This topic applies only to users of the User and Entity Behavior Analytics (UEBA) app. You can access behavior-based detections from the UEBA app on an on-premises deployment of Splunk Enterprise Security.
View behavior-based detections from UEBA in Splunk Enterprise Security
Follow these steps to view behavior-based detections from the User and Entity Behavior Analytics (UEBA) app in Splunk Enterprise Security:
- In Splunk Enterprise Security, select Security content and then select Content management to view the list of detections.
- To filter for behavior-based detections, change the Type filter to Behavior-based detection and change the App filter to User and Entity Behavioral Analytics Content.
- Select a detection to view the detection details.
You can't edit or create behavior-based detections on the Content management page. These detections are view only in Splunk Enterprise Security.
- (Optional) In the Status column for the detection, use the drop-down menu to select On or Off. A detection that's turned off does not create any events in any index.
- (Optional) In the Actions column for the detection, select the more icon ( ), and then select Manage finding exclusion rules. With finding exclusion rules, you can exclude risk for a given detection based on specified criteria. You can create and manage finding exclusion rules in the UEBA app.
See also
For more information on behavior analytics in Splunk Enterprise Security, see the following product documentation:
Manage detections from the behavioral analytics service in Splunk Enterprise Security | Machine Learning Toolkit Overview in Splunk Enterprise Security |
This documentation applies to the following versions of Splunk® Enterprise Security: 8.1.0
Feedback submitted, thanks!