JupiterOne August 2023 Release
We have officially migrated our documentation to our new site here at docs.jupiterone.io! π₯³
New Features and Improvementsβ
Queriesβ
Natural Language Queriesβ
JupiterOne now supports natural language to generate J1QL (JupiterOne query language). You can now type questions like "What new IAM users have been created in the last week?" and "What s3 buckets do I have?" and J1 will convert these questions into J1QL syntax. This feature is currently only available in the Query Anywhere Search Box
Improvementsβ
The csv
exporting experience has been upgraded to allow for larger downloads (1 million entity limit) and an email link to access your downloaded file.
Properties Panelβ
Your Properties Panel has been refreshed with a whole new look and new features to help you find what you are looking for faster in JupiterOne.
Insightsβ
- Added two new Insights dashboards corresponding to our new Alert Rule Packs for
Device Management
andToxic Combinations
.- The
Device Management
dashboard can be found under Assets and requires at least one integration that ingests devices - The
Toxic Combinations
dashboard can be found under Attack Surface category and requires integration into J1 of your Endpoint Detection & Response tools, Mobile Device Management, Cloud Service Provider, and Identity Provider systems
- The
Alerts and Rulesβ
Released two new Alert Rule Packs: Device Management and Toxic Combinations, both of which are tagged in Alerts as
DeviceManagement
andToxicCombinations
respectively.You can now preview your Alert Rule Action using the "preview" toggle. This allows you to see the json for the first 10 query results which power your alert.
Integrationsβ
New Integrationsβ
Linear (beta): Added integration for Linear Read more β
FleetDM (beta): Added integration for FleetDM Read more β
Updatesβ
AWS: In the US environment of JupiterOne (apps.us.jupiterone.io), the
Trust Relationship
on the AWS IAM Role used by the AWS Integration has been changed to trust 5 additional JupiterOne-owned AWS accounts. In addition to the original JupiterOne AWS Account ID (612791702201
), the role should be updated to trust the following 5 AWS Account IDs:592277296164
543056157939
688694159727
248422699954
703115985002
The public GitHub repository for CloudFormation & Terraform templates has been updated accordingly. This is change helps to reduce AWS rate limits and is highly encouraged, but not requiredβall AWS integrations will continue to function as expected without these changes. Please reach out to your account representatives with additional questions.
- Azure: Added the ability to ingest MFA properties for the
azure_user
entity. New properties include:mfaEnabled
(boolean)mfaType
(string, the user preferred method)mfaMethods
(array of strings, includes all MFA methods the user has configured)
Your Azure instance API token will need to have the AuditLog.Read.All
permission in order to ingest the MFA properties.
CrowdStrike: Our CrowdStrike integration now ingests information on applications with vulnerabilities with the following new entity:
Resource Entity _type
Entity _class
Application crowdstrike_application
Application
With the addition of this entity, we have also updated the relationships:
Source Entity _type | Relationship _class | Target Entity _type |
---|---|---|
crowdstrike_account | HAS | crowdstrike_endpoint_protection |
crowdstrike_account | HAS | crowdstrike_sensor |
crowdstrike_application | HAS | crowdstrike_vulnerability |
crowdstrike_prevention_policy | ENFORCES | crowdstrike_endpoint_protection |
crowdstrike_sensor | ASSIGNED | crowdstrike_prevention_policy |
crowdstrike_sensor | HAS | crowdstrike_application |
crowdstrike_sensor | HAS | crowdstrike_zero_trust_assessment |
crowdstrike_vulnerability | EXPLOITS | crowdstrike_sensor |