All Apps and Add-ons

Is there any way to capture the Risky Sign-ins from Azure into Splunk?

anandhalagarasa
Path Finder

Hi Team,

Is there any way to capture the Risky Sign-ins from Azure into Splunk so that will be helpful to implement the same in our environment.

Kindly note we have already installed Splunk Add-on For Microsoft services in our Search Head server. But not sure how to proceed further to capture the Risky Sign-ins from Azure environment.

Tags (1)
0 Karma

aplackemeier
Explorer

index=* "riskState" | spath riskState | search riskState=atRisk

0 Karma

Darky86
New Member

Sorry to resurrect a superdead thread, but we are dealing with the same issue 2 years later. Is there an app that is able to import Risky Sign-ins, Risky Users and the like from Azure AD Identity Security into Splunk?

0 Karma

jconger
Splunk Employee
Splunk Employee

The Splunk Add-on for Microsoft Cloud Services does not currently integrate with the Azure AD Identity Protection graph API (https://docs.microsoft.com/en-us/azure/active-directory/active-directory-identityprotection-graph-ge... ) You can use the Splunk Add-on builder to interface with this API to pull these events though.

0 Karma

hughkelley
Path Finder

I think this app will fill the gap @jconger describes:

Microsoft Graph Security API Add-On for Splunk


https://splunkbase.splunk.com/app/4564/

0 Karma

anandhalagarasa
Path Finder

Can anyone help on this request

0 Karma

anandhalagarasa
Path Finder

Can anyone help?

0 Karma
Get Updates on the Splunk Community!

.conf25 Registration is OPEN!

Ready. Set. Splunk! Your favorite Splunk user event is back and better than ever. Get ready for more technical ...

Detecting Cross-Channel Fraud with Splunk

This article is the final installment in our three-part series exploring fraud detection techniques using ...

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...