Log360 UEBA uses machine learning to detect behavior anomalies, strengthening your defenses against insider threats and data breaches.Try Log360 now
One of the best ways to defend against both internal and external attacks is to use user and entity behavior analytics (UEBA) to continuously monitor user and device activity. UEBA learns about each user and creates a baseline of regular activities for each user and entity.
Any activity that deviates from this baseline gets flagged as an anomaly. The IT administrator can then investigate the issue and take the necessary steps to mitigate the risk. Powered by machine learning, UEBA solutions grow more effective the more experience they gain.
Log360 UEBA analyzes logs from different sources including firewalls, routers, workstations, databases, and file servers. Any deviation from normal behavior is classified as a time, count, or pattern anomaly. It then gives actionable insight to the IT administrator with the use of risk scores, anomaly trends, and intuitive reports.
CISCONet ScreenSophosPalo AltoWatch GuardWindows
Windows 10Windows 8.1 Windows 8 Windows 7 Windows Vista Windows XP Prof. X64 ed. Windows XP
Window Server 2019 Window Server 2016 Window Server 2012 Window Server 2012 R2 Window Server 2008 Window Server 2008 R2 Window Server 2003 Window Server 2003 R2
OracleSQL ServerMy SQL
Access to reports such as:
Logon reports File activities reports Logon failure reports Firewall changes reports Configuration changes reports
All the data used to generate the reports can be viewed in graphical form.
UEBA maintains a risk score for each and every user and entity profile. Whenever an activity log for a user/entity differs from its baseline, the risk score of that particular profile increases. An increased risk score of a profile helps the IT admin to look into the matter immediately to prevent any security breach.
Graphically represents the variations in the number of anomalies for a given time period.
A risk score is calculated for each user and entity in the organization after comparing their actions to their baseline of regular activities. The risk score can range from anywhere between 0 to 100, indicating no risk to maximum risk, respectively. The risk score is dependent on factors such as the allotted weight of the action, the extent of the deviation from the baseline, the frequency of deviation, and the time elapsed since the deviation.
In addition to an overall risk score, each user and entity will also have an associated risk score for insider threats, account compromise, and data exfiltration. If the IT administrator feels an entity or user's risk score is too high, they can investigate it further and quickly stop any potential catastrophes.
Here are some activities that might increase the risk score of users and entities, indicating possible insider threats, account compromise, and data exfiltration.
Your download is in progress and it will be completed in just a few seconds!
If you face any issues, download manually here