Why It Matters

Image

Security teams depend on reliable log management for:
  • Forensic investigations
  • Regulatory retention requirements
  • Real-time threat analysis
  • Cross-platform event correlation
Attackers exploit visibility gaps. Auditors question undocumented events.
Without controlled export and retention:
  • Logs may be overwritten
  • Evidence becomes incomplete
  • SIEM visibility fragments
  • Compliance exposure increases
Identity systems must support secure, structured, and policy-driven log governance.

What are Log Export & Retention Controls?


Rainbow Secure Log Export & Retention Controls allow organizations to:
  • Define log retention periods
  • Control access to stored logs
  • Export structured logs for external systems
  • Integrate identity logs with SIEM platforms
  • Preserve audit-ready evidence
Logs include:
  • Authentication events
  • MFA challenges
  • Risk-triggered responses
  • Privileged access activity
  • Administrative configuration changes
  • IP blocking events
  • Session monitoring records
All log data is:
  • Time-stamped
  • Identity-attributed
  • Access-controlled
  • Structured in CEF format for reliable export

Image
image2

Core Functional Components

  • Configurable Log Retention Policies

    Organizations can define:

    • Retention duration
    • Archival timelines
    • Storage scope
    • Compliance-aligned governance policies
    Supports both operational monitoring and regulatory mandates.

  • Secure Log Storage & Access Controls

    Log visibility is restricted by:

    • Role
    • Administrative privileges
    • Audit authorization
    Prevents unauthorized modification, deletion, or tampering.

  • Structured Log Export

    Export logs in structured formats suitable for:

    • SIEM ingestion
    • Audit documentation
    • Incident investigation
    • Compliance submission
    Exports can be filtered by:
    • Date range
    • User identity
    • Event category
    • Risk level

  • SIEM Integration Support

    Identity logs integrate with:

    • Enterprise SIEM platforms
    • Security analytics environments
    • Incident response workflows
    Enhances centralized threat detection and cross-platform correlation.

  • Compliance-Ready Log Preservation

    Ensure identity activity records are retained in alignment with:

    • Internal governance policies
    • Regulatory expectations
    • Legal documentation requirements
    Log integrity supports defensibility during audits and investigations.

Feature Blocks

Identity logs are structured in CEF format for seamless ingestion into enterprise security monitoring systems.
Supports centralized event correlation and analytics.

image
image
image
image

Restrict who can:

  • View logs
  • Export logs
  • Modify retention policies
Read-only access controls prevent log tampering.
image
image
image
image


Maintain structured records suitable for:

  • Audit defense
  • Regulatory review
  • Incident documentation
Ensures identity evidence remains defensible.
image
image
image
image
  • SIEM-Ready Log Formatting
  • Access-Controlled Log Management
  • Evidence Preservation for Legal & Compliance

Benefits

Image
  • Strengthen Incident Investigation

    Preserve detailed identity records for forensic reconstruction.

  • Support Compliance Retention Requirements

    Align with internal and regulatory retention mandates.

  • Improve SIEM Visibility

    Enhance cross-system threat detection through structured log integration.

  • Reduce Risk of Log Loss

    Protect critical identity evidence from overwrite or deletion.

  • Increase Governance Control

    Maintain oversight over log access and retention policies.

Shape Image

Technical Guidance

Your Security Analysts can download exported logs and upload or transfer them to your SIEM platform for deeper analysis. For automation, work with the Rainbow Secure team to configure a custom ETL process for scheduled log ingestion.

 

 

Sentinel expects CEF via a Syslog forwarder. For manual uploads, use Custom Logs (DCR-based).
  • Step 1: Navigate to the Log Analytics Workspace linked to Sentinel.
  • Step 2: Go to Settings > Tables > Create > New Custom Log (DCR-based).
  • Step 3: Provide a name (e.g., RSSSO_Logs_CL).
  • Step 4: Upload the sample CEF file. Sentinel identifies rows automatically.
  • Step 5: Use a KQL transformation during ingestion to parse CEF: source | extend parse_cef(RawData)
  • Step 6: Define the file path where future logs will be stored (e.g., C:\Logs*.txt or /var/log/rssso/*.log).
expert-image

Splunk provides built-in support for CEF via the Splunk Add-on for CEF.
  • Step 1: Go to Settings > Data Inputs > Files & Directories.
  • Step 2: Select New Local Input and browse to the exported file.
  • Step 3: Set Sourcetype to cef (preferred if add-on is installed).
  • Step 4: If no add-on exists, define a custom sourcetype such as rssso:cef.
  • Step 5: Save and search — fields like src_ip and user become searchable.
expert-image

QRadar uses Universal CEF and is strict about header formatting.
  • Step 1: Go to Admin > Log Sources.
  • Step 2: Create a New Log Source.
  • Step 3: Select Log Source Type: Universal CEF.
  • Step 4: Choose Protocol Configuration: Log File.
  • Step 5: Configure:
    • Service Type: Local or SFTP
    • Log File Pattern: .*.txt
  • Step 6: Deploy changes. QRadar parses Signature ID and Severity automatically.
expert-image

SentinelOne supports large-scale log ingestion.
  • Step 1: Navigate to SentinelOne Console > Visibility > Data Lake.
  • Step 2: Select Add Data > Custom Logs.
  • Step 3: Upload the exported file.
  • Choose the CEF Parser under Parser Configuration.
  • Step 5: For automation, configure SentinelOne Agent Log Collection to monitor the export directory.
expert-image
Shape

Frequently Asked Questions

Image

Pricing & Editions


Log Export & Retention Controls
Available as:
  • Compliance Reporting module
  • As part of Rainbow Secure IAM Packages
  • Custom SIEM integration Services –
    complimentary to Enterprise IAM Package
  • Integrated with MFA, SSO, PAM &
    Risk Monitoring
Pricing depends on:
  • User volume
  • Log storage scope
  • Integration complexity

Request Technical Consultation
Image
Image

Are You Ready For The Action?


Logs Should Be Protected as Carefully as Accounts.
With Rainbow Secure:

  • Identity logs are retained securely
  • SIEM integration is streamlined
  • Exports are structured in CEF format
  • Compliance evidence is preserved
Maintain visibility. Preserve evidence. Stay audit-ready.

Ready To Get Started ? We're Here To Help

Start your journey with us today. It’s quick, easy, and we’re here to help you every step of the way.
Let’s Talk