Have the option to be notified/export audit logs. This can be via webhooks and/or a dedicated API endpoint. This is useful for:
Monitor changes in workspace configuration on internal dashboards
Add logs into SIEM platforms like Sentinel
Guest
Feb 23, 2026
Comment from a support agent :
I’ve done some digging into our internal roadmap and can confirm that a dedicated Audit Log API for SIEM ingestion—specifically for platforms like Microsoft Sentinel is currently an open feature request.
While we have the manual viewer you found in our Help Center, we don't yet have a native streaming endpoint or a dedicated /audit-logs API to handle this programmatically. You can add your vote to this open feature request here: https://front.ideas.aha.io/ideas/PRD-I-8512
While it isn't a pre-packaged audit log, it does capture teammate activity and conversation events that can be piped into your SIEM for monitoring changes in your workspace configuration.
+1 on this. Note: We don't use Sentinel but another SIEM. We don't think Front should implement a Sentinel-specific integration but rather dedicated Audit Logs API endpoint and/or webhooks.
Most providers usually provide 1 or 2 of the following 3 things:
Audit Logs API (1Password, Slack, Google, Atlassian, Jira, Confluence, Github, Salesforce, Microsoft Defender for Endpoint, Cloudflare, etc.). This is now the industry standard. This requires building the Audit Log fetcher, but most SIEM solutions then take the time to add the API integrations natively on their side (ex: Datadog SIEM Integrations, Splunk Integrations, etc.).
Some providers also allow push streaming (require adding middleware that transforms the data to the SIEM compatible format) either:
To an s3-compatible bucket (Datadog Audit trail, AWS CloudTrail, Jamf Protect, Github, Cloudflare, Tailscale, etc.).
or through a Webhook (Jamf Protect, Jamf Pro, Stripe, Auth0),
A few providers provide direct log streaming from provider to SIEM, which is really old school as it requires each provider to maintain many SIEM providers.
Jamf Pro Legacy Enterprise supports only Splunk,
Github only supports Splunk and Datadog through this method.
Auth0 supports a number of vendors because it has a marketplace so the integration is performed by 3rd parties.
Comment from a support agent :
I’ve done some digging into our internal roadmap and can confirm that a dedicated Audit Log API for SIEM ingestion—specifically for platforms like Microsoft Sentinel is currently an open feature request.
While we have the manual viewer you found in our Help Center, we don't yet have a native streaming endpoint or a dedicated
/audit-logsAPI to handle this programmatically. You can add your vote to this open feature request here: https://front.ideas.aha.io/ideas/PRD-I-8512In the meantime, most teams looking for this level of visibility use our Events API to build a custom bridge: https://dev.frontapp.com/reference/get-event
While it isn't a pre-packaged audit log, it does capture teammate activity and conversation events that can be piped into your SIEM for monitoring changes in your workspace configuration.
+1 on this.
Note: We don't use Sentinel but another SIEM. We don't think Front should implement a Sentinel-specific integration but rather dedicated Audit Logs API endpoint and/or webhooks.
Most providers usually provide 1 or 2 of the following 3 things:
Audit Logs API (1Password, Slack, Google, Atlassian, Jira, Confluence, Github, Salesforce, Microsoft Defender for Endpoint, Cloudflare, etc.). This is now the industry standard. This requires building the Audit Log fetcher, but most SIEM solutions then take the time to add the API integrations natively on their side (ex: Datadog SIEM Integrations, Splunk Integrations, etc.).
Some providers also allow push streaming (require adding middleware that transforms the data to the SIEM compatible format) either:
To an s3-compatible bucket (Datadog Audit trail, AWS CloudTrail, Jamf Protect, Github, Cloudflare, Tailscale, etc.).
or through a Webhook (Jamf Protect, Jamf Pro, Stripe, Auth0),
A few providers provide direct log streaming from provider to SIEM, which is really old school as it requires each provider to maintain many SIEM providers.
Jamf Pro Legacy Enterprise supports only Splunk,
Github only supports Splunk and Datadog through this method.
Auth0 supports a number of vendors because it has a marketplace so the integration is performed by 3rd parties.
Tailscale supports Datadog, Splunk, Panther, Elasticsearch.