Skip to main content

Seamless integration with Splunk

Leveraging Avigilon Alta’s Rules Engine, you can use Splunk to import, search and investigate Alta access control events to help inform crucial business decisions.

Leverage rules for these events:

  • Hardware state changes, including contact sensor, REX, generic inputs and tamper detection.

  • Entry events, including anti-passback breaches, successful and denied unlock attempts and forced or propped open entries.

  • Lockdown plan trigger and revert attempts.

Set up is easy using the basic Avigilon Alta Rules Engine — generate a token in Splunk, then create a rule for each Alta access control event type. New events will be sent to the Splunk platform, where you can take action.

Use cases

Read how the Splunk and Avigilon Alta integration strengthens access control.

  • Monitor security breaches

    Easily track vulnerabilities and issues like forced and propped open doors, anti-passback misuse, and hardware tampering.

  • Evaluate entry traffic

    Collect Avigilon Alta reader badge-in and badge-out events and track the usage of doors not associated with readers by importing REX and contact sensor state change events to Splunk.

  • Track lockdown usage

    At a glance, see who is triggering and reverting lockdown plans, which lockdown plans are being used more than others and how often they’re being used.

  • Gain insight into your Avigilon Alta data

    See who is accessing your entries and when; see what credential methods they’re using and whether they’re onsite or remote.

Have questions? We can help

Our video security experts can help you implement the right security system for your business.