Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Jamf Protect - Unified Logs

Back
Id9eb2f758-003b-4303-83c6-97aed4c03e41
RulenameJamf Protect - Unified Logs
DescriptionCreates an informational incident based on Jamf Protect Unified Log data in Microsoft Sentinel
SeverityInformational
Required data connectorsJamfProtect
KindNRT
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Jamf Protect/Analytic Rules/JamfProtectUnifiedLogs.yaml
Version1.0.3
Arm template9eb2f758-003b-4303-83c6-97aed4c03e41.json
Deploy To Azure
JamfProtectUnifiedLogs
| where isnotempty(EventSeverity)
| extend Host_IPs = tostring(parse_json(DvcIpAddr)[0])
suppressionEnabled: false
description: |
    'Creates an informational incident based on Jamf Protect Unified Log data in Microsoft Sentinel'
kind: NRT
tactics: 
requiredDataConnectors:
- connectorId: JamfProtect
  dataTypes:
  - jamfprotect_CL
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Jamf Protect/Analytic Rules/JamfProtectUnifiedLogs.yaml
severity: Informational
name: Jamf Protect - Unified Logs
suppressionDuration: PT5H
customDetails:
  Protect_Event_Type: EventType
  Unified_Log: EventDescription
  Tags: Match_tags
  Event_Process: TargetProcessName
alertDetailsOverride:
  alertDynamicProperties:
  - alertProperty: ProviderName
    value: EventVendor
  - alertProperty: ProductName
    value: EventProduct
  alertDescriptionFormat: '{{EventDescription}} has been captured in the unified logs'
  alertSeverityColumnName: EventSeverity
  alertDisplayNameFormat: '{{EventDescription}} on {{DvcHostname}}'
query: |
  JamfProtectUnifiedLogs
  | where isnotempty(EventSeverity)
  | extend Host_IPs = tostring(parse_json(DvcIpAddr)[0])  
relevantTechniques: 
id: 9eb2f758-003b-4303-83c6-97aed4c03e41
status: Available
version: 1.0.3
incidentConfiguration:
  groupingConfiguration:
    reopenClosedIncident: false
    lookbackDuration: PT5H
    enabled: false
    matchingMethod: AllEntities
  createIncident: true
eventGroupingSettings:
  aggregationKind: AlertPerResult
entityMappings:
- entityType: Host
  fieldMappings:
  - columnName: DvcHostname
    identifier: HostName
- entityType: IP
  fieldMappings:
  - columnName: Host_IPs
    identifier: Address