This App can query MS Defender Advanced Hunting with their query format (KQL) through Defender API.
There are two plans in Defender API and this app support both.
This plan is relevant when creating an app on Azure AD.
Please refer this for more detail about the plan.
There are two following option.
Example 1
\
, please use \\\\\\\
or \\\x5c
in SPL.| advhunt query="DeviceFileEvents
| where Timestamp > ago(1d)
| where FolderPath matches regex 'C:\\\x5cUsers' or FolderPath matches regex 'C:\\\\\\\Users'
| project Timestamp, DeviceId, DeviceName, ActionType, FolderPath, FileName"
| spath input=_raw
| advhunt plan=v2 query="AlertInfo | Timestamp > ago(3d) | limit 2"
| spath input=_raw
| makeresults
| eval ActionType = "AntivirusReport,HogeReport"
| makemv delim="," ActionType
| mvexpand ActionType
| mvcombine ActionType
| eval query = "('" . mvjoin(ActionType, "', '") . "')"
| map search="| advhunt query=\"DeviceEvents | where ActionType has_any $query$ \" | spath input=_raw | table * "
To use this app, users need following privileges.
If you use Plan 1, you can't query againt some schema.
Quotas and resource allocation of API
index=_internal source="*advanced_hunting*" NOT "__init__"
Support Defender for Endpoint Plan 2
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.