Welcome to the new Splunkbase! To return to the old Splunkbase, click here.
Warning

This app is archived. Learn more

Blue team app for Office 365 and Azure app icon

Blue team app for Office 365 and Azure

The Blue team app for Office 365 and Azure is developed to help you investigate the Office 365 Audit log. This app contains over 30 unique searches that will help you identify suspicious activity in your Office 365 and Azure environment. Requirements: This app relies on the data collected in the Unified Audit Log. There are several ways to export this data out of an environment: 1. Exporting the data using the Office 365 Extractor (https://github.com/PwC-IR/Office-365-Extractor) Full disclosure this app was built by a colleague and me. 2. Getting the data from the API which can be achieved with the Splunk Add-on for Microsoft Office 365 3. Using the Office 365 Security and Compliance web portal Dependencies: The custom timeline app is used for one visualisation and can be found here: https://splunkbase.splunk.com/app/3120 Getting started: - Update the macro `ual` to the index where your UAL data is stored. Important: - Please send me feedback via GitHub.com/invictus-ir - Support the development of the app https://www.buymeacoffee.com/invictusir Credit to tr4cefl0w (https://twitter.com/tr4cefl0w) for some of the searches as described on his blog https://0x00sec.org/t/a-blue-team-guide-to-azure-office-365-monitoring/14411

splunk product badge

Latest Version 1.4.7
February 20, 2023
Compatibility
Not Available
Platform Version: 9.4, 9.3, 9.2, 9.1, 9.0, 8.2, 8.1, 8.0, 7.3, 7.2, 7.1, 7.0
Rating

0

(0)

Log in to rate this app
Support
Blue team app for Office 365 and Azure support icon
Not Supported
Ranking

#37

in Security, Fraud & Compliance

#40

in IT Operations
The Blue team app for Office 365 and Azure is developed to help you investigate the Office 365 Audit log. This app contains over 30 unique searches that will help you identify suspicious activity in your Office 365 and Azure environment. Requirements: This app relies on the data collected in the Unified Audit Log. There are several ways to export this data out of an environment: 1. Exporting the data using the Office 365 Extractor (https://github.com/PwC-IR/Office-365-Extractor) Full disclosure this app was built by a colleague and me. 2. Getting the data from the API which can be achieved with the Splunk Add-on for Microsoft Office 365 3. Using the Office 365 Security and Compliance web portal Dependencies: The custom timeline app is used for one visualisation and can be found here: https://splunkbase.splunk.com/app/3120 Getting started: - Update the macro `ual` to the index where your UAL data is stored. Important: - Please send me feedback via GitHub.com/invictus-ir - Support the development of the app https://www.buymeacoffee.com/invictusir Credit to tr4cefl0w (https://twitter.com/tr4cefl0w) for some of the searches as described on his blog https://0x00sec.org/t/a-blue-team-guide-to-azure-office-365-monitoring/14411

Categories

Created By

Korstiaan stam

Type

app

Downloads

47,096

Resources

Login to report this app listing