You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
even though I can find events that should match when I query Graph directly:
Get-MgAuditLogSignIn -All -Filter "riskEventTypes_V2/any(c:c eq 'riskyIPAddress') and createdDateTime ge 2023-08-01T00:00:00Z and createdDateTime lt 2023-08-29T00:00:00Z"
Use this URL in the query https://graph.microsoft.com/v1.0/auditLogs/signIns
Click the "Run Query" button
Oftentimes, the beta endpoint returns more data => https://graph.microsoft.com/beta/auditLogs/signIns. If the beta endpoint has the data you're looking for, select the beta endpoint in the Splunk input dropdown.
Using the add-on, we don't see any
riskyIPAddress
values in the indexedriskEventTypes_v2
fields of Splunk events.I have searched back over our entire index and don't get any hits for this:
even though I can find events that should match when I query Graph directly:
An example of a Graph-fetched log:
and the same event logged in Splunk. Note the difference in the RiskEventTypesV2 field values
The text was updated successfully, but these errors were encountered: