Skip to content

Commit 29734d4

Browse files
committed
Fix: Lab 08 Ex01 - Playbook Defender
1 parent ee5e0bd commit 29734d4

File tree

1 file changed

+28
-34
lines changed

1 file changed

+28
-34
lines changed

Instructions/Labs/LAB_AK_08_Lab1_Ex01_Playbook_Defender.md

Lines changed: 28 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
lab:
3-
title: Exercise 2 - Create a Playbook
4-
module: Learning Path 8 - Create detections and perform investigations using Microsoft Sentinel
5-
description: You have now created a playbook and an automation rule in Microsoft Sentinel.
6-
duration: 30 minutes
7-
level: 200
8-
islab: true
9-
primarytopics:
3+
title: Exercise 1 - Create a Playbook
4+
module: Learning Path 8 - Create detections and perform investigations using Microsoft Sentinel
5+
description: You have now created a playbook and an automation rule in Microsoft Sentinel.
6+
duration: 30 minutes
7+
level: 200
8+
islab: true
9+
primarytopics:
1010
- Microsoft Sentinel
1111
---
1212

@@ -24,13 +24,11 @@ With a playbook, you can help automate and orchestrate your threat response, int
2424

2525
In this task, you create a Logic App that is used as a Playbook in Microsoft Sentinel.
2626

27-
>**Note:** Microsoft Sentinel has been predeployed and onboarded to Microsoft Defender XDR with the name **sentinelworkspace-01**, and the required *Content Hub* solutions have been installed.
27+
>**Note:** Microsoft Sentinel has been predeployed and onboarded to Microsoft Defender XDR with the name **Sentinelworkspace-01**, and the required *Content hub* solutions have been installed.
2828
29-
1. Log in to WIN1 virtual machine as Admin with the password: **Pa55w.rd**.
29+
1. Sign in to **WIN1** virtual machine as Admin using the provided credentials.
3030

31-
1. Open the Microsoft Edge browser.
32-
33-
1. In the Edge browser, navigate to Defender XDR at `https://security.microsoft.com`.
31+
1. Open **Microsoft Edge** browser and navigate to **Microsoft Defender XDR** at `https://security.microsoft.com`.
3432

3533
1. In the **Sign in** dialog box, copy, and paste in the **Tenant Email** account provided by your lab hosting provider and then select **Next**.
3634

@@ -40,29 +38,25 @@ In this task, you create a Logic App that is used as a Playbook in Microsoft Sen
4038
4139
1. In the Microsoft Defender navigation menu, scroll down and expand the **Microsoft Sentinel** section.
4240

43-
1. Expand the *Content management* section and select **Content Hub**.
44-
45-
1. Within the search bar, look for **Sentinel SOAR Essentials**.
41+
1. Expand the **Content management** section and select **Content hub**.
4642

47-
1. Select the solution that appears in the results.
43+
1. In the search box, type **Sentinel SOAR Essentials**.
4844

49-
1. Within the solution details, select **Manage**.
45+
1. From the results, select the **Sentinel SOAR Essentials** solution and then select **Manage**.
5046

51-
1. Find the **Defender_XDR_Ransomware_Playbook_for_SecOps-Tasks** playbook and select the name.
47+
1. Find the **Defender_XDR_Ransomware_Playbook_for_SecOps-Tasks** playbook and then select the playbook name.
5248

5349
1. Select the **Incident tasks - Microsoft Defender XDR Ransomware Playbook for SecOps** template.
5450

5551
1. On the details pane, select **Create playbook**.
5652

57-
1. For Resource Group, select **SentinelStatic** and select OK.
58-
59-
1. Remove **for** and the extra *underscores* from the playbook name (would exceed limit of 64 characters). It should read **Defender_XDR_Ransomware_Playbook_SecOps_Tasks**.
53+
1. For Resource Group, select **SentinelStatic** and then select **OK**.
6054

61-
1. Select **Connections**.
55+
1. Edit the playbook name to remove *for* and the extra *underscores* (would exceed limit of 64 characters). It should read **Defender_XDR_Ransomware_Playbook_SecOps_Tasks**.
6256

63-
1. Select **Next: Review and create**.
57+
1. Select **Next: Connections >** and review the default options.
6458

65-
1. Now select **Create Playbook**.
59+
1. Select **Next: Review and create**, review the details, and then select **Create playbook**.
6660

6761
>**Note:** Wait for the deployment to finish before proceeding to the next task.
6862
@@ -74,25 +68,25 @@ In this task, you update the new playbook you created with the proper connection
7468

7569
1. When the previous task completes you should be in the *Defender_XDR_Ransomware_Playbook_SecOps-Tasks | Logic app designer* page. If you aren't, complete steps 2-7 below.
7670

77-
1. In the Search bar of the Azure portal, type Sentinel, then select Microsoft Sentinel.
71+
1. In the Search bar of the Azure portal, type *Sentinel*, then select **Microsoft Sentinel**.
7872

7973
1. Select your Microsoft Sentinel Workspace.
8074

81-
1. Select Automation under the Configuration area and then select the *Active Playbooks* tab.
75+
1. Select **Automation** under the **Configuration** area and then select the **Active Playbooks** tab.
8276

83-
1. Select Refresh from the command bar in case you don’t see any playbooks. You should see the playbook created from the previous step.
77+
1. Select **Refresh** from the command bar if you do not see any playbooks. The playbook created in the previous step should be displayed.
8478

8579
1. Select the **Defender_XDR_Ransomware_Playbook_SecOps_Tasks** playbook name link.
8680

87-
1. On the Logic app designer page for **Defender_XDR_Ransomware_Playbook_SecOps_Tasks**, in the command menu, select Edit.
81+
1. On the **Logic app designer** page for **Defender_XDR_Ransomware_Playbook_SecOps_Tasks**, in the command menu, select **Edit**.
8882

8983
>**Note:** You may need to refresh the page.
9084
91-
1. Select the first block, Microsoft Sentinel incident.
85+
1. Select the first block labeled **Microsoft Sentinel incident**.
9286

93-
1. Select the **Change connection*** link.
87+
1. Select the **Change connection** link.
9488

95-
1. Select **Add new** and select **Sign in**. In the new window, select your Azure subscription admin credentials when prompted. The last line of the block should now read Connected to your-Student-username.
89+
1. Select **Add new** and select **Sign in**. In the new window, select your Azure subscription admin credentials when prompted. The last line of the block should now read "Connected to your-Student-username".
9690

9791
<!--- 1. Below within the logic split (+ sign), select Add an action to incident.--->
9892

@@ -106,11 +100,11 @@ In this task, you update the new playbook you created with the proper connection
106100

107101
1. Select **+ Create** and choose **Automation Rule**.
108102

109-
1. Give the rule a name
103+
1. Give the rule a name.
110104

111105
1. Leave the *Trigger* as **When an incident is created**.
112106

113-
1. Select **+ Add** and choose *Condition (And)*.
107+
1. Select **+ Add** and choose **Condition (And)**.
114108

115109
1. From the drop-down, select **Tactics**.
116110

@@ -134,7 +128,7 @@ In this task, you update the new playbook you created with the proper connection
134128

135129
1. Select **Apply** at the bottom.
136130

137-
1. Select the **X** on the *Create new automation rule* window to close it.
131+
> **Note:** The **Create new automation rule** window closes automatically after the rule is created. If the window does not close, select the **X** to close it.
138132
139133
You have now created a playbook and an automation rule in Microsoft Sentinel.
140134

0 commit comments

Comments
 (0)