Events
May 19, 6 PM - May 23, 12 AM
Calling all developers, creators, and AI innovators to join us in Seattle @Microsoft Build May 19-22.
Register todayThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Microsoft Sentinel provides Security Orchestration, Automation, and Response (SOAR) capabilities with automation rules and playbooks. Automation rules automate incident handling and response, and playbooks run predetermined sequences of actions to response and remediate threats. This article discusses how to identify SOAR use cases, and how to migrate your ArcSight SOAR automation to Microsoft Sentinel.
Automation rules simplify complex workflows for your incident orchestration processes, and allow you to centrally manage your incident handling automation.
With automation rules, you can:
Here’s what you need to think about when migrating SOAR use cases from ArcSight.
This section shows how key SOAR concepts in ArcSight translate to Microsoft Sentinel components, and provides general guidelines for how to migrate each step or component in the SOAR workflow.
Step (in diagram) | ArcSight | Microsoft Sentinel |
---|---|---|
1 | Ingest events into Enterprise Security Manager (ESM) and trigger correlation events. | Ingest events into the Log Analytics workspace. |
2 | Automatically filter alerts for case creation. | Use analytics rules to trigger alerts. Enrich alerts using the custom details feature to create dynamic incident names. |
3 | Classify cases. | Use automation rules. With automation rules, Microsoft Sentinel treats incidents according to the analytics rule that triggered the incident, and the incident properties that match defined criteria. |
4 | Consolidate cases. | You can consolidate several alerts to a single incident according to properties such as matching entities, alert details, or creation timeframe, using the alert grouping feature. |
5 | Dispatch cases. | Assign incidents to specific analysts using an integration between Microsoft Teams, Azure Logic Apps, and Microsoft Sentinel automation rules. |
Review which Microsoft Sentinel or Azure Logic Apps features map to the main ArcSight SOAR components.
ArcSight | Microsoft Sentinel/Azure Logic Apps |
---|---|
Trigger | Trigger |
Automation bit | Azure Function connector |
Action | Action |
Scheduled playbooks | Playbooks initiated by the recurrence trigger |
Workflow playbooks | Playbooks automatically initiated by Microsoft Sentinel alert or incident triggers |
Marketplace | • Automation > Templates tab • Content hub catalog • GitHub |
Most of the playbooks that you use with Microsoft Sentinel are available in either the Automation > Templates tab, the Content hub catalog, or GitHub. In some cases, however, you might need to create playbooks from scratch or from existing templates.
You typically build your custom logic app using the Azure Logic App Designer feature. The logic apps code is based on Azure Resource Manager (ARM) templates, which facilitate development, deployment and portability of Azure Logic Apps across multiple environments. To convert your custom playbook into a portable ARM template, you can use the ARM template generator.
Use these resources for cases where you need to build your own playbooks either from scratch or from existing templates.
Here are best practices you should take into account after your SOAR migration:
In this article, you learned how to map your SOAR automation from ArcSight to Microsoft Sentinel.
Events
May 19, 6 PM - May 23, 12 AM
Calling all developers, creators, and AI innovators to join us in Seattle @Microsoft Build May 19-22.
Register today