Jamf Protect Security Event and Telemetry with a Webhook
This guide explains how to set up Jamf Protect Cloud to forward telemetry and security events to RunReveal using a webhook url generated by the JAMF Protect source in the RunReveal UI.
Prerequisites
- Jamf Protect Cloud admin access
You need rights to configure telemetry forwarding and webhooks. - RunReveal account with permissions to add sources and view logs (admin/editor)
Ability to add sources and view logs. - Telemetry/Security logging set up in JAMF Protect Cloud
Decide which Jamf Protect data (telemetry, alerts, etc.) you want to send.
Step 1: Generate a Webhook Endpoint in RunReveal
- Navigate to Sources in RunReveal
- Click Add Source
- Select Jamf Protect and choose Webhook as the ingest type and save the source with a name to generate the unique webhook url.
- Copy the webhook endpoint URL provided
Step 2: Create Data Endpoint Action in Jamf Protect Cloud
- Log in to Jamf Protect Cloud Console
- Navigate to Settings → Action Configurations
- Click New to create a new action configuration
- Select Data Endpoint as the action type
- Provide a descriptive name (e.g., “RunReveal Webhook”)
- Configure the data endpoint settings:
- Endpoint URL: Paste the RunReveal webhook URL you copied earlier
- Method: POST
- Headers: Set Content-Type to application/json
- Authentication: None (authentication handled via webhook URL)
- Data Format: JSON
For more details, see the Creating an Action Configuration - JAMF macOS Security Portal guide.
Step 3: Select Telemetry & Event Types to Forward
- In Jamf Protect, you can typically choose:
- Telemetry (system, process, network, file events)
- Alerts (detections, policy violations)
- Device status/events
- User activity
- You can always update your selection later as monitoring needs evolve.
Step 4: Validate Delivery
- Return to RunReveal, open your Jamf Protect Source page.
- Confirm that logs are arriving.
- Search within explorer or use Native AI Chat to inspect recent Jamf Protect events.
Troubleshooting
-
Missing Logs
- Check that Jamf Protect webhook is enabled and pointed to RunReveal
- Validate that events are generated in JAMF Protect Cloud and that you’ve selected your event types for the forwarder.