<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure Monitor Active Directory via Event Hub in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426979#M52232</link>
    <description>&lt;P&gt;Yes.  Here's how:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Install the Azure Monitor Add-on &lt;A href="https://github.com/Microsoft/AzureMonitorAddonForSplunk/wiki"&gt;https://github.com/Microsoft/AzureMonitorAddonForSplunk/wiki&lt;/A&gt; (don't forget to get the node.js and Python dependencies)&lt;/LI&gt;
&lt;LI&gt;Setup all your Azure stuff (Event Hubs, Azure AD applications, Key Vault, SPNs)

&lt;UL&gt;
&lt;LI&gt;Easy way = run a script -&amp;gt; &lt;A href="https://github.com/microsoft/AzureMonitorAddonForSplunk/tree/master/scripts"&gt;https://github.com/microsoft/AzureMonitorAddonForSplunk/tree/master/scripts&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Manual way = &lt;A href="https://www.splunk.com/blog/2018/04/20/splunking-microsoft-azure-monitor-data-part-1-azure-setup.html"&gt;https://www.splunk.com/blog/2018/04/20/splunking-microsoft-azure-monitor-data-part-1-azure-setup.html&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;&lt;/LI&gt;
&lt;LI&gt;Send your Azure AD sign-in and audit logs to an Event Hub&lt;/LI&gt;
&lt;LI&gt;Modify your hubs.json file in the add-on -&amp;gt; &lt;A href="https://github.com/microsoft/AzureMonitorAddonForSplunk/wiki/Configuration-of-Splunk#hubsjson"&gt;https://github.com/microsoft/AzureMonitorAddonForSplunk/wiki/Configuration-of-Splunk#hubsjson&lt;/A&gt;

&lt;UL&gt;
&lt;LI&gt;Basically, after you enable the Azure AD logs going to an event hub, check the event hubs in the Azure portal for the name of the actual hub(s).  It will be something like &lt;CODE&gt;insights-logs-signinlogs&lt;/CODE&gt; and &lt;CODE&gt;insights-logs-auditlogs&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;&lt;/LI&gt;
&lt;LI&gt;Setup and Azure Monitor Diagnostic Logs input on the Splunk instance where you installed the Azure Monitor add-on&lt;/LI&gt;
&lt;LI&gt;Done&lt;/LI&gt;
&lt;/OL&gt;</description>
    <pubDate>Mon, 17 Jun 2019 16:37:52 GMT</pubDate>
    <dc:creator>jconger</dc:creator>
    <dc:date>2019-06-17T16:37:52Z</dc:date>
    <item>
      <title>Azure Monitor Active Directory via Event Hub</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426978#M52231</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;Anyone successful able to pull the logs (Sign-in and Audit logs) of Active Directory via Azure Event Hub. If yes which method you follow.&lt;/P&gt;

&lt;P&gt;Any other recommendation method. Thanks in advance   &lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 03:57:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426978#M52231</guid>
      <dc:creator>sumitkathpal292</dc:creator>
      <dc:date>2019-06-17T03:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Monitor Active Directory via Event Hub</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426979#M52232</link>
      <description>&lt;P&gt;Yes.  Here's how:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Install the Azure Monitor Add-on &lt;A href="https://github.com/Microsoft/AzureMonitorAddonForSplunk/wiki"&gt;https://github.com/Microsoft/AzureMonitorAddonForSplunk/wiki&lt;/A&gt; (don't forget to get the node.js and Python dependencies)&lt;/LI&gt;
&lt;LI&gt;Setup all your Azure stuff (Event Hubs, Azure AD applications, Key Vault, SPNs)

