let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1)) };
TaniumThreatResponse_CL
| extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
| extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
| where Computer_IP_s !contains "N/A"
kind: Scheduled
tactics: []
triggerThreshold: 0
triggerOperator: gt
version: 1.2.0
name: Tanium Threat Response Alerts
alertDetailsOverride:
alertDisplayNameFormat: '{{TaniumTHRLabel}}'
alertDescriptionFormat: 'Alert from Tanium Threat Response. GUID: {{Alert_Id_g}}; Computer Name: {{Computer_Name_s}}; IP: {{Computer_IP_s}}'
incidentConfiguration:
createIncident: true
groupingConfiguration:
matchingMethod: AllEntities
enabled: false
lookbackDuration: PT5H
reopenClosedIncident: false
queryFrequency: 5m
id: dd9aa0ff-7ac1-4448-879c-e1a18d5890b4
requiredDataConnectors: []
eventGroupingSettings:
aggregationKind: AlertPerResult
relevantTechniques: []
description: Alerts from Tanium Threat Response (THR) that can be acted upon by Microsoft Sentinel Playbook
customDetails:
TaniumAlertId: Alert_Id_g
IntelId: Intel_Id_d
entityMappings:
- entityType: URL
fieldMappings:
- columnName: TaniumUrl
identifier: Url
- entityType: IP
fieldMappings:
- columnName: Computer_IP_s
identifier: Address
- entityType: Host
fieldMappings:
- columnName: Computer_Name_s
identifier: HostName
- entityType: Malware
fieldMappings:
- columnName: TaniumTHRLabel
identifier: Name
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Tanium/Analytic Rules/TaniumThreatResponseAlerts.yaml
queryPeriod: 6m
severity: High
query: |
let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1)) };
TaniumThreatResponse_CL
| extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
| extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
| where Computer_IP_s !contains "N/A"