Input

Log data categories UEBA uses for threat analysis are:

  1. Authentication: events with user, status, and host related fields.

  2. Web Proxy: events containing information about user and source address.

  3. Email: email server and gateway related events with the sender, receiver, and datasize fields. Only outgoing emails sent to external recipients with a Sent, Delivered, or Successful status are analyzed. Only senders of the outgoing emails are considered entities.

  4. VPN (Virtual Private Network): all the remote or SSL VPN (Secure Sockets Layer Virtual Private Network) related events with the source_address, user, and status fields.

  5. Resource/File Access: all the resource and file access related events with the user, host, object_name, object_type, and status fields.

  6. Active Directory:

Event ID

Description

4624

An account was successfully logged on.

4625

An account failed to logon.

4648

A logon was attempted using explicit credentials.

4768

A Kerberos authentication ticket (TGT) was requested.

4769

A Kerberos service ticket was requested.

4770

A Kerberos service ticket was renewed.

4771

Kerberos pre-authentication failed.

4772

A Kerberos authentication ticket request failed.

4773

A Kerberos service ticket request failed.

4776

The computer attempted to validate the credentials for an account.

4777

The domain controller failed to validate the credentials for an account.

4656

A handle to an object was requested.

4663

An attempt was made to access an object.


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support