ArcSight User Behavior Monitoring Use Cases

The ArcSight User Behavior Monitoring (UBM) solution resources are organized in the ESM Console using use case resources. A use case resource provides a way to group and view a set of resources that help address ArcSight a specific security issue or business requirement.

The UBM solution supports the use cases listed in the following table. Open Text recommends configuring the use cases in the order listed below to maximize the reporting information for the downstream use case. For example, configuring the Actor Attribution by IP Address Use Case before the Actor Threat Score Use Case means that the Actor Threat Score Use Case can attribute events to actors using IP addresses.

Use Case

Use Case Purpose

Actor Management Use Case

The Actor Management use case contains resources designed to show analysts the status of actor resources in ESM. The number of actors, roles, and account IDs monitored can be identified with this use case. In addition, analysts can monitor changes to actor resources, and identify the use of rogue accounts that cannot be tied to any actor in ESM.

Actor Attribution by IP Address Use Case

The Actor Attribution by IP Address use case associates IP addresses to actors, and allows events from IP addresses to be attributed to the logged in actor, even if no username is present in the event.

Shared Accounts Use Case

The Shared Accounts use case reports on the usage of accounts that might be in use by more than one individual. The use case can detect when anyone uses an existing known shared account, as well as detect the use of any account by more than one individual.

Actor Threat Score Use Case

The Actor Threat Score use case provides a method for tracking the level of suspicious activity exhibited by monitored users. Analysts are notified when an actor's suspicious activity exceeds configurable levels. Actors with high threat scores are monitored at a higher level of scrutiny.

Suspicious Activity Use Case

The Suspicious Activity use case provides resources that can be used to discover and analyze suspicious activity occurring on your network. When triggered, the suspicious activity rules can contribute to the resources of the Actor Threat Score Use Case.

User Activity Monitoring Use Case

The User Activity Monitoring use case contains resources designed to enable analysts to monitor the activity of users on the network. Many resources break down activity by actors' employee type, department, or other attributes.

Privileged User Monitoring Use Case

The Privileged User Monitoring use case monitors the usage and authorization of privileged accounts.

Actor Management Use Case

The Actor Management use case contains resources designed to show analysts the status of actor resources in ESM. The number of actors, roles, and account IDs monitored can be identified with this use case. In addition, analysts can monitor changes to actor resources, and identify the use of rogue accounts that cannot be tied to any actor in ESM.

The Actor Management use case monitors and reports on changes to actor information such as employee type, status, department, roles and account IDs. The Actor Model Import connector dynamically synchronizes information from an Identity Management System to the actors stored in ESM. By monitoring and reporting on the changes to actors, this use case effectively monitors changes to the Identity Management System.

If an account ID is not known by the Identity Management System and therefore not associated with any actors, the account ID is considered to be rogue. For example, if a database administrator creates an account in the database but does not register that account in the Identity Management System, the account ID is rogue. By comparing relevant actor information with events observed on the network, this use case can report when activity is observed from accounts which cannot be correlated to an identity—the activity of rogue accounts.

In addition, the resources provided in the Actor Management use case enable auditors, analysts, and managers to provide the following services:

Configure Resources

Configure the following types of resources for this use case:

Rules

The following rules can be configured for this use case:

Enable the Actor Changes rule if you want to track the activity of rogue accounts—accounts IDs not attributable to any actors. (If enabled, this rule might trigger excessively if there are a lot of account IDs that are not in your actor model.)

If this rule is enabled and rogue account activity is detected, by default the rule invokes the following actions:

By default, the other actions of the Actor Changes rule are disabled. You can optionally enable these actions:

Enable the Actor Changes rule if you want to track when an actor resource is deleted using the ESM Console. Manually editing the information stored in actors should be avoided because typically this information is dynamically updated by Actor Model Import connector(s). If this rule is enabled and an actor resource has been deleted, by default the rule invokes the following actions:

By default, the other action of the Actor Changes rule is disabled. You can optionally enable this action:

Enable the Actor Changes rule if you want to track when the identity information stored in actors has been manually changed using the ESM Console. Manually editing the information stored in actors should be avoided because typically this information is dynamically updated by Actor Model Import connector(s). This rule is provided to send a notification when someone edits actors manually. If this rule is enabled and ESM audit events indicating actor changes are detected, by default the rule invokes the following action:

By default, the following actions of the Actor Changes rule is disabled. You can optionally enable these actions:

Send Notification—If this action is enabled and the rule is triggered, the rule sends a notification to all users assigned to the CERT Team.

Add to Existing Case—Adds a case to the specified URI.

Devices

This use case depends on audit events generated by ESM when actor resources are modified. Any device can contribute to the Actor Changes rule. The Actor Changes rule is triggered by the account activity of rogue accounts from any device.

The Actor Changes and Actor Changes rules are triggered by audit events triggered by ESM.

All devices can supply events to this use case but the resources will only process events from devices, when the device generates events that can be attributed to specific actors.

