JamfProtectUnifiedLogs
| where isnotempty(EventSeverity)
| extend Host_IPs = tostring(parse_json(DvcIpAddr)[0])
name: Jamf Protect - Unified Logs
relevantTechniques:
id: 9eb2f758-003b-4303-83c6-97aed4c03e41
suppressionEnabled: false
requiredDataConnectors:
- dataTypes:
- jamfprotect_CL
connectorId: JamfProtect
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.0.3
severity: Informational
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Jamf Protect/Analytic Rules/JamfProtectUnifiedLogs.yaml
entityMappings:
- fieldMappings:
- identifier: HostName
columnName: DvcHostname
entityType: Host
- fieldMappings:
- identifier: Address
columnName: Host_IPs
entityType: IP
kind: NRT
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
matchingMethod: AllEntities
lookbackDuration: PT5H
enabled: false
createIncident: true
suppressionDuration: PT5H
alertDetailsOverride:
alertDisplayNameFormat: '{{EventDescription}} on {{DvcHostname}}'
alertDescriptionFormat: '{{EventDescription}} has been captured in the unified logs'
alertDynamicProperties:
- value: EventVendor
alertProperty: ProviderName
- value: EventProduct
alertProperty: ProductName
alertSeverityColumnName: EventSeverity
status: Available
query: |
JamfProtectUnifiedLogs
| where isnotempty(EventSeverity)
| extend Host_IPs = tostring(parse_json(DvcIpAddr)[0])
tactics:
customDetails:
Protect_Event_Type: EventType
Tags: Match_tags
Unified_Log: EventDescription
Event_Process: TargetProcessName
description: |
'Creates an informational incident based on Jamf Protect Unified Log data in Microsoft Sentinel'