Anomalies

Anomalies is a list of all the suspicious activities detected. Each anomaly has risk level, entity risk level, possible threat type, anomaly description, and time when the anomaly was created. The anomaly and entity risk levels are color-coded according to their Risk Scores.

In Anomalies, you can:

  • Sort the Anomaly Risk, Entity Risk, and Time columns. You can only sort one column at a time. When you sort the column, only the anomalies already listed in the panel are sorted. Once you scroll to load more anomalies, the sorting is reset.

  • Filter the data based on the individual entity by clicking the highlighted entity’s name in the Anomaly column.

  • View the anomaly details, including visualization and additional description, by expanding an anomaly with the Expand (plus) button.

  • Create incidents and explore raw events from the More (kebab) icon.

../_images/UEBA_Page_Anomalies_Panel.png

Anomalies

Creating Incidents

  1. Go to UEBA from the navigation bar and click an entity tab.

  2. Hover over the More (kebab) icon and click Create Incident.

    ../_images/UEBA_Page_Create_Incident.png

    Creating Incident From the More Menu

    Or, click the Expand (plus) button of an anamoly and click Create Incident.

    ../_images/UEBA_Page_Create_Incident_Anomaliespanel.png

    Creating Incident by Expanding an Anomaly

  3. UEBA provides Incident name, Description and Risk level by default based on the anomaly. However, you can update these fields if required.

    ../_images/UEBA_Page_Create_Incident_info.png

    Configuring Incident Information

  4. In Assigned to, select a user to assign the ownership of the incident. The drop-down displays all the distinct Users mapped to the Incident User Groups.

  5. In Manageable by, select a group or groups to assign who can manage the incident. All the Incident User Groups and their corresponding users are listed in the expandable drop-down.

    Users selected in both Assigned to and Manageable by can view the generated incident, reassign it, and comment on the data. However, only the Assigned to user can resolve it.

    ../_images/UEBA_Page_Create_ownership_panel.png

    Configuring Ownership Information

    While creating the incident, you can only see Assigned to and Manageable by if you belong to an Incident User Groups. In this case, you are assigned to the generated incident, and you are responsible for managing it.

    You can also assign an incident to yourself and select none of the Incident User Groups in Manageable by.

  6. Select Attack Tag, and enter Metadata and Log Sources.

    ../_images/UEBA_Page_Create_metadata_info.png

    Configuring Incident Categorization

  7. Click Submit.

For more details, go to Alerts and Incidents.

Note

For LPSM versions 2.2.0 and later, users need the Create Incident permission to create an incident.

Visualization

Based on the threat type, one of the following charts is displayed to visualize the anomaly:

Volumetric Chart

Volumetric chart visualizes the number of times the user performed a particular anomalous activity. There are seven bars that display following data:

  • Average number of times the user performs the particular activity

  • Expected highest number of times the user performs the particular activity

  • Observed number of times the user performed the activity

  • Average number of times peer users perform the activity

  • Expected highest number of times peer users perform the activity

  • Average number of times other users perform the activity

  • Expected highest number of times other users perform the activity

The purple bar indicates the observed anomaly.

../_images/UEBA_Volumetric_Chart.png

Volumetric Chart

The anomaly highlighted is based on the number of times the user behaved anomalously within a timeframe in comparison to normal behavior. For example, when a user logs into a particular server an unusual number of times within an hour, this indicates the possibility of lateral movement.

Working Hours Chart

Working Hours chart displays the activity of the user on a 24-hour clock. Each slice in the chart represents 1 hour of the time slot. The purple slice shows the most unusual time at which the user was active. The grey slices represent the expected activity on that period.

../_images/UEBA_Working_Hours_Chart.png

Working Hours Chart

The anomaly highlighted by this chart is based on the user’s activity at a particular time, in comparison to the past activity. For example, when a user is working on an hour they usually do not work or have never worked in the past, this may represent an account compromise or misuse.

Rare Chart

Rare chart highlights the anomalous activity performed by the user in a horizontal bar. The dark line in the bar represents the observed anomaly: the further the line is to the right, the more anomalous the activity is.

../_images/UEBA_Rare_Chart.png

Rare Chart

The anomaly highlighted by this chart is based on the user’s activity in comparison to the rarity of the same activity performed in the past. For example, when a user, who rarely had failed access attempts on a particular shared drive, has access failures 10 times, this may indicate a compromised account.

Rare User Chart

Rare User chart highlights how anomalous the user is, in a horizontal bar. The dark line in the bar represents the observed anomaly: the further the line is to the right, the more anomalous the user is.

../_images/UEBA_Rareuser_Chart.png

Rare User Chart

The anomaly highlighted by this chart is based on the rarity of the user’s activity compared to their normal behavior. For example, when an inactive or a new account becomes active, this may indicate an account misuse.

Working Day Chart

Working Day chart depicts the typical weekly activity of the specific user and its peer group in a bar. The gray area in each bar highlights the activity of the user and its peer group on each weekday. A large gray area indicates a high amount of user activity for the corresponding day. The day with a dark border signifies when the anomaly was detected.

../_images/UEBA_Working_Day_Chart.png

Working Day Chart

The anomaly highlighted by this chart is based on the user’s activity on a particular day of the week, in comparison to the user’s past activity as well as its peer group’s weekly activity. For example, when a user is working on a day they usually do not work or have never worked in the past, this may represent an account compromise or misuse.

Access Ratio Cluster Chart

Access Ratio Cluster chart highlights the anomalous activity performed by the user in a horizontal bar and the percentage of similar peers and other users of the organization performing the activity in pie charts. The dark line in the bar represents the observed anomaly: the further the line is to the right, the more anomalous the activity is.

../_images/UEBA_Access_Ratio_Cluster_Chart.png

Access Ratio Cluster Chart

The anomaly highlighted by this chart is based on the user’s activity in comparison to its peer group’s activity as well as the activity of other users in the organization. For example, when a user accesses a particular shared drive that few other people interact with, this indicates a possibility of lateral movement in the system.

Access Ratio Chart

Access Ratio chart highlights the anomalous activity performed by the user in a horizontal bar and the percentage of other users of the organization performing the activity in a pie chart. The dark line in the bar represents the observed anomaly: the further the line is to the right, the more anomalous the activity is.

../_images/UEBA_Access_Ratio_Chart.png

Access Ratio Chart

The anomaly highlighted by this chart is based on the user’s activity in comparison to the number of users that have performed the same activity in the past. For example, when a user accesses a particular resource that only 2 other users have accessed before, this may indicate that an attacker is using the user’s account for lateral movement.

None Chart

None chart provides an additional contextual description of the anomaly. None represents anomalies other charts do not represent. For example, when a user attempts to access a resource that no one has accessed recently, this may indicate that an attacker is using the user’s account for lateral movement.

../_images/UEBA_None_Chart.png

None Chart


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support