# KnowBe4 #### **1. Overview** This document explains how to integrate **KnowBe4** with a **SIEM** solution using the KnowBe4 REST API. This allows ingestion of phishing simulation logs for monitoring, alerting, and reporting. #### **2. Requirements** - Admin access to KnowBe4 - API access enabled on KnowBe4 - API-capable SIEM (e.g., Elastic, Splunk, QRadar, etc.) - Internet access from the SIEM/log collector ##### **3. Generate API Token in KnowBe4** - Go to KnowBe4 and navigate to '**Account Settings**'. [](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/LI4eDNX25XOWSs6M-image.png) - Under **'Account Integrations'**, select **'API'.** [](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/FEyXEdFliEheqSBT-image.png) - Select **'Reporting API'.** [](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/Y0CwQJ3sN3GQt3tk-image.png) - Select **'Create New API Token'.** [](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/HXOEmcyAjhPfXV3c-image.png) - Enter a name for the API token, such as "ScytaleAPI." Then, select **'Create Token'.** [](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/vodcZZ4jTRTUm7zo-image.png) - Copy the token for use in your integration. [](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-06/qnsKibT5lEAiyfBa-image.png) #### **Configure SIEM to Pull Logs** ##### **Option A: SIEM with HTTP Polling Support** 1. Use built-in HTTP pull or script-based log ingestion 2. Schedule API calls to poll the KnowBe4 endpoint 3. Parse and map JSON fields ##### **Option B: Use a Log Collector (e.g., Logstash)** 1. Set up an HTTP poller input with API headers 2. Output parsed data to your SIEM (via syslog, Elastic, etc.) ##### **Field Mapping (Common Fields)**
Field | Description |
---|---|
user\_email | Targeted user |
clicked | User clicked link (true/false) |
reported | User reported the email |
test\_status | Status of phishing test |
event\_time | Timestamp of action |