Investigate threats as a security analyst
As an analyst in a Security Operations Center (SOC), use Splunk User Behavior Analytics (UBA) to review and investigate the threats in your environment.
- Review current threats in your environment on Threat Review. Review current threats.
- Understand the specific actors in a threat by reviewing the Threat Details.
- Review the anomalies that contributed to the threat in the Anomaly Details.
- Learn more about the users involved in the threat on the User Information page. View user information
- Review users with threats on User Review. Review current user activity.
Review Peer Groups in Splunk UBA | Review current threats |
This documentation applies to the following versions of Splunk® User Behavior Analytics: 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.4.1, 5.0.5, 5.0.5.1
Feedback submitted, thanks!