Verify Configuration

After configuring this use case, verify that ESM is collecting events that indicate that actors are being populated by the Actor Model Import connector(s):

  1. In the Navigator panel, go to Dashboards.
  2. Navigate to ArcSight Solutions/UBM/Actor Management/.
  3. Right-click Actor Changes and select Show Dashboard.

Resources

The following table lists all the resources explicitly assigned to this use case and any dependent resources.

Resources that Support the Actor Management Use Case

Resource

Description

Type

URI

Monitor Resources

Actor Changes

This active channel shows all actor audit events generated by ESM when an actor resource is updated.

Active Channel

ArcSight Solutions/UBM/Actor Management/

Activity from Rogue Account IDs

This active channel shows correlation events that indicate the use of rogue account IDs.

Active Channel

ArcSight Solutions/UBM/Actor Management/

Actor Role Changes

This active channel shows actor audit events indicating role changes have occurred.

Active Channel

ArcSight Solutions/UBM/Actor Management/

Actor Roles Overview

This dashboard shows a summary of actor role data and can be used to investigate the current status of actor role assignments in the system.

Dashboard

ArcSight Solutions/UBM/Actor Management/

Rogue Account IDs

This dashboard shows information associated with rogue accounts such as account IDs, applications, attacker addresses and target addresses.

Dashboard

ArcSight Solutions/UBM/Actor Management/

Actor Role Changes

This dashboard displays several data monitors that can be used for monitoring changes to actors' role assignments.

Dashboard

ArcSight Solutions/UBM/Actor Management/

Events with and without Actors

This dashboard shows a summary of how events over the last hour are being attributed to actors and includes information about those events that are not attributed to actors.

Dashboard

ArcSight Solutions/UBM /Actor Management/

Actor Overview

This dashboard shows a summary of actor data and can be used to investigate the current status of actor resources in the system.

Dashboard

ArcSight Solutions/UBM/Actor Management/

Actor Changes

This dashboard displays several data monitors that can be used for monitoring changes to actor resources that are imported by model import connectors, or via manual changes.

Dashboard

ArcSight Solutions/UBM/Actor Management/

Role Names

This query viewer shows every role name and role type in the system, ordered by role name.

Query Viewer

ArcSight Solutions/UBM/Actor Management/

Number of Role Assignments

This query viewer displays the total number of actor role assignments per authenticator in the system.

Query Viewer

ArcSight Solutions/UBM/Actor Management/

Count of Roles by Type

This query viewer displays the number of roles of each type in the system.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Leaf Node Organizational Units

This query viewer shows the leaf node organizational unit from actors' distinguished names, and the number of actors in that organizational unit.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Number of Account IDs

This query viewer displays the number of unique account IDs per authenticator in the system.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Top 20 Roles

This query viewer displays the top roles by count of the actors assigned to them.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Roles by Actor

This actor query viewer shows every actor's full name and roles.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Top Rogue Account IDs in Use

This query viewer shows the top rogue account IDs by count of the number of events. Each rogue account ID is a combination of the attacker and target user names.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Department Overview

This query viewer displays the number of actors in each department.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Top Attacker Addresses with Activity from Rogue Account IDs

This query viewer shows the top attacker addresses by count of the number of events that show activity attributable to rogue accounts IDs.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Top Target Addresses with Activity from Rogue Account IDs

This query viewer shows the top target addresses by count of the number of events that show activity attributable to rogue accounts IDs.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Actor Status Overview

This query viewer displays each unique actor status value and the number of actors having that status.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Top Applications with Activity from Rogue Account IDs

This query viewer shows the top applications by count of the number of events that show activity attributable to rogue accounts IDs.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Top 20 Actors with Roles

This query viewer displays the top actors by count of their role assignments.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Actor Base Attributes

This query viewer displays all single-value attributes (base attributes) for each actor in the system.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Total Number of Actors

This query viewer displays the number of unique actor resources in the system.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Count of Roles by Memberships

This query viewer gives the number of actors that are assigned to each role.

Query Viewer

ArcSight Solutions/UBM /Actor Management/

Detailed Activity for Account ID

This report shows all activity that can be attributed to a single account id.

Report

ArcSight Solutions/UBM /Actor Management/

Actors with Specified Role

This report shows all role assignments for actors having the role specified when running the report. The report lists each actor having the specified role, and all of the other roles assigned to each actor.

Report

ArcSight Solutions/UBM /Actor Management/

Rogue Account IDs - Activity

This report shows a summary of all events attributable to rogue accounts and can be used to identify the use of rogue accounts on specific systems.

Report

ArcSight Solutions/UBM /Actor Management/

Role Attestation for Department

This report shows all roles for actors in the specified department.

Report

ArcSight Solutions/UBM /Actor Management/

Top Rogue Account IDs in Use

This report shows the top rogue account IDs by count of the number of events. Each rogue account ID is a combination of the attacker and target user names.

Report

ArcSight Solutions/UBM /Actor Management/

Actor Role Changes

This report shows a summary of actor role changes, included role added and role deleted events.

