--- title: Configure Splunk to pull Microsoft Defender ATP detections description: Configure Splunk to receive and pull detections from Microsoft Defender Security Center. keywords: configure splunk, security information and events management tools, splunk search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.author: macapara author: mjcaparas ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: article --- # Configure Splunk to pull Microsoft Defender ATP detections **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configuresplunk-abovefoldlink) You'll need to configure Splunk so that it can pull Microsoft Defender ATP detections. >[!Note] >- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections >- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details. ## Before you begin - Install the open source [Windows Defender ATP Modular Inputs TA](https://splunkbase.splunk.com/app/4128/) in Splunk. - Make sure you have enabled the **SIEM integration** feature from the **Settings** menu. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md) - Have the details file you saved from enabling the **SIEM integration** feature ready. You'll need to get the following values: - OAuth 2 Token refresh URL - OAuth 2 Client ID - OAuth 2 Client secret - Have the refresh token that you generated from the SIEM integration feature ready. ## Configure Splunk 1. Login in to Splunk. 2. Click **Search & Reporting**, then **Settings** > **Data inputs**. 3. Click **REST** under **Local inputs**. NOTE: This input will only appear after you install the [Windows Defender ATP Modular Inputs TA](https://splunkbase.splunk.com/app/4128/). 4. Click **New**. 5. Type the following values in the required fields, then click **Save**: NOTE: All other values in the form are optional and can be left blank.
Field | Value |
---|---|
Endpoint URL | Depending on the location of your datacenter, select any of the following URL: For EU: https://wdatp-alertexporter-eu.securitycenter.windows.com/api/alerts For US: https://wdatp-alertexporter-us.securitycenter.windows.com/api/alerts For UK: https://wdatp-alertexporter-uk.securitycenter.windows.com/api/alerts
|
HTTP Method | GET | Authentication Type | oauth2 |
OAuth 2 Access token | Use the value that you generated when you enabled the SIEM integration feature. NOTE: The access token expires after an hour. |
OAuth 2 Refresh Token | Use the value that you generated when you enabled the SIEM integration feature. |
OAuth 2 Token Refresh URL | Use the value from the details file you saved when you enabled the SIEM integration feature. |
OAuth 2 Client ID | Use the value from the details file you saved when you enabled the SIEM integration feature. |
OAuth 2 Client Secret | Use the value from the details file you saved when you enabled the SIEM integration feature. |
Response type | Json |
Response Handler | JSONArrayHandler |
Polling Interval | Number of seconds that Splunk will ping the Microsoft Defender ATP machine. Accepted values are in seconds. |
Set sourcetype | Manual |
Source type | _json |