Getting Data In

Why is my azure not sending all Windows Defender for Enpoint Alerts to Splunk?

dkeck
Influencer

Hi,

I try to figure this out for a week now and I am stucked. I installed the Microsoft 365 Defender Add-on for Splunk, which is the official supported TA referring to the Microsoft Partner docs.

I enabled the input for endpoint alerts and excepted the TA to index all alerts since the "start time" (2 weeks ago).

But only one event was send, the earliest event in the 14 days period. So in my case an event from 6/9/2021, the input was enabled on 23rd of June.

Splin internal is only telling me that the connection was successfull ( status 200) and how long it took.

I double checked all the siem intergration docs from microsoft , like what permissions need to be set and so on.

Here is the link https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/api-hello-world?view=o365-...

Does anyone know, if there are more options in azure that need to be turned on to make it more talkativ?

In Defender itself I can see way more alerts than 1 in the last 14 days.

Thank you

Labels (2)
0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...