Report

ArcSight Solutions/UBM /Actor Management/

Roles by Number of Assignees

This report shows each role, role type, and the number of actors assigned to that role.

Report

ArcSight Solutions/UBM /Actor Management/

Role Attestation for All Actors

This report shows all roles for all actors in the system that have a status of Active.

Report

ArcSight Solutions/UBM /Actor Management/

Rogue Account IDs - List

This report shows a list of the rogue account IDs included on the Rogue Account IDs active list.

Report

ArcSight Solutions/UBM /Actor Management/

Role Attestation for Actors with Specified Role

This report shows all role assignments for actors having the role specified when running the report. The report lists each actor having the specified role, and all of the other roles assigned to each actor.

Report

ArcSight Solutions/UBM /Actor Management/

Actors Status Disabled

This report shows information from actor audit events indicating an actor's status was set to disabled.

Report

ArcSight Solutions/UBM /Actor Management/

Actor Information Detail

This report shows a detail of the attributes for all actors in the system.

Report

ArcSight Solutions/UBM /Actor Management/

Actors Added

This report shows information from actor audit events indicating an actor resource was added to the system.

Report

ArcSight Solutions/UBM /Actor Management/

Library - Correlation Resources

Activity from Rogue Account ID

This rule triggers on events attributable to rogue account IDs, and adds the account IDs to the Rogue Account IDs active list.

Rule

ArcSight Solutions/UBM /Actor Management/

Actor Updated by Interactive Session

This rule triggers on actor audit events generated by ESM when an actor resource is updated by an interactive session, such as an admin user session. Its purpose is to notify when manual changes are made to actor resources.

Rule

ArcSight Solutions/UBM /Actor Management/

Actor Deleted by Interactive Session

This rule triggers on actor audit events generated by ESM when an actor resource is deleted by an interactive session. Its purpose is to notify when manual deletions of actor resources occur.

Rule

ArcSight Solutions/UBM /Actor Management/

Library Resources

My DNS Domains

This active list defines the DNS domain names which are owned by the organization.

Active List

ArcSight Solutions/UBM /User Activity Monitoring/

Rogue Account IDs

This active list contains relevant information from events that involve the use of a rogue account id.

Active List

ArcSight Solutions/UBM /Actor Management/

Account Authenticators

This active list is used by the actor global variables to determine what the Identity Management authenticator is, base on the event, so that an actor can be determined from event information.

Active List

ArcSight System/Actor Data Support

Known Shared Accounts

This active list maintains a list of known shared accounts per application. Note that all account IDs must be in uppercase and the Application field must be the same as what appears in the Device Product event field.

Active List

ArcSight Solutions/UBM /Shared Accounts/

Actor Audit Events - Top Actions

This data monitor calculates the most frequent actions being taken on actor resources.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Actor Role Deletions - Last N

This data monitor maintains a list of the last n actor role deletions.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Actor Audit Events - Top Actors

This data monitor calculates the most frequent actor resources being updated.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Actor Role Additions - Last N

This data monitor maintains a list of the last n actor role additions.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Actor Attribute Updates

This data monitor maintains a list of the last n actor attribute change events.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Actor Role Additions - Top Value Counts

This data monitor calculates the most frequent role assignments added to actor resources.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Actor Audit Events - Interactive Session

This data monitor shows pertinent fields from actor audit events caused by an interactive session, such as admin user.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Events without Actors - Top 10 Usernames (Last Hour)

This data monitor shows the top 10 user names across events that cannot be attributed to an actor in the last hour.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Actor Account ID Additions

This data monitor maintains a list of the last n actor account ID additions.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Events with and without Actors in the Last Hour

This data monitor shows a moving average of how many events can and cannot be attributed to an actor.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Actor Role Deletions - Top Value Counts

This data monitor calculates the most frequent role assignments deleted from actor resources.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Actor Account ID Deletions

This data monitor maintains a list of the last n actor account ID deletions.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Events with no Actor Breakdown by Authenticator (Last Hour)

This data monitor shows a moving average of how many events cannot be attributed to an actor by authenticator. In case an authenticator cannot be derived from an event, the device vendor, product, agent address and agent zone event fields are displayed.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

Events with Actors Breakdown - Last Hour

This data monitor shows a breakdown of how actors are being mapped to events either by account (event user name) or by the originating IP address.

Data Monitor

ArcSight Solutions/UBM /Actor Management/

solnConcatAttackerTargetUser

This variable concatenates the attacker user name, a | character and the target user name. It can be used as a single field to showcase various user name combinations in events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ARST_IDV_DeletedAccountResource

This global variable returns the deleted account ID resource from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ActorByAccountID

This global variable maps the account information in an event with an actor. The account information consists of the device vendor and product, and information derived from the attacker or target user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM /Core Variables/

ActorFromIPMap

This global variable returns an actor's UUID, full name, username used, and login type if the actor is associated with a source IP address.

