Microsoft 365
Overview
Microsoft 365 provides detailed audit logs of user activities, such as file downloads, data access grants, configuration changes, and DLP event logs. Read these logs to detect and analyze suspicious activities and potential threats.
For more information about this integration, click here.
How to use with Terraform
To deploy this integration using Terraform, you can use the coralogix_integration
resource provided by the Coralogix Terraform provider. Below is an example configuration:
resource "coralogix_integration" "microsoft-365-collector" {
integration_key = "microsoft-365-collector"
version = "0.0.1"
parameters = {
IntegrationName = "Microsoft 365"
ApplicationName = "<ApplicationName>"
TenantId = "<TenantId>"
ClientId = "<ClientId>"
ClientSecret = "<ClientSecret>"
}
}
Replace the placeholder values with your actual configuration parameters. Refer to the parameter table below for required fields and their descriptions.
Revisions
0.0.1
Name | Type | Required | Description |
---|---|---|---|
ApplicationName | String | Yes | The application name that the integration will be used with. |
ClientId | String | Yes | Application ID used to authenticate and read logs from your Microsoft 365 environment. |
ClientSecret | String | Yes | Secret value used to authenticate and read logs from your Microsoft 365 environment. |
IntegrationName | String | Yes | |
TenantId | String | Yes | Your Microsoft tenant ID to connect and read logs from. |
SubsystemName | String | No | The subsystem name that the integration will be used with. |
Theme
Light