SIEM Integration
Forward NeuralTrust audit logs to your SIEM platform for centralized security monitoring, compliance reporting, and incident response.Benefits
- Centralized monitoring — View NeuralTrust events alongside your other systems
- Compliance — Meet requirements for security event aggregation (SOC2, ISO 27001, HIPAA)
- Incident response — Faster detection through correlation with other security events
- Custom alerting — Create alerts in your SIEM based on NeuralTrust events
Supported Platforms
| Platform | Authentication |
|---|---|
| Splunk | HEC Token |
| Elastic (ELK Stack) | API Key |
| IBM QRadar | SEC Token |
| Microsoft Sentinel | Entra ID (OAuth) |
| Datadog | API Key |
You only need to configure one SIEM platform. Choose the one your organization uses.
Configure Your SIEM
Go to Settings → SIEM, select your provider, and enter the required credentials.Splunk
Splunk
Step 1: Get your Splunk HEC Token
- Log in to your Splunk instance
- Go to Settings → Data Inputs → HTTP Event Collector
- Click New Token or use an existing one
- Copy the Token Value and your HEC endpoint URL
- Go to Settings → SIEM
- Select Splunk as the provider
- Enter your Endpoint URL, HEC Token, and Index
- Click Save
Elastic (ELK Stack)
Elastic (ELK Stack)
Step 1: Get your Elastic API Key
- Log in to Elastic Cloud or your self-hosted Kibana
- Go to Stack Management → API Keys
- Click Create API Key and copy it (only shown once!)
- Note your Elasticsearch endpoint
- Go to Settings → SIEM
- Select Elastic as the provider
- Enter your Endpoint URL, API Key, and Index
- Click Save
IBM QRadar
IBM QRadar
Step 1: Get your QRadar SEC Token
- Log in to QRadar Console
- Go to Admin → Authorized Services
- Create a new authorized service and copy the SEC Token
- Go to Settings → SIEM
- Select IBM QRadar as the provider
- Enter your Endpoint URL, SEC Token, and Log Source
- Click Save
Microsoft Sentinel
Microsoft Sentinel
Step 1: Create an App Registration in Azure
- Go to Azure Portal → Microsoft Entra ID → App registrations
- Create a new registration and copy Client ID and Tenant ID
- Create a Client Secret (copy immediately!)
- Go to Azure Monitor → Data Collection Rules
- Create a rule and note the DCR Immutable ID and Stream Name
- Grant Monitoring Metrics Publisher role to your App Registration
- Go to Settings → SIEM
- Select Microsoft Sentinel as the provider
- Enter Tenant ID, Client ID, Client Secret, DCR Immutable ID, and Stream Name
- Click Save
Datadog
Datadog
Step 1: Get your Datadog API Key
- Log in to Datadog
- Go to Organization Settings → API Keys
- Create or copy an existing API key
- Go to Settings → SIEM
- Select Datadog as the provider
- Enter your Endpoint URL, API Key, and Service name
- Click Save
Select Event Categories
After connecting your SIEM, choose which events to forward:- In Settings → Audit Logs, click the SIEM Integration button
- Toggle the categories you want to send:
- Authentication — Login/logout events
- User Management — User and role changes
- SSO Security — SSO and SCIM events
- API Access — API key events
- Administrative — Config changes
- Click Save
Event Format
Events are sent as JSON:Troubleshooting
| Issue | Solution |
|---|---|
| Events not appearing | Verify endpoint URL and credentials |
| Authentication failed | Regenerate API key/token |
| Connection disconnected | Check firewall allows NeuralTrust IPs |
Related Documentation
- Audit Logs — View events in NeuralTrust
- Configure SSO — Authentication events are logged
- Break the Glass — Emergency access events