Release notes for the Splunk Add-on for Microsoft Office 365¶
Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 was released
on
Note
The Cloud Discovery content type from Cloud App Security input will be deprecated in a future release.
Note
Version 4.3.0 and higher is expected to have around 1% of event duplication for the Management Activity input in the Splunk platform due to duplicate events from the Microsoft API.
About this release¶
Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 is compatible with the following software, CIM versions, and platforms.
Splunk platform versions | 9.1.x, 9.2.x, 9.3.x, 9.4.x |
CIM | 5.1.0 |
Supported OS | Platform independent (MacOS is not supported) |
Vendor products | Microsoft Office 365 |
New features¶
Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 has the following new features:
- Provided support for beta version of API in Microsoft Entra ID Metadata input.
- Provided support for Certificate Based Authentication in tenant configuration.
- Introduced alert
Add Member to Microsoft 365 Group
to migrate it from Splunk Add-on for Microsoft Azure. For more information, see Configure Add Member to Microsoft 365 Group Alert. - Provided support for
USGovGCC
andUSGovGCCHigh
endpoints in Message Trace input. - Provided support for custom command
getsensitivitylabels
. For more information, see Get Sensitivity Labels command. - Bug fixes.
Fixed issues¶
Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 contains the following, if any, fixed issues.
Known issues¶
Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 contains the following, if any, known issues.
Third-party software attributions¶
Version 4.9.0 of the Splunk Add-on for Microsoft Office 365 incorporates the following third-party software or libraries.
Third-party software attributions for the Splunk Add-on for Microsoft Office 365