Integrating ADSelfService Plus with Splunk
Steps involved:
The first step of the integration process is to generate an HTTP event collector token using the Splunk Enterprise:
- Log in to Splunk as an administrator.
- Navigate to Settings > Data Inputs > HTTP Event Collector.
- Click New Token.
- Specify a name for the token and retain the default values for the other fields.
- Click Save and the authentication token will be generated.
Once the HTTP event collector token is generated:
- Log in to ADSelfService Plus as default Admin.
- Navigate to Admin > Product Settings > Integration Settings.
- Click the Splunk Server tile.
- Enter the details including Splunk Server Name, HTTP Event Collector Port Number, and Port Protocol, and specify the HTTP Event Collector Token generated for ADSelfService Plus in Splunk.

Integrating ADSelfService Plus with a Syslog Server
Steps involved:
- Log in to ADSelfService Plus as default Admin.
- Navigate to Admin > Product Settings > Integration Settings.
- Click the Syslog Server tile.
- Enter the details including Syslog Server Name, Port Number, and Port Protocol. Also, choose the Syslog Standard and specify the Data Format needed for your SIEM parser.

Like this tip? Get the most out of ADSelfService Plus by checking out more tips and tricks here.