Global Variable

ArcSight Solutions/UBM /Actor Attribution by IP Address/

ARST_IDV_ActionFromAuditEvt

This global variable returns the action type from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ARST_IDV_DeletedResource

This global variable returns the deleted role resource from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ARST_IDV_AddedAccountID

This global variable returns the added account ID from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

AttributableActor

This global variable returns all the information for an actor, where the event to actor attribution is done using either attacker or target user name fields, or the source IP address. Note: To turn lookups based on the source IP address, in the Parameters tab, do not use the actorByAccountOrSourceIP local variable to lookup the actor, use the UUID field of the ActorByAccountID global variable instead.

Global Variable

ArcSight Solutions/UBM /Core Variables/

ActorByIP

This global variable returns all the information for an actor, where the event to actor attribution is done using the source IP address.

Global Variable

ArcSight Solutions/UBM /Actor Attribution by IP Address/

ARST_IDV_AddedAccountResource

This global variable returns the added account ID resource from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

Top Level OUs

This global variable returns the top level OU from an actor's distinguished name.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ActorByAttackerUserName

This variable maps the account information in an event with an actor. The account information consists of the device vendor, device product, connector address, connector zone, and information derived from the attacker user name.

Global Variable

ArcSight Solutions/UBM /Core Variables

solnPatternDiscoveryConst

This variable returns a constant string that can be used in Pattern Discovery profiles when it is not required to specify either a Source or a Target event field.

Global Variable

ArcSight Solutions/UBM /Core Variables/

ARST_IDV_DeletedAccountID

This global variable returns the deleted account ID from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ActorByTargetUserName

This variable maps the account information in an event with an actor. The account information consists of the device vendor, device product, connector address, connector zone, and information derived from the target user name.

Global Variable

ArcSight Solutions/UBM /Core Variables

ARST_IDV_DeletedRole

This global variable returns the deleted role from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

solnGetAuthenticator

This global variable extracts the authenticator from the event by looking up the Account Authenticators list using event fields.

Global Variable

ArcSight Solutions/UBM /Core Variables/

solnGetUsername

This global variable returns user name in an event from target user name or attacker user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM /Core Variables/

ARST_IDV_ActorFromAuditEvt

This global variable returns the modified Actor from actor audit events.

Global Variable

ArcSight Solutions/UBM /Privileged Users/

ARST_IDV_AddedRole

This global variable returns the added role from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ARST_IDV_AddedRoleType

This global variable returns the added role type from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ARST_IDV_AddedResource

This global variable returns the added role resource from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ARST_IDV_ActorsManager

This global variable retrieves an actor's manager actor, by using the Manager DN field of the subordinate actor resource.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ARST_IDV_UpdatedAttributeValue

This global variable returns the updated attribute new value from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ARST_IDV_UpdatedAttributeName

This global variable returns the updated attribute name from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

ARST_IDV_DeletedRoleType

This global variable returns the deleted role type from actor audit events.

Global Variable

ArcSight Solutions/UBM /Actor Management/

Activity from Rogue Account IDs

This field set selects pertinent fields from events attributable to rogue account IDs.

Field Set

ArcSight Solutions/UBM /Actor Management/

Actor Role Additions

This field set contains fields of interest for monitoring additions to Actors assigned roles.

Field Set

ArcSight Solutions/UBM /Actor Management/

Actor Audit Events

This field set contains fields of interest for monitoring changes to Actor resources.

Field Set

ArcSight Solutions/UBM /Actor Management/

Actor Role Deletions

This field set contains fields of interest for monitoring deletions from Actors assigned roles.

Field Set

ArcSight Solutions/UBM /Actor Management/

ActorByTargetUserName is NULL

This filter selects events which cannot be attributed to an actor based on the target user name field.

Filter

ArcSight Solutions/UBM/Core Filters/

Target Username is a System Account

This filter selects events in which the target user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

ActorByAttackerUserName is NULL

This filter selects events which cannot be attributed to an actor based on the attacker user name field.

Filter

ArcSight Solutions/UBM/Core Filters/

All Failed Logins

This filter selects all events indicating that a user failed authentication.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Target User Name is Rogue Account ID

This filter selects events that the target user name is unknown and cannot be associated to actors or other predefined accounts.

Filter

ArcSight Solutions/UBM/Actor Management/

ActorByIP is NULL

This filter selects events where an actor cannot be attributed to an event based on the event source IP address.

Filter

ArcSight Solutions/UBM/Core Filters/

Attacker User Name is a System Account

This filter selects events in which the attacker user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

ASM Events

This filter selects internal monitoring events involving data monitor resources.

Filter

ArcSight Solutions/UBM/Core Filters/

Actor Audit Events by Interactive Session

This filter selects actor audit events generated by ESM when an actor resource is updated by an interactive session, such as admin user. Its purpose is to find manual changes made to actor resources.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Audit Events - Account Identifier Deleted

This filter selects actor audit events generated by ESM when an actor's account ID is deleted.

