Azure-Sentinel/Playbooks/Send-AnalyticalRulesHealthN...
Sreedhar Ande c6f50da536
Updated Send-AnalyticalRulesHealthNotifications
2021-12-01 15:21:16 -08:00
..
images updated graphics 2021-09-29 15:31:08 -07:00
README.MD Updated Send-AnalyticalRulesHealthNotifications 2021-12-01 15:21:16 -08:00
azuredeploy.json Updated ARM template with formatted email 2021-09-29 13:43:24 -07:00

README.MD

Send notifications on Azure Sentinel Analytical Rules - auto-disabled rules

Author: Sreedhar Ande

It's a rare occurrence that a scheduled query rule fails to run, but it can happen. As shown in the image below, several Scheduled Analytics Rules that had been Auto-disabled

Autodisabled_Rules

For more information, click here

Blog https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/monitoring-microsoft-sentinel-analytical-rules-push-health/ba-p/2793694

In the event of a predetermined number of consecutive permanent failures, of the same type and on the same rule, Azure Sentinel stops trying to execute the rule, and also takes the following steps:
- Disables the rule.
- Adds the words "AUTO DISABLED" to the beginning of the rule's name.
- Adds the reason for the failure (and the disabling) to the rule's description.

This Playbook will trigger immediately and inform Security teams by notifying them via mail or post message to Teams Channel

Deployment

Deploy to Azure Deploy to Azure Gov

Post Deployment Steps

  1. API connections are used to connect Logic Apps to SaaS services, such as Office 365 & Teams
    Apiconnections

  2. This LogicApp deployed using Managed Identity, grant permissions to the managed identity by using Azure role-based access control (Azure RBAC). The managed identity is authenticated with Azure AD, so you dont have to store any credentials in code Role_assignments

    Role_assignments_1

    Role_assignments_2

Sample notifications

Email

Notification_Email

Teams

Teams_Notification