All Apps and Add-ons

Azure Microsoft Windows Defender data receiving error message

pmein
Explorer

I have the Add-on for Windows Defender installed and configured. I am seeing that it appears to be polling for events successfully.

Log event in _internal:

file=connectionpool.py:_make_request:400 | https://wdatp-alertexporter-eu.securitycenter.windows.com:443 "GET //api/alerts?sinceTimeUtc=2019-12-26%2013:34:57.241814 HTTP/1.1" 200 2236

I have triggered an alert and see it within the ATP portal and also received the email alert form Azure but I am not seeing the data in Splunk.

Looking at _internal I do see the log entry:

DEBUG pid=91667 tid=MainThread file=connectionpool.py:_make_request:387 | "GET /servicesNS/nobody/TA_windows-defender/storage/collections/data/TA_windows_defender_checkpointer/ATP_EVENTS_obj_checkpoint HTTP/1.1" 404 140

Why is the 404 error coming across? What am I missing in my configuration? I thought I followed the docs correctly but I must be missing something.

0 Karma

pmein
Explorer

I would also ask if anyone has this up and running with Splunk to pull the ATP alerts from Microsoft Defender Security Center. I would certainly be interested in any hurdles you encountered or did it just work out of the gate for you.

0 Karma

siemguy
Observer

Hello, were you able to get this working using the API? I was told the best option would be through SCCM. 

0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...