Review current threats
Splunk User Behavior Analytics (UBA) detects threats based on anomalous activity. Review the threats active in your environment so that you can take targeted action to remediate them.
Filter the threats displayed in the Threats Table
View the Threats Table to see a summary of the threats in your system. You can filter the threats that are displayed in the Threats Table.
- To view the Threats Table, select Explore > Threats in Splunk UBA or click Threats on the Splunk UBA home page.
- Click Add Filter to limit the threats displayed in the Threats Table.
You can filter by any combination of the following criteria:
- Threat information, such as score, category, or status
- Entities involved in the threat, such as users, devices, accounts, apps, and domains
- Anomalies involved in the threat
As an example, filter the Threats Table so view only closed threats:
- Navigate to the Threats Table.
- Click Add Filter.
- Select Threat Status.
- Select Closed By System and Closed By User.
Filters are applied immediately without having to save any settings. You can click Save to save the filtered display as a preset display, so you select it from the Threats Table list of presets without having to re-configure the filters.
Filters are applied across all threat pages, including Threat Review and Threats Dashboard.
Click Threats Review from the Splunk UBA home page to review the current threats detected in your environment. Threats Review displays threats one at a time, with the most severe and urgent threats first. Threats are ordered by risk score, with the more recent and highest-risk threats first. This lets you focus on the threat at hand and review the most urgent threats first.
You can see the total number of threats, and if you choose, select from the available filters to target your Threat Review. Gain an understanding of the threat by reviewing the information about it.
- Review the threat type, description, and risk score. The higher the score, the greater the risk to your environment.
- Review the timeline to see when the threat first appeared, the start date, and the last time the threat was detected, the last update.
- Review the associated anomalies. Select one to view the threat details filtered on the threat-specific anomalies.
- Review the associated users, devices, apps, and/or domains. Select one to view the related info page.
- Determine what action to take next based on the What's Next panel.
- Threat Kill Chain identifies the phases of the kill chain and whether the phase is present for that threat. Use this panel to better understand the threat progression through your organization. To see more details on the kill chain, click Details to open Threat Details.
Not all items may be available for all threats. For example, if a threat is not derived from a kill chain-based correlation model, then the Threat Kill Chain panel will not appear.
Take action on a threat
If you choose, you can take action on the threat.
- Click Watchlists beneath the name of the threat to add it to a watchlist, like a threat watchlist. You can also classify the threat as a False Positive or note that it is Important, Reviewed, or select Save for Later to save the threat to review it later.
- If the threat is not a real threat, select Actions > Not a Threat and select whether the threat is resolved, the user associated has changed roles, or a device should be added to the IP whitelist. See Delete threats and anomalies.
- Send the threat somewhere for further investigation or to share it with others. Select Actions to send the threat to another system.
- Send the threat via email to other analysts. Select the option to Attach HTML if you want to include the threat details page with the threat. To set up the email output connector, see Send Splunk UBA threats to analysts using email in Administer Splunk User Behavior Analytics.
- If you have a ServiceNow or Splunk Enterprise Security integration configured, you can also Export to ServiceNow or Export to SplunkES. See Send threats from Splunk UBA to ServiceNow and Send Splunk UBA threats and anomalies to Splunk Enterprise Security in Administer Splunk User Behavior Analytics.
To learn more about a threat, click Details on the Threats Review page to see the Threat Details.
- The Threat Details page for each threat displays a short and a long description. Read the description to learn more about the type of threat and remediation steps.
- Each threat also has a risk score. The higher the risk score, the greater the threat. Click the risk score to learn more about the factors contributing to the score.
- Review the Threat Relations to understand the interaction of users, devices, domains and/or apps in this threat. Each dotted line represents one or several anomalies connecting users, devices, domains and/or apps. The color of the line corresponds to the highest-risk anomaly in the group of anomalies.
- The Kill Chain on this dashboard is more detailed, organizing the kill chain phases by date, phase, and duration, with the relevant anomalies, locations, and descriptions detailed for each phase.
- The Threat Anomalies Timeline shows the volume and risk level of each anomaly associated with the threat over time.
- The Threat Anomalies Trend helps you identify spikes in anomalous activity. Click the menu, then select Breakdown to see the threat trend graph broken down by anomaly type.
- View all anomalies associated with the threat in the Threat Anomalies panel. The anomalies are sorted by event date by default. Select the header title to reorder the table. You can search within the table, or download the listed anomalies to a CSV file. Click a specific anomaly to view the Anomaly Details, or click the username, device IP address, or app name to view the relevant info page.
- Use the Device Locations map to see the locations of the devices associated with the threat. Use this to determine whether the devices are in their expected locations. The colors indicate the risk level of the anomalies associated with the devices.
Not all panels may be available for all threats.
Select a specific anomaly to view the Anomaly Details dashboard. The Anomaly Details page for each anomaly displays an event date and a description. Read the description to learn more about the type of anomaly and what anomalous activity it is associated with.
Each anomaly has a risk score. The higher the risk score, the greater the risk associated with the anomalous activity.
Take action on anomalies
You can take action on an anomaly, and make changes based on the results of an investigation.
- Click Watchlists beneath the name of the anomaly to add the anomaly to a watchlist. For example, False Positive, Important, Reviewed, or a custom watchlist.
- Select Actions > change Score to change the risk score of an anomaly. Changes to the risk score apply only to the specific anomaly, and are not shared with the model that created the anomaly.
- Select Actions > Delete to delete an anomaly it if it was created in error. See Delete threats and anomalies.
- Select Actions > View similar anomalies to open the anomalies table filtered by characteristics of the anomaly you are viewing.
Review the anomaly details
- Review the Users and Devices involved in the anomaly, if any. Click a username or device IP address to view the relevant information page.
- Review the Anomaly Relations to understand the interaction of users, devices, domains and/or apps in this anomaly.
- As a hunter, use Event Drilldown to connect to Splunk Enterprise and review an anomaly's contributing raw events. See Use event drilldown to review an anomaly's raw events.
- Review the supporting evidence for the anomaly. Each anomaly has different types of supporting evidence. For example, the Unusual Machine Access anomaly displays the common devices and users for the machine so that you can compare them against the anomalous access activity. The Malicious Domain anomaly shares the specific aspects of the domain and the risk that each of those aspects pose to your environment that led the model to determine that the domain is malicious.
- View the Score Details for information about how the anomaly score was calculated. Scoring rules for anomalies in Splunk UBA can be customized. See Customize anomaly scoring rules.
- Use the Anomaly Graph to see the interaction of devices and users. Click the + for a user or device to see additional users, devices, or anomalies associated with the user or device. The blue path indicates the most-commonly-followed path. Only some anomalies have an anomaly graph.
- If devices associated with the anomaly have location data, you can view them on the Device Locations map.
- Under Additional Information you can review the log format of the anomaly as well as the model that detected the anomaly.
Not all panels may be available for all anomalies.
Investigate threats as a security analyst
View user information
This documentation applies to the following versions of Splunk® User Behavior Analytics: 5.0.1, 5.0.2