Skip to content

Configure Cloud Application Security inputs for the Splunk Add-on for Microsoft Office 365

Description: All service policies, alerts and entities visible through the Microsoft Cloud Application Security portal.

  • Policies - Lists threat protection policy information.
  • Alerts - Lists information about risks identified.
  • Cloud Discovery Entities - Lists information about accounts and users of cloud apps.
  • Files - Lists information about files and folders metadata.

Prerequisites: Before you enable inputs, complete the previous steps in the configuration process:

Configure your inputs on the Splunk platform instance responsible for collecting data for this add-on, usually a heavy forwarder. You can configure inputs using Splunk Web (recommended) or using the configuration files.

Configure inputs using Splunk Web

Configure your inputs using Splunk Web on the Splunk platform instance responsible for collecting data for this add-on, usually a heavy forwarder.

  1. In the Splunk Add-on for Microsoft Office 365, click Inputs > Create New Input > Cloud Application Security.
  2. Enter the parameter values using information provided in the input parameter table below.
  3. Click Add.
  4. Verify that data is successfully arriving by running the following search on your search head:

Splunk Search

sourcetype=o365:cas:api

If you do not see any events, check the Troubleshooting tab on your data collection node to verify that your accounts, forwarders, and inputs are all configured successfully.

Configure inputs in the configuration files

Configure your inputs using the configuration files on the Splunk platform instance responsible for collecting data for this add-on, usually a heavy forwarder.

  1. Create $SPLUNK_HOME/etc/apps/Splunk_ta_o365/local/inputs.conf.
  2. Add the following stanza.
[splunk_ta_o365_cloud_app_security://<name>]
content_type = <value>
index = <value>
interval = <value>
tenant_name = <value>
  1. (Optional) Configure a custom index.
  2. Restart your Splunk platform instance.
  3. Verify that data is successfully arriving by running the following search on your search head:

Splunk Search

sourcetype=o365:cas:api

If you do not see any events, check the Troubleshooting tab on your data collection node to verify that your accounts, forwarders, and inputs are all configured successfully.

Input Parameters

Each attribute in the following table corresponds to a field in Splunk Web.

Input Name Corresponding field in Splunk Web Description
name Input Name A unique name for your input.
tenant_name Tenant Name The Microsoft Office 365 account from which you want to gather data.
content_type Content Type Supported content-type of Cloud Application Security for which data is to be fetched.
index Index The index in which the Audit Logs data should be stored. The default is main.
interval Interval (seconds) Rerun the input after the defined value, in seconds.