This demo shows how to automate a Microsoft Sentinel workflow using Power Automate—so routine security responses can happen consistently without an analyst manually clicking the same buttons forever. It starts in Microsoft Sentinel and opens Automation, then creates a new automation rule. From there, it walks through the rule setup: name and conditions (what kinds of incidents/alerts should trigger), and the action to run a playbook. The playbook is built in Power Automate, where you choose the Sentinel connector, pass incident details into the flow, and add the steps you want—like notifying a channel, creating a ticket, enriching the incident, or updating status—then save and test. The result is a repeatable response pattern that fires automatically whenever the rule conditions are met.
We produced this as a practical, follow-along automation demo: preproduction locked the “why this matters” story (reduce toil, standardize response) and the exact click path, production captured clean screens with professional voiceover and pacing, and post trimmed it to the essential steps so viewers can replicate it quickly. Final delivery includes closed captions, audio description, and thumbnails.



