
Investigate threats as a security analyst
As an analyst in a Security Operations Center (SOC), use Splunk User Behavior Analytics (UBA) to review and investigate the threats in your environment.
- Review current threats in your environment on Threat Review. Review current threats.
- Understand the specific actors in a threat by reviewing the Threat Details.
- Review the anomalies that contributed to the threat in the Anomaly Details.
- Learn more about the users involved in the threat on the User Information page. View user information
- Review users with threats on User Review. Review current user activity.
PREVIOUS Review overall user activity |
NEXT Review current threats |
This documentation applies to the following versions of Splunk® User Behavior Analytics: 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.4.1, 5.0.5, 5.0.5.1, 5.1.0, 5.1.0.1, 5.2.0
Feedback submitted, thanks!