All Apps and Add-ons

Add-on for windows defender is not working: https://splunkbase.splunk.com/app/4128/

rahulhoney
New Member

We are trying to fetch data from Microsoft ATP using the "Add-on for windows defender" app and we are seeing an error.

App location on Splunkbase is: https://splunkbase.splunk.com/app/4128/

2019-12-17 12:37:22,682 ERROR pid=23927 tid=MainThread file=base_modinput.py:log_error:307 | Get error when collecting events. Traceback (most recent call last): File "/opt/splunk/etc/apps/TA_windows-defender/bin/ta_windows_defender/modinput_wrapper/base_modinput.py", line 127, in stream_events self.collect_events(ew) File "/opt/splunk/etc/apps/TA_windows-defender/bin/windows_defender_atp_alerts.py", line 88, in collect_events input_module.collect_events(self, ew) File "/opt/splunk/etc/apps/TA_windows-defender/bin/input_module_windows_defender_atp_alerts.py", line 151, in collect_events "Authorization": 'Bearer ' + access_token, TypeError: cannot concatenate 'str' and 'NoneType' objects

2019-12-17 12:37:22,681 ERROR pid=23927 tid=MainThread file=base_modinput.py:log_error:307 | No JSON object could be decoded

Tags (1)
0 Karma

marianomromano
Engager
0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...