Skip to content

Splunk Integration (SIEM)

This document provides instructions on how to integrate Xint’s audit logs with Splunk.

  1. Navigate to Menu: Go to [Settings] -> [SIEM].

  2. Start Integration: Click the [Add Integration] button under the Splunk section to enter the configuration screen.

  3. Enter Information: Provide the HEC details generated in Splunk.

    • HEC URL: Enter the full URL to receive logs (e.g., https://<splunk-host>:8088/services/collector/event).
    • HEC Token: Enter the authentication token issued by Splunk.
    • Index: Enter the name of the Splunk index where logs will be stored. Splunk Integration
  4. Test Connection: Click the [Test Connection] button to verify that logs are successfully being sent with the provided information.

  5. Complete Integration: Click [Add Integration] to save your settings. Once the configuration is active, audit logs will be forwarded to Splunk in real-time.

Xint transmits the following events to Splunk for security auditing and tracking purposes.

Event NameDescription
User Related
user.loginUser successfully logged into the system
user.createA new user was created or added to the organization
user.update_roleA specific user’s access role was changed
user.deactivateA user account was deactivated and access was revoked
Organization Related
organization.invitation.createA new user invitation was created and sent
organization.invitation.revokeA previously sent user invitation was revoked
organization.auth.email.enableEmail/Password authentication was enabled
organization.auth.email.disableEmail/Password authentication was disabled
organization.auth.google.enableGoogle social login was enabled
organization.auth.google.disableGoogle social login was disabled
organization.auth.oidc.enableOIDC authentication for SSO was enabled
organization.auth.oidc.disableOIDC authentication was disabled
organization.auth.oidc.configureOIDC configuration (Client ID, Endpoint, etc.) was established
organization.auth.oidc.updateExisting OIDC configuration was updated
organization.auth.oidc.deleteRegistered OIDC configuration was deleted
Scan Related
scan.createA new scan profile or task was created
scan.deleteExisting scan settings or result data were deleted
scan.startA scan task was started manually or by schedule
scan.stopAn active scan task was manually stopped by a user
scan.scheduleA scan was scheduled to run at a specific time
scan.unscheduleA previously configured scan schedule was removed
Others
api-key.createA new API Key for system access was issued
api-key.deleteAn existing API Key was revoked or deleted
siem.test_connectionA test connection was performed to verify SIEM integration