Filter

ArcSight Solutions/UBM/Actor Management/

Outbound Email

This filter selects events indicating email traffic from internal domains to external domains.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

ArcSight Events

This filter selects events in which the Device Vendor and Device Product is ArcSight.

Filter

ArcSight Solutions/UBM/Core Filters/

Attacker User Name is NOT NULL

This filter selects events in which the attacker user name field is populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Activity from Rogue Account IDs

This filter selects events where either the attacker or target user name is deemed to be a rogue account id. A rogue account ID is one that is unknown and cannot be associated to actors or other predefined accounts. Login attempts are excluded to eliminate false positives due to username typos.

Filter

ArcSight Solutions/UBM/Actor Management/

Inbound Email

This filter selects events indicating email traffic from external domains to internal domains.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Physical Access System Events

This filter selects all events from physical access systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Actor Audit Events - Role Changes

This filter selects actor audit events generated by ESM when an actor resource's role attribute is updated.

Filter

ArcSight Solutions/UBM/Actor Management/

No Actor with Authenticator

This filter identifies events where an authenticator can be derived from the event fields but an actor cannot.

Filter

ArcSight Solutions/UBM/Actor Management/

ActorByAccountID is NULL

This filter selects events which can not be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

ActorByAccountID is NOT NULL

This filter selects events which can be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

Non-ArcSight Events

This filter selects events in which the Device Vendor and Device Product is not ArcSight.

Filter

ArcSight Solutions/UBM/Core Filters/

Actor Audit Events - Actor Deleted by Interactive Session

This filter selects actor audit events generated by ESM when an actor resource is deleted by an interactive session. Its purpose is to find manual deletions made to actor resources.

Filter

ArcSight Solutions/UBM/Actor Management/

User Privilege Added

This filter selects events indicating that new rights were assigned to a user.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Attacker User Name is NULL

This filter selects events in which the attacker user name field is not populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Event with User Name and without Actor

This filter identifies events that have a user name in them but cannot be attributed to an actor.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Audit Events - Base Attribute Updated

This filter selects actor audit events generated by ESM when an actor's base attribute is updated.

Filter

ArcSight Solutions/UBM/Actor Management/

ActorByIP is NOT NULL

This filter checks if an actor can be associated with the source IP address of the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Target User Name is NOT NULL

This filter selects events in which the attacker user name field is populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Arcsight Internal Events

This filter selects ArcSight ESM internally generated events.

Filter

ArcSight Solutions/UBM/Core Filters/

Actor Audit Events - Role Added

This filter selects actor audit events generated by ESM when an actor resource's role attribute is added.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Audit Events - Actor Added

This filter selects actor audit events generated by ESM when an actor resource is added.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Audit Events - Role Deleted

This filter selects actor audit events generated by ESM when an actor resource's role attribute is deleted.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Audit Events - Status Disabled

This filter selects actor audit events generated by ESM when an actor's base attribute is updated.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Audit Events - Account Identifier Added

This filter selects actor audit events generated by ESM when an actor's account ID is added.

Filter

ArcSight Solutions/UBM/Actor Management/

Attacker User Name is Rogue Account ID

This filter selects events where the attacker user name is unknown and cannot be associated to actors or other predefined accounts.

Filter

ArcSight Solutions/UBM/Actor Management/

Email Traffic

This filter selects events indicating successful email communications.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Events without Actor

This filter identifies the events that cannot be attributed to an actor.

Filter

ArcSight Solutions/UBM/Actor Management/

Events with Actor

This filter identifies events that can be attributed to an actor either by virtue of the event user name or the originating IP address.

Filter

ArcSight Solutions/UBM/Actor Management/

Username Present

This filter checks whether any of attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Target User Name is NULL

This filter selects events in which the target user name field is not populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Non-ArcSight Internal

This filter excludes internal ArcSight events.

Filter

ArcSight Solutions/UBM/Core Filters/

Windows Events

This filter selects all events in which the device product field is Microsoft Windows.

Filter

ArcSight Solutions/UBM/Core Filters/

Windows Exceptions for Target User Name Rogue Account ID checks

This filter identifies Microsoft Windows events that have a target user name which should not be attributed to a rogue account id.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Audit Events

This filter selects all actor audit events generated by ESM when an actor resource is updated.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Audit Events - Actor Deleted

This filter selects actor audit events generated by ESM when an actor resource is deleted.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Attribute Modifications

This profile detects patterns of actor attribute modifications.

Profile

ArcSight Solutions/UBM/Actor Management/

Actor Role Deletions

This profile detects patterns of actor role deletions.

Profile

ArcSight Solutions/UBM/Actor Management/

Actor Role Additions

This profile detects patterns of actor role additions.

Profile

ArcSight Solutions/UBM/Actor Management/

Top Applications with Activity from Rogue Account IDs

This query selects the top applications by count of the number of events that show activity attributable to rogue accounts IDs.

Query

ArcSight Solutions/UBM/Actor Management/

Role Names

This query selects every role name and role type in the system, ordered by role name.

