Microsoft 365 Defender ATP Data

Splunk Add-on for Microsoft Security for Splunk will be used to collect Windows Defender ATP alert logs.

Splunkbase Download: https://splunkbase.splunk.com/app/6207/

Installation and Configuration Guide: https://splunkbase.splunk.com/app/6207/#/details

Note: Use index=defenderatp for data collection or update the macro definition for cs_o365_defender_atp (Settings > Configuration).

Collect Defender ATP Configuration Status Logs from Windows Servers

The Defender ATP Status Check Add-On will be used to collect Defender ATP Configuration Status check logs.

Splunkbase Download: https://splunkbase.splunk.com/app/5691

Installation and Configuration Guide: https://splunkbase.splunk.com/app/5691/#/details

Install the Defender ATP Status Check Add-On on a heavy forwarder and universal forwarders (Windows).

Add the following stanza to inputs.conf in the local directory for the TA-defender-atp-status-check add-on:

[powershell://generate_defender_atp_status_logs] 
disabled = 0
index = defenderatp

Note: Use index=defenderatp for data collection or update the macro definition for cs_o365_defender_atp_audit (Settings > Configuration).

Audit Defender ATP Configuration Status

Use the Microsoft Defender ATP Audit dashboard (Settings > Microsoft 365 Defender ATP) to audit the configuration status for Defender ATP.


Copyright © 2023 CrossRealms International.