Splunk Add-ons for Microsoft Cloud Data Sources
Splunk Add-ons
Add-on | Input/Action | API | Permissions | Role (IAM) | Default Sourcetype(s) / Sources |
---|---|---|---|---|---|
Splunk Add-on for Microsoft Cloud Services
|
Azure Storage Table |
N/A |
Access key OR Shared Access Signature (SAS) |
N/A |
mscs:storage:blob
|
Azure Audit | N/A | N/A | (Subscription) Reader | mscs:azure:audit |
|
Azure Resource | N/A | N/A | (Subscription) Reader |
mscs:resource:disk
|
|
Event Hub | N/A | N/A | (Event Hub) Azure Event Hubs Data receiver |
mscs:azure:eventhub
|
|
Metrics | N/A | (Subscription) Reader |
mscs:metrics
|
||
Azure KQL Log Analytics | Log Analytics API | (Application) Data.Read - Read Log Analytics data | N/A |
mscs:kql
|
|
Azure Consumption (Billing) | N/A | (Subscription) Reader |
mscs:consumption:billing
|
||
Splunk Add-on for Microsoft Azure
|
Microsoft Entra ID [1] Sign-ins | Microsoft Graph |
(Application) AuditLog.Read.All - Read all audit log data (Application) Directory.Read.All |
N/A |
azure:aad:signin
|
Microsoft Entra ID [1] Audit | Microsoft Graph |
(Application) AuditLog.Read.All - Read all audit log data (Application) Directory.Read.All |
N/A |
azure:aad:audit
|
|
Microsoft Entra ID [1] Users | Microsoft Graph | (Application) User.Read.All - Read all users' full profiles | N/A | azure:aad:user |
|
Microsoft Entra ID [1] Groups | Microsoft Graph | (Application) Group.Read.All - Read all groups | N/A | azure:aad:group |
|
Microsoft Entra ID [1] Applications | Microsoft Graph | (Application) Application.Read.All - Read all applications | N/A | azure:aad:application |
|
Microsoft Entra ID [1] Devices | Microsoft Graph | (Application) Device.Read.All - Read all devices | N/A | azure:aad:device |
|
Microsoft Entra ID [1] Risk Detection | Microsoft Graph |
(Application) IdentityRiskEvent.Read.All - Read all identity risk event
information (Application) IdentityRiskyUser.Read.All - Read all identity risk user information |
N/A |
azure:aad:identity_protection:risk_detection
|
|
Microsoft Graph Security API | Microsoft Graph | (Application) SecurityEvents.Read.All | N/A | ms:graph:security:alerts |
|
Azure Security Center [2] Alerts & Tasks | N/A | (Subscription) Reader |
azure:securityCenter:alert
|
||
Azure Resource Graph | N/A | (Subscription) Reader |
azure:resourcegraph
|
||
Azure Topology (automatic) | N/A | (Subscription) Reader |
azure:topology
|
||
Azure Topology (manual) | N/A | (Subscription) Reader |
azure:topology
|
||
Add member to Microsoft 365 Group (alert action) | Microsoft Graph | (Application) GroupMember.ReadWrite.All - Read and write all group memberships | N/A | ||
Stop Azure VM (alert action) | N/A | (Subscription) Virtual Machine Contributor | |||
Dismiss Azure Alert (alert action) | N/A | (Subscription) Contributor | |||
Splunk Add-on for Microsoft Office 365
|
Management Activity:
|
Office 365 Management APIs |
(Application) ActivityFeed.Read (Application) ActivityFeed.ReadDlp (if collecting DLP data) (Delegated) ActivityFeed.Read (Delegated) ActivityFeed.ReadDlp (if collecting DLP data) |
N/A |
o365:management:activity
|
Service Health & Communications
|
Microsoft Graph |
(Application) ServiceHealth.Read.All (Application) ServiceMessage.Read.All |
N/A |
o365:service:healthIssue
|
|
Mailbox
|
