-
Book Overview & Buying
-
Table Of Contents
Security Orchestration, Automation, and Response for Security Analysts
By :
In the previous three chapters, we focused on hands-on examples that hopefully helped you understand how to utilize automation.
We started with examples of how to enrich incidents on the incident creation for faster triage in Chapter 6 and continued with examples of how to utilize automation to manage incidents in Chapter 7. In the previous chapter, we focused on how to utilize automation to respond to incidents. We utilized the two most common response automation techniques – block the user and isolate a device.
This chapter will focus on tips and tricks for mastering automation when working with Microsoft Sentinel playbooks.
In this final chapter of the book, we will go through the following topics:
Let’s get into it!