Splunk® Supported Add-ons

Splunk Add-on for Microsoft Office 365

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Configure an integration application in Azure AD for the Splunk Add-on for Microsoft Office 365

In order to gather data from the Office 365 Management Activity API and the Office 365 Service Communication API using this add-on, you must first create an integration application in Azure AD. This application securely authenticates the Splunk Add-on for Microsoft Office via the OAuth2 protocol, so that it can access and gather the data according to the services and permission levels that you specify.

In order to create an integration application, you need the following prerequisites:

  • A Microsoft Azure account with administrator permissions to delegate roles to the application user. Your Microsoft Azure subscription must be linked with your Office 365 subscription by using the same login id.
  • A security token for the Microsoft Cloud Application Security Portal. See the Managing API tokens topic in the Microsoft documentation.

Create an application in Microsoft Azure AD

  1. Follow the instructions in Get started with Office 365 Management APIs in the Microsoft documentation to create an integration application.
  2. When creating your application, make a note of the following parameters. They will be needed to Configure a Tenant in the Splunk Add-on for Microsoft Office 365.
    • Directory ID (Tenant ID)
    • Application ID (Client ID)
  3. Set the following Application permissions and Delegated permissions in the API Permissions > Add a permission pane of the Azure Active Directory Office 365 Management API configuration. These permissions are required for the Splunk Add-on for Microsoft Office 365.
    API/Permissions name Description API Technology Name
    ServiceHealth.Read Read service health information for your organization Microsoft Office 365 Management
    ActivityFeed.Read Read activity data for your organization Microsoft Office 365 Management
    AuditLog.Read.All Read all audit log data Microsoft Graph
    Policy.Read.All Read your organization's policies Microsoft Graph
    Reports.Read.All Read all usage reports Microsoft Graph
    Directory.Read.All Read directory data Microsoft Graph
    ActivityFeed.ReadDlp (Optional) Read DLP policy events including detected sensitive data. Microsoft Office 365 Management

    Accessing DLP policy events requires an additional Microsoft Azure Active Directory subscription. Refer to the Microsoft Azure Active Directory documentation for more information.

  4. Click Save after you change permissions.
  5. Click Grant admin consent for <tenant name>.
  6. In Certificates & secrets, under Client secrets, generate a password and make a note of the generated key (Client Secret).

    When you exit the password pane the password is permanently hidden. If you have not made a note of the password, you will have to generate a new password for your application.

Last modified on 14 October, 2021
PREVIOUS
Upgrade the Splunk Add-on for Microsoft Office 365
  NEXT
Configure a Tenant in the Splunk Add-on for Microsoft Office 365

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters