Log Streaming
Overview
FenixPyre’s Log Streaming feature allows you to export your organization’s security audit logs created by FenixPyre to an external log-analysis or SIEM platform such as Splunk, Datadog, or a custom HTTP endpoint.
Log Streaming makes it possible to react to events—such as file encryptions, admin actions, or user access changes - using your own business logic, monitoring tools, or automated workflows.
Data Responsibility and Control
When Log Streaming is enabled, you (the Customer) become the data controller for the exported information. This means you are responsible for:
Deciding what information is streamed out of FenixPyre
Determining where and how that data is stored, processed, or analyzed in your own environment
Maintaining compliance with your own security and privacy obligations
FenixPyre acts solely as the processor, transmitting events securely to your chosen destination.
Log Categories Forwarded by FenixPyre
FenixPyre generates several distinct categories of logs that can be forwarded to Splunk. Each category captures a specific type of event within your organization’s FenixPyre environment:
Category
Description
Example Use Cases
Admin Logs
Records of actions taken by administrators within the FenixPyre Dashboard. Includes configuration changes, integration updates, rule creations, and user-management operations.
- Tracking changes to encryption policies - Auditing configuration updates - Detecting unauthorized admin access
User Logs
Captures authentication, authorization, and user-initiated activities such as login attempts, password resets, and permission changes.
- Monitoring user access behavior - Detecting repeated failed logins - Investigating access control issues
Agent Logs
Logs emitted by FenixPyre Agents deployed on endpoints or servers.
- Tracking offline event - Tracks other agent critical logs
File Access Logs
Detailed records of file-level interactions: open, upload, download, share, delete, or move operations across connected storage platforms (e.g., Desktop, Egnyte, OneDrive, Box).
- Detecting unauthorized file exfiltration - Tracking CUI/PHI/PII access - Analyzing user activity by file type
These logs together provide a full audit trail of all sensitive operations across FenixPyre and its integrated storage connectors.
Supported log streaming services
Datadog
HTTP endpoint
Last updated
Was this helpful?
