How-To: Export EZCA PKI Logs to a SIEM Solution
EZCA enables your security team to monitor critical user actions by pushing the information to your SIEM.
⚠️ This step is optional
While this step is recommended, it is not required to use EZCA. If you do not have a SIEM solution or do not want to send your logs to your SIEM, you can skip this step.
Why Should I Export My Cloud PKI Logs to a SIEM?
EZCA enables your security team to monitor critical user actions by pushing audit logs to your Security Information and Event Management (SIEM) solution. By exporting your Cloud PKI logs to your SIEM, you can:
- Centralize your security monitoring: By sending your Cloud PKI logs to your SIEM, you can centralize your security monitoring and have a single view of all your security events.
- Detect and respond to threats faster: By having your Cloud PKI logs in your SIEM, you can detect and respond to threats faster by correlating Cloud PKI events with other security events in your environment.
- Meet compliance requirements: Many compliance frameworks require organizations to monitor and log security events. By exporting your Cloud PKI logs to your SIEM, you can meet these requirements more easily.
Which SIEM Providers are Supported for Cloud PKI Log Export?
The following SIEM providers are currently supported:
If your SIEM provider is not currently supported email your Keytos contact and request a connector for that specific provider.
What Events are Sent to my SIEM from EZCA?
EZCA sends a variety of events to your SIEM to help you monitor your PKI activity. These events include:
CA Operation Events
| Event ID |
Event Summary |
Description |
Potential Criticality |
| 4882 |
The security permissions for Certificate Services changed |
A change in CA settings that might give or remove critical permissions |
High |
| 92 |
CA change denied due to insufficient permissions |
A user attempted to change CA settings without the proper permissions |
High |
| 23 |
Intermediate CA request rejected |
A new Intermediate CA request has been rejected |
High |
| 19 |
CA deleted |
This indicates that a CA was deleted |
High |
| 28 |
Intermediate CA was imported |
A new Intermediate CA has been created chaining to an external CA |
Medium |
| 22 |
Intermediate CA created with EZCA Root |
A new Intermediate CA has been created chaining to an EZCA CA |
Medium |
| 12 |
CA was renewed |
A CA has been renewed |
Low |
Certificate Operation Events
| Event ID |
Event Summary |
Description |
Potential Criticality |
| 4888 |
Certificate request denied due to insufficient permissions |
A user attempted to request a certificate without the proper permissions |
High |
| 4870 |
A certificate has been revoked |
This can cause an outage if was done by mistake or the new certificate is not added to all the endpoints that use the certificate |
Medium |
| 4872 |
Publish CRL |
This is an even that the CRL has been published, this does not have to be tracked as we take care of it for you. |
Low |
| 4887 |
Certificate was created |
This event indicates a certificate was created successfully |
Low |
How Do I Export Cloud PKI Audit Logs to my SIEM?
EZCA enables your security team to monitor critical user actions by pushing the information to your SIEM. In this page we will show you how to connect your Cloud PKI logs to Azure Log Analytics and Azure Sentinel.
EZCA enables your security team to monitor critical user actions by pushing the information to your SIEM. In this page we will show you how to connect your Cloud PKI logs to Splunk.
EZCA enables your security team to monitor critical user actions by pushing the information to your SIEM. In this page we will show you how to connect your Cloud PKI logs to CrowdStrike Falcon.