<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft 365 Defender Add-on for Splunk - Documenation in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/578631#M75758</link>
    <description>&lt;P&gt;The incidents and alerts inputs for this add-on work perfectly!&amp;nbsp; We bring them in all day.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The alert_actions do not work very well.&amp;nbsp; We are using the workaround&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/109095"&gt;@jconger&lt;/a&gt;&amp;nbsp; mentioned below.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have the makeresults command setup as a scheduled report to bring in custom advanced threat hunting queries.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/109095"&gt;@jconger&lt;/a&gt;&amp;nbsp; - on the next release, could you add a custom KQL input?&amp;nbsp; This would be similar to how&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/4623/#/details" target="_blank"&gt;TA for Defender ATP hunting API | Splunkbase&lt;/A&gt;&amp;nbsp;does this.&amp;nbsp; There is an input to simply run the KQL against defender api.&amp;nbsp; The makeresults command already has the correct structure.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Dec 2021 12:44:39 GMT</pubDate>
    <dc:creator>jaxjohnny2000</dc:creator>
    <dc:date>2021-12-16T12:44:39Z</dc:date>
    <item>
      <title>Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/569769#M75272</link>
      <description>&lt;P&gt;Does anyone have any information about how to use the new Alert Actions?&lt;/P&gt;&lt;P&gt;We created a simple alert which has output greater than 0, added the account name, and pasted in a simple KQL.&amp;nbsp; Nothing happens&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Release Notes&lt;/P&gt;&lt;DIV class="u.container:vpad-md"&gt;Version 1.3.0&lt;DIV class="u.item sb.color:gray"&gt;May 21, 2021&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="u.container c-details-body__copy"&gt;&lt;DIV class="u.item c-details-body__documentation"&gt;&lt;P&gt;Alert actions introduced:&lt;BR /&gt;&lt;EM&gt;Advanced Hunting alert action runs advanced hunting queries on entities to ingest additional detail&lt;BR /&gt;&lt;/EM&gt;Incident Update alert action updates the Microsoft 365 Defender portal from a Splunk search&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 05 Oct 2021 19:04:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/569769#M75272</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-05T19:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/569860#M75276</link>
      <description>&lt;P&gt;Any information, documents, writeups or examples on how to use these new Alert actions would be incredibly useful.&amp;nbsp; What is the variable format in the Incident Update alert action?&amp;nbsp; I'm assuming $fieldname$?&amp;nbsp; for the Hunting query, do we need to replace the &amp;gt; character with ;gt ?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have the inputs on a heavy forwarder and the add-on installed on the search head cluster.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 11:19:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/569860#M75276</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-06T11:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/569922#M75280</link>
      <description>&lt;P&gt;Here is the full log from the last run of the alert:&lt;/P&gt;&lt;P&gt;2021-10-05 18:25:05,937 INFO pid=16772 tid=MainThread file=cim_actions.py:message:431 | sendmodaction - worker="SEARCH-HEAD" signature="Invoking modular action" action_name="defender_advanced_hunting" search_name="Test - KQL - Alert" sid="scheduler_YWRtLWpvaG5ueS5ibGl6emFyZA_VEEtTVNfRGVmZW5kZXI__RMD5e3ec459a641895e9_at_1633458300_871_C0398236-4083-4264-97A9-2408308CBC8C" rid="0" app="TA-MS_Defender" user="splunk-admin-user" digest_mode="1" action_mode="saved"&lt;BR /&gt;2021-10-05 18:25:10,336 INFO pid=16772 tid=MainThread file=cim_actions.py:message:431 | sendmodaction - worker="SEARCH-HEAD" signature="_Splunk_ Alert action defender_advanced_hunting started." action_name="defender_advanced_hunting" search_name="Test - KQL - Alert" sid="scheduler_YWRtLWpvaG5ueS5ibGl6emFyZA_VEEtTVNfRGVmZW5kZXI__RMD5e3ec459a641895e9_at_1633458300_871_C0398236-4083-4264-97A9-2408308CBC8C" rid="0" app="TA-MS_Defender" user="splunk-admin-user" digest_mode="1" action_mode="saved" action_status="success"&lt;BR /&gt;2021-10-05 18:25:10,343 INFO pid=16772 tid=MainThread file=cim_actions.py:message:431 | sendmodaction - worker="SEARCH-HEAD" signature="_Splunk_ Defender account name : MDATP_SEAR_API_Access" action_name="defender_advanced_hunting" search_name="Test - KQL - Alert" sid="scheduler_YWRtLWpvaG5ueS5ibGl6emFyZA_VEEtTVNfRGVmZW5kZXI__RMD5e3ec459a641895e9_at_1633458300_871_C0398236-4083-4264-97A9-2408308CBC8C" rid="0" app="TA-MS_Defender" user="splunk-admin-user" digest_mode="1" action_mode="saved" action_status="success"&lt;BR /&gt;2021-10-05 18:25:10,348 ERROR pid=16772 tid=MainThread file=cim_actions.py:message:431 | sendmodaction - worker="SEARCH-HEAD" signature="get_credentials_with_account_name() - Type 3 - The stanza name None specified is not in the global account configuration. Tested with stanza name : MDATP_SEAR_API_Access. Retrying ... " action_name="defender_advanced_hunting" search_name="Test - KQL - Alert" sid="scheduler_YWRtLWpvaG5ueS5ibGl6emFyZA_VEEtTVNfRGVmZW5kZXI__RMD5e3ec459a641895e9_at_1633458300_871_C0398236-4083-4264-97A9-2408308CBC8C" rid="0" app="TA-MS_Defender" user="splunk-admin-user" digest_mode="1" action_mode="saved" action_status="failure"&lt;BR /&gt;2021-10-05 18:25:10,348 ERROR pid=16772 tid=MainThread file=cim_actions.py:message:431 | sendmodaction - worker="SEARCH-HEAD" signature="get_credentials_with_account_name() - Type 3 - Exception occurred. The global account name specified has not been configured. Please re-configure them or re-enter the right stanza name." action_name="defender_advanced_hunting" search_name="Test - KQL - Alert" sid="scheduler_YWRtLWpvaG5ueS5ibGl6emFyZA_VEEtTVNfRGVmZW5kZXI__RMD5e3ec459a641895e9_at_1633458300_871_C0398236-4083-4264-97A9-2408308CBC8C" rid="0" app="TA-MS_Defender" user="splunk-admin-user" digest_mode="1" action_mode="saved" action_status="failure"&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 17:02:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/569922#M75280</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-06T17:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/569924#M75281</link>
      <description>&lt;P&gt;our setup:&lt;BR /&gt;&lt;BR /&gt;Heavy Forwarder - account setup, and inputs configured to pull Incidents and Alerts&lt;/P&gt;&lt;P&gt;Search Head Cluster - Account name setup there also&lt;BR /&gt;SHC - Alert Action with Advanced Hunting set -&amp;nbsp;Test - KQL - Alert&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 17:03:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/569924#M75281</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-06T17:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/570110#M75288</link>
      <description>&lt;P&gt;The alert actions are utilized by the workflow actions (check out workflow_actions.conf) and dashboards (check out the incident_detail.xml dashboard).&amp;nbsp; However, the actions can be used independently as well.&lt;/P&gt;&lt;P&gt;Here is an example of using the alert action independently via SPL to hunt based on an IP address:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults | eval index="YOUR INDEX (defaults to main)", tenant_id="YOUR TENANT ID", query="let ip='IP ADDRESS'; search in (DeviceNetworkEvents, DeviceFileEvents, DeviceLogonEvents, DeviceEvents, EmailEvents, IdentityLogonEvents, IdentityQueryEvents, IdentityDirectoryEvents, CloudAppEvents) Timestamp between (ago(7d) .. now()) and (IPAddress == ip or LocalIP == ip or FileOriginIP == ip or RequestSourceIP == ip or SenderIPv4 == ip or SenderIPv6 == ip or RemoteIP == ip or DestinationIPAddress == ip) | top 100 by Timestamp" | sendalert defender_advanced_hunting&lt;/LI-CODE&gt;&lt;P&gt;The results will be indexed into whatever index you specified.&amp;nbsp; If you do not include the index in the search, results will go in the &lt;FONT face="courier new,courier"&gt;main&lt;/FONT&gt; index.&amp;nbsp; &amp;nbsp;The sourcetype will be&amp;nbsp;&lt;FONT face="courier new,courier"&gt;m365:defender:incident:advanced_hunting&lt;/FONT&gt;.&lt;/P&gt;&lt;P&gt;Search for the results of the hunting action:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="YOUR INDEX" sourcetype="m365:defender:incident:advanced_hunting"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As mentioned, these alert actions are utilized by workflow actions.&amp;nbsp; To observe this, navigate to the Defender 365 Incident Queue dashboard, select an incident (the Incident Detail dashboard should open), select the Entities button in the dashboard, expand the entity, and select Event Actions (see screenshot below).&amp;nbsp; Depending on the entityType field, different actions will appear.&amp;nbsp; Currently, the add-on implements workflow actions for IP addresses, Users, and Files.&amp;nbsp; This can be expanded to other types of entities by editing the workflow_actions.conf file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Defender-workflow-action.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/16306iFF8051C2E04A9BEF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Defender-workflow-action.png" alt="Defender-workflow-action.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still with me?