Getting Data In

Why is my azure not sending all Windows Defender for Enpoint Alerts to Splunk?



I try to figure this out for a week now and I am stucked. I installed the Microsoft 365 Defender Add-on for Splunk, which is the official supported TA referring to the Microsoft Partner docs.

I enabled the input for endpoint alerts and excepted the TA to index all alerts since the "start time" (2 weeks ago).

But only one event was send, the earliest event in the 14 days period. So in my case an event from 6/9/2021, the input was enabled on 23rd of June.

Splin internal is only telling me that the connection was successfull ( status 200) and how long it took.

I double checked all the siem intergration docs from microsoft , like what permissions need to be set and so on.

Here is the link

Does anyone know, if there are more options in azure that need to be turned on to make it more talkativ?

In Defender itself I can see way more alerts than 1 in the last 14 days.

Thank you

Labels (3)
0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...