<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft 365 Defender Add-on for Splunk duplicate events in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/583906#M76047</link>
    <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;java jar&amp;nbsp;files to be installed and run at the splunk end? or on the server end ? (which is gonna send logs to splunk)&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 07 Feb 2022 07:52:49 GMT</pubDate>
    <dc:creator>VijaySrrie</dc:creator>
    <dc:date>2022-02-07T07:52:49Z</dc:date>
    <item>
      <title>Why is Microsoft 365 Defender Add-on for Splunk duplicating events?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/530965#M64279</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have upgraded from the old defender app to the new&amp;nbsp;Microsoft 365 Defender Add-on for Splunk.&lt;/P&gt;
&lt;P&gt;I finally got it working after renewing secrets etc... but seems like there are a lot of duplicate events for each incident triggered.&amp;nbsp;&lt;BR /&gt;How can we get this too work properly? Can Splunk give proper support on this?&amp;nbsp; These small input apps are vital for a proper working of our SOC en Splunk ES environment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 04:03:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/530965#M64279</guid>
      <dc:creator>Azeemering</dc:creator>
      <dc:date>2022-02-23T04:03:24Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/530988#M64280</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/169081"&gt;@Azeemering&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are couple of TA around this subject.&amp;nbsp;&lt;/P&gt;&lt;P&gt;can you share TA URL?&lt;/P&gt;&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/5038/" target="_blank"&gt;I have also developed one&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2020 10:56:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/530988#M64280</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2020-11-26T10:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/530990#M64281</link>
      <description>&lt;P&gt;It's the&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/4959/" target="_blank"&gt;https://splunkbase.splunk.com/app/4959/&lt;/A&gt;&amp;nbsp;&amp;nbsp;Microsoft 365 Defender Add-on for Splunk&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2020 10:58:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/530990#M64281</guid>
      <dc:creator>Azeemering</dc:creator>
      <dc:date>2020-11-26T10:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/530993#M64282</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/169081"&gt;@Azeemering&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The one you mentioned is neither supported by developer nor Splunk support.&lt;/P&gt;&lt;P&gt;what exactly are you looking for?&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Are you looking for o365 defender TA&amp;nbsp; ?&lt;/LI&gt;&lt;LI&gt;do you want to&amp;nbsp; just collect Microsoft/windows defender agent logs installed on endpoints from cloud?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;if you are looking for second&amp;nbsp; 2&amp;nbsp; then you can try my TA link shared in my first response.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2020 11:05:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/530993#M64282</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2020-11-26T11:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531009#M64285</link>
      <description>&lt;P&gt;We are collecting the Alerts triggered in Windows Defender ATP from securitycenter.&lt;BR /&gt;This app was built by Splunk works, but not supported. But it should work right? Why release it otherwise?&lt;BR /&gt;What I have noticed during troubleshooting it indexes the same alerts every time the input runs on the schedule. So when a new event comes in and the input is running again the alert is indexed a second time. Seems like there is something wrong with checkpointing or something?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2020 13:34:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531009#M64285</guid>
      <dc:creator>Azeemering</dc:creator>
      <dc:date>2020-11-26T13:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531518#M64331</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/109095"&gt;@jconger&lt;/a&gt;&amp;nbsp;Anybody from Splunk who can help with this? The lack of support for app like this really is not a good development.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2020 13:37:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531518#M64331</guid>
      <dc:creator>Azeemering</dc:creator>
      <dc:date>2020-12-01T13:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531560#M64333</link>
      <description>&lt;P&gt;Can you share your inputs.conf?&lt;/P&gt;&lt;P&gt;Also, you can view the checkpoints by doing the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Add the following lines to transforms.conf in the app:&lt;/LI&gt;&lt;/UL&gt;&lt;LI-CODE lang="markup"&gt;[TA_Defender_checkpoint_lookup]
collection = TA_MS_Defender_checkpointer
