Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Tanium Threat Response Alerts

Back
Iddd9aa0ff-7ac1-4448-879c-e1a18d5890b4
RulenameTanium Threat Response Alerts
DescriptionAlerts from Tanium Threat Response (THR) that can be acted upon by Microsoft Sentinel Playbook
SeverityHigh
KindScheduled
Query frequency5m
Query period6m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Tanium/Analytic Rules/TaniumThreatResponseAlerts.yaml
Version1.2.0
Arm templatedd9aa0ff-7ac1-4448-879c-e1a18d5890b4.json
Deploy To Azure
let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1))  };
TaniumThreatResponse_CL
| extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
| extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
| where Computer_IP_s !contains "N/A"
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Tanium/Analytic Rules/TaniumThreatResponseAlerts.yaml
queryPeriod: 6m
description: Alerts from Tanium Threat Response (THR) that can be acted upon by Microsoft Sentinel Playbook
triggerThreshold: 0
name: Tanium Threat Response Alerts
triggerOperator: gt
entityMappings:
- entityType: URL
  fieldMappings:
  - identifier: Url
    columnName: TaniumUrl
- entityType: IP
  fieldMappings:
  - identifier: Address
    columnName: Computer_IP_s
- entityType: Host
  fieldMappings:
  - identifier: HostName
    columnName: Computer_Name_s
- entityType: Malware
  fieldMappings:
  - identifier: Name
    columnName: TaniumTHRLabel
kind: Scheduled
requiredDataConnectors: []
customDetails:
  IntelId: Intel_Id_d
  TaniumAlertId: Alert_Id_g
eventGroupingSettings:
  aggregationKind: AlertPerResult
queryFrequency: 5m
tactics: []
id: dd9aa0ff-7ac1-4448-879c-e1a18d5890b4
incidentConfiguration:
  createIncident: true
  groupingConfiguration:
    matchingMethod: AllEntities
    enabled: false
    reopenClosedIncident: false
    lookbackDuration: PT5H
version: 1.2.0
query: |
  let cap = (s:string) { strcat(toupper(substring(s,0,1)), substring(s,1))  };
  TaniumThreatResponse_CL
  | extend TaniumUrl = pack("computer_name", Computer_Name_s, "alert_guid", Alert_Id_g, "ip_address", Computer_IP_s, "platform", Match_Details_finding_system_info_platform_s)
  | extend TaniumTHRLabel = strcat(cap(Intel_Type_s)," - ", cap(Intel_Name_s), " - ", cap(Match_Details_match_type_s))
  | where Computer_IP_s !contains "N/A"  
alertDetailsOverride:
  alertDescriptionFormat: 'Alert from Tanium Threat Response. GUID: {{Alert_Id_g}}; Computer Name: {{Computer_Name_s}}; IP: {{Computer_IP_s}}'
  alertDisplayNameFormat: '{{TaniumTHRLabel}}'
severity: High
relevantTechniques: []