2019-09-20 15:29:57 -07:00

4.6 KiB

title, description, keywords, search.product, search.appverid, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, ms.author, author, ms.localizationpriority, manager, audience, ms.collection, ms.topic
title description keywords search.product search.appverid ms.prod ms.mktglfcycl ms.sitesec ms.pagetype ms.author author ms.localizationpriority manager audience ms.collection ms.topic
Configure Splunk to pull Microsoft Defender ATP detections Configure Splunk to receive and pull detections from Microsoft Defender Security Center. configure splunk, security information and events management tools, splunk eADQiWindows 10XVcnh met150 w10 deploy library security macapara mjcaparas medium dansimp ITPro M365-security-compliance article

Configure Splunk to pull Microsoft Defender ATP detections

Applies to:

Want to experience Microsoft Defender ATP? Sign up for a free trial.

You'll need to configure Splunk so that it can pull Microsoft Defender ATP detections.

Note

Before you begin

Configure Splunk

  1. Login in to Splunk.

  2. Go to Settings > Data inputs.

  3. Select Windows Defender ATP alerts under Local inputs.

    NOTE: This input will only appear after you install the Windows Defender ATP Modular Inputs TA.

  4. Click New.

  5. Type the following values in the required fields, then click Save:

    NOTE: All other values in the form are optional and can be left blank.

    Field Value
    Name Name for the Data Input
    Login URL URL to authenticate the azure app (Default : https://login.microsoftonline.com)
    Endpoint Depending on the location of your datacenter, select any of the following URL:

    For EU: https://wdatp-alertexporter-eu.securitycenter.windows.com/api/alerts

    For US:https://wdatp-alertexporter-us.securitycenter.windows.com/api/alerts

    For UK:https://wdatp-alertexporter-uk.securitycenter.windows.com/api/alerts
    Tenant ID Azure Tenant ID
    Resource Value from the SIEM integration feature page
    Client ID Value from the SIEM integration feature page
    Client Secret Value from the SIEM integration feature page

After completing these configuration steps, you can go to the Splunk dashboard and run queries.

View detections using Splunk solution explorer

Use the solution explorer to view detections in Splunk.

  1. In Splunk, go to Settings > Searchers, reports, and alerts.

  2. Select New.

  3. Enter the following details:

    • Search: Enter a query, for example:
      sourcetype="wdatp:alerts" |spath|table*

    • App: Add-on for Windows Defender (TA_Windows-defender)

      Other values are optional and can be left with the default values.

  4. Click Save. The query is saved in the list of searches.

  5. Find the query you saved in the list and click Run. The results are displayed based on your query.

Tip

To minimize Detection duplications, you can use the following query: source="rest://wdatp:alerts" | spath | dedup _raw | table *