Any employee within a company may access operating systems, devices, and applications, but with different usernames and credentials. Consider for a moment whether your username is the same for your Linux, Windows, or SQL accounts. Devices and applications use platform-specific user registries that are distinct from each other.

Linking these user accounts is a common challenge organizations face especially during single sign-on implementation. This administrative challenge can hinder an organization's security performance if the security analytics solution is not able to map user behavior across platforms and assign risk scores accordingly. Imagine monitoring various user accounts in separate silos, each with a different risk score, even though they all actually belong to the same user. This is the issue at hand. The table below shows one user, Michael Bay, using different user identities to log on and access various devices and applications.

One user, one risk score: User identity mapping in UEBA

A UEBA solution is able to track anomalous activities of users and entities, and generates a risk score, thereby helping you track and prevent occurrences of insider threats, account compromise, and data exfiltration. User identity mapping (UIM) is the process of mapping different user accounts in an enterprise to a base account such as Active Directory by matching common attributes. With UIM, the activities of discrete user accounts from different sources are attributed to the one user who is actually performing them.

How does ManageEngine Log360 map user identities for enhanced anomaly detection?

Users are mapped across the network using their AD account as the basis, or Source Account using mapping configurations. Mapping configurations are rules that the admins can create by specifying attributes of account target and account source across domains. Users identified by these specified attributes will be automatically mapped. Here's how it works in four easy steps.

  • Admins create mapping rules by specifying which of the user's Source Account (AD) attributes and target account attributes should match. All AD users and their details are automatically identified by Log360 when domains are added.
  • Log360 will then look for user accounts across log sources that meet this criterion and map them to the user’s AD account.
  • Admins can review these mappings and verify them.
  • Admins can also create individual identifier rules for each specific AD user to map different user accounts to that particular AD user.

The individual user accounts are then mapped to the AD account, and all anomalies associated with the user across sources can be viewed in a single dashboard.

The user accounts that were earlier considered separate and had individual risk scores, will now have only one representation and one risk score. The consolidated risk score is calculated from the individual's action across platforms (Windows, Linux, and SQL).

Interested in learning more about ManageEngine Log360? Sign up for a personalized demo with our product experts here.

×
  • Please enter a business email id
     
  • By clicking 'Read the ebook', you agree to processing of personal data according to the Privacy Policy

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By clicking on Keep me Updated you agree to processing of personal data according to the Privacy Policy.

Expert Talks

     
 

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.