icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading SailPoint IdentityNow AuditEvent Add-on
SHA256 checksum (sailpoint-identitynow-auditevent-add-on_206.tgz) 256d15d3c625bbc2935039159fa85681f9a2f58fb9ec9a592ed0f6d8f78848f1
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

SailPoint IdentityNow AuditEvent Add-on

Splunk Cloud
This app is NOT supported by Splunk. Please read about what that means for youhere.
Overview
Details
SailPoint IdentityNow AuditEvent Add-on provides customers the ability to extract audit information from SailPoint's IdentityNow product. The add-on is intended to make it easier to bring IdentityNow user activity and governance events into Splunk to improve insights from security incident and event monitoring solution.
Documentation is available to SailPoint community members here: https://community.sailpoint.com/docs/DOC-11294

Along with the audit information, the SailPoint IdentityNow AuditEvent Add-on also provides a source types with in Splunk®.This source type is used to collect events from SailPoint's IdentitNow tenant(s).  Users can configure this source type to collect events to Splunk® and populate a custom dashboard visualizing different types and details for these events.

Introduction

SailPoint's IdentityNow AuditEvent Add-on has been certified by Splunk and is designed to provide customers the ability to extract audit information from one or more of their IdentityNow tenants using Splunk Enterprise or Splunk Cloud. Along with the audit information, the.SailPoint Adaptive Response Add-on also provides a source types with in.Splunk®.This source type is used to collect events from SailPoint's IdentitNow tenant(s). Users can configure this source type to collect events to Splunk®.and populate a custom dashboard visualizing different types and details for these events.

Using IdentityNow's AuditEvents API, we can solve a number of problems with this add-on. Some examples include:

  1. Surface and gain insights into the brute force password attempts IdentityNow has blocked
  2. Correlate IdentityNow user activity with other system events to identify coordinated attacks
  3. Evaluate the timing of login attempts from different geographies to identify problems

Requirements

Full functionality requires the following:

  • In order to stream AuditEvent data to a Splunk Enterprise, or Splunk Cloud deployment, an active IdentityNow tenant must exist.
  • Configuration requires that the implementer also have the organization name of their IdentityNow API gateway.
  • Splunk® Enterprise Security (7.3.0+)

Installation and User Guide

https://community.sailpoint.com/t5/IdentityNow-Wiki/SailPoint-IdentityNow-AuditEvent-Add-on-for-Splunk-Installation/ta-p/77123

Solution Brief

https://www.sailpoint.com/identity-library/sailpoint-splunk-integrated-approach-identity-governance-monitoring-auditing/

Process Overview

Alt text

  1. The IdentityNow AuditEvent add-on is designed to be used for data collection.
  2. A Splunk®-monitored system logs an anomaly.
  3. The SailPoint's IdentityNow AuditEvent Add-on makes HTTP requests to the correct IdentityNow api gateway endpoints.
  4. Endpoint gathers the audit events.
  5. Each extracted event can be used for further examination externally.

Example Search

Searching for sourcetype="sailpoint_identitynow" will list all the events consumed by the add-on

alt text

Release Notes

Version 2.0.6
April 27, 2021

1,104
Installs
1,090
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.