All Apps and Add-ons

Is there any way to capture the Risky Sign-ins from Azure into Splunk?

anandhalagarasa
Path Finder

Hi Team,

Is there any way to capture the Risky Sign-ins from Azure into Splunk so that will be helpful to implement the same in our environment.

Kindly note we have already installed Splunk Add-on For Microsoft services in our Search Head server. But not sure how to proceed further to capture the Risky Sign-ins from Azure environment.

Labels (1)
Tags (1)
0 Karma

aplackemeier
Explorer

index=* "riskState" | spath riskState | search riskState=atRisk

0 Karma

Darky86
New Member

Sorry to resurrect a superdead thread, but we are dealing with the same issue 2 years later. Is there an app that is able to import Risky Sign-ins, Risky Users and the like from Azure AD Identity Security into Splunk?

0 Karma

jconger
Splunk Employee
Splunk Employee

The Splunk Add-on for Microsoft Cloud Services does not currently integrate with the Azure AD Identity Protection graph API (https://docs.microsoft.com/en-us/azure/active-directory/active-directory-identityprotection-graph-ge... ) You can use the Splunk Add-on builder to interface with this API to pull these events though.

0 Karma

hughkelley
Path Finder

I think this app will fill the gap @jconger describes:

Microsoft Graph Security API Add-On for Splunk


https://splunkbase.splunk.com/app/4564/

0 Karma

anandhalagarasa
Path Finder

Can anyone help on this request

0 Karma

anandhalagarasa
Path Finder

Can anyone help?

0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...