For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/security/default_rules/mex-to8-3fa.md. A documentation index is available at /llms.txt.

JumpCloud policy created

Goal

Detect when a JumpCloud policy is created.

Strategy

This rule lets you monitor the following JumpCloud event to detect when a policy is created:

  • @evt.name:policy_create

Triage and response

  1. Contact the JumpCloud administrator {{@usr.email}} to confirm if the policy creation was intended.
  2. If the change was not authorized, verify there are no other signals from the administrator:{{@usr.email}}.