Configure Cloud Application Security inputs for the Splunk Add-on for Microsoft Office 365¶
Description: All service policies, alerts and entities visible through the Microsoft Cloud Application Security portal.
- Policies - Lists threat protection policy information.
- Alerts - Lists information about risks identified.
- Cloud Discovery Entities - Lists information about accounts and users of cloud apps.
- Files - Lists information about files and folders metadata.
Prerequisites: Before you enable inputs, complete the previous steps in the configuration process:
- Configure an integration application in Microsoft Entra ID (Azure AD) for the Splunk Add-on for Microsoft Office 365
- Configure a Tenant in the Splunk Add-on for Microsoft Office 365
Configure your inputs on the Splunk platform instance responsible for collecting data for this add-on, usually a heavy forwarder. You can configure inputs using Splunk Web (recommended) or using the configuration files.
Configure inputs using Splunk Web¶
Configure your inputs using Splunk Web on the Splunk platform instance responsible for collecting data for this add-on, usually a heavy forwarder.
- In the Splunk Add-on for Microsoft Office 365, click Inputs > Create New Input > Cloud Application Security.
- Enter the parameter values using information provided in the input parameter table below.
- Click Add.
- Verify that data is successfully arriving by running the following search on your search head:
Splunk Search
sourcetype=o365:cas:api
If you do not see any events, check the Troubleshooting tab on your data collection node to verify that your accounts, forwarders, and inputs are all configured successfully.
Configure inputs in the configuration files¶
Configure your inputs using the configuration files on the Splunk platform instance responsible for collecting data for this add-on, usually a heavy forwarder.
- Create
$SPLUNK_HOME/etc/apps/Splunk_ta_o365/local/inputs.conf
. - Add the following stanza.
[splunk_ta_o365_cloud_app_security://<name>]
content_type = <value>
index = <value>
interval = <value>
tenant_name = <value>
- (Optional) Configure a custom
index
. - Restart your Splunk platform instance.
- Verify that data is successfully arriving by running the following search on your search head:
Splunk Search
sourcetype=o365:cas:api
If you do not see any events, check the Troubleshooting tab on your data collection node to verify that your accounts, forwarders, and inputs are all configured successfully.
Input Parameters¶
Each attribute in the following table corresponds to a field in Splunk Web.
Input Name | Corresponding field in Splunk Web | Description |
---|---|---|
name |
Input Name | A unique name for your input. |
tenant_name |
Tenant Name | The Microsoft Office 365 account from which you want to gather data. |
content_type |
Content Type | Supported content-type of Cloud Application Security for which data is to be fetched. |
index |
Index | The index in which the Audit Logs data should be stored. The default is main. |
interval |
Interval (seconds) | Rerun the input after the defined value, in seconds. |