Delinea Cloud Suite Insights & Audit Logs

Prev Next

TL;DR

Supported data types

3rd party detection

Hunters detection

IOC search

Search

Table name

Log format

Collection method

Delinea Audit Logs

✅

✅

✅

✅

delinea_audit_logs

NDJSON

S3


Overview

Delinea’s cloud-based SaaS solution consolidates identities and applies Zero Trust Principles to stop privileged access abuse and reduce security risks. Cloud Suite allows organizations to minimize their attack surface by consolidating identities and leveraging multi-directory services for authentication, implementing just-in-time privilege, MFA enforcement, and securing remote access while auditing everything.

Delinea Cloud Suite Insights & Audit Logs is the centralized auditing and visibility component of the Delinea Platform, designed to provide unified, tamper-resistant recording of all security-relevant activities occurring across Delinea’s privileged access management services, such as Secret Server, Delinea Identity, Identity Federation, and other Cloud Suite components. Insights aggregates events from all connected Delinea products into a single, normalized audit stream.

Logs follow a consistent schema that supports correlation across authentication, authorization, and privileged credential usage, enabling complete traceability from user login through secret access. The platform delivers real-time monitoring, compliance-ready audit trails, and forensic-quality event detail, helping organizations detect abnormal behavior, meet regulatory requirements (such as SOX, HIPAA, PCI-DSS), and maintain strong privileged access governance.

Insights logs can be exported through APIs, integrated with Hunters’ SIEM platform, or retained for long-term investigations, ensuring security teams maintain comprehensive oversight of privileged account activity across hybrid and cloud environments.

Supported data types

Delinea Cloud Suite Audit Logs

Table name: delinea_audit_logs

Delinea Cloud Suite Audit Logs is the centralized auditing and visibility component of the Delinea Platform, designed to provide unified, tamper-resistant recording of all security-relevant activities occurring across Delinea’s privileged access management services.

Each event captures detailed metadata, including the acting user or system, authentication factors, source IP address, target resource, timestamps, and contextual payloads specific to the operation, such as secret access, password retrieval, federation authentication, role use, and session lifecycle events.

Learn more here.

Send data to Hunters

Hunters supports audit logs from Delinea Cloud Suite using S3.

To connect Delinea Cloud Suite logs:

  1. Route Delinea Cloud Suite logs into an AWS S3 bucket.

  2. Once the export is completed and the logs are collected to S3, follow the steps in this section.

Expected format

The expected format of the logs is the NDJson format as exported by Delinea Cloud Suite.

Authentication logs

{"AuditEventMessageId": "00000000-0000-0000-0000-000000000001", "TenantId": "11111111-1111-1111-1111-111111111111", "Service": {"Type": "Secret Server"}, "SessionId": null, "Source": {"Host": {"Network": {"AddressType": "ipaddress", "IpAddress": "10.0.0.1"}}}, "Actor": {"Id": "22222222-2222-2222-2222-222222222222", "PlatformId": "22222222-2222-2222-2222-222222222222", "IdType": "platformid", "Type": "user", "Name": "user.admin@example.com"}, "Target": {"Host": {"$type": "Delinea.Audit.Abstractions.Models.V2.AuditEventModels.Host, Delinea.Audit.Abstractions", "MachineName": null, "Network": null, "Client": null}, "Id": "99999", "IdType": null, "Type": "SECRET", "Name": "99999"}, "Action": {"Name": "Delinea.Vault.Secret.Password.Viewed", "Verb": "", "TargetType": ""}, "EventDateTime": "2025-11-10T13:45:11.237+00:00", "ProcessedTime": "0001-01-01T00:00:00+00:00", "Notes": "{\"machineName\":\"worker-anonymized\",\"machineTimeZone\":\"Coordinated Universal Time\",\"product\":\"Secret Server\",\"schemaVersion\":\"https://schema.delinea.app/secretserver/schema.v1.json\",\"itemName\":\"REDACTED_SECRET_NAME\",\"itemNameForDisplay\":\"REDACTED_SECRET_NAME\",\"byUser\":\"user.admin@example.com\",\"byUserDisplayName\":\"User Admin\",\"delegatedUserName\":null,\"delegatedUserDisplayName\":null,\"byUserEmailAddress\":null,\"delegatedUserPlatformId\":null,\"eventAction\":\"PASSWORD_DISPLAYED\",\"eventEntityType\":\"SECRET\",\"containerName\":\"REDACTED_CONTAINER\",\"byUserPlatformId\":null,\"eventLevel\":2,\"itemPlatformId\":null,\"targetUserId\":null,\"targetUserName\":null,\"targetUserDisplayName\":null,\"targetUserPlatformId\":null,\"eventQueueId\":619611,\"eventEntityTypeId\":10001,\"eventActionId\":10039,\"userId\":0,\"delegatedUserId\":null,\"itemId\":99999,\"containerId\":0,\"eventTime\":\"0001-01-01T00:00:00\",\"eventDetails\":\"Fields: (Password) Account Name: REDACTED_ACCOUNT_ID \",\"ipAddress\":\"10.0.0.1\",\"eventDataObject\":null,\"additionalData\":null,\"additionalDataDictionary\":{},\"fieldChangesCollection\":null}", "Tags": {"$type": "System.Collections.Generic.Dictionary`2[[System.String, System.Private.CoreLib],[System.String[], System.Private.CoreLib]], System.Private.CoreLib"}, "AdditionalAttributes": {"$type": "System.Collections.Generic.Dictionary`2[[System.String, System.Private.CoreLib],[System.String[], System.Private.CoreLib]], System.Private.CoreLib", "eventmessageguid": ["aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee"]}, "Level": 1, "UniqueConsumableId": null, "Version": 0, "Redelivered": false, "RelayEvenIfExpired": true, "ParentCorrelationId": "00000000-0000-0000-0000-000000000000", "CorrelationId": "00000000-0000-0000-0000-000000000000", "TenantSecondaryId": "11111111-1111-1111-1111-111111111111", "ForceCompress": false, "$type": "Delinea.Audit.Platform.Messages.AuditEventConsumableModel, Delinea.Audit.Platform.Messages", "FieldChanges": null, "ExpiresOn": null, "RoutingKeySegments": null, "_ucid": "ffffffff-1111-2222-3333-444444444444", "MetaData": null, "RiskData": null}