Query

ArcSight Solutions/UBM/Actor Management/

Count of Roles by Type

This query selects the total number of actor role assignments per authenticator in the system.

Query

ArcSight Solutions/UBM/Actor Management/

Actor Status Overview

This query selects each unique actor status value and the number of actors having that status.

Query

ArcSight Solutions/UBM/Actor Management/

Top 20 Actors with Roles

This query selects the top actors by count of their role assignments.

Query

ArcSight Solutions/UBM/Actor Management/

Number of Account IDs

This query selects the number of unique account IDs per authenticator in the system.

Query

ArcSight Solutions/UBM/Actor Management/

Department Overview

This query selects the department from each actor, and counts the number of actors in that department.

Query

ArcSight Solutions/UBM/Actor Management/

Actor Base Attributes

This query selects all single-value attributes (base attributes) for each actor in the system.

Query

ArcSight Solutions/UBM/Actor Management/

Top 20 Entitled Actors for Department

This query selects the top actors from the specified department by count of their role assignments.

Query

ArcSight Solutions/UBM/Actor Management/

Actors Status Disabled

This query selects information from actor audit events indicating an actor's status was set to disabled.

Query

ArcSight Solutions/UBM/Actor Management/

Top 20 Roles

This query selects the top roles by count of the actors assigned to them.

Query

ArcSight Solutions/UBM/Actor Management/

Actor Role Additions

This query selects actor audit events generated by ESM when an actor's role attribute is added.

Query

ArcSight Solutions/UBM/Actor Management/

Top Target Addresses with Activity from Rogue Account IDs

This query selects the top target addresses by count of the number of events that show activity attributable to rogue accounts IDs.

Query

ArcSight Solutions/UBM/Actor Management/

Leaf Node OUs

This query selects the leaf node organizational unit from actors distinguished names, and counts the number of actors in that organizational unit.

Query

ArcSight Solutions/UBM/Actor Management/

Role Attestation for Actors with Specified Role

This query selects all role assignments for actors having the role specified when running the report.

Query

ArcSight Solutions/UBM/Actor Management/

Roles by Actor

This query selects every actor's full name and roles.

Query

ArcSight Solutions/UBM/Actor Management/

Activity from Rogue Account IDs - by Attacker User

This query selects the attacker user name, target host name, and count of events attributable to rogue accounts IDs, grouped by attacker user name and target host name.

Query

ArcSight Solutions/UBM/Actor Management/

Actor All Attributes

This query on actors selects all attributes from each actor resource.

Query

ArcSight Solutions/UBM/Actor Management/

Roles by Actor with Active Status

This query selects all roles for all actors who have a status of Active.

Query

ArcSight Solutions/UBM/Actor Management/

Actor Role Deletions

This query selects actor audit events generated by ESM when an actor's role attribute is deleted.

Query

ArcSight Solutions/UBM/Actor Management/

Number of Role Assignments

This query selects the total number of actor role assignments per authenticator in the system.

Query

ArcSight Solutions/UBM/Actor Management/

Count of Roles by Memberships

This query on actors gives the number of actors that are assigned to each role.

Query

ArcSight Solutions/UBM/Actor Management/

Actors with Specified Role

This query selects all role assignments for actors having the role specified when running the report.

Query

ArcSight Solutions/UBM/Actor Management/

Actors Added

This query selects information from actor audit events indicating an actor resource was added to the system.

Query

ArcSight Solutions/UBM/Actor Management/

Detailed Activity for Account ID

This query selects all activity that can be attributed to a single account id.

Query

ArcSight Solutions/UBM/Actor Management/

Top Rogue Account IDs in Use

This query selects the top rogue account IDs by count of the number of events. Each rogue account ID is a combination of the attacker and target user names.

Query

ArcSight Solutions/UBM/Actor Management/

Top Attacker Addresses with Activity from Rogue Account IDs

This query selects the top attacker addresses by count of the number of events that show activity attributable to rogue accounts IDs.

Query

ArcSight Solutions/UBM/Actor Management/

Total Number of Actors

This query selects the number of unique actor resources in the system.

Query

ArcSight Solutions/UBM/Actor Management/

Activity from Rogue Account IDs - by Target User

This query selects the target user name, target host name, and count of events attributable to rogue account IDs, grouped by target user name and host name.

Query

ArcSight Solutions/UBM/Actor Management/

Rogue Account IDs

This query selects pertinent information from the Rogue Account IDs active list.

Query

ArcSight Solutions/UBM/Actor Management/

Roles by Actor for Department

This query selects all roles for all actors in the specified department.

Query

ArcSight Solutions/UBM/Actor Management/

IP Address to Actor Map

This session list tracks the IP addresses that can be associated with actors. Typically, these IP addresses will belong to single-user machines.

Session List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Attribution by IP Address Use Case

The Actor Attribution by IP Address use case associates IP addresses to actors, and allows events from IP addresses to be attributed to the logged in actor, even if no username is present in the event.

