Map the Microsoft Azure Sentinel incident fields
- UpdatedJan 30, 2025
- 7 minutes to read
- Yokohama
- Security Incident Response integrations
Map the individual Microsoft Azure Sentinel incident fields to the fields on the SIR security incident so that you can create incidents with the mapped data.
Before you begin
Role required: sn_si.admin
Procedure
-
On the mapping page, in the Azure Sentinel Field Mapping section, select one of the Sample Ingestion Methods.
Table 1. Sample Ingestion Methods Field Description All default Incident and entity fields Use this ingestion method to view the static list of all the incidents and entity fields. This method contains only default field names without any values. You can use this information to map with the SIR fields.
Retrieve Recent Azure Sentinel incidents Use this ingestion method to import the most recent incidents and entities data. If the Azure Sentinel incident contains the entity data, then the entity data is retrieved and it is available for mapping in the Azure Sentinel Source Fields section. Sometimes the Azure Sentinel incident may not contain the entity data, and hence the entity fields are not available for mapping in such a scenario.
If the Azure Sentinel incident contains multiple alerts, the earliest alert that is part of the incident is shown in the mapping section. During ingestion as well the earliest security alert field values will be used.
You can ingest 5 sample incidents by default and a maximum of 20 sample incidents.
The sample incident field values populate when the profile ingests the sample incidents. You can map these incidents to the SIR Incident Target Fields. The incident fields and values appear as individual tabs.
Import Sample Data Click Import Sample Data to import sample incidents from Azure Sentinel. This button appears when you select the Retrieve Recent Azure Sentinel incidents ingestion method.
Retrieving sample incidents from Microsoft Azure Sentinel server may take a moment.
Map these retrieved incidents to the SIR Incident Target Fields. The incident fields and values appear as individual tabs.
-
To add fields to the default fields that are displayed on the security incident, do the following actions:
-
On the SIR Incident Target Fields section, click the
Map another field button.
It shows a list of SIR fields, from which you can select a field for a new field to be displayed. -
In the Security Incident column, expand the list that is displayed and then select a field.
Note: Multiple observables can be displayed on the same security incident. For example, the Observable field can be mapped multiple times with different values. Similarly, the Configuration Item and Work notes fields support multiple values. If you try to map two values to a field that can't support multiple values, you see an error message that this field does not support multiple values. Similarly, if a field on a security incident has a list from which you can choose multiple options, and you try to map an option to that field that is not displayed on the list, the field does not populate on the security incident.
- From the Azure Sentinel Source Fields section, drag and drop your field to map it to your new field.
-
When you select the checkbox that corresponds to a field, any new or updated changes made in Azure Sentinel will automatically update the respective SIR incident data with the new incident data.
Note: In the base system, the system property sn_sec_sentinel.incident_updates is by default set to True to receive the Microsoft Azure Sentinel updates related to new alerts that are linked to SIR.
- By default, the Affected Users, Configuration items, and Observables fields are checked. This means that whenever there are new observables or associated configuration items, or affected users that gets added to the incident then that information is automatically extracted and populated in the respective related lists in the Security Incident Response (SIR) during that polling interval.
- For any other fields, you must select the checkbox that corresponds to a field for any new or updated changes made in the Azure Sentinel incident record within Azure Sentinel. This will automatically update the respective SIR incident data with the new incident data.
Important: Due diligence is required to be done before selecting this functionality as overriding the existing data may result in unstable data for the analyst to work with and any other automation that is set even by the field values of security incident may also get affected. So, it is very important to do the due diligence before you select any override functionality.
-
On the SIR Incident Target Fields section, click the
-
To remove a field, use the
Remove item button next to the input expression field in the SIR Incident Target Fields section.
-
To map a field value from the Azure Sentinel Source Fields section to a field on the SIR Incident Target Fields section, use one of the following actions:
-
Drag the field name (for example, id) and drop it next to a field name in the SIR Incident Target Fields column.
You can match any value from the Azure Sentinel Source Fields section to a field on the SIR Incident Target Fields section. Fields are color-coded so that you do not overlook or duplicate incident fields in the mapping process. Light blue fields indicate that an incident field is not yet selected and mapped on the security incident. You may prefer to associate an incoming incident field with more than one field on a security incident. A gray field indicates that a field has been selected and mapped to a field on the security incident. This way, you can visualize which field values have been added to the security incident and if any remaining important incident information remains unmapped.
-
You can add a combination of text and field.
For example, Incident name is ${name}$. Here Incident name is can be manually entered while ${name}$ is mapped from the Azure Sentinel Source Fields section.
-
You can directly manually enter and map a source incident or entity field to a target field.
- To manually map a source incident field use the ${field name}$ format. For example, to map an incident field Severity, the format is${properties(severity)}$.
- To manually add a source entity field, use the ${entity name: entity field}$ format. For example, to map an entity field Description of entity Security Alert, the format is ${SecurityAlert: properties(description)}$.
This integration classifies certain observable sub-types. When you map an Azure Sentinel field with the SIR observable field, the ServiceNow AI Platform auto-classifies the observable. If you want to generically map the incoming Azure Sentinel observable to the observable type in SIR, then drag and drop the Azure Sentinel field in the Observable field. However, if you aware of the observable type for the incoming Azure Sentinel observable in SIR, then map specifically to the SIR Observable type field. Some examples of specific observable types in SIR include Observable(Domain name), Observable(Email address), Observable(IP address (V4)), and Observable(Host name).If your incoming Azure Sentinel fields contain any MITRE-ATT&CK information, then map it to the MITRE-ATT&CK Technique field. Ensure that the incoming Azure Sentinel field contains the MITRE-ATT&CK technique ID or technique name.
Sometimes, incident field values in Microsoft Azure Sentinel may not translate directly to the fields on the SIR security incident. For these values, you can use a script editor to format field values on the security incident during the mapping step. Use the script editor if you want to format values that are similar, but not identical.
-
Drag the field name (for example, id) and drop it next to a field name in the SIR Incident Target Fields column.
- To format a field translation for a new field from an Azure sentinel incident to match a field value on a Security Incident, click the Click here link in the SIR Incident Target Fields header.
-
To modify the fields which support field translation, click the
script format field translation icon.
The fields that support field translation are Category, Configuration Item, and Priority. For example, click onicon next to the Category. The Azure Sentinel Field Translation script editor opens.
-
Enter any changes to the script and click Update to save the changes and return to the Mapping page.
For example, for Category define the following in the script editor:This mapping ensures that a profile uses only configured categories.
"<Incoming Sentinel Incident Field Value>" : "<Category to assign to the Security Incident>".
-
Continue your mapping by adding or removing field values.
You can use the same field values in the Incident Generation Conditions builder to define additional criteria that an incoming incident must satisfy to create a security incident.
- To move to the Filtering and Aggregation section, click Continue.
What to do next