icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Jamf Protect Add-on
SHA256 checksum (jamf-protect-add-on_101.tgz) 71da3cd25a7696b7633a739f48cda7b4a36ca381f59d36062e3bc71844c2f5cc SHA256 checksum (jamf-protect-add-on_100.tgz) ca72623fcb4a459756a6ea3b66c8efa336c535768d1a56c31f5641f95919fbc3 SHA256 checksum (jamf-protect-add-on_090.tgz) 74bd330104c71010003799d88830fd2811bd48959bc282367f531d8af055c39f
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Jamf Protect Add-on

Splunk Cloud
Overview
Details
The Jamf Protect Add-on for Splunk empowers security teams with in-depth visibility into Mac security events, providing integrated visualization for enriched investigation into macOS threat alerting with tuned endpoint telemetry data streams. This add-on supports data streams from the macOS Security & Jamf Security Cloud portals, resulting in a single collection point for all endpoint and network based events occurring across your Apple device fleet.

Jamf Protect Documentation

The Jamf Protect Add-on for Splunk supports the following:

  • Jamf Protect (Alerts and Telemetry)
  • Jamf Protect Offline Mode (Telemetry Only)
  • Jamf Security Cloud
    • Threat Events Stream
    • Network Traffic Stream

Important
The base event type must be updated before enabling this Add On.

Data Inputs

See Splunk Integration with Jamf Protect to learn more how to configure Jamf Protect to send events to Splunk.

Due to differences in the json schema of Jamf Protect Alerts and Jamf Protect Telemetry, two HTTP Event Collectors (HECs) must be created. The Jamf Protect Add-on expects initial source types of:

  • Jamf Protect Alerts & Unified Logs: jamf:protect:alerts
  • Jamf Protect Telemetry: jamf:protect:telemetry
  • Jamf Security Cloud: jamf:protect:web

Existing Data

For compatibility with existing Splunk objects such as source types, field names, and similar you may need to make a search time rename for the Jamf Splunk object. To do this, follow these steps:

Splunk Cloud

Jamf Protect Alerts

  • Click SettingsSource types
  • Find your current conflicting source type
    • Click Edit
    • Click Advanced
    • Click New setting
      • Name: rename
      • Value: jamf:protect:alerts

Jamf Protect Telemetry

  • Click SettingsSource types
  • Find your current conflicting source type
    • Click Edit
    • Click Advanced
    • Click New setting
      • Name: rename
      • Value: jamf:protect:telemetry

Jamf Security Cloud

  • Click SettingsSource types
  • Find your current conflicting source type
    • Click Edit
    • Click Advanced
    • Click New setting
      • Name: rename
      • Value: jamf:protect:web

Splunk Enterprise

Copy the top line from the text chunk in [ ] you want to modify from default/props.conf to local/props.conf and set the appropriate original source type.

Example:

###
[EXISTING-SOURCETYPE]
rename = jamf:protect:alerts

This will not change your data, it will only allow you to use the search time extractions from this app with your existing source type. Please make sure that your new data is using the source types of jamf:protect:alerts or jamf:protect:telemetry, depending on your Jamf Protect deployment, for best compatibility with the add-on.

Event Type Modification

For jamf_protect and jamf_protect_web, the base event types must be updated, so the correct index value is set. This is not necessary for the Telemetry event types. Follow these steps:

Splunk Cloud

  • Click SettingsEvent types
  • App → Jamf Protect (TA-JamfProtect)
    • Click jamf_protect
      • Search String: index="CORRECTINDEX" sourcetype="jamf:protect:alerts"
      • Click Save
    • Click jamf_protect_web
      • Search String: index="CORRECTINDEX" sourcetype="jamf:protect:web"
      • Click Save

Splunk Enterprise

Copy the setting below from default/eventtypes.conf to local/eventtypes.conf. Replace index=* with the index your jamf:protect data is in.

Example:

[jamf_protect]
search = index=CORRECTINDEX sourcetype="jamf:protect:alerts"

[jamf_protect_web]
search = index=CORRECTINDEX sourcetype="jamf:protect:web"

Important
The indexes must also be updated within the Telemetry Lookup Workflow Action before it can be used.

Release Notes

Version 1.0.1
Nov. 10, 2023
  • Bug Fixes
Version 1.0.0
Aug. 30, 2023
  • Added Jamf Security Cloud data streams
    • Threat Events Stream
    • Network Traffic Stream
  • Added Intrusion Detection mapping for Jamf Protect Alerts
  • Bug Fixes
Version 0.9.0
May 24, 2023

0.9.0 - Initial Beta Release


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.