&amp;nbsp; Okay, because there is a different way to get this hunting data.&amp;nbsp; The workflow actions are ad-hoc hunting queries, but you can continuously export all of this table data to an event hub from Defender.&amp;nbsp; Then, use the &lt;A href="https://splunkbase.splunk.com/app/3110/" target="_self"&gt;Splunk Add-on for Microsoft Cloud Services&lt;/A&gt; to ingest the data from the event hub.&amp;nbsp; If you go this route, I suggest installing this add-on that maps all of the Defender event hub data to the Common Information Model (CIM) =&amp;gt;&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/5518/" target="_blank"&gt;https://splunkbase.splunk.com/app/5518/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Oct 2021 18:54:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/570110#M75288</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2021-10-07T18:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/570253#M75300</link>
      <description>&lt;P&gt;Thank you Jason,&lt;/P&gt;&lt;P&gt;Here is a search we executed:&lt;/P&gt;&lt;P&gt;| makeresults&lt;BR /&gt;| eval index="cloud_security_microsoft", tenant_id="&amp;lt;TENANT ID&amp;gt;", query="DeviceEvents | where ActionType == 'AntivirusScanCompleted' | where Timestamp &amp;gt; ago (1h)"&lt;BR /&gt;| sendalert defender_advanced_hunting param.account_name="MDATP_API_Access" param.global_account_name="MDATP_API_Access"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This gave us data, but in the main index, and with the incorrect sourcetype&lt;/P&gt;&lt;P&gt;The results are here:&lt;BR /&gt;&lt;BR /&gt;index=main sourcetype="stash_common_action_model-6" InitiatingProcessCreationTime=*&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Oct 2021 15:47:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/570253#M75300</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-08T15:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/570261#M75301</link>
      <description>&lt;P&gt;interesting, we now have hundreds of thousands of events in main, but none in the correct index&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;index=main sourcetype="stash_common_action_model*"&lt;/P&gt;</description>
      <pubDate>Fri, 08 Oct 2021 16:48:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/570261#M75301</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-08T16:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571029#M75336</link>
      <description>&lt;P&gt;Do you have the &lt;A href="https://splunkbase.splunk.com/app/1621/" target="_self"&gt;Common Information Model add-on&lt;/A&gt; installed?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Oct 2021 17:14:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571029#M75336</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2021-10-14T17:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571333#M75352</link>
      <description>&lt;P&gt;Affirmative.&amp;nbsp; Installed on both Heavy Forwarder and search head cluster.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We have continued to run into issues with the alert_action&lt;/P&gt;&lt;P&gt;The Event Hub works well from Defender, the challenge is volume.&amp;nbsp; Our defender data brings in 1.5TB per day into Splunk.&amp;nbsp; The SOC needs the Advanced Threat hunting data along with the incidents and alerts.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We were using&amp;nbsp;Add-on for Defender ATP Hunting API to bring in the Hunting API.&amp;nbsp; However, that stopped working with 8.2.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So we are considering a method to use the Event Hub, and then maybe filter inputs to only what we need.&amp;nbsp; A poor man's threat hunting?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 13:12:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571333#M75352</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-18T13:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571650#M75371</link>
      <description>&lt;P&gt;Thank you Jason,&lt;BR /&gt;Here is a simple KQL which works with makeresults, but not with the alert_action&lt;BR /&gt;AlertEvidence | where Timestamp &amp;gt; ago(7d)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;| makeresults&lt;BR /&gt;| eval index="main", tenant_id="12345-02da-47f3-a903-12345", query="AlertEvidence | where Timestamp &amp;gt; ago(7d)"&lt;BR /&gt;| sendalert defender_advanced_hunting param.account_name="MDATP_API_Access" param.global_account_name="MDATP_API_Access"&lt;/P&gt;&lt;P&gt;Next, I look in the logs:&lt;BR /&gt;index=cim_modactions source="/opt/splunk/var/log/splunk/defender_advanced_hunting_modalert.log" signature=*&lt;BR /&gt;| table _time action_mode signature&lt;BR /&gt;| sort - _time&lt;BR /&gt;Which brings this result&lt;BR /&gt;2021-10-20 08:49:31.570 adhoc Successfully created splunk events&lt;BR /&gt;2021-10-20 08:49:30.763 adhoc do_query() - Number of results : 28792&lt;BR /&gt;2021-10-20 08:49:10.417 adhoc _Splunk_ Getting proxy server.