As the depth and breadth of the use cases in QRadar have grown, so has the frequency of the questions I hear from clients about maturing their insider threat program with UBA. In this blog series, I’ll address and answer these questions for our UBA clients.
In my previous blog, we covered getting started with a collection of account access and authentication behavioral use cases. In this blog, we’ll focus on deploying use cases that detect abnormal access behaviors, browsing patterns, network or cloud activity, and endpoint activity.
The table below highlights the 9 categories in which these use cases fall. When enabled, these help SOC analysts detect 78 distinct behavioral anomalies.
Geography-based anomalies:
Network and DNS-based anomalous behaviors:
Users accessing or connecting with risky sites (threat intelligence):
Tuning and enabling this selection of 42 use cases will help you advance your Insider Threat program to the next level of detecting anomalous activities of users that may be an indication of usage of compromised or stolen credentials, authentic insiders either being careless and exposing the company to unwanted risks or engaging other risky or suspicious activities.