--- title: Configure Splunk to pull Microsoft Defender ATP detections description: Configure Splunk to receive and pull detections from Microsoft Defender Security Center. keywords: configure splunk, security information and events management tools, splunk search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article --- # Configure Splunk to pull Microsoft Defender ATP detections **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configuresplunk-abovefoldlink) You'll need to configure Splunk so that it can pull Microsoft Defender ATP detections. >[!Note] >- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections >- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details. ## Before you begin - Install the open source [Windows Defender ATP Modular Inputs TA](https://splunkbase.splunk.com/app/4128/) in Splunk. - Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) - Have the details file you saved from enabling the **SIEM integration** feature ready. You'll need to get the following values: - Tenant ID - Client ID - Client Secret - Resource URL ## Configure Splunk 1. Login in to Splunk. 2. Go to **Settings** > **Data inputs**. 3. Select **Windows Defender ATP alerts** under **Local inputs**. NOTE: This input will only appear after you install the [Windows Defender ATP Modular Inputs TA](https://splunkbase.splunk.com/app/4128/). 4. Click **New**. 5. Type the following values in the required fields, then click **Save**: NOTE: All other values in the form are optional and can be left blank.
Field | Value |
---|---|
Name | Name for the Data Input | Login URL | URL to authenticate the azure app (Default : https://login.microsoftonline.com) | Endpoint | Depending on the location of your datacenter, select any of the following URL: For EU: https://wdatp-alertexporter-eu.securitycenter.windows.com/api/alerts For US: https://wdatp-alertexporter-us.securitycenter.windows.com/api/alerts For UK: https://wdatp-alertexporter-uk.securitycenter.windows.com/api/alerts
|
Tenant ID | Azure Tenant ID | Resource | Value from the SIEM integration feature page |
Client ID | Value from the SIEM integration feature page |
Client Secret | Value from the SIEM integration feature page |