I try to figure this out for a week now and I am stucked. I installed the Microsoft 365 Defender Add-on for Splunk, which is the official supported TA referring to the Microsoft Partner docs.
I enabled the input for endpoint alerts and excepted the TA to index all alerts since the "start time" (2 weeks ago).
But only one event was send, the earliest event in the 14 days period. So in my case an event from 6/9/2021, the input was enabled on 23rd of June.
Splin internal is only telling me that the connection was successfull ( status 200) and how long it took.
I double checked all the siem intergration docs from microsoft , like what permissions need to be set and so on.
Here is the link https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api-hello-world?view=o365-...
Does anyone know, if there are more options in azure that need to be turned on to make it more talkativ?
In Defender itself I can see way more alerts than 1 in the last 14 days.