Skip to main content

SIEM Integration

SIEM (Security Information and Event Management) integration allows you to export MeetLoyd security events to external security tools for centralized monitoring and analysis.

Enterprise Feature

SIEM integration is available on Enterprise plans only.

Why SIEM Integration?

  • Centralized monitoring: Correlate MeetLoyd events with your other security data
  • Real-time streaming: Events flow to your SIEM as they happen
  • Compliance reporting: Unified audit trail across all your systems
  • Threat detection: Use your SIEM's analytics to detect anomalies in agent behavior

Supported SIEM Platforms

PlatformDescription
SplunkEnterprise security analytics
DatadogCloud monitoring and security
Elastic SecurityOpen-source SIEM
SumoLogicCloud-native analytics and SIEM
Custom HTTP endpointsAny system that accepts webhooks (including Microsoft Sentinel, AWS Security Hub, and others)

Event Types

Event CategoryEvents
AuthenticationLogin, logout, failed attempts, MFA events
User ManagementCreated, updated, deleted, role changed
Agent OperationsCreated, deleted, sensitive actions
Admin ActionsSettings changes, permission grants
Security EventsIncidents, approvals, session terminations

Event Format

Events are sent in JSON format with a consistent structure including event type, timestamp, actor details (user ID, email), action details (IP address, user agent, method), tenant ID, and severity level.

MeetLoyd also supports CEF (Common Event Format) for ArcSight and Splunk, and LEEF (Log Event Extended Format) for IBM QRadar.

Feature Availability

FeatureEnterprise
SIEM DestinationsUp to 5
Real-time StreamingYes
Custom Event FiltersYes
Batch ExportYes

Related: Security Center | Audit Logs