Suspicious Behavior

Suspicious Behavior

Description

This threat is generated when a user (or group of users) exhibit general suspicious behavior, specifically patterns of behavior that are outside the normal baseline for the user.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection, Security Monitoring

Category

Account Compromise, Adversary Tactics, Endpoint Compromise, IAM Analytics, Lateral Movement, Malware

Alert Volume

Medium

Data Availability

Bad

Journey

Stage 6

Data Sources

Network Communication
Box
Application Data
Host-based IDS
Endpoint Detection and Response
IDS or IPS
Authentication
Windows Security
Web Proxy
Anti-Virus or Anti-Malware
DNS
Web Server
DLP
Email