Security Event Export

SIEM INTEGRATION

Export agent governance events to your SIEM in CEF, LEEF, or OCSF format. Webhook, Syslog, and S3 destinations. Splunk, Elastic, and Sentinel compatible.

3Event Formats
3Destinations
Real-timeEvent Streaming

See it in action

custodex.vercel.app
SIEM INTEGRATION — Custodex Dashboard

CEF. LEEF. OCSF. Your choice.

Common Event Format (CEF) for ArcSight and Splunk. Log Event Extended Format (LEEF) for QRadar. Open Cybersecurity Schema Framework (OCSF) for modern SIEM platforms. Custom template support for proprietary formats. All formats include agent identity, action, decision, and governance context.

Webhook, Syslog, or S3. Configure and forget.

Webhook destinations with custom headers and authentication. Syslog (TCP/UDP) with configurable host, port, and protocol. S3 bucket export with region, prefix, and batched uploads. Test connection before saving. Export history with event counts and error tracking.

// SIEM config example
{
  "name": "Splunk Production",
  "format": "cef",
  "destination": "webhook",
  "connectionConfig": {
    "url": "https://splunk.corp.com:8088/services/collector",
    "headers": {
      "Authorization": "Splunk HEC-TOKEN"
    }
  },
  "eventFilters": {
    "decisions": ["denied", "pending_approval"],
    "minSeverity": "medium"
  }
}

Send what matters. Filter the noise.

Filter events by decision type (allowed, denied, pending), severity level, agent, action pattern, or time window. Only forward security-relevant events to reduce SIEM ingestion costs. Custom templates let you reshape event payloads to match your SIEM schema.

What's included in
siem integration

01

CEF format for ArcSight and Splunk

02

LEEF format for IBM QRadar

03

OCSF for modern SIEM platforms

04

Webhook, Syslog (TCP/UDP), and S3 destinations

05

Event filtering by decision, severity, and agent

06

Export history with event counts and error tracking