TABLE OF CONTENTS
- Overview
- Prerequisites
- Generate API Credentials in Huntress
- Find Your Organization ID
- Configure Huntress in ADR SIEM
- Verification (MSSP Only)
Overview
This document provides the steps to integrate Huntress with ADR SIEM (aiSIEM/aiXDR) using API credentials. Once configured, Huntress telemetry and alerts will be ingested into ADR through the CCE (Collection and Control Engine), enabling centralized visibility, threat detection, and automated correlation.
Prerequisites
Access to your Huntress portal (
https://<subdomain>.huntress.io).User role with permissions to generate API credentials.
Administrative access to ADR CCE and SIEM UI.
Firewall rules allowing outbound HTTPS from CCE to Huntress API endpoints.
Generate API Credentials in Huntress
Log in to the Huntress Portal →
https://<your_subdomain>.huntress.io.Click your user profile dropdown (top-right).
Select API Credentials. (Visible only if API access is granted.)
Click Setup → then Generate.
Copy the credentials:
Access ID (Public Key)
Secret Key (Private Key)
Important: The Secret Key will only be shown once. Store it securely; regenerate if lost.
Find Your Organization ID
The Organization ID (org_id) is required in the ADR configuration JSON.
Steps:
Log in to the Huntress Portal.
Click Organizations in the top navigation bar.
Select the organization you want to integrate.
Look at your browser’s URL. The Organization ID is the number in the path.
Example URL:
https://huntress.io/organizations/123456/agents
Here, 123456 is the Organization ID.
Configure Huntress in ADR SIEM
Log in to ADR SIEM UI with admin rights.
Navigate: Administation → Add-On Store → Search for Huntress Add (+).
Fill in the following fields:
| Field | Value |
|---|---|
| Device Name | Huntress |
| CCE Host (IP) | Enter the CCE IP |
| Access ID / Username | Enter the Access ID (Public Key) |
| Password / Secret Key | Enter the Secret Key (Private Key) |
| Config (JSON) | Provide JSON including your Huntress ORGID |
Example:
{ "ORGID": "<your_org_id>" }Click Save.
Verification (MSSP Only)
On ADR SIEM UI
Navigate: System → Logs and Flows Collection Status.
Confirm that Huntress appears under Source Device IP.
Validate that logs/events are being ingested.
On ADR CCE (CLI)
Run
otmdoc -s addondevicescrontab -l
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article