In addition, the resources provided in the Actor Attribution by IP Address use case enable auditors, analysts, and managers to provide the following services:

The soInActorByTargetIP global variable provides the ability to attribute an actor to an event using the event’s target IP address. The soInActorByTargetIP global variable (like the analogous source IP AsoInActorByTargetIP global variable) returns information about the actor such as the UUID, name, employee type, and title.

This use case provides resources that have been developed specially for the Microsoft Windows and UNIX operating systems. Microsoft Windows and UNIX specific configuration instructions are provided in Configure Resources. Please note the following:

Categorize Assets and Zones

This use case requires categorization of assets and zones into the appropriate UBM Network Domains:

Single-user Machines—Classify the assets or zones that define the single-user machines into one of the following asset categories:

Server machine supporting multiple logins—Classify the assets or zones that define the server machines into the following asset category: ArcSight Solutions/UBM/Network Domains/Servers

The Source and Destination Subnets for Actor Logins query viewer shows source and destination sub-nets for actor login events. Use the results of this query viewer to determine the appropriate zones to create for your environment and to classify these zones into the appropriate single-user or server asset categories.

Devices

The following types of devices supply events to this use case:

All the device types listed above can supply events to this use case but the resources will only process events from devices, when the device generates login events that can be attributed to specific actors.

Configure Resources

Configure the following types of resources for this use case:

Some tuning of the default configuration might be required to eliminate false positives/negatives generated by this use case.

Active Lists

You might want to customize the following active lists for this use case:

Rules

Configure the following rules for this use case:

Session List

Configure the following session list for this use case:

Server Login Sessions—Server logins by specific actors are tracked in the Server Login Sessions session list. If an actor does not log in to a server for 12 hours, the entry for the actor/server combination is removed from the Server Login Sessions session list. You might want to adjust the time out period of the Server Login Sessions session list for your organization. You can change the default time-out period of 12 hours for the Server Login Sessions session list by editing the TTL Days value in the session list editor.

Filters

Verify that the following filters detect events in your environment that match the expected behavior for each filter:

Verify Configuration

After configuring this use case, verify events are attributable to actors based on the originating IP address by viewing the Actor Changes active channel:

  1. In the Navigator panel, go to Active Channels.
  2. Navigate to ArcSight Solutions/UBM/Actor Attribution by IP Address.
  3. Right-click All ActorAttribution by IP Address -Rule Firings and select Show Active Channel.All rule fire events for this use case should display.
  4. Right-click Actor Changes and select Show Active Channel.

Only those events that can be attributable to actors based on the originating IP address should display.

Resources

The following table lists all the resources explicitly assigned to this use case and any dependent resources.

Resources that Support the Actor Attribution by IP Address Use Case

Resource

Description

Type

URI

Monitor Resources

Actor Logged into Server

This active channel shows actor login events to server machines.

Active Channel

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Events with ActorByIP

This active channel shows all events that can be associated with an actor based on source IP address.

Active Channel

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Login Events with ActorByIP

This active channel shows login events that can be associated with an actor, where the actor attribution is done using the source IP address.

Active Channel

ArcSight Solutions/UBM/Actor Attribution by IP Address/

All Actor Attribution by IP Address - Rule Firings

This active channel shows all correlation events for the Actor Attribution by IP Address use case.

Active Channel

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Source and Destination Subnets for Actor Logins

This query viewer shows source and destination subnets for actor login events. Use the results of this query viewer to determine the appropriate zones to create for your environment and to classify these zones into the appropriate single-user or server asset categories.

Query Viewer

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Login Events

This query viewer displays login events that can be attributable to an actor using account IDs.

Query Viewer

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actors Currently Logged into Servers

This query viewer shows all actors that are currently logged into server machines.

Query Viewer

ArcSight Solutions/UBM/Actor Attribution by IP Address/

All Events for Actors Associated by Target IP Only

This query viewer shows all events that can be associated with an actor, where the actor attribution is done using the target IP address only.

Query Viewer

ArcSight Solutions/UBM/Actor Attribution by IP Address/

All Events for Actors Associated by Source IP Only

This query viewer shows all events that can be associated with an actor, where the actor attribution is done using the source IP address only.

Query Viewer

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Current IP to Actor Associations

This query viewer returns details of current IP-to-actor associations within the given time frame.

Query Viewer

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actors Associated with a Workstation IP Address

This report shows details of all actors associated with a specific workstation (single-user machine) IP address within the given time frame.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Country or Region

This report displays actor server logins by country or region.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Department and Title

This report displays servers logged into for various actor department and title combinations.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

IP Associations for Actor

This query selects all the IP associations for an actor within the given time frame.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Disabled Actors

This report displays all server logins that have been made by disabled actors.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Actors with Common Roles

This report displays common roles across two or more actors that have logged into certain servers.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Actors with Unique Roles

This report displays roles that are unique to only one actor that has logged into a certain server.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins for Actor

This report shows information about server logins that can be attributed to a specific actor.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

All Actor to IP Associations

This report displays all IP-to-actor associations within the given time frame.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actors on Server

This report shows all actors that can potentially be associated with a server machine for the given time frame.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Department and Source Zone

This report displays actor server logins by department and source zone.

