let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1)) };
TaniumThreatResponse_CL
| extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
| extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
| where Computer_IP_s !contains "N/A"
name: Tanium Threat Response Alerts
relevantTechniques: []
id: dd9aa0ff-7ac1-4448-879c-e1a18d5890b4
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Tanium/Analytic Rules/TaniumThreatResponseAlerts.yaml
requiredDataConnectors: []
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 1.2.0
severity: High
triggerThreshold: 0
queryPeriod: 6m
entityMappings:
- fieldMappings:
- identifier: Url
columnName: TaniumUrl
entityType: URL
- fieldMappings:
- identifier: Address
columnName: Computer_IP_s
entityType: IP
- fieldMappings:
- identifier: HostName
columnName: Computer_Name_s
entityType: Host
- fieldMappings:
- identifier: Name
columnName: TaniumTHRLabel
entityType: Malware
kind: Scheduled
incidentConfiguration:
groupingConfiguration:
reopenClosedIncident: false
matchingMethod: AllEntities
lookbackDuration: PT5H
enabled: false
createIncident: true
queryFrequency: 5m
alertDetailsOverride:
alertDisplayNameFormat: '{{TaniumTHRLabel}}'
alertDescriptionFormat: 'Alert from Tanium Threat Response. GUID: {{Alert_Id_g}}; Computer Name: {{Computer_Name_s}}; IP: {{Computer_IP_s}}'
query: |
let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1)) };
TaniumThreatResponse_CL
| extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
| extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
| where Computer_IP_s !contains "N/A"
tactics: []
customDetails:
IntelId: Intel_Id_d
TaniumAlertId: Alert_Id_g
description: Alerts from Tanium Threat Response (THR) that can be acted upon by Microsoft Sentinel Playbook
triggerOperator: gt