Source types for the Splunk Add-on for Microsoft Office 365¶
The Splunk Add-on for Microsoft Office 365 provides the index-time and search-time knowledge for audit, service status, and service message events in the following formats.
Source type |
Dataset_Name |
Description |
CIM data models |
---|---|---|---|
|
n/a |
All service policies, alerts and entities visible through the Microsoft cloud application security portal. |
n/a |
|
n/a |
All audit events and reports visible through the Microsoft Graph API endpoints. This includes all log events and reports visible through the Microsoft Graph API. |
n/a |
|
Authentication |
All audit events visible through the Office 365 Management Activity API |
Authentication, Alerts, Change, Data Access, Data Loss Prevention, Email |
|
n/a |
All service status events visible through the Microsoft Graph API
for Service health and communications. |
n/a |
|
n/a |
All service message events visible through the Microsoft Graph
API for Service health and communications. |
n/a |
|
n/a |
All Message Trace events visible through the Microsoft Report API endpoints. |
|
|
n/a |
All log events generated by the Splunk Add-on for Microsoft Office 365. |
n/a |