Skip to main content

 

Splunk Lantern

Microsoft

Microsoft helps your organization reach its full potential by relying on an integrated and open cloud platform that spans six critical areas—security, infrastructure, digital and app innovation, data and AI, business applications, and modern work. Azure can help you migrate, modernize, and maximize your cloud and on-premises investments. Microsoft 365 can help you reduce costs – but not productivity – and centralize your business. Additional services, such as Exchange, Hyper-V, and IIS Web Server help you keep your business running smoothly.

Before looking at documentation for specific data sources, review the Splunk Help information on general data ingestion for Splunk Enterprise, Splunk Cloud Platform or Splunk Observability Cloud.

Getting data in

Source Add-ons and Apps Guidance

Windows

  • Windows security logs have over 400 loggable events. We recommend following Microsoft’s official guidance for “Stronger” security visibility. The audit policy recommendations page from Microsoft TechNet provides detailed configuration settings for operating systems from Windows 7/Server 2008 and later. In the Common Information Model, Windows security log data can be mapped to the Authentication, Updates, Vulnerabilities, Endpoint, Event Signatures, Performance, and Change data models, depending on the field.
  • Windows process launch logs are a subset of security audit logs that track program activation, process exit, handle duplication, and indirect object access. The most common events related to process launches are:
  • Windows event logs contain important events relating to applications, system services and the operating system. The events describe errors, warnings or information details about activity taking place on each system. This information is used to monitor and troubleshoot each system. In the Common Information Model, Windows event logs can be mapped to the Endpoint, Inventory, Updates, Change, and Performance data models, depending on the field.

Splunk platform

Configuration

Splunk Lantern Articles

Active Directory

Microsoft Active Directory (AD) is a directory service that stores information about network objects such as users, computers, and other devices, and provides authentication and authorization services. Data from Active Directory includes security logs related to user logins, group policy changes, object modifications, and replication events, which are critical for identity and access management, security monitoring, and compliance auditing.

Splunk platform

Splunk SOAR

Splunk Lantern Articles

Azure

Microsoft Azure is a comprehensive suite of cloud computing services that includes virtual machines, storage, databases, networking, analytics, and AI. Data from Azure services includes activity logs, diagnostic logs, and metrics, providing insights into resource usage, performance, security events, and operational health across your cloud infrastructure.

Splunk SOAR

Configuration

Splunk Lantern Articles

Cloud Services

Microsoft Cloud Services refer to a broad range of hosted applications and infrastructure, including Azure, Microsoft 365, and Dynamics 365. These services generate various logs, such as audit logs for user and administrative activities, security logs for threat detection, and operational logs for performance monitoring, all essential for maintaining visibility and control over cloud environments.

Splunk platform

Configuration

Exchange

Microsoft Exchange Server is a mail server and calendaring server developed by Microsoft. It stores email messages, calendars, contacts, and tasks, and provides services for email communication and collaboration. Exchange logs include message tracking logs, protocol logs, and connectivity logs, offering detailed insights into email flow, server health, and potential security incidents.

Splunk platform

Splunk SOAR

Configuration

IIS Web Server

Microsoft Internet Information Services (IIS) is an extensible web server software with a large number of features. IIS can be:

  • used to host ASP.NET web applications and static websites.
  • used as an FTP server, host WCF services.
  • extended to host web applications built on other platforms such as PHP.
  • used with built-in authentication options such as Basic, ASP.NET, and Windows auth.
  • managed via the CLI or using PowerShell.
  • used to produce IIS websites with a number of tools, including WebDav and Microsoft Visual Studio.

In the Common Information Model, Microsoft IIS data is typically mapped to the Web data model.

Splunk platform

Configuration

Splunk Lantern Articles

Microsoft 365

Microsoft Office 365 produces service status, service messages, and management activity logs that are all useful for system administrators. In the Common Information Model, Microsoft O365 data can be mapped to any of the following data models: Authentication, Change, Data Access.

Microsoft O365 reporting data allows you to determine if a message was received, rejected, deferred, or delivered by the service. It also shows what actions were taken on the message before it reached its final status. These logs also provide the following information:

  • Message size
  • Message ID
  • To IP
  • From IP
  • Date

Splunk platform

Splunk SOAR

Configuration

Splunk Lantern Articles

SQL Server

Microsoft SQL Server is a relational database management system that stores and retrieves data as requested by other software applications. It generates various logs, including error logs, transaction logs, and audit logs, which provide critical information for database performance monitoring, security auditing, and troubleshooting.

Splunk platform

Splunk SOAR

Configuration

Sysmon

Microsoft Sysmon, a component of Microsoft’s Sysinternals suite of Windows utilities, is a powerful host-level tool that can assist you in detecting advanced threats on your network by providing intricate host-operation details in real time. In contrast to common Antivirus/Host-Based Intrusion-detection (HIDS) solutions, Sysmon performs system activity deep monitoring and logs high-confidence indicators of advanced attacks.

Sysmon is capable of producing extensive details that are useful in the early detection of malicious code execution or other nefarious behavior. These include:

  • Process executions, including parent/child relationships, user that launched process, and hash data
  • File creations
  • File creation time changes
  • Network activity, down to the process level
  • Image loads
  • Creation of remote threads
  • Interprocess accesses
  • Windows registry modifications
  • NTFS alternate data stream (ADS) creations
  • Pipe creations and connections
  • WMI event monitoring

Splunk platform

Splunk Lantern Articles

System Center

Microsoft System Center is a suite of management products designed to help organizations manage their IT environments across various platforms. It includes tools like System Center Operations Manager (SCOM) for monitoring, System Center Configuration Manager (SCCM) for deployment and compliance, and System Center Virtual Machine Manager (SCVMM) for virtualization management. Data from System Center products provides insights into infrastructure health, software deployments, and configuration changes.

Splunk platform

Splunk SOAR

Configuration

Teams

Microsoft Teams is a unified communication and collaboration platform that combines workplace chat, video meetings, file storage, and application integration. It generates data such as chat logs, call detail records, meeting events, and administrative audit logs, which are valuable for monitoring communication patterns, troubleshooting connectivity issues, and ensuring compliance.

Splunk platform

Microsoft Teams Add-on for Splunk

Splunk Lantern Articles