let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1)) };
TaniumThreatResponse_CL
| extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
| extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
| where Computer_IP_s !contains "N/A"
customDetails:
TaniumAlertId: Alert_Id_g
IntelId: Intel_Id_d
kind: Scheduled
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Tanium/Analytic Rules/TaniumThreatResponseAlerts.yaml
alertDetailsOverride:
alertDisplayNameFormat: '{{TaniumTHRLabel}}'
alertDescriptionFormat: 'Alert from Tanium Threat Response. GUID: {{Alert_Id_g}}; Computer Name: {{Computer_Name_s}}; IP: {{Computer_IP_s}}'
query: |
let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1)) };
TaniumThreatResponse_CL
| extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
| extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
| where Computer_IP_s !contains "N/A"
requiredDataConnectors: []
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
enabled: false
matchingMethod: AllEntities
lookbackDuration: PT5H
createIncident: true
tactics: []
name: Tanium Threat Response Alerts
relevantTechniques: []
severity: High
entityMappings:
- fieldMappings:
- identifier: Url
columnName: TaniumUrl
entityType: URL
- fieldMappings:
- identifier: Address
columnName: Computer_IP_s
entityType: IP
- fieldMappings:
- identifier: HostName
columnName: Computer_Name_s
entityType: Host
- fieldMappings:
- identifier: Name
columnName: TaniumTHRLabel
entityType: Malware
triggerOperator: gt
description: Alerts from Tanium Threat Response (THR) that can be acted upon by Microsoft Sentinel Playbook
queryFrequency: 5m
triggerThreshold: 0
queryPeriod: 6m
version: 1.2.0
eventGroupingSettings:
aggregationKind: AlertPerResult
id: dd9aa0ff-7ac1-4448-879c-e1a18d5890b4