\current\user\agent\flexagent` folder of the connector installation folder.
3. Open an elevated command-line:
@@ -69,7 +79,7 @@ The following steps assume that you have completed all the required steps in [Be
Type in the name of the client property file. It must match the client property file. |
Events URL |
- `https://DataAccess-PRD.trafficmanager.net:444/api/alerts` |
+ Depending on the location of your datacenter, select either the EU or the US URL: **For EU**: https://wdatp-alertexporter-eu.securitycenter.windows.com/api/alerts **For US:** https://wdatp-alertexporter-us.securitycenter.windows.com/api/alerts |
Authentication Type |
OAuth 2 |
@@ -78,7 +88,8 @@ The following steps assume that you have completed all the required steps in [Be
Select *wdatp-connector.properties*. |
Refresh Token |
- Paste the refresh token that your Windows Defender ATP contact provided, or run the `restutil` tool to get it. |
+ You can use the Windows Defender ATP events URL or the restutil tool to get obtain a refresh token. For more information on getting your refresh token using the events URL, see [Obtain a refresh token](configure-aad-windows-defender-advanced-threat-protection.md#obtain-a-refresh-token). **To get your refresh token using the restutil tool:** a. Open a command prompt. Navigate to `C:\ArcSightSmartConnectors\\current\bin`. b. Type: `arcsight restutil token -config C:\ArcSightSmartConnectors_Prod\WDATP\WDATP-connector.properties`. A Web browser window will open. c. Type in your credentials then click on the password field to let the page redirect. In the login prompt, enter your credentials. d. A refresh token is shown in the command prompt. e. Paste the value in the form.
+ |
diff --git a/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md b/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md
index 60e1c00469..ee6c76e9b7 100644
--- a/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md
+++ b/windows/keep-secure/configure-splunk-windows-defender-advanced-threat-protection.md
@@ -25,9 +25,9 @@ You'll need to configure Splunk so that it can consume Windows Defender ATP aler
## Before you begin
-- Install the [REST API Modular Input app](https://splunkbase.splunk.com/app/1546/) in Splunk
-- Contact the Windows Defender ATP team to get your refresh token
-- Get the following information from your Azure Active Directory (AAD) application by selecting the **View Endpoint** on the application configuration page:
+- Install the [REST API Modular Input app](https://splunkbase.splunk.com/app/1546/) in Splunk.
+- Obtain your refresh token. For more information, see [Obtain a refresh token](configure-aad-windows-defender-advanced-threat-protection.md#obtain-a-refresh-token).
+- Get the following information from your Azure Active Directory (AAD) application by selecting **View Endpoint** on the application configuration page:
- OAuth 2 Token refresh URL
- OAuth 2 Client ID
- OAuth 2 Client secret
@@ -56,7 +56,8 @@ You'll need to configure Splunk so that it can consume Windows Defender ATP aler
Endpoint URL |
- https://DataAccess-PRD.trafficmanager.net:444/api/alerts |
+ Depending on the location of your datacenter, select either the EU or the US URL: **For EU**: https://wdatp-alertexporter-eu.securitycenter.windows.com/api/alerts **For US:** https://wdatp-alertexporter-us.securitycenter.windows.com/api/alerts
+
|
HTTP Method |
diff --git a/windows/keep-secure/images/atp-refresh-token.png b/windows/keep-secure/images/atp-refresh-token.png
new file mode 100644
index 0000000000..3f7e8c7c69
Binary files /dev/null and b/windows/keep-secure/images/atp-refresh-token.png differ