Splunk® Supported Add-ons

Splunk Add-on for Microsoft Security

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Configure Alert Actions to collect data for the Splunk Add-on for Microsoft Security

You can configure an alert action for Advanced Hunting and Update Incidents in the Splunk Add-on for Microsoft Security in order to collect data into Splunk ad-hoc rather than proactively

  1. Navigate to Add-on UI > Settings > Searches, Reports and Alerts.
  2. Click New Alert.
  3. Click Create Alert and provide the appropriate information.
  4. Select a value from Add Action dropdown
    • Defender Advanced Hunting : For collecting Advanced Hunting Events
    • Defender Update Incident : For updating incidents and collecting events of updated incidents
    • Defender Update Incident via Graph API: For updating incidents and collecting events of updated incidents using the Microsoft Graph API
  5. Select desired action and provide the requested information.
  6. Click Save.

Note the following:

  • Alert Action queries are not supported on Classic Cloud instances.
  • When you create a Defender Advanced Hunting Alert Action, you must provide the Query
  • You can optionally provide a Tenant ID corresponding to the selected Account to authenticate API calls for Alert Actions
  • In clustered environments, configure the Alert Action on either the Victoria stack or HF as it collects data.
Last modified on 24 April, 2024
PREVIOUS
Configure inputs for the Splunk Add-on for Microsoft Security
  NEXT
Use Dashboards to view the analytics for the Splunk Add-on for Microsoft Security

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters