Tanium Threat Response Alerts

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Alerts from Tanium Threat Response (THR) that can be acted upon by Microsoft Sentinel Playbook

Attribute Value
Type Analytic Rule
Solution Tanium
ID dd9aa0ff-7ac1-4448-879c-e1a18d5890b4
Severity High
Kind Scheduled
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
TaniumThreatResponse_CL 🔶 ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Tanium