Microsoft Graph | (Application) Reports.Read.All | N/A | sourcetype=o365:graph:api
source=MailboxUsageMailboxCounts
source=MailboxUsageDetail
|
|
Office 365
|
Microsoft Graph | (Application) Reports.Read.All | N/A | sourctype=o365:graph:api
source=Office365GroupsActivityDetail
source=Office365ServicesUserCounts
|
|
OneDrive
|
Microsoft Graph | (Application) Reports.Read.All | N/A | sourcetype=o365:graph:api
source=OneDriveActivityUserCounts
source=OneDriveUsageAccountDetail
source=OneDriveUsageStorage
|
|
SharePoint
|
Microsoft Graph | (Application) Reports.Read.All | N/A | sourcetype=o365:graph:api
source=SharePointSiteUsageDetail
source=SharePointSiteUsageFileCounts
|
|
Teams
|
Microsoft Graph | (Application) Reports.Read.All | N/A | sourcetype=o365:graph:api
source=TeamsUserActivityCounts
source=TeamsUserActivityUserDetail
|
|
Yammer
|
Microsoft Graph | (Application) Reports.Read.All | N/A | sourcetype=o365:graph:api
source=YammerGroupsActivityDetail
source=YammerGroupsActivityGroupCounts
|
|
Audit Logs
|
Microsoft Graph | (Application) AuditLog.Read.All (Application) Directory.Read.All |
N/A | sourcetype=o365:graph:api
source=AuditLogs.SignIns
|
|
Cloud Application Security [3]
Cloud Application Security is now Microsoft Defender for Cloud Apps |
o365:cas:api
|
||||
Message Trace | Office 365 Exchange Online | (Application) ReportingWebService.Read.All | Global Reader | o365:reporting:messagetrace
|
|
Microsoft O365 Email Add-on for Splunk
|
O365 Email | Microsoft Graph | (Application) Mail.ReadWrite | N/A |
ms:o365:email
|
O365 Email Groups | Microsoft Graph |
(Application) Group.Read.All (Application) GroupMember.Read.All (Application) Directory.Read.All |
N/A |
ms:o365:groups
|
|
Microsoft Teams Add-on for Splunk
|
Teams Call Record (New) | Microsoft Graph | (Application) CallRecords.Read.All | N/A |
m365:teams:callRecord
|
Teams User Report | Microsoft Graph |
(Application) Reports.Read.All (Delegated) Reports.Read.All |
N/A |
m365:teams:user:report
|
|
Teams Subscription (Deprecated) | Microsoft Graph | (Delegated) Subscriptions.Read.All | N/A |
m365:subscription
|
|
Teams Call Record (Deprecated) | Microsoft Graph | (Application) CallRecords.Read.All | N/A |
m365:teams:callRecord
|
|
Teams Webhook (Deprecated) | N/A | N/A | N/A |
m365:webhook
|
|
Splunk Add-on for Microsoft Security
|
Microsoft 365 Defender Incidents | Microsoft Threat Protection | (Application) Incident.Read.All | N/A |
m365:defender:incident
|
Defender Advanced Hunting (action) | Microsoft Threat Protection | (Application) AdvancedHunting.Read.All | N/A |
m365:defender:incident:advanced_hunting
|
|
Defender Update Incident (action) | Microsoft Threat Protection | (Application) Incident.ReadWrite.All | N/A | N/A | |
Microsoft Defender for Endpoint Alerts | WindowsDefenderATP | (Application) Alert.Read.All | N/A |
ms:defender:atp:alerts
|
|
Microsoft Graph Security API Add-on for Splunk
Archived - use the Splunk Add-on for Microsoft Azure "Microsoft Graph Security API" input |
Microsoft Graph Security | Microsoft Graph | (Application) SecurityEvents.Read.All | N/A |
GraphSecurityAlert
|
[1] Azure Active Directory is now Microsoft Entra ID
[2] Azure Security Center is now Microsoft Defender for Cloud
[3] Cloud Application Security is now Microsoft Defender for Cloud Apps