When updating from v0.1.x to v0.2.x, please re-setup the credentials
This App can use Advanced Hunting with their query format (KQL) through Microsoft Defender for Endpoint API.
Microsoft offers three APIs for Microsoft Defender Endpoint to use Advanced Hunting.
This app can automatically recognize which API endpoint you choose, and query it.
If two or three are used in a single app, this app will give priority to "Microsoft Defender for Endpoint".
Please refer this for more detail about the endpoint.
AdvancedQuery.Read.All
permission.AdvancedHunting.Read.All
permission.ThreatHunting.Read.All
permission.Label | Description |
---|---|
Account name | Required. Set unique name for this credential. |
Client ID | Required. Set Application (Client) ID. |
Client Secret | Required. Set Client Secret. |
Tenant ID | Required. Set Directory (Tenant) ID. |
Default Credential | Optional. If checked, this app use this credentail as default. |
Request read timeout (in seconds) | Optional. This means the read timeout for API request. Default value is 60s. |
Request connection timeout (in seconds) | Optional. This means the connection timeout for API request. Default value is 10s. |
Request retry num | Optional. This means the number of retry for API request when API returns server error. Default value is 0. |
Command | Type | Description |
---|---|---|
advhunt | Generating Command | Fetch data using Advanced Hunting query |
Options | Description |
---|---|
query | Required. Set your Advanced Hunting Query |
renew | Optional. If it set as "True", this app will force to update an access token. |
cred | Optional. Set the unique credential name you want to use. - Not set: use the default credential which is checked in setup page. - Single value: use the specified value. e.g. cred="cred1" - Multi value: use the specified comma separated value. e.g. cred="cred1,cred2" - set all : use all credentials. e.g. cred="all" |
\
, please use \\\\\\\
or \\\x5c
in SPL.| advhunt query="DeviceFileEvents
| where Timestamp > ago(1d)
| where FolderPath matches regex 'C:\\\x5cUsers' or FolderPath matches regex 'C:\\\\\\\Users'
| project Timestamp, DeviceId, DeviceName, ActionType, FolderPath, FileName"
| spath input=_raw
| advhunt renew=True query="AlertInfo
| where Timestamp > ago(3d)
| limit 2"
| spath input=_raw
| makeresults
| eval ActionType = "AntivirusReport,HogeReport"
| makemv delim="," ActionType
| mvexpand ActionType
| mvcombine ActionType
| eval query = "('" . mvjoin(ActionType, "', '") . "')"
| map search="| advhunt query=\"DeviceEvents | where ActionType has_any $query$ \" | spath input=_raw | table * "
cred="<here>"
| advhunt cred="tenant1_cred,tenant2_cred" query="AlertInfo"
| advhunt [| makeresults
| eval query = "DeviceFileEvents
| where Timestamp > ago(1d)
| limit 1"
| return query ]
| spath
[passwords]
access = read : [*], write : [*]
index=_internal source="*advanced_hunting*" NOT "__init__"
When updating from v0.1.x to v0.2, please re-setup the credentials
When updating from v0.1.x to v0.2, please re-setup the credentials
Update Splunk SDK
Fix for the cloud compatibility check
Delete a comment for Splunk Cloud environment, which cause an error.
Fix timestamp format error.
Changed to automatically recognize plans.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.