Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
Alerts from Tanium Threat Response (THR) that can be acted upon by Microsoft Sentinel Playbook
| Attribute | Value |
|---|---|
| Type | Analytic Rule |
| Solution | Tanium |
| ID | dd9aa0ff-7ac1-4448-879c-e1a18d5890b4 |
| Severity | High |
| Kind | Scheduled |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
TaniumThreatResponse_CL 🔶 |
? | ✓ | ? |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