Skip to content

Migrate and upgrade the Splunk add-on for Microsoft Security

Upgrade the Splunk Add-on for Microsoft Security from version 2.1 to version 2.2.0 or later

After upgrading the add-on in your environment to version 2.2.0 or later, clear the browser cache. Refresh the Add-On’s page to see the new modular inputs to collect simulations and real time Advanced hunting events from Azure Event Hub streamed using streaming API.

Upgrade the Splunk Add-on for Microsoft Security from version 2.0.1 to version 2.1.1

After upgrading the add-on in your environment to version 2.1.1, clear the browser cache. Refresh the Add-On’s page to see the dashboards that give a sneak peek under the hood of the add-on.

Upgrade the Splunk Add-on for Microsoft Security from version 1.3.1 to version 2.0.1

After upgrading the add-on in your environment to version 2.0.1, clear the web browser cache.

Migrate from the Microsoft 365 Defender Add-on for Splunk to the Splunk Add-on for Microsoft Security 1.0.0 and later

If you have already installed the Microsoft 365 Defender Add-on for Splunk in a Splunk instance and want to install Splunk Add-on for Microsoft Security in the same Splunk instance, you must first:

  • Disable inputs for the Microsoft 365 Defender Add-on for Splunk
  • Disable the Microsoft 365 Defender Add-on for Splunk.

This prevents clashing of modular inputs, data collection mechanisms, and sourcetypes in both add-ons.

To disable inputs for Microsoft 365 Defender Add-on for Splunk, navigate to the Inputs page and select “Disable” in the dropdown for that add-on.

To disable the Microsoft 365 Defender Add-on for Splunk, navigate to Apps > Manage Apps and select the “Disable” option for the add-on.

If both add-ons are enabled on the same Splunk instance, data duplication occurs for the sourcetype with the same names: ms:defender:atp:alerts and m365:defender:incident:advanced_hunting. The names of former sources and current sources are:

  • The Microsoft 365 Defender Add-on for Splunk source names:
    • microsoft_365_defender_incidents
    • microsoft_defender_atp_alerts
    • ms_defender_apt_alerts
  • The Splunk Add-on for Microsoft Security sourcenames:
    • microsoft_365_defender_endpoint_incidents
    • microsoft_defender_endpoint_atp_alerts
    • ms_defender_endpoint_apt_alerts
  • If the Microsoft 365 Defender Add-on for Splunk is already installed, the modular input names are different for the Splunk Add-on for Microsoft Security. This means that source names are modified for events coming through modular inputs. The table describes these source name changes.
Source name in Microsoft 365 Defender Add-on for Splunk Source name in Splunk add-on for MS Security v1.0.0 and later
microsoft_365_defender_incidents microsoft_365_defender_endpoint_incidents
microsoft_defender_atp_alerts microsoft_defender_endpoint_atp_alerts
ms_defender_apt_alerts ms_defender_endpoint_apt_alerts

This table describes the event types supported in Splunk Add-on for Microsoft Security 1.0.0 and later with data models compared with the same for Microsoft 365 Defender Add-on for Splunk.

Event type CIM data model in the Microsoft 365 Defender Add-on for Splunk CIM data model in the Splunk Add-on for Microsoft Security
ms_security_incident Alerts Ticket Management:Incident
ms_security_atp_alert Alerts Alerts
ms_security_advanced_hunting No DM No DM
ms_security_advanced_hunting_process Endpoint:Processes Endpoint:Processes
ms_security_advanced_hunting_network Network Traffic, Endpoint:Ports The eventtype is removed and the events now falls under ms_security_advanced_hunting_process eventtype
ms_security_advanced_hunting_filesystem Change:Endpoint, Endpoint:Filesystem Endpoint:Filesystem
ms_security_advanced_hunting_registry Change:Endpoint, Endpoint:Registry Endpoint:Registry
ms_security_advanced_hunting_delivery Not present Email:Delivery
ms_security_advanced_hunting_email Not present Email:All_Email
ms_security_advanced_hunting_authentication Not present Authentication
ms_security_incident_alerts Not present Alerts
  • The sourcetypes supported in the Splunk Add-on for Microsoft Security are:
    • ms:defender:atp:alerts
    • ms365:defender:incident
    • m365:defender:incident:advanced_hunting
    • ms365:defender:incident:alerts

Events in old sourcetype m365:defender:incident consisted of alerts data and incident data. Alerts related data was not relevant in this sourcetype. So in this release, the events are bifurcated at index time in such a way that alerts related data gets indexed into the new sourcetype ms365:defender:incident:alerts, and only incident related data gets ingested in the re-named sourcetype ms365:defender:incident

  • Schema difference in Alerts that are collected through the Splunk Add-on for Microsoft Security:

The Splunk Addon for Microsoft Security collects Alerts in the following sourcetypes:

* ms:defender:atp:alerts
* ms365:defender:incident:alerts

Based on specific requirements, users can collect either of the two alert sourcetypes as these events contain some fields which are unique to each sourcetype.

Refer to the Microsoft Documents for ATP Alerts and Incident APIs to get further information about the difference in schema for both alerts.