Skip to content

Release notes for the Splunk Add-on for Microsoft Office 365

Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 was released on .

Note

The Cloud Discovery content type from Cloud App Security input will be deprecated in a future release.

Note

Version 4.3.0 and higher is expected to have around 1% of event duplication for the Management Activity input in the Splunk platform due to duplicate events from the Microsoft API.

About this release

Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 is compatible with the following software, CIM versions, and platforms.

Splunk platform versions 9.1.x, 9.2.x, 9.3.x, 9.4.x
CIM 5.1.0
Supported OS Platform independent (MacOS is not supported)
Vendor products Microsoft Office 365

New features

Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 has the following new features:

  • Provided support for beta version of API in Microsoft Entra ID Metadata input.
  • Provided support for Certificate Based Authentication in tenant configuration.
  • Introduced alert Add Member to Microsoft 365 Group to migrate it from Splunk Add-on for Microsoft Azure. For more information, see Configure Add Member to Microsoft 365 Group Alert.
  • Provided support for USGovGCC and USGovGCCHigh endpoints in Message Trace input.
  • Provided support for custom command getsensitivitylabels. For more information, see Get Sensitivity Labels command.
  • Bug fixes.

Fixed issues

Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 contains the following, if any, fixed issues.

Known issues

Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 contains the following, if any, known issues.

Third-party software attributions

Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 incorporates the following third-party software or libraries.

Third-party software attributions for the Splunk Add-on for Microsoft Office 365