Splunk Tech Talks
Deep-dives for technical practitioners.

Maximize the Value from Microsoft Defender with Splunk

melissap
Splunk Employee
Splunk Employee

Microsoft Defender Header.png

 

Join Splunk and Sens Consulting for this Security Edition Tech Talk

Who should attend:  Security Analysts, SOC Managers

Microsoft Defender Threat Vulnerabilities data contains valuable information about software vulnerabilities in your environment. Defender also has device tagging capabilities which will enhance your asset list in Splunk Enterprise Security. So let's get this data into Splunk and elevate your security overview.

 

(view in My Videos)


Tune in for Maximize the value from Microsoft Defender with Splunk to see how to prepare the data in Microsoft Defender and collect and normalize it into the Vulnerability data model. Afterwards you will end up with a dashboard on a System Manager level - revealing the risks both in a specific system and across the organization. All of this is packed into a technical add-on which will be available for you.

Speakers:
Mikael Bjerkeland, Security Sales Engineer, Splunk
Andreas Søvik - Senior Consultant, Sens Consulting
Thomas Hillesøy - Senior Consultant, Sens Consulting

Splunkbase App: Microsoft 365 Defender Threat Vulnerability Add-on for Splunk

 

melissap
Splunk Employee
Splunk Employee

Here are all the resources to continue on your Journey

Splunkbase App

Documentation

Sens Consulting

melissap
Splunk Employee
Splunk Employee

Just in: The new APP is live on Splunkbase.

Microsoft 365 Defender Threat Vulnerability Add-on for Splunk

Contributors
Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...