Sample Microsoft Defender and Sentinel Integration
In this sample integration, the customer connected their Microsoft system with the Arctic Wolf ticketing system.
This customer uses Microsoft Defender and Microsoft Sentinel. Their automation creates Microsoft Defender and Microsoft Sentinel alerts automatically. When the Microsoft incident closes, the Arctic Wolf ticket automatically closes. They tested this configuration in the Microsoft Sentinel workspace.
Tools used
- Microsoft Defender — Security suite containing many tools
- Microsoft Sentinel — Security Information and Event Management (SIEM) tool
- Azure Logic Apps — Automation tool
Automation workflow for creating alerts in a Microsoft environment
- The REST API Poller runs on a scheduled basis to poll the Ticket API.
You can customize the frequency in the package before deployment using the
queryWindowInMinvalue. Queries are automatically windowed based on query time using theupdatedAfterfield. - Data Collection Rules control the incoming and outgoing data stream.
These rules extend the
updatedAtvalue in Arctic Wolf tickets to theTimeGeneratedfield in Microsoft alerts. These rules can also filter incoming records as needed. - Data is written to a custom table of Arctic Wolf tickets.
- The Microsoft Sentinel analytic rule queries the custom table of Arctic Wolf tickets and generates the Microsoft Defender or Microsoft Sentinel alert.
Microsoft Sentinel analytic rule
- Prefix all alerts with
AWfor source transparency. - Filter out events with a Closed or Solved status.
- Create a field called
URLwhich maps to the Alert DetailsAlertLinkparameter.This creates a clickable link directly to the ticket in the Arctic Wolf Unified Portal, which is accessible through the Tickets and Alerts page. For more information, see Tickets and Alerts. You must update the alert query that is provided with your Arctic Wolf Organization ID. Search for
extend URL = strcat. - Map the Ticket API status field values to the Unified Portal values. For more information, see Ticket status mapping.
- Extract the Arctic Wolf severity to a custom field, and then map it to the
Alert Details Severityparameter. - Add a custom field that indicates the detection source is Arctic Wolf.
- Query the
SecurityAlerttable based on the custom detection source and source ID fields, and then filter the creation of new alerts.Arctic Wolf tickets are sometimes created and updated faster than Microsoft Sentinel can write the data, which creates a race condition that can result in duplicate alerts. This rule helps reduce the odds of this occurring. The customer favors reducing delays over potential duplicate alerts and plans to add additional rules to further reduce instances of duplicate alerts.
For a sample analytic rule, see sample_sentinel_analytic_rule.txt.zip.
Deploy the alert creation automation
Automation for closing Arctic Wolf tickets
The customer also created an automation that closes the Arctic Wolf ticket when the Microsoft Defender or Microsoft Sentinel incident is closed. Microsoft Sentinel sometimes attempts to close the Arctic Wolf alert twice, but this doesn't have an impact on the result.