page, on the General tab, review the fields and select the Automated response tab.

    automatedresponsetab.png

  8. On the Automated response tab select + Add new.

    automationrulesaddnew.png

  9. In the Create new automation rule panel, set the Automation rule name to WinWatchlist.

  10. Set the first value in Actions to Run playbook.

  11. In the second value in Actions, select the Add-HostToWatchlist-IncidentTrigger playbook.

    actions2entries.png

  12. Review the rest of the fields and select Apply.

  13. On the Automated response tab, select Next : Review + create >.

  14. Once the Validation process has completed successfully select Save.