Collect JumpCloud Directory Insights logs

Supported in:

This document explains how to ingest JumpCloud Directory Insights logs into Google Security Operations using Google Cloud Storage V2.

JumpCloud is a cloud directory platform that provides identity management, SSO, and device management. Directory Insights delivers audit and activity logs covering user authentication, admin actions, and system events. The parser maps log fields to the Unified Data Model (UDM), handling event types such as user logins, resource changes, and security actions.

Before you begin

Make sure you have the following prerequisites:

  • A Google SecOps instance
  • A GCP project with Cloud Storage API enabled
  • Permissions to create and manage GCS buckets and IAM policies
  • A JumpCloud account with an Adminor Managerrole and a valid API key

Create Google Cloud Storage bucket

  1. Go to the Google Cloud Console .
  2. Select your project or create a new one.
  3. In the navigation menu, go to Cloud Storage > Buckets.
  4. Click Create bucket.
  5. Provide the following configuration details:

    Setting Value
    Name your bucket Enter a globally unique name (for example, jumpcloud-directory-insights-logs )
    Location type Choose based on your needs (Region, Dual-region, Multi-region)
    Location Select the location (for example, us-central1 )
    Storage class Standard (recommended for frequently accessed logs)
    Access control Uniform (recommended)
    Protection tools Optional: Enable object versioning or retention policy
  6. Click Create.

Export JumpCloud Directory Insights logs to Google Cloud Storage

JumpCloud Directory Insights exposes events through the Directory Insights API . Use a scheduled script or Cloud Run function to pull events and write them to GCS.

  1. Generate a JumpCloud API key:

    1. Sign in to the JumpCloud Admin Portal.
    2. Go to your profile icon and select My API Key.
    3. Copy the API key.
  2. Create a Cloud Run function that queries the JumpCloud Directory Insights API, retrieves events, and writes them to GCS.

  3. Trigger the function on a schedule using Cloud Scheduler and Pub/Sub.

  • Ensure that the exported files retain their original JSON format.
  • Each file should contain one or more event records.
  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Feeds.
  3. Click Add New Feed.
  4. Click Configure a single feed.
  5. Select Google Cloud Storage V2as the Source type.
  6. Select JumpCloud Directory Insightsas the Log type.
  7. Click Get Service Account. A unique service account email will be displayed, for example:

     chronicle-12345678@chronicle-gcp-prod.iam.gserviceaccount.com 
    
  8. Copy this email address. You will use it in the next step.

  1. Go to Cloud Storage > Buckets.
  2. Click your bucket name.
  3. Go to the Permissionstab.
  4. Click Grant access.
  5. Provide the following configuration details:
    • Add principals: Paste the Google SecOps service account email.
    • Assign roles: Select Storage Object Viewer.
  6. Click Save.

Configure a feed in Google SecOps to ingest JumpCloud Directory Insights logs

  1. Go to SIEM Settings > Feeds.
  2. Click Add New Feed.
  3. Click Configure a single feed.
  4. In the Feed namefield, enter a name for the feed (for example, JumpCloud Directory Insights Logs ).
  5. Select Google Cloud Storage V2as the Source type.
  6. Select JumpCloud Directory Insightsas the Log type.
  7. Click Next.
  8. Specify values for the following input parameters:

    Field Value
    Storage bucket URI gs://jumpcloud-directory-insights-logs/jumpcloud/
    Source Deletion Option Select the deletion option according to your preference
    Maximum File Age (Days) Default is 180 days
    Asset namespace The asset namespace
    Ingestion labels The label to be applied to the events from this feed
    • Replace jumpcloud-directory-insights-logs with your actual GCS bucket name.
    • Always include the trailing slash ( / ) at the end of the URI.
  9. Click Next.

