Skip to content

Commit ed59b68

Browse files
committed
o365 TA update
1 parent 6e9700b commit ed59b68

19 files changed

+1375
-1357
lines changed

data_sources/o365.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
name: O365
22
id: b32de97d-0074-4cca-853c-db22c392b6c0
33
version: 1
4-
date: '2024-07-18'
4+
date: "2024-07-18"
55
author: Patrick Bareiss, Splunk
66
description: Data source object for O365.
77
source: o365
88
sourcetype: o365:management:activity
99
separator: Operation
1010
supported_TA:
11-
- name: Splunk Add-on for Microsoft Office 365
12-
url: https://splunkbase.splunk.com/app/4055
13-
version: 4.7.0
11+
- name: Splunk Add-on for Microsoft Office 365
12+
url: https://splunkbase.splunk.com/app/4055
13+
version: 4.8.0

data_sources/o365_add_app_role_assignment_grant_to_user_.yml

Lines changed: 75 additions & 74 deletions
Original file line numberDiff line numberDiff line change
@@ -1,87 +1,88 @@
11
name: O365 Add app role assignment grant to user.
22
id: ce1d7849-a1d2-47fd-b6eb-d7ef854a860c
33
version: 1
4-
date: '2024-07-18'
4+
date: "2024-07-18"
55
author: Patrick Bareiss, Splunk
66
description: Data source object for O365 Add app role assignment grant to user.
77
source: o365
88
sourcetype: o365:management:activity
99
separator: Operation
1010
supported_TA:
11-
- name: Splunk Add-on for Microsoft Office 365
12-
url: https://splunkbase.splunk.com/app/4055
13-
version: 4.7.0
11+
- name: Splunk Add-on for Microsoft Office 365
12+
url: https://splunkbase.splunk.com/app/4055
13+
version: 4.8.0
1414
fields:
15-
- _time
16-
- ActorContextId
17-
- ActorIpAddress
18-
- Actor{}.ID
19-
- Actor{}.Type
20-
- AzureActiveDirectoryEventType
21-
- ClientIP
22-
- CreationTime
23-
- ExtendedProperties{}.Name
24-
- ExtendedProperties{}.Value
25-
- Id
26-
- InterSystemsId
27-
- IntraSystemId
28-
- ModifiedProperties{}.Name
29-
- ModifiedProperties{}.NewValue
30-
- ModifiedProperties{}.OldValue
31-
- ObjectId
32-
- Operation
33-
- OrganizationId
34-
- RecordType
35-
- ResultStatus
36-
- SupportTicketId
37-
- TargetContextId
38-
- Target{}.ID
39-
- Target{}.Type
40-
- UserId
41-
- UserKey
42-
- UserType
43-
- Version
44-
- Workload
45-
- additionalDetails
46-
- app
47-
- authentication_service
48-
- command
49-
- date_hour
50-
- date_mday
51-
- date_minute
52-
- date_month
53-
- date_second
54-
- date_wday
55-
- date_year
56-
- date_zone
57-
- dest
58-
- dest_name
59-
- dvc
60-
- event_type
61-
- extendedAuditEventCategory
62-
- extended_properties
63-
- host
64-
- index
65-
- linecount
66-
- object
67-
- punct
68-
- record_type
69-
- signature
70-
- source
71-
- sourcetype
72-
- splunk_server
73-
- src
74-
- src_ip
75-
- src_user
76-
- status
77-
- timeendpos
78-
- timestartpos
79-
- user
80-
- user_id
81-
- user_type
82-
- vendor_account
83-
- vendor_product
84-
example_log: '{"Actor": [{"ID": "[email protected]", "Type": 5}, {"ID":
15+
- _time
16+
- ActorContextId
17+
- ActorIpAddress
18+
- Actor{}.ID
19+
- Actor{}.Type
20+
- AzureActiveDirectoryEventType
21+
- ClientIP
22+
- CreationTime
23+
- ExtendedProperties{}.Name
24+
- ExtendedProperties{}.Value
25+
- Id
26+
- InterSystemsId
27+
- IntraSystemId
28+
- ModifiedProperties{}.Name
29+
- ModifiedProperties{}.NewValue
30+
- ModifiedProperties{}.OldValue
31+
- ObjectId
32+
- Operation
33+
- OrganizationId
34+
- RecordType
35+
- ResultStatus
36+
- SupportTicketId
37+
- TargetContextId
38+
- Target{}.ID
39+
- Target{}.Type
40+
- UserId
41+
- UserKey
42+
- UserType
43+
- Version
44+
- Workload
45+
- additionalDetails
46+
- app
47+
- authentication_service
48+
- command
49+
- date_hour
50+
- date_mday
51+
- date_minute
52+
- date_month
53+
- date_second
54+
- date_wday
55+
- date_year
56+
- date_zone
57+
- dest
58+
- dest_name
59+
- dvc
60+
- event_type
61+
- extendedAuditEventCategory
62+
- extended_properties
63+
- host
64+
- index
65+
- linecount
66+
- object
67+
- punct
68+
- record_type
69+
- signature
70+
- source
71+
- sourcetype
72+
- splunk_server
73+
- src
74+
- src_ip
75+
- src_user
76+
- status
77+
- timeendpos
78+
- timestartpos
79+
- user
80+
- user_id
81+
- user_type
82+
- vendor_account
83+
- vendor_product
84+
example_log:
85+
'{"Actor": [{"ID": "[email protected]", "Type": 5}, {"ID":
8586
"10037FFEA938FB92", "Type": 3}, {"ID": "74658136-14ec-4630-ad9b-26e160ff0fc6", "Type":
8687
2}, {"ID": "User_bfb8c366-0406-41a5-b3e3-328f4a3b4484", "Type": 2}, {"ID": "bfb8c366-0406-41a5-b3e3-328f4a3b4484",
8788
"Type": 2}, {"ID": "User", "Type": 2}], "ActorContextId": "0e8108b1-18e9-41a4-961b-dfcddf92ef08",