external_type = kvstore
fields_list = _key, state&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Run the following search:&lt;/LI&gt;&lt;/UL&gt;&lt;LI-CODE lang="markup"&gt;| inputlookup TA_Defender_checkpoint_lookup | eval key = _key&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2020 16:31:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531560#M64333</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2020-12-01T16:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531561#M64334</link>
      <description>&lt;P&gt;Hi, thanks for your quick reply!&lt;/P&gt;&lt;P&gt;[microsoft_defender_atp_alerts://MD_ATP_Acceptatie]&lt;BR /&gt;azure_app_account = ATP_Defender_Acceptatie&lt;BR /&gt;index = xxx_xxxx&lt;BR /&gt;interval = 500&lt;BR /&gt;location = api-eu.securitycenter.microsoft.com&lt;BR /&gt;start_date = 2020-11-30T09:00:00Z&lt;BR /&gt;tenant_id = xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;disabled = 0&lt;/P&gt;&lt;P&gt;[microsoft_defender_atp_alerts://MD_ATP_Productie]&lt;BR /&gt;azure_app_account = ATP_Defender_Productie&lt;BR /&gt;index = xxx_xxxxx&lt;BR /&gt;interval = 500&lt;BR /&gt;location = api-eu.securitycenter.microsoft.com&lt;BR /&gt;start_date = 2020-11-30T09:00:00Z&lt;BR /&gt;tenant_id = xxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;disabled = 0&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2020 16:36:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531561#M64334</guid>
      <dc:creator>Azeemering</dc:creator>
      <dc:date>2020-12-01T16:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531563#M64335</link>
      <description>&lt;P&gt;I also added a transforms.conf with your suggested settings and I can now see the checkpoint:&lt;/P&gt;&lt;P&gt;key state&lt;BR /&gt;atp_lastUpdateTime_MD_ATP_Acceptatie "2020-11-25T09:00:00Z"&lt;BR /&gt;atp_lastUpdateTime_MD_ATP_Productie "2020-11-30T09:37:04.08Z"&lt;/P&gt;&lt;P&gt;The funny thing is it seems to ingests the last event it finds again and again until there is a new alert.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2020 16:45:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/531563#M64335</guid>
      <dc:creator>Azeemering</dc:creator>
      <dc:date>2020-12-01T16:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/533416#M64465</link>
      <description>&lt;P&gt;There is a slight bug(?) in the API calls where a comparison is made related to the checkpoint timestamp.&lt;/P&gt;&lt;P&gt;Specifically this is found on line 52 in&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt; TA-MS_Defender/bin/input_module_microsoft_defender_atp_alerts.py&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;where it says;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;atp_url = "https://%s/api/alerts?$expand=evidence&amp;amp;$filter=lastUpdateTime+ge+%s" % (helper.get_arg("location"), query_date)&lt;/LI-CODE&gt;&lt;P&gt;and I believe that the "ge" (&amp;gt;=) is the culprit here, and that its the reason for the last event from the previous run being indexed again. Changing it to "gt" (&amp;gt;) seemed to fix the problem.&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;atp_url = "https://%s/api/alerts?$expand=evidence&amp;amp;$filter=lastUpdateTime+gt+%s" % (helper.get_arg("location"), query_date)&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="Helvetica, Arial, sans-serif"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Helvetica, Arial, sans-serif"&gt;NB: &lt;/FONT&gt;The same thing is found in &lt;STRONG&gt;&lt;FONT face="Helvetica, Arial, sans-serif"&gt;inputs_module_microsoft_365_defender_incidents.py&lt;/FONT&gt;&lt;/STRONG&gt;&lt;FONT face="Helvetica, Arial, sans-serif"&gt; in the same directory&lt;/FONT&gt;, but since I don't have that input, I haven't been able to verify that the behaviour is the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 08:42:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/533416#M64465</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2020-12-17T08:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/533438#M64467</link>
      <description>&lt;P&gt;Thank you...this works indeed for me too.&amp;nbsp; Very nice....well spotted!&lt;BR /&gt;&lt;BR /&gt;I'm not exactly sure how to word it a 100% right...but I am disappointed that Splunk let's the community fix their released apps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 13:12:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/533438#M64467</guid>
      <dc:creator>Azeemering</dc:creator>
      <dc:date>2020-12-17T13:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/533443#M64468</link>
      <description>&lt;P&gt;Great to hear that it worked.&lt;/P&gt;&lt;P&gt;To be honest, though, the app is clearly labeled as "non-supported". It is not an official Splunk product.&lt;/P&gt;&lt;P&gt;I sent an email the other day to the person I believe to be the author to suggest this bug. No reply as yet, but I hope it will be fixed in the next release.&lt;/P&gt;&lt;P&gt;/Kristian&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 13:36:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/533443#M64468</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2020-12-17T13:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/569680#M75269</link>
