# KnowBe4 #### **1. Overview** This document explains how to integrate **KnowBe4** with a **SIEM** solution using the KnowBe4 REST API. This allows ingestion of phishing simulation logs for monitoring, alerting, and reporting. #### **2. Requirements** - Admin access to KnowBe4 - API access enabled on KnowBe4 - API-capable SIEM (e.g., Elastic, Splunk, QRadar, etc.) - Internet access from the SIEM/log collector ##### **3. Generate API Token in KnowBe4** - Go to KnowBe4 and navigate to '**Account Settings**'. [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/LI4eDNX25XOWSs6M-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/LI4eDNX25XOWSs6M-image.png) - Under **'Account Integrations'**, select **'API'.** [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/FEyXEdFliEheqSBT-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/FEyXEdFliEheqSBT-image.png) - Select **'Reporting API'.** [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/Y0CwQJ3sN3GQt3tk-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/Y0CwQJ3sN3GQt3tk-image.png) - Select **'Create New API Token'.** [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/HXOEmcyAjhPfXV3c-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/HXOEmcyAjhPfXV3c-image.png) - Enter a name for the API token, such as "ScytaleAPI." Then, select **'Create Token'.** [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/vodcZZ4jTRTUm7zo-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/vodcZZ4jTRTUm7zo-image.png) - Copy the token for use in your integration. [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/scaled-1680-/qnsKibT5lEAiyfBa-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/qnsKibT5lEAiyfBa-image.png) #### **Configure SIEM to Pull Logs** ##### **Option A: SIEM with HTTP Polling Support** 1. Use built-in HTTP pull or script-based log ingestion 2. Schedule API calls to poll the KnowBe4 endpoint 3. Parse and map JSON fields ##### **Option B: Use a Log Collector (e.g., Logstash)** 1. Set up an HTTP poller input with API headers 2. Output parsed data to your SIEM (via syslog, Elastic, etc.) ##### **Field Mapping (Common Fields)**

Field

Description

user\_emailTargeted user
clickedUser clicked link (true/false)
reportedUser reported the email
test\_statusStatus of phishing test
event\_timeTimestamp of action
#### #### **Validation Steps** - Run a test phishing campaign in KnowBe4 - Check SIEM logs for new entries - Validate parsing of key fields - Create filters/dashboards to view data **Reference Link: [https://docs.scytale.ai/knowbe4-user-guide](https://docs.scytale.ai/knowbe4-user-guide "Knowbe4")**