Splunk® Supported Add-ons

Splunk Add-on for Microsoft Office 365

Download manual as PDF

Download topic as PDF

Source types for the Splunk Add-on for Microsoft Office 365

The Splunk Add-on for Microsoft Office 365 provides the index-time and search-time knowledge for audit, service status, and service message events in the following formats.

Source type Dataset_Name Description CIM data models
o365:management:activity authentication, account_management, endpoint_changes All audit events visible through the Office 365 Management Activity API Change Analysis, Authentication
o365:service:status n/a All service status events visible through the Office 365 Service Communications API n/a
o365:service:message n/a All service message events visible through the Office 365 Service Communications API n/a
splunk:ta:o365:log n/a All log events generated by the Splunk Add-on for Microsoft Office 365 n/a
PREVIOUS
Splunk Add-on for Microsoft Office 365
  NEXT
Release notes for the Splunk Add-on for Microsoft Office 365

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters