Verify your environment
Now we have our alert rule running, the SOC team is finding that it’s just way too ‘noisy’ because every time an admin logs on, it’s generating Alerts and Incidents. It’s your job to ensure that the Alert must trigger whenever an administrator logs in and create an Incident, AND, the Incident should be automatically closed if the IP address exists in the Watchlist.
We want to automatically update your Security Teams channel when the Incident is not automatically closed.
Hint: When you log on, if your IP is in the Watchlist, automatically close the alert/incident
Update The Workbook
Send a message to your security operations channel in Microsoft Teams or Slack to make sure your security analysts are aware of the incident.
Verify that the Incident is automatically closed. You have implemented a playbook that automatically closes the Incident if the IP address of the administrator/logon user is included in your Watchlist. And, you’ve verified that an Incident is created if you login from and IP address that is NOT in the Watchlist.
Verify that you have updated the Workbook. When an incident is not automatically closed, your security Teams channel is notified.
Check the GitHub repository for existing Logic Apps/ Playbooks.
When adding the Playbook, you need to Manage playbook permissions (in blue, just under the Actions heading).
Read the learning resource above on automated response to find out how to link into Teams (and you can search the web for additional info).
Too comfortable? Eager to do more? Try these additional challenges!