  10. Review your new feed configuration in the Finalizescreen, and then click Submit.

UDM mapping table

Log Field UDM Mapping Logic
data.profile_list.payload_content.payload_type, data.profile_list.payload_content.payload_identifier, data.profile_list.payload_content.payload_uuid, data.profile_list.payload_content.payload_organization, data.profile_list.payload_content.payload_display_name, data.profile_list.payload_content.payload_description
about Merged with attribute labels from payloadContent
data.association.op, data.association.action_source, data.geoip.region_code, data.service, data.event_type, data.@version, data.application.version, data.application.publisher, data.application.uninstall_string, data.changes.0.field, data.changes.0.from, data.changes.0.to, data.available_os_updates.allows_install_later
additional.fields Merged with corresponding labels
extensions.auth.type Set to "MACHINE" when event_type is USER_LOGIN
data.timestamp
metadata.event_timestamp Converted using date match ISO8601, RFC3339, yyyy-MM-ddTHH:mm:ss.SSSSSSZ
data.message, data.client_ip, data.initiated_by.username, data.system.hostname
metadata.event_type Set to USER_LOGIN if message matches "logged in" and target not empty, else USER_UNCATEGORIZED if ip and userid present, else STATUS_UPDATE if hostname or ip present, else USER_UNCATEGORIZED if userid present, else GENERIC_EVENT
data.id
metadata.product_log_id Value copied directly
data.@version, data.application.version
metadata.product_version Set to data.@version, then replaced with data.application.version
data.application.name
principal.application Value copied directly
data.mdm_type
principal.asset.hardware Merged with manufacturer set to data.mdm_type
data.command_uuid
principal.asset_id Concatenated as "commandUuid:" + data.command_uuid
data.system.hostname
principal.hostname Value copied directly
data.client_ip
principal.ip Merged from data.client_ip
data.geoip.country_code
principal.location.country_or_region Value copied directly
data.geoip.region_code
principal.location.name Value copied directly
data.geoip.latitude
principal.location.region_latitude Converted to string then to float
data.geoip.longitude
principal.location.region_longitude Converted to string then to float
data.geoip.region_name
principal.location.state Value copied directly
data.application.path, data.process_name
principal.process.file.full_path Set to data.application.path, then replaced with data.process_name
data.association.connection.from.name, data.mdm_device_manager_id, data.request_type
principal.resource.attribute.labels Merged with labels for connection_from_name, mdm_device_manager_id, request_type
data.system.id, data.resource.id, data.mdm_device_id
principal.resource.id Set to data.system.id, then replaced with data.resource.id, then replaced with data.mdm_device_id
data.resource.username
principal.resource.name Value copied directly
data.association.connection.from.object_id
principal.resource.product_object_id Value copied directly
data.association.connection.from.type
principal.resource.type Value copied directly
data.initiated_by.email
principal.user.email_addresses Merged if email matches ^.+@.+$
data.system.displayName
principal.user.user_display_name Value copied directly
data.initiated_by.username, data.admin_info.name
principal.user.userid Set to data.initiated_by.username, then replaced with data.admin_info.name, then replaced with data.initiated_by.username
data.success, data.status
sec_result.action Set to ALLOW if success true or status Acknowledged, BLOCK if success false
data.status, data.success
sec_result.action_details Set to status if not empty, else success
data.success, data.status, data.security_info.management_status.is_activation_lock_manageable, data.security_info.management_status.is_user_enrollment, data.security_info.management_status.enrolled_via_dep, data.organization, data.windows_meta.logon_type, data.security_info.management_status.user_approved_enrollment
sec_result.detection_fields Merged with labels for is_activation_lock_manageable, is_user_enrollment, enrolled_via_dep, organization, logon_type, user_approved_enrollment
data.query_responses.device_name
target.hostname Value copied directly
data.query_responses.wifi_mac
target.mac Merged from data.query_responses.wifi_mac
data.query_responses.model_name
target.platform Set to "MAC" if matches (?i)mac
data.query_responses.os_version
target.platform_version Value copied directly
data.query_responses.available_device_capacity, data.query_responses.device_capacity
target.resource.attribute.labels Merged with labels for available_device_capacity, device_capacity
data.association.connection.to.name
target.resource.name Value copied directly
data.association.connection.to.object_id
target.resource.product_object_id Value copied directly
data.association.connection.to.type
target.resource.type Value copied directly
data.profile_list.payload_organization
target.user.department Merged from profile_payload_organization
metadata.vendor_name Set to "JUMPCLOUD_DIRECTORY_INSIGHTS"
metadata.product_name Set to "JUMPCLOUD_DIRECTORY_INSIGHTS"

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: