diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md
index ce5c0230b1..70736626cc 100644
--- a/windows/security/threat-protection/TOC.md
+++ b/windows/security/threat-protection/TOC.md
@@ -303,7 +303,7 @@
### [Microsoft Defender Advanced Threat Protection for Mac](windows-defender-antivirus/microsoft-defender-atp-mac.md)
-#### [What's New in Microsoft Defender ATP for Mac] (windows-defender-antivirus/microsoft-defender-atp-mac-whatsnew.md)
+#### [What's New in Microsoft Defender ATP for Mac](windows-defender-antivirus/microsoft-defender-atp-mac-whatsnew.md)
#### [Deploy Microsoft Defender Advanced Threat Protection for Mac]()
##### [Microsoft Intune-based deployment](windows-defender-antivirus/microsoft-defender-atp-mac-install-with-intune.md)
##### [JAMF-based deployment](windows-defender-antivirus/microsoft-defender-atp-mac-install-with-jamf.md)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md
index fd61b88ec1..52be77a611 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md
@@ -40,19 +40,19 @@ You'll need to configure Splunk so that it can pull Microsoft Defender ATP detec
- Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)
- Have the details file you saved from enabling the **SIEM integration** feature ready. You'll need to get the following values:
- - OAuth 2 Token refresh URL
- - OAuth 2 Client ID
- - OAuth 2 Client secret
+ - Tenant ID
+ - Client ID
+ - Client Secret
+ - Resource URL
-- Have the refresh token that you generated from the SIEM integration feature ready.
## Configure Splunk
1. Login in to Splunk.
-2. Click **Search & Reporting**, then **Settings** > **Data inputs**.
+2. Go to **Settings** > **Data inputs**.
-3. Click **REST** under **Local inputs**.
+3. Select **Windows Defender ATP alerts** under **Local inputs**.
NOTE:
This input will only appear after you install the [Windows Defender ATP Modular Inputs TA](https://splunkbase.splunk.com/app/4128/).
@@ -71,55 +71,30 @@ You'll need to configure Splunk so that it can pull Microsoft Defender ATP detec
Value |
- Endpoint URL |
+ Name |
+ Name for the Data Input |
+
+ Login URL |
+ URL to authenticate the azure app (Default : https://login.microsoftonline.com) |
+
+ Endpoint |
Depending on the location of your datacenter, select any of the following URL: For EU: https://wdatp-alertexporter-eu.securitycenter.windows.com/api/alerts For US:https://wdatp-alertexporter-us.securitycenter.windows.com/api/alerts
For UK:https://wdatp-alertexporter-uk.securitycenter.windows.com/api/alerts
|
- HTTP Method |
- GET |
+ Tenant ID |
+ Azure Tenant ID |
- Authentication Type |
- oauth2 |
+ Resource |
+ Value from the SIEM integration feature page |
- OAuth 2 Access token |
- Use the value that you generated when you enabled the SIEM integration feature. NOTE: The access token expires after an hour. |
+ Client ID |
+ Value from the SIEM integration feature page |
- OAuth 2 Refresh Token |
- Use the value that you generated when you enabled the SIEM integration feature. |
-
-
- OAuth 2 Token Refresh URL |
- Use the value from the details file you saved when you enabled the SIEM integration feature. |
-
-
- OAuth 2 Client ID |
- Use the value from the details file you saved when you enabled the SIEM integration feature. |
-
-
- OAuth 2 Client Secret |
- Use the value from the details file you saved when you enabled the SIEM integration feature. |
-
-
- Response type |
- Json |
-
-
- Response Handler |
- JSONArrayHandler |
-
-
- Polling Interval |
- Number of seconds that Splunk will ping the Microsoft Defender ATP machine. Accepted values are in seconds. |
-
-
- Set sourcetype |
- Manual |
-
-
- Source type |
- _json |
+ Client Secret |
+ Value from the SIEM integration feature page |
+
@@ -133,20 +108,20 @@ Use the solution explorer to view detections in Splunk.
2. Select **New**.
3. Enter the following details:
- - Destination app: Select Search & Reporting (search)
- - Search name: Enter a name for the query
- Search: Enter a query, for example:
- `source="rest://windows atp alerts"|spath|table*`
+ `sourcetype="wdatp:alerts" |spath|table*`
+ - App: Add-on for Windows Defender (TA_Windows-defender)
Other values are optional and can be left with the default values.
+
4. Click **Save**. The query is saved in the list of searches.
5. Find the query you saved in the list and click **Run**. The results are displayed based on your query.
>[!TIP]
-> To mininimize Detection duplications, you can use the following query:
->```source="rest://windows atp alerts" | spath | dedup _raw | table *```
+> To minimize Detection duplications, you can use the following query:
+>```source="rest://wdatp:alerts" | spath | dedup _raw | table *```
## Related topics
- [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md)