Accessing Microsoft Defender for Cloud Alerts in Splunk using Graph Security API Integration
Published Oct 23 2019 01:08 PM 10.5K Views
Microsoft

In August a new Microsoft Graph Security API add-on for Splunk for introduced, and you can read this article for more information on how to configure it. After finishing configuring this integration, the alerts from Microsoft Defender for Cloud will be start flowing to Splunk. Here are the core steps that you can use to access these alerts:

 

1. Access Splunk and click Microsoft Graph Security Add-On for Splunk, as shown below:

 

Splunk0.JPG

 

2. Click Search, and in the New Search page, type the query below and click the search button: 

 

Splunk1.JPG

 

3. At this point you should see the alerts the results. Below you have a sample of how the alert will look like on Splunk:

 

Splunk3.JPG

 

Another approach to quickly access alerts from different providers that are available via Graph Security API is to search for the keyword  alert, once the result comes up, click vendorInformation.provider in the left, and click on the provider that you want to filter, as shown the sample below:

 

Splunk4.JPG

 

As you can see on the example above, data from Azure Sentinel will also be available using this Graph Security API Add-on.

 

Credit for setting up the Graph Security API Add-On for Splunk Lab 

Yaniv Shasha, Program Manager, CxE Security

 

Co-Authors
Version history
Last update:
‎Oct 24 2021 05:11 AM
Updated by: