Monitor Salesforce’s Real-Time Events with Splunk

In 2019 Salesforce announced the general availability of Real-Time Event Monitoring (RTEM) which includes 19 different events that help monitor & secure your Salesforce data. Real-Time Event Monitoring stores events for 6 months as Salesforce Big Objects and streams events via Salesforce’s Streaming API in near real-time. This makes it easy for customers to audit up to 6 months of user & application activities as well as connect the events in near real-time to the 3rd party systems of their choice. 

Salesforce customers can use Event Monitoring events for a variety of use cases centered around security, application performance and product intelligence. 

Event Monitoring Use Case | SFDC and Splunk

With RTEM data, you gain real-time visibility into how sensitive data is viewed, exported or queried via the API which helps identify insider threats and malicious / accidental data incidents in a timely manner. Real Time Event Monitoring gives security teams the ability to monitor & investigate various high risk actors such as departing employees, privileged users (Salesforce admins) and developers.

High Risk Personas | SFDC and Splunk

Real-Time Event Monitoring also includes Threat Detection which uses machine learning to identify and surface threats related to anomalous API / report interactions, session hijacking attacks and credential stuffing attacks

Another feature included with RTEM is Transaction Security, which Salesforce customers can use to set up custom security policies to get alerted or stop potentially malicious users from proceeding with risky behaviors such as downloading massive amounts of sensitive data. 

Real Time Event Monitoring is available to Salesforce customers as an add-on product and is part of Salesforce’s premium security product suite, Shield, which is essential for modern security teams to ensure a good security posture in today’s world full of cyber threats. If you’re a Salesforce customer and would like to learn more about Real-Time Event Monitoring, check out the RTEM Trailhead.

Splunk + Salesforce’s Real-Time Event Monitoring

Many Salesforce customers love to use Splunk with Event Monitoring’s v1 batch log based offering, EventLogFiles, with the widely used Splunk Add-on for Salesforce. Now, the Salesforce + Splunk story gets even better by adding Real-Time Events as a supported data source in Splunk, which drastically reduces the latency in which Salesforce events are delivered to Splunk.

This great demo developed by the Splunk team demonstrates the power of this all new Splunk integration with Real-Time Event Monitoring, which Salesforce and several keystone customers helped develop. The demo gives a thorough overview of the different Salesforce data sources that can be imported into Splunk and shows how easy it is to use Splunk dashboards to track security concerns such as failed logins, suspicious login-as activities and high risk permission modifications. It also shows how customers can take advantage of Splunk SOAR to implement robust threat response strategies and mitigate threats that Event Monitoring helps identify. A highlight of the demo is when Splunk walks us through how security teams can set up custom notifications based off of Real-Time Events and respond to them directly from Slack! 

Combining Event Monitoring’s rich set of activity data with the robust capabilities of Splunk makes for an incredible solution for Salesforce / Splunk joint customers. To learn more about the integration and app, check out the demo here!


About the Author
This is a guest blog post from Trevor Scott, Product Manager for Event Monitoring from Salesforce.

Posted by