Splunk® User Behavior Analytics

Use Splunk User Behavior Analytics

Acrobat logo Download manual as PDF

Acrobat logo Download topic as PDF

Review current threats

Splunk User Behavior Analytics (UBA) detects threats based on anomalous activity. Review the threats active in your environment so that you can take targeted action to remediate them.

Filter the threats displayed in the Threats Table

View the Threats Table to see a summary of the threats in your system. You can filter the threats that are displayed in the Threats Table.

  1. To view the Threats Table, select Explore > Threats in Splunk UBA or click Threats on the Splunk UBA home page.
  2. Click Add Filter to limit the threats displayed in the Threats Table.

You can filter by any combination of the following criteria:

  • Threat information, such as score, category, or status
  • Entities involved in the threat, such as users, devices, accounts, apps, and domains
  • Anomalies involved in the threat

As an example, filter the Threats Table so view only closed threats:

  1. Navigate to the Threats Table.
  2. Click Add Filter.
  3. Select Threat Status.
  4. Select Closed By System and Closed By User.

Filters are applied immediately without having to save any settings. You can click Save to save the filtered display as a preset display, so you select it from the Threats Table list of presets without having to re-configure the filters.

Filters are applied across all threat pages, including Threat Review and Threats Dashboard.

Threats Review

Click Threats Review from the Splunk UBA home page to review the current threats detected in your environment. Threats Review displays threats one at a time, with the most severe and urgent threats first. Threats are ordered by risk score, with the more recent and highest-risk threats first. This lets you focus on the threat at hand and review the most urgent threats first.

This screen image shows the Threats Review page. The elements on this page are described in the surrounding text.

You can see the total number of threats, and if you choose, select from the available filters to target your Threat Review. Gain an understanding of the threat by reviewing the information about it.

  • Review the threat type, description, and risk score. The higher the score, the greater the risk to your environment.
  • Review the timeline to see when the threat first appeared, the start date, and the last time the threat was detected, the last update.
  • Review the associated anomalies. Select one to view the threat details filtered on the threat-specific anomalies.
  • Review the associated users, devices, apps, and/or domains. Select one to view the related info page.
  • Determine what action to take next based on the What's Next panel.
  • Threat Kill Chain identifies the phases of the kill chain and whether the phase is present for that threat. Use this panel to better understand the threat progression through your organization. To see more details on the kill chain, click Details to open Threat Details.

Not all items may be available for all threats. For example, if a threat is not derived from a kill chain-based correlation model, then the Threat Kill Chain panel will not appear.

Take action on a threat

If you choose, you can take action on the threat.

  • Click Watchlists beneath the name of the threat to add it to a watchlist, like a threat watchlist. You can also classify the threat as a False Positive or note that it is Important, Reviewed, or select Save for Later to save the threat to review it later.
  • If the threat is not a real threat, select Actions > Not a Threat and select a reason or provide a comment for closing the threat. See Close threats in Splunk UBA.
  • Send the threat somewhere for further investigation or to share it with others. Select Actions to send the threat to another system.

Threat Details

To learn more about a threat, click Details on the Threats Review page to see the Threat Details.

This screen image shows the Threat Details page. The elements on this page are described in the surrounding text.

  • The Threat Details page for each threat displays a short and a long description. Read the description to learn more about the type of threat and remediation steps.
  • Each threat also has a risk score. The higher the risk score, the greater the threat. Click the risk score to learn more about the factors contributing to the score.
  • Review the Threat Relations to understand the interaction of users, devices, domains and/or apps in this threat. Each dotted line represents one or several anomalies connecting users, devices, domains and/or apps. The color of the line corresponds to the highest-risk anomaly in the group of anomalies.
  • The Kill Chain on this dashboard is more detailed, organizing the kill chain phases by date, phase, and duration, with the relevant anomalies, locations, and descriptions detailed for each phase.
  • The Threat Anomalies Timeline shows the volume and risk level of each anomaly associated with the threat over time.
  • The Threat Anomalies Trend helps you identify spikes in anomalous activity. Click the menu, then select Breakdown to see the threat trend graph broken down by anomaly type.
  • View all anomalies associated with the threat in the Threat Anomalies panel. The anomalies are sorted by event date by default. Select the header title to reorder the table. You can search within the table, or download the listed anomalies to a CSV file. Click a specific anomaly to view the Anomaly Details, or click the username, device IP address, or app name to view the relevant info page.
  • Use the Device Locations map to see the locations of the devices associated with the threat. Use this to determine whether the devices are in their expected locations. The colors indicate the risk level of the anomalies associated with the devices.

Not all panels may be available for all threats.

Anomaly Details

Select a specific anomaly to view the Anomaly Details dashboard. The Anomaly Details page for each anomaly displays an event date and a description. Read the description to learn more about the type of anomaly and what anomalous activity it is associated with.

This screen image shows the Anomaly Details page. The elements on this page are described in the surrounding text.

Each anomaly has a risk score. The higher the risk score, the greater the risk associated with the anomalous activity.

Take action on anomalies

You can take action on an anomaly, and make changes based on the results of an investigation.

  • Click Watchlists beneath the name of the anomaly to add the anomaly to a watchlist. For example, False Positive, Important, Reviewed, or a custom watchlist.
  • Select Actions > change Score to change the risk score of an anomaly. Changes to the risk score apply only to the specific anomaly, and are not shared with the model that created the anomaly.
  • Select Actions > Delete to delete an anomaly it if it was created in error. See Delete anomalies in Splunk UBA.
  • Select Actions > View similar anomalies to open the anomalies table filtered by characteristics of the anomaly you are viewing.

Review the anomaly details

  • Review the Users and Devices involved in the anomaly, if any. Click a username or device IP address to view the relevant information page.
  • Review the Anomaly Relations to understand the interaction of users, devices, domains and/or apps in this anomaly.
  • As a hunter, use Event Drilldown to connect to Splunk Enterprise and review an anomaly's contributing raw events. See Use event drilldown to review an anomaly's raw events.
  • Review the supporting evidence for the anomaly. Each anomaly has different types of supporting evidence. For example, the Unusual Machine Access anomaly displays the common devices and users for the machine so that you can compare them against the anomalous access activity. The Malicious Domain anomaly shares the specific aspects of the domain and the risk that each of those aspects pose to your environment that led the model to determine that the domain is malicious.
  • View the Score Details for information about how the anomaly score was calculated. Scoring rules for anomalies in Splunk UBA can be customized. See Customize anomaly scoring rules.
  • Use the Anomaly Graph to see the interaction of devices and users. Click the + for a user or device to see additional users, devices, or anomalies associated with the user or device. The blue path indicates the most-commonly-followed path. Only some anomalies have an anomaly graph.
  • If devices associated with the anomaly have location data, you can view them on the Device Locations map.
  • Under Additional Information you can review the log format of the anomaly as well as the model that detected the anomaly.

Not all panels may be available for all anomalies.

Last modified on 31 March, 2020
PREVIOUS
Investigate threats as a security analyst
  NEXT
View user information

This documentation applies to the following versions of Splunk® User Behavior Analytics: 5.0.1, 5.0.2, 5.0.3, 5.0.4


Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters