Sep 07 2021
05:29 AM
- last edited on
Dec 23 2021
11:03 AM
by
TechCommunityAP
Sep 07 2021
05:29 AM
- last edited on
Dec 23 2021
11:03 AM
by
TechCommunityAP
Hello,
we are looking at Microsoft 365 ATP Defender and we are struggling with the integration with Splunk due some missing fields in the logs, did anyone was succesful to do this?
Thank you!
RS
Sep 07 2021 09:11 AM
Sep 08 2021 04:21 AM
@Jake_Mowrer Yes we installed this addon but there some issues:
these fields are not available anymore. (while were available with different app/API)
IncidentLinkToMTP
IncidentLinktoWOATP
RemediationAction
RemediationIsSuccess
We already opened a case with Microsoft support but we are not able to resolve this. This is the reason we are asking if other customers are successful with this integration or not.
Sep 09 2021 01:31 PM
@rs8091 Those fields are from the SIEM API documented here:
Microsoft Defender for Endpoint detections API fields | Microsoft Docs
The 1.3.0 Add-on for Splunk is using the incident API in M365 Defender and the Alert API in Defender for Endpoint (you can set it up for both) and not the SIEM API:
M365 Defender incident API - List incidents API in Microsoft 365 Defender | Microsoft Docs
Defender for Endpoint API - List alerts API | Microsoft Docs
The fields you are looking for are a bit different now:
M365 Defender incident API:
- IncidentLinktoMTP = incidentUri (M365 Defender incident API)
- RemediationAction and RemediationIsSucess changed to:
detectionStatus, remediationStatus, remediationStatusDetails
Thanks,
Jake Mowrer
Sep 13 2021 06:02 AM
Sep 13 2021 06:58 AM
Sep 18 2021 02:00 PM
Nov 17 2021 09:43 AM
@Jake_Mowrer Hello, this app is not supported by Splunk, we tried to explain it to Microsoft support several times.
Apps and add-ons published either by Splunk or third-party developers. Indicates that no support or maintenance are provided by the publisher.
Customers are solely responsible for ensuring proper functionality and version compatibility of Not-supported apps and add-ons with the applicable Splunk software. If unresolvable functional or compatibility issues are encountered, customers may be required to uninstall the app or add-on from their Splunk environment in order for Splunk to fulfill support obligations.
Are you aware of this?
Thank you
Nov 17 2021 10:01 AM
Nov 27 2021 12:58 PM
@Jake_Mowrer the app is working but our team does not want to put in production the unsupported app because they are afraid it can stop working any time. Is there a timeline for fixing this?
An alternative from the support is to use the graph api (https://graph.microsoft.com/v1.0/security/alerts/ with app: https://splunkbase.splunk.com/app/4564/ ) but we don't see the same level of detail of the incident API.
"IncidentURI" is missing and also useful fields like "Veridict", "InvestigationState"
Dec 03 2021 11:32 PM
@rs8091 - Thank you for your comments.
The Splunk supported Microsoft 365 Defender Add-on for Splunk will be released in the near future.
We'll announce it and news about other SIEM connectors here in the Tech Community.
Thanks,
Jan 19 2022 08:22 AM
@Michael ShalevAny update on the when this new supported version of M365 Defender for Endpoint Add-on for Splunk will be available?
Jan 19 2022 10:55 AM
@cvue-snl - thanks for your question.
We're waiting for the new Add-on to complete Splunk's deployment process - I will update here when I receive notice that deployment is complete
Feb 15 2022 06:37 AM
@rs8091 @cvue-snl FYI Splunk released the supported add-on. Please see here: https://splunkbase.splunk.com/app/6207/#/overview
Apr 19 2022 04:20 PM
Hi @rs8091,
There is even a newer add-on called Splunk Add-on for Microsoft Security v1.2.0 that is fully supported by Splunk.
If you want to continue updating Incidents and/or Alerts, you also need the Microsoft 365 App for Splunk that now includes these capabilities.