let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1)) };
TaniumThreatResponse_CL
| extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
| extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
| where Computer_IP_s !contains "N/A"
name: Tanium Threat Response Alerts
incidentConfiguration:
groupingConfiguration:
enabled: false
reopenClosedIncident: false
lookbackDuration: PT5H
matchingMethod: AllEntities
createIncident: true
query: |
let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1)) };
TaniumThreatResponse_CL
| extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
| extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
| where Computer_IP_s !contains "N/A"
entityMappings:
- entityType: URL
fieldMappings:
- columnName: TaniumUrl
identifier: Url
- entityType: IP
fieldMappings:
- columnName: Computer_IP_s
identifier: Address
- entityType: Host
fieldMappings:
- columnName: Computer_Name_s
identifier: HostName
- entityType: Malware
fieldMappings:
- columnName: TaniumTHRLabel
identifier: Name
queryPeriod: 6m
tactics: []
triggerOperator: gt
kind: Scheduled
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Tanium/Analytic Rules/TaniumThreatResponseAlerts.yaml
eventGroupingSettings:
aggregationKind: AlertPerResult
alertDetailsOverride:
alertDescriptionFormat: 'Alert from Tanium Threat Response. GUID: {{Alert_Id_g}}; Computer Name: {{Computer_Name_s}}; IP: {{Computer_IP_s}}'
alertDisplayNameFormat: '{{TaniumTHRLabel}}'
relevantTechniques: []
id: dd9aa0ff-7ac1-4448-879c-e1a18d5890b4
customDetails:
TaniumAlertId: Alert_Id_g
IntelId: Intel_Id_d
severity: High
requiredDataConnectors: []
version: 1.2.0
description: Alerts from Tanium Threat Response (THR) that can be acted upon by Microsoft Sentinel Playbook
queryFrequency: 5m