Skip to content

Conversation

@txhaflaire
Copy link
Contributor

Type of change:

  • enhancement

Proposed commit message

  • The Jamf Protect Telemetry data stream got enhancements in it's process audit tokens
    • The audit token now contains a effective username (e_username)
    • The audit token now contains a executable path for the process (exec_path)

Check Jamf's release notes here

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.

How to test this PR locally

elastic-package test system

2025/08/26 10:33:53  INFO Write container logs to file: /Users/thijs.xhaflaire/Documents/GitHub/Elastic/integrations/build/container-logs/elastic-agent-1756197233255878000.log
--- Test results for package: jamf_protect - START ---
╭──────────────┬────────────────────┬───────────┬───────────────┬────────┬───────────────╮
│ PACKAGE      │ DATA STREAM        │ TEST TYPE │ TEST NAME     │ RESULT │  TIME ELAPSED │
├──────────────┼────────────────────┼───────────┼───────────────┼────────┼───────────────┤
│ jamf_protect │ alerts             │ system    │ http-endpoint │ PASS   │  37.43365875s │
│ jamf_protect │ telemetry          │ system    │ http-endpoint │ PASS   │ 41.959942917s │
│ jamf_protect │ telemetry_legacy   │ system    │ http-endpoint │ PASS   │ 43.874400084s │
│ jamf_protect │ web_threat_events  │ system    │ http-endpoint │ PASS   │ 44.194318834s │
│ jamf_protect │ web_traffic_events │ system    │ http-endpoint │ PASS   │ 42.502668709s │
╰──────────────┴────────────────────┴───────────┴───────────────┴────────┴───────────────╯
--- Test results for package: jamf_protect - END   ---
Done

@txhaflaire txhaflaire requested a review from a team as a code owner August 26, 2025 08:40
@txhaflaire txhaflaire changed the title first commit for 3.1.1 [Jamf Protect 3.1.1] Enhancements to process mapping Aug 26, 2025
@andrewkroh andrewkroh added documentation Improvements or additions to documentation. Applied to PRs that modify *.md files. Integration:jamf_protect Jamf Protect (Partner supported) Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] labels Aug 26, 2025
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

@kcreddy
Copy link
Contributor

kcreddy commented Aug 28, 2025

/test

@elastic-vault-github-plugin-prod

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

txhaflaire and others added 2 commits August 28, 2025 13:41
Co-authored-by: Krishna Chaitanya Reddy Burri <krish.reddy91@gmail.com>
Co-authored-by: Krishna Chaitanya Reddy Burri <krish.reddy91@gmail.com>
@txhaflaire txhaflaire changed the title [Jamf Protect 3.1.1] Enhancements to process mapping [Jamf Protect 3.2.0] Enhancements to process mapping Aug 28, 2025
@txhaflaire
Copy link
Contributor Author

@kcreddy Thanks for the review - i've implemented the minor changes and those are ready to be reviewed.

@kcreddy
Copy link
Contributor

kcreddy commented Aug 28, 2025

/test

Copy link
Contributor

@kcreddy kcreddy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@txhaflaire
Copy link
Contributor Author

@kcreddy i saw in SQ that the readme file was out of date - fixed that.

@kcreddy
Copy link
Contributor

kcreddy commented Aug 28, 2025

/test

@elasticmachine
Copy link

💚 Build Succeeded

History

@elastic-sonarqube
Copy link

@kcreddy kcreddy merged commit 968d488 into elastic:main Aug 28, 2025
9 checks passed
@elastic-vault-github-plugin-prod

Package jamf_protect - 3.2.0 containing this change is available at https://epr.elastic.co/package/jamf_protect/3.2.0/

@andrewkroh andrewkroh added the enhancement New feature or request label Sep 3, 2025
tehbooom pushed a commit to tehbooom/integrations that referenced this pull request Nov 19, 2025
The Jamf Protect Telemetry data stream got enhancements in it's process audit tokens.
  - The audit token now contains a effective username (e_username)
  - The audit token now contains a executable path for the process (exec_path)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

documentation Improvements or additions to documentation. Applied to PRs that modify *.md files. enhancement New feature or request Integration:jamf_protect Jamf Protect (Partner supported) Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations]

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants