This article explains how to integrate ADAudit Plus with security information and event management (SIEM) solutions. This integration allows real-time event forwarding, enhanced security monitoring, and streamlined compliance reporting.
Have a SIEM solution (e.g., Splunk, ArcSight, or LogRhythm) or a Syslog server.
Ensure network connectivity between ADAudit Plus and the SIEM solution.
Ensure Syslog or SIEM servers are reachable from ADAudit Plus.
Verify the correct protocol (e.g.,, UDP, TCP, or HTTP) and ports are open.
Click Enable SIEM Integration.
Select the SIEM solution type from the drop-down menu (Syslog, Splunk, ArcSight, or LogRhythm).
Click Save & Proceed.
Specify the port number (default: UDP 514) and protocol (UDP or TCP).
Select the Syslog format (RFC 3164 or RFC 5424).
Choose the log categories to forward.
Click Save Configuration.
Copy the generated authentication token.
Under Global Settings, enable All Tokens.
In ADAudit Plus, select Splunk as the integration type.
Enter the Splunk server hostname or IP address.
Specify the port number (default: 8088) and protocol (HTTP or HTTPS).
Paste the HTTP Event Collector token generated in Splunk.
Choose the log categories to forward.
Click Save Configuration.
Specify the collector port number.
Choose the Common Event Format (CEF) for data transfer.
Select the log categories to forward.
Click Save Configuration.
Enter the LogRhythm Syslog receiver address.
Specify the port number and protocol (UDP or TCP).
Select the log categories to forward.
Click Save Configuration.
Key mappings for SIEM integration
ADAudit Plus forwards various syslog key data that SIEM solutions use to categorize and analyze events. Below are key mappings for different integrations:
Syslog key mappings
Syslog key | ADAudit Plus field |
EVENT_NUMBER | Event Number |
RECORD_NUMBER | Record Number |
UNIQUE_ID | Unique ID |
REPORT_PROFILE | Report Profile Name |
ALERT_PROFILE | Alert Profile Name |
SEVERITY | Severity |
TIME_GENERATED | Event Time |
USERNAME | User Name |
ACCOUNT_DOMAIN | Account Domain |
CLIENT_IP_ADDRESS | User Machine IP |
ArcSight CEF key mappings
CEF key | ADAudit Plus column |
cat | ADAudit Plus Category |
cn1 | Event Number |
cn2 | Record Number |
cn3 | Unique ID |
cs1 | Report Profile Name |
cs4 | Alert Profile Name |
cs3 | Event Source |
cs5 | Severity |
rt | Event Time |
type | Event Type |
reason | Event Remarks |
msg | Message String |
fileName | File Name |
fileLocation | File Location |
suser | User Name |
sntdom | Domain Name |
shost | User Machine Name |
Review error logs for any misconfigurations.
Use TCP instead of UDP for reliable event delivery.
Enable filtering to forward only necessary audit categories.
Regularly test log forwarding to prevent data loss.
Maintain documentation of SIEM integration settings for compliance.