Skip to content

Commit 6d8f4fd

Browse files
authored
Merge pull request #107049 from MarkusVi/dhanyah35
dhanyah35
2 parents 1964ee2 + b18c0f9 commit 6d8f4fd

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-splunk.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
17-
ms.date: 05/13/2019
17+
ms.date: 03/10/2020
1818
ms.author: markvi
1919
ms.reviewer: dhanyahk
2020

@@ -28,8 +28,10 @@ In this article, you learn how to integrate Azure Active Directory (Azure AD) lo
2828
## Prerequisites
2929

3030
To use this feature, you need:
31-
* An Azure event hub that contains Azure AD activity logs. Learn how to [stream your activity logs to an event hub](quickstart-azure-monitor-stream-logs-to-event-hub.md).
32-
* The Azure Monitor Add-on for Splunk. [Download and configure your Splunk instance](https://github.com/Microsoft/AzureMonitorAddonForSplunk/blob/master/README.md).
31+
32+
- An Azure event hub that contains Azure AD activity logs. Learn how to [stream your activity logs to an event hub](quickstart-azure-monitor-stream-logs-to-event-hub.md).
33+
34+
- The [Microsoft Azure Add on for Splunk](https://splunkbase.splunk.com/app/3757/).
3335

3436
## Integrate Azure Active Directory logs
3537

0 commit comments

Comments
 (0)