&lt;BR /&gt;2021-10-20 08:49:08.786 adhoc _Splunk_ Defender account name : MDATP_SEAR_API_Access&lt;BR /&gt;2021-10-20 08:49:08.774 adhoc _Splunk_ Alert action defender_advanced_hunting started.&lt;BR /&gt;2021-10-20 08:49:04.150 adhoc Invoking modular action&lt;BR /&gt;&lt;BR /&gt;Next i added the exact same copy/paste search to a saved search in the alert actionk, Defender Advanced Hunting&lt;BR /&gt;2021-10-20 08:50:15.183 saved _Splunk_ Error getting ta_ms_defender_account: 'ta_ms_defender_account'&lt;BR /&gt;2021-10-20 08:50:15.177 saved _Splunk_ Alert action defender_advanced_hunting started.&lt;BR /&gt;2021-10-20 08:50:10.776 saved Invoking modular action&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 12:55:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571650#M75371</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-20T12:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571697#M75374</link>
      <description>&lt;P&gt;hi jason,&lt;/P&gt;&lt;P&gt;one question about the timestamp parsing using your makeresults command.&amp;nbsp; All the events come in with the exact same _time value.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so we get this when searching&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Events might not be returned in sub-second order due to search memory limits. See search.log for more information. Increase the value of the following limits.conf setting:[search]:max_rawsize_perchunk."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Where do you set the timestamp parsing?&amp;nbsp; we tried props, but it did not take affect&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 16:44:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571697#M75374</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-20T16:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571715#M75376</link>
      <description>&lt;P&gt;maybe, if you have time from all the .conf questions you have coming in; make an input that only runs the hunting queries?&lt;BR /&gt;&lt;BR /&gt;the only last thing we have is the timestamp recognition.&amp;nbsp; it uses the calling time instead of the Timestamp you have configured.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 19:27:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/571715#M75376</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-20T19:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/578570#M75755</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/138520"&gt;@jaxjohnny2000&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/109095"&gt;@jconger&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Why we need this add-on? We have a requirement to ingest MCAS logs into splunk (salesforce logs flows into MCAS and those logs from MCAS to be ingested into splunk) Can I use the above add-on to achieve this?&lt;/P&gt;&lt;P&gt;Or should I use Syslog collectors to ingest MCAS logs into splunk?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 03:30:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/578570#M75755</guid>
      <dc:creator>VijaySrrie</dc:creator>
      <dc:date>2021-12-16T03:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk - Documenation</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/578631#M75758</link>
      <description>&lt;P&gt;The incidents and alerts inputs for this add-on work perfectly!&amp;nbsp; We bring them in all day.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The alert_actions do not work very well.&amp;nbsp; We are using the workaround&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/109095"&gt;@jconger&lt;/a&gt;&amp;nbsp; mentioned below.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have the makeresults command setup as a scheduled report to bring in custom advanced threat hunting queries.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/109095"&gt;@jconger&lt;/a&gt;&amp;nbsp; - on the next release, could you add a custom KQL input?&amp;nbsp; This would be similar to how&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/4623/#/details" target="_blank"&gt;TA for Defender ATP hunting API | Splunkbase&lt;/A&gt;&amp;nbsp;does this.&amp;nbsp; There is an input to simply run the KQL against defender api.&amp;nbsp; The makeresults command already has the correct structure.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 12:44:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-365-Defender-Add-on-for-Splunk-Documenation/m-p/578631#M75758</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-12-16T12:44:39Z</dc:date>
    </item>
  </channel>
</rss>