&lt;UL&gt;
&lt;LI&gt;Easy way = run a script -&amp;gt; &lt;A href="https://github.com/microsoft/AzureMonitorAddonForSplunk/tree/master/scripts"&gt;https://github.com/microsoft/AzureMonitorAddonForSplunk/tree/master/scripts&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Manual way = &lt;A href="https://www.splunk.com/blog/2018/04/20/splunking-microsoft-azure-monitor-data-part-1-azure-setup.html"&gt;https://www.splunk.com/blog/2018/04/20/splunking-microsoft-azure-monitor-data-part-1-azure-setup.html&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;&lt;/LI&gt;
&lt;LI&gt;Send your Azure AD sign-in and audit logs to an Event Hub&lt;/LI&gt;
&lt;LI&gt;Modify your hubs.json file in the add-on -&amp;gt; &lt;A href="https://github.com/microsoft/AzureMonitorAddonForSplunk/wiki/Configuration-of-Splunk#hubsjson"&gt;https://github.com/microsoft/AzureMonitorAddonForSplunk/wiki/Configuration-of-Splunk#hubsjson&lt;/A&gt;

&lt;UL&gt;
&lt;LI&gt;Basically, after you enable the Azure AD logs going to an event hub, check the event hubs in the Azure portal for the name of the actual hub(s).  It will be something like &lt;CODE&gt;insights-logs-signinlogs&lt;/CODE&gt; and &lt;CODE&gt;insights-logs-auditlogs&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;&lt;/LI&gt;
&lt;LI&gt;Setup and Azure Monitor Diagnostic Logs input on the Splunk instance where you installed the Azure Monitor add-on&lt;/LI&gt;
&lt;LI&gt;Done&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Mon, 17 Jun 2019 16:37:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426979#M52232</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2019-06-17T16:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Monitor Active Directory via Event Hub</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426980#M52233</link>
      <description>&lt;P&gt;Thanks @jconger it worked.&lt;/P&gt;

&lt;P&gt;Can we define sourcetype for sign and audit logs as currently sourcetype is defined which is amdl:diagnosticLogs.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 23:45:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426980#M52233</guid>
      <dc:creator>sumitkathpal292</dc:creator>
      <dc:date>2019-06-17T23:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Monitor Active Directory via Event Hub</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426981#M52234</link>
      <description>&lt;P&gt;Yes - modify logCategories.json&lt;/P&gt;

&lt;P&gt;&lt;A href="https://github.com/microsoft/AzureMonitorAddonForSplunk/wiki/Configuration-of-Splunk#logcategoriesjson"&gt;https://github.com/microsoft/AzureMonitorAddonForSplunk/wiki/Configuration-of-Splunk#logcategoriesjson&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2019 23:55:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426981#M52234</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2019-06-17T23:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Monitor Active Directory via Event Hub</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426982#M52235</link>
      <description>&lt;P&gt;Thanks for quick reply  @jconger , you mean i need to update "MICROSOFT.AADIAM/AUDIT"  OR "MICROSOFT.AADIAM/SIGNIN" with ?&lt;/P&gt;

&lt;P&gt;"MICROSOFT.AADIAM/AUDIT": "amdl:aadal:audit", &lt;BR /&gt;
    "MICROSOFT.AADIAM/SIGNIN": "amdl:aadal:signin"&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 00:33:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426982#M52235</guid>
      <dc:creator>sumitkathpal292</dc:creator>
      <dc:date>2019-06-18T00:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Monitor Active Directory via Event Hub</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426983#M52236</link>
      <description>&lt;P&gt;@jconger did u got change to have a look ?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 03:27:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426983#M52236</guid>
      <dc:creator>sumitkathpal292</dc:creator>
      <dc:date>2019-06-24T03:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Monitor Active Directory via Event Hub</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426984#M52237</link>
      <description>&lt;P&gt;@jconger please help.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 05:13:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Azure-Monitor-Active-Directory-via-Event-Hub/m-p/426984#M52237</guid>
      <dc:creator>sumitkathpal</dc:creator>
      <dc:date>2019-07-31T05:13:05Z</dc:date>
    </item>
  </channel>
</rss>

