Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Jamf Protect - Unified Logs

Back
Id9eb2f758-003b-4303-83c6-97aed4c03e41
RulenameJamf Protect - Unified Logs
DescriptionCreates an informational incident based on Jamf Protect Unified Log data in Microsoft Sentinel
SeverityInformational
Required data connectorsJamfProtect
KindNRT
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Jamf Protect/Analytic Rules/JamfProtectUnifiedLogs.yaml
Version1.0.2
Arm template9eb2f758-003b-4303-83c6-97aed4c03e41.json
Deploy To Azure
JamfProtect
| where EventType == "UnifiedLog"
| where isnotempty(EventSeverity)
| extend Host_IPs = tostring(parse_json(DvcIpAddr)[0])
relevantTechniques: 
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    lookbackDuration: PT5H
    enabled: false
    reopenClosedIncident: false
    matchingMethod: AllEntities
name: Jamf Protect - Unified Logs
requiredDataConnectors:
- dataTypes:
  - jamfprotect_CL
  connectorId: JamfProtect
entityMappings:
- fieldMappings:
  - identifier: HostName
    columnName: DvcHostname
  entityType: Host
- fieldMappings:
  - identifier: Address
    columnName: Host_IPs
  entityType: IP
query: |
  JamfProtect
  | where EventType == "UnifiedLog"
  | where isnotempty(EventSeverity)
  | extend Host_IPs = tostring(parse_json(DvcIpAddr)[0])  
id: 9eb2f758-003b-4303-83c6-97aed4c03e41
tactics: 
version: 1.0.2
customDetails:
  Unified_Log: EventDescription
  Event_Process: TargetProcessName
  Tags: Match_tags
  Protect_Event_Type: EventType
alertDetailsOverride:
  alertDynamicProperties:
  - alertProperty: ProviderName
    value: EventVendor
  - alertProperty: ProductName
    value: EventProduct
  alertDisplayNameFormat: '{{EventDescription}} on {{DvcHostname}}'
  alertSeverityColumnName: EventSeverity
  alertDescriptionFormat: '{{EventDescription}} has been captured in the unified logs'
kind: NRT
eventGroupingSettings:
  aggregationKind: AlertPerResult
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Jamf Protect/Analytic Rules/JamfProtectUnifiedLogs.yaml
suppressionDuration: PT5H
severity: Informational
status: Available
suppressionEnabled: false
description: |
    'Creates an informational incident based on Jamf Protect Unified Log data in Microsoft Sentinel'
{
  "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workspace": {
      "type": "String"
    }
  },
  "resources": [
    {
      "apiVersion": "2024-01-01-preview",
      "id": "[concat(resourceId('Microsoft.OperationalInsights/workspaces/providers', parameters('workspace'), 'Microsoft.SecurityInsights'),'/alertRules/9eb2f758-003b-4303-83c6-97aed4c03e41')]",
      "kind": "NRT",
      "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/9eb2f758-003b-4303-83c6-97aed4c03e41')]",
      "properties": {
        "alertDetailsOverride": {
          "alertDescriptionFormat": "{{EventDescription}} has been captured in the unified logs",
          "alertDisplayNameFormat": "{{EventDescription}} on {{DvcHostname}}",
          "alertDynamicProperties": [
            {
              "alertProperty": "ProviderName",
              "value": "EventVendor"
            },
            {
              "alertProperty": "ProductName",
              "value": "EventProduct"
            }
          ],
          "alertSeverityColumnName": "EventSeverity"
        },
        "alertRuleTemplateName": "9eb2f758-003b-4303-83c6-97aed4c03e41",
        "customDetails": {
          "Event_Process": "TargetProcessName",
          "Protect_Event_Type": "EventType",
          "Tags": "Match_tags",
          "Unified_Log": "EventDescription"
        },
        "description": "'Creates an informational incident based on Jamf Protect Unified Log data in Microsoft Sentinel'\n",
        "displayName": "Jamf Protect - Unified Logs",
        "enabled": true,
        "entityMappings": [
          {
            "entityType": "Host",
            "fieldMappings": [
              {
                "columnName": "DvcHostname",
                "identifier": "HostName"
              }
            ]
          },
          {
            "entityType": "IP",
            "fieldMappings": [
              {
                "columnName": "Host_IPs",
                "identifier": "Address"
              }
            ]
          }
        ],
        "eventGroupingSettings": {
          "aggregationKind": "AlertPerResult"
        },
        "incidentConfiguration": {
          "createIncident": true,
          "groupingConfiguration": {
            "enabled": false,
            "lookbackDuration": "PT5H",
            "matchingMethod": "AllEntities",
            "reopenClosedIncident": false
          }
        },
        "OriginalUri": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Jamf Protect/Analytic Rules/JamfProtectUnifiedLogs.yaml",
        "query": "JamfProtect\n| where EventType == \"UnifiedLog\"\n| where isnotempty(EventSeverity)\n| extend Host_IPs = tostring(parse_json(DvcIpAddr)[0])\n",
        "severity": "Informational",
        "status": "Available",
        "subTechniques": [],
        "suppressionDuration": "PT5H",
        "suppressionEnabled": false,
        "tactics": null,
        "techniques": null,
        "templateVersion": "1.0.2"
      },
      "type": "Microsoft.OperationalInsights/workspaces/providers/alertRules"
    }
  ]
}