data_sources/o365_add_app_role_assignment_to_service_principal_.yml

Lines changed: 74 additions & 73 deletions
Original file line numberDiff line numberDiff line change
@@ -1,86 +1,87 @@
11
name: O365 Add app role assignment to service principal.
22
id: 785ba57a-ba7b-474e-97c8-9474e6e00b3a
33
version: 1
4-
date: '2024-07-18'
4+
date: "2024-07-18"
55
author: Patrick Bareiss, Splunk
66
description: Data source object for O365 Add app role assignment to service principal.
77
source: o365
88
sourcetype: o365:management:activity
99
separator: Operation
1010
supported_TA:
11-
- name: Splunk Add-on for Microsoft Office 365
12-
url: https://splunkbase.splunk.com/app/4055
13-
version: 4.7.0
11+
- name: Splunk Add-on for Microsoft Office 365
12+
url: https://splunkbase.splunk.com/app/4055
13+
version: 4.8.0
1414
fields:
15-
- _time
16-
- ActorContextId
17-
- Actor{}.ID
18-
- Actor{}.Type
19-
- AzureActiveDirectoryEventType
20-
- CreationTime
21-
- ExtendedProperties{}.Name
22-
- ExtendedProperties{}.Value
23-
- Id
24-
- InterSystemsId
25-
- IntraSystemId
26-
- ModifiedProperties{}.Name
27-
- ModifiedProperties{}.NewValue
28-
- ModifiedProperties{}.OldValue
29-
- ObjectId
30-
- Operation
31-
- OrganizationId
32-
- RecordType
33-
- ResultStatus
34-
- SupportTicketId
35-
- TargetContextId
36-
- Target{}.ID
37-
- Target{}.Type
38-
- UserId
39-
- UserKey
40-
- UserType
41-
- Version
42-
- Workload
43-
- additionalDetails
44-
- app
45-
- authentication_service
46-
- command
47-
- date_hour
48-
- date_mday
49-
- date_minute
50-
- date_month
51-
- date_second
52-
- date_wday
53-
- date_year
54-
- date_zone
55-
- dest
56-
- dest_name
57-
- dvc
58-
- event_type
59-
- eventtype
60-
- extendedAuditEventCategory
61-
- host
62-
- index
63-
- linecount
64-
- object
65-
- punct
66-
- record_type
67-
- signature
68-
- source
69-
- sourcetype
70-
- splunk_server
71-
- status
72-
- tag
73-
- tag::eventtype
74-
- timeendpos
75-
- timestartpos
76-
- user
77-
- user_agent
78-
- user_agent_change
79-
- user_id
80-
- user_type
81-
- vendor_account
82-
- vendor_product
83-
example_log: '{"CreationTime": "2024-02-08T21:49:53", "Id": "a6bee61d-8b3f-42e1-b4fa-778fb05c43ac",
15+
- _time
16+
- ActorContextId
17+
- Actor{}.ID
18+
- Actor{}.Type
19+
- AzureActiveDirectoryEventType
20+
- CreationTime
21+
- ExtendedProperties{}.Name
22+
- ExtendedProperties{}.Value
23+
- Id
24+
- InterSystemsId
25+
- IntraSystemId
26+
- ModifiedProperties{}.Name
27+
- ModifiedProperties{}.NewValue
28+
- ModifiedProperties{}.OldValue
29+
- ObjectId
30+
- Operation
31+
- OrganizationId
32+
- RecordType
33+
- ResultStatus
34+
- SupportTicketId
35+
- TargetContextId
36+
- Target{}.ID
37+
- Target{}.Type
38+
- UserId
39+
- UserKey
40+
- UserType
41+
- Version
42+
- Workload
43+
- additionalDetails
44+
- app
45+
- authentication_service
46+
- command
47+
- date_hour
48+
- date_mday
49+
- date_minute
50+
- date_month
51+
- date_second
52+
- date_wday
53+
- date_year
54+
- date_zone
55+
- dest
56+
- dest_name
57+
- dvc
58+
- event_type
59+
- eventtype
60+
- extendedAuditEventCategory
61+
- host
62+
- index
63+
- linecount
64+
- object
65+
- punct
66+
- record_type
67+
- signature
68+
- source
69+
- sourcetype
70+
- splunk_server
71+
- status
72+
- tag
73+
- tag::eventtype
74+
- timeendpos
75+
- timestartpos
76+
- user
77+
- user_agent
78+
- user_agent_change
79+
- user_id
80+
- user_type
81+
- vendor_account
82+
- vendor_product
83+
example_log:
84+
'{"CreationTime": "2024-02-08T21:49:53", "Id": "a6bee61d-8b3f-42e1-b4fa-778fb05c43ac",
8485
"Operation": "Add app role assignment to service principal.", "OrganizationId":
8586
"75243ab2-44f8-435c-a7a6-b479385df6d4", "RecordType": 8, "ResultStatus": "Success",
8687
"UserKey": "Not Available", "UserType": 4, "Version": 1, "Workload": "AzureActiveDirectory",

0 commit comments

Comments
 (0)