Report

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Library - Correlation Resources

Actor Logged into Single-User Windows Machine

This rule triggers when it detects that an actor has logged into a Microsoft Windows single-user machine.

Rule

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Logged into Windows Server

This rule triggers when it detects that an actor has logged into a Microsoft Windows server machine.

Rule

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Logged into non-Windows Server

This rule triggers when an actor logs into a non-Microsoft Windows server machine.

Rule

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Logged into non-Windows Single-User Machine

This rule triggers when it detects that an actor has logged into a non-Microsoft Windows single-user machine.

Rule

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Library Resources

Account Exclusions

This active list maintains a list of account IDs, which when observed in an event, do not need to be considered when associating an IP address to an actor. All the entries must be in uppercase.

Active List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Excluded Source Machines

This active list maintains a list of source IP addresses, which when observed in an event, do not need to be considered when associating an IP address to an actor.

Active List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Account Authenticators

This active list is used by the actor global variables to determine what the Identity Management authenticator is, base on the event, so that an actor can be determined from event information.

Active List

ArcSight System/Actor Data Support

Excluded Target Machines

This active list maintains a list of target IP addresses, which when observed in an event, do not need to be considered when associating an IP address to an actor.

Active List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Desktops

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM/Network Domains

Servers

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM/Network Domains

Laptops

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM/Network Domains

AttributableActor

This global variable returns all the information for an actor, where the event to actor attribution is done using either attacker or target user name fields, or the source IP address. Note: To turn lookups based on the source IP address, in the Parameters tab, do not use the actorByAccountOrSourceIP local variable to lookup the actor, use the UUID field of the ActorByAccountID global variable instead.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByIP

This global variable returns all the information for an actor, where the event to actor attribution is done using the source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

ActorByAccountID

This global variable maps the account information in an event with an actor. The account information consists of the device vendor and product, and information derived from the attacker or target user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorFromIPMap

This global variable returns an actor's UUID, full name, username used, and login type if the actor is associated with a source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

solnPatternDiscoveryConst

This variable returns a constant string that can be used in Pattern Discovery profiles when it is not required to specify either a Source or a Target event field.

Global Variable

ArcSight Solutions/UBM/Core Variables/

solnActorByTargetIP

This global variable returns all the information about an actor, where the event to actor attribution is done using the target IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

AccountIDForLogins

This global variable determines which event username field to use.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByUUID

This Actor global variable looks for a UUID in Device Custom String1, and retrieves the Actor with that UUID.

Global Variable

ArcSight Solutions/UBM/Core Variables

Actor Logged into Server

This field set selects the fields appropriate for viewing events that are associated with actor login events to server machines.

Field Set

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Attribution by IP Address - Rule Firings

This field set selects the fields appropriate for viewing correlation events for the Actor Attribution by IP Address use case.

Field Set

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Events with ActorByIP

This field set selects the fields appropriate for viewing events that are associated with actors based on source IP address.

Field Set

ArcSight Solutions/UBM/Core/

Actor Logged into Single-User Windows Machine

This filter selects all actor login events to a Microsoft Windows single-user machines.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Successful Logins

This filter identifies successful logins by both administrative and non-administrative users across a variety of operating systems (Unix, Windows 2003, Windows 2008).

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Target Username is a System Account

This filter selects events in which the target user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Successful Logins - Non-Windows and Non-Unix

This filter selects login events that cannot be attributed to either Microsoft Windows or Unix.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Attacker User Name is a System Account

This filter selects events in which the attacker user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Actor Activity on Server

This filter selects all actor activity to server machines.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Successful Logins - Windows 2003

This filter identifies successful login events to Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Windows 2008 Authentication Ticket Request

This filter identifies Microsoft Windows 2008 events which indicate that a Kerberos authentication ticket was requested.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Actor not Associated with Source IP

This filter identifies events where an actor is not already associated with the incoming source IP. This filter is primarily used in the attribution rules.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Unix Events

This filter selects events that are coming from Unix devices.

Filter

ArcSight Solutions/UBM/Core Filters/

Actor Logged into Windows Server

This filter identifies actor logins to Microsoft Windows server machines.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

ActorByAccountID is NULL

This filter selects events which can not be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

ActorByAccountID is NOT NULL

This filter selects events which can be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

Windows 2003 Authentication Ticket Request

This filter identifies Microsoft Windows Kerberos Authentication Ticket Request events. These events are generated when a user logs into an Active Directory domain.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Target is Single-User Machine

This filter identifies events where the target machine is classified as a single-user machine.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Successful Logins - Windows 2008

This filter identifies successful login events to Windows 2008 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Source is Single-User Machine

This filter identifies events where the source machine is classified as a single-user machine.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Machine and Account Exclusions

This filter combines the machine and account exclusions conditions.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Login Attempts

This filter selects any attempts at logging into systems