Jamf Pro is a popular mobile device management solution that provides IT professionals with unified ecosystem management for Apple devices. Panther can collect, normalize, and monitor Jamf Pro logs to help you identify suspicious activity in real-time. Your normalized data is then retained to enable future security investigations in a serverless data lake powered by Snowflake.
Jamf Pro access logs contain information about Jamf Pro login events. This includes usernames, how your service responded to a request, timestamps, and more. Common security use cases for Jamf Pro logs include:
Panther’s integration for Jamf Pro is simple and quick to configure, allowing you to onboard your logs in just a few minutes. Simply select Jamf Pro from the list of pre-defined log sources, set up data transport via an AWS S3 bucket, and configure Jamf Pro to push logs to your S3 bucket.
For more details on onboarding Jamf Pro logs or for supported log schema, you can view our Jamf Pro documentation here.
As Panther ingests your Jamf Pro audit logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows your security team to build detections, identify anomalies, and conduct investigations on Jamf Pro logs in the context of days, weeks, or months of data.
Panther applies normalization fields to all log records, which standardizes names for attributes and allows you to correlate data across all log sources - not just Jamf Pro. You can use Panther’s various search tools - such as Data Explorer, Indicator Search, and Query Builder - to investigate your normalized logs for suspicious activity or vulnerabilities. For more on querying and searching normalized log data in Panther, check out our documentation on Investigations & Search.
With Panther, your team won’t be confined to restrictive detection rules or proprietary languages as seen in many SIEMs. Panther is built around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your team.
Panther fire alerts when your detection rules or policies are triggered, and integrates with a variety of alert destinations to allow for easy access and management of alerts for your security team. Alerts can also be sent to alert context or SOAR platforms for more remediation options.
Alerts are categorized under five severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically designate severity based on specific log event attributes.
If you have any questions about ingesting or monitoring Jamf Pro logs in Panther, we’re here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.
You can view our detailed documentation on configuring and monitoring Jamf Pro logs here, or customers can join the Panther Community to share best practices or custom detections for monitoring Jamf Pro.
With Panther, you don’t have to waste precious time and effort on operational overhead, accept limitations with SIEM detections, or pay skyrocketing costs to keep up with the growth of your data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built a scalable, cloud-native platform to solve them.
Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today’s security teams. For a powerful, practical, and scalable SIEM solution for Jamf Pro, request a demo today.