SA1.11 Interactive Lab: Build Your First Playbook
Lab: Build and Deploy the Enrichment Playbook
In this lab, you build and deploy the SA-Playbook-Enrichment-First playbook from SA1.4, connect it to the automation rules from SA1.3, and validate the complete automation chain.
Part 1: Build the Automation Rules
Deploy the four automation rules from SA1.3:
- AiTM Triage Acceleration (order 100)
- Ransomware Severity Override (order 110)
- Playbook Trigger for High/Critical (order 200)
- CEO Travel FP Auto-Close (order 500)
Verify: create a test incident with title containing “AiTM.” Confirm severity changes to High and tag is applied.
Part 2: Build the Enrichment Playbook
Follow SA1.4 step by step:
- Create the Logic App (Consumption plan)
- Configure managed identity + permissions (Sentinel Responder + Log Analytics Reader)
- Build the 6-action workflow: trigger → extract → query → comment → Teams → tag
- Save and connect to automation rule (order 200)
Part 3: End-to-End Test
- Create a test incident matching the playbook trigger conditions
- Verify: Logic App run succeeds, enrichment comment appears, Teams message posted, tag updated
- Check run history: note execution time and any warnings
Part 4: Add Monitoring
- Enable diagnostic settings on the Logic App (send to Log Analytics workspace)
- Create the health monitoring analytics rule from SA1.9
- Verify: force a playbook failure (temporarily remove a permission) and confirm the monitoring alert fires
- Restore the permission and confirm the playbook recovers
Self-Assessment
- All 4 automation rules deployed and validated
- Enrichment playbook built and successfully tested
- Managed identity configured with least-privilege permissions
- Teams notification received in SOC channel
- Monitoring analytics rule active and tested
- Logic App run history shows successful execution under 30 seconds
© 2026 Ridgeline Cyber Defence™ Ltd. Content may not be reproduced or redistributed. Worked artifacts may be adapted for use within your organization.
You're reading the free modules of this course
The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts. Premium subscribers get access to all courses.