SIEM Integrations
Forward SpoofWard events and alerts to your Security Information and Event Management (SIEM) platform for centralized monitoring, correlation with other security data, and long-term retention. SpoofWard supports integration with Microsoft Sentinel and Splunk.
SIEM integrations are available on Enterprise plans only. Contact your account manager to enable this feature.
Supported SIEM Platforms
- Microsoft Sentinel — Forward events via the Log Analytics Data Collector API
- Splunk — Forward events via the HTTP Event Collector (HEC)
Microsoft Sentinel Integration
Prerequisites
- An active Microsoft Sentinel workspace in Azure
- Your Log Analytics Workspace ID
- A Shared Key (primary or secondary) from your Log Analytics workspace
Finding Your Credentials
- In the Azure portal, navigate to your Log Analytics workspace
- Go to Agents management (or Settings → Agents)
- Copy the Workspace ID
- Copy the Primary key (or Secondary key)
Configuring in SpoofWard
- Navigate to Settings → Integrations → SIEM
- Select Microsoft Sentinel
- Enter your Workspace ID
- Enter your Shared Key
- Optionally set a custom Log Type name (defaults to
SpoofWard). This determines the table name in Sentinel, which will appear asSpoofWard_CL. - Select which event types to forward (see Event Types below)
- Click Test Connection to send a test event to Sentinel
- Click Save
After connecting, it may take 15–30 minutes for the custom log table to appear in your Sentinel workspace. Run a query for SpoofWard_CL in Log Analytics to verify data is arriving.
Splunk Integration
Prerequisites
- A Splunk instance (Cloud or Enterprise) with the HTTP Event Collector enabled
- An HEC Token configured for the target index
- The HEC endpoint URL for your Splunk instance
- The target Index where events should be stored
Setting Up the HEC Token in Splunk
- In Splunk, navigate to Settings → Data Inputs → HTTP Event Collector
- Click New Token
- Enter a name (e.g., "SpoofWard")
- Select the target index
- Set the source type to
_json - Click Submit and copy the generated token
Configuring in SpoofWard
- Navigate to Settings → Integrations → SIEM
- Select Splunk
- Enter your HEC Endpoint URL (e.g.,
https://your-splunk:8088) - Enter your HEC Token
- Enter the target Index name
- Optionally set a Source value (defaults to
spoofward) - Select which event types to forward (see Event Types below)
- Click Test Connection to send a test event
- Click Save
Ensure your Splunk HEC endpoint is accessible from the internet if you are using Splunk Enterprise on-premises. SpoofWard sends events from its cloud infrastructure and must be able to reach your HEC URL.
Event Types
Select which categories of events SpoofWard forwards to your SIEM. You can enable or disable each type independently.
- DNS Changes — Records added, modified, or removed for monitored domains (DMARC, SPF, DKIM, MX, CNAME, TXT)
- Authentication Failures — DMARC, SPF, or DKIM authentication failures detected in aggregate or forensic reports
- Threat Alerts — Spoofing attempts, lookalike domain detections, and brand impersonation events
- Anomalies — Unusual patterns such as sudden volume spikes, new sending sources, or geographic anomalies
- Domain Health Changes — Changes to DNS health scores, new issues detected, or issues resolved
- User Activity — Audit log events including logins, configuration changes, and administrative actions
Event Schema
All events forwarded to your SIEM follow a consistent JSON schema:
- event_type — The category of event (e.g.,
dns_change,threat_alert) - severity — Event severity:
low,medium,high, orcritical - domain — The affected domain name
- timestamp — ISO 8601 timestamp of the event
- tenant_id — Your SpoofWard workspace identifier
- details — An object containing event-specific data
- source_ip — Relevant source IP address (where applicable)
Managing the Integration
- Pause — Temporarily stop forwarding events without removing the configuration
- Edit — Update credentials, endpoint URLs, or event type selections
- Test — Send a test event to verify the connection is active
- View Log — Review recent delivery attempts and any failures
- Delete — Remove the SIEM integration and delete stored credentials
Troubleshooting
- Events not appearing in Sentinel — Verify the Workspace ID and Shared Key are correct. Check that the custom log table has had time to provision (up to 30 minutes for new tables).
- Events not appearing in Splunk — Verify the HEC token is active, the endpoint URL is reachable, and the index exists. Check Splunk's
_internalindex for HEC errors. - Connection test fails — Check firewall rules to ensure SpoofWard's IP ranges can reach your SIEM endpoint. Contact support for the current list of egress IPs.
- Duplicate events — If you see duplicates, check whether you have both a SIEM integration and a webhook forwarding to the same destination. Disable one to avoid duplicates.