Operations Task Management for Azure Alerts
Background
A few weeks back, a customer asked us for a way to effectively track the alerts that they get from Microsoft Sentinel and Defender for Cloud and ensure resolution. For organisations with an ITIL practice, this work is tracked by logging an Incident or a Problem ticket in an ITSM tool. But some organisations are a lot leaner (no ITIL practice and no ITSM tooling) and simply need something that works.
Solution Idea
And so the idea is to use Azure Boards as a simple Kanban board for the operations team to track work status. The tasks are created automatically as alerts/incidents are raised using Azure Logic Apps.
Workflow
But before that, let's design the workflow:
This workflow is implemented using a custom inherited process in Azure Boards. In our implementation, we used
Work Item Type=Issue for Incident-type items, typically coming from Microsoft Sentinel, and
Work Item Type=Problem for Problem-type items, typically coming from Defender for Cloud recommendations
Since items are created automatically in Azure Boards, there is a need to clean up the alerts and reduce false positives. The work items are also first triaged and approved/removed before work is done. An extra verification stage is added for review before resolution.
The Logic Apps
Creating the logic apps was easy. Microsoft already provided templates to deploy these logic apps in our Azure Subscription.
- Create DevOps Tasks from Microsoft Defender - then duplicate this task and create separate triggers for Defender Alerts, Recommendations and Regulatory Compliance.
- Create DevOps Tasks from Microsoft Sentinel
Here are some screenshots
Result
Future Work
At the moment, we expect the work item owner to update/resolve the alert in Microsoft Defender/Sentinel manually as they complete the work. This can be optimised further by creating a webhook upon work item update, which in turn calls a logic app that resolves the linked Sentinel or Defender alert.
The Logic App can be implemented using the following connector actions:
- Close Defender Alert as benign/false-positive/true-positive
Update: This is implemented, see here.
To see the code, check out the GitHub Repo.
Published on:
Learn moreRelated posts
Azure Database for PostgreSQL Flexible Server - Elastic Clusters, faster disks, and AI updates
Increase scalability, optimize performance, and integrate advanced AI features with Azure Database for PostgreSQL Flexible Server. Scale up wi...
Disconnected operations for Azure Local
Introducing the new Linux-based Azure Cosmos DB Emulator (Preview)
We are excited to announce the preview release of the new Linux-based Azure Cosmos DB Emulator! This latest version is built to provide faster...
Azure Cosmos DB Shines at Microsoft Ignite 2024!
Microsoft Ignite 2024 took over the Windy City this week, bringing with it new technological innovation and exciting product announcements apl...