      <description>&lt;P&gt;This appears to be corrected in version 1.3.0&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 12:10:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/569680#M75269</guid>
      <dc:creator>jaxjohnny2000</dc:creator>
      <dc:date>2021-10-05T12:10:53Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/578567#M75752</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/138520"&gt;@jaxjohnny2000&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/169081"&gt;@Azeemering&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6332"&gt;@kristian_kolb&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/109095"&gt;@jconger&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/129407"&gt;@thambisetty&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why we need this add-on? We have a requirement to ingest MCAS logs into splunk (salesforce logs flows into MCAS and those logs from MCAS to be ingested into splunk) Can I use the above add-on to achieve this?&lt;/P&gt;&lt;P&gt;Or should I use Syslog collectors to ingest MCAS logs into splunk?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 03:27:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/578567#M75752</guid>
      <dc:creator>VijaySrrie</dc:creator>
      <dc:date>2021-12-16T03:27:32Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/583834#M76043</link>
      <description>&lt;P&gt;you may try this&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/5278/#/details" target="_blank"&gt;https://splunkbase.splunk.com/app/5278/#/details&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Feb 2022 04:44:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/583834#M76043</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2022-02-06T04:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/583889#M76044</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/129407"&gt;@thambisetty&lt;/a&gt;&amp;nbsp; how did you ingest MCAS logs into splunk?&lt;/P&gt;&lt;P&gt;The add-on which you have mentioned, is to provide value to the logs that are ingested via syslog. Is that correct?&lt;/P&gt;&lt;P&gt;You ingested logs using syslog collectors and then used above add-on to add values to the logs, is that correct?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 03:55:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/583889#M76044</guid>
      <dc:creator>VijaySrrie</dc:creator>
      <dc:date>2022-02-07T03:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/583903#M76046</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/164779"&gt;@VijaySrrie&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I haven't tested the one I have mentioned in my previous answer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I had followed the below document to integrate mcas logs to Splunk and its working fine.&amp;nbsp;&lt;BR /&gt;&lt;A href="https://docs.microsoft.com/en-us/defender-cloud-apps/siem" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/defender-cloud-apps/siem&lt;/A&gt;&lt;/P&gt;&lt;H3&gt;Note:&lt;/H3&gt;&lt;H3&gt;Step 1: Set it up in the Defender for Cloud Apps portal&lt;BR /&gt;In the point 5. you need to enter your HF/indexer/syslog IP and port.&amp;nbsp;&lt;/H3&gt;&lt;P&gt;if you run java jar on the host which you entered in step 1 and point 5 then you don't need to open any firewall connections, otherwise remember to open firewall connection from the host where you install java jar file and host you entered in step 1 and point 5.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 07:41:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/583903#M76046</guid>
      <dc:creator>thambisetty</dc:creator>
      <dc:date>2022-02-07T07:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/583906#M76047</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;java jar&amp;nbsp;files to be installed and run at the splunk end? or on the server end ? (which is gonna send logs to splunk)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 07:52:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/583906#M76047</guid>
      <dc:creator>VijaySrrie</dc:creator>
      <dc:date>2022-02-07T07:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft 365 Defender Add-on for Splunk duplicate events</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/586123#M76144</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/129407"&gt;@thambisetty&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have opened the firewalls/proxy&lt;BR /&gt;In SIEM trace log file - no errors and logs related to connections are there&lt;BR /&gt;In MCAS portal it is showing as connected&lt;BR /&gt;In splunk, how should I check the logs?&lt;/P&gt;&lt;P&gt;Do we have any index or sourcetype?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Feb 2022 00:30:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-is-Microsoft-365-Defender-Add-on-for-Splunk-duplicating/m-p/586123#M76144</guid>
      <dc:creator>VijaySrrie</dc:creator>
      <dc:date>2022-02-23T00:30:39Z</dc:date>
    </item>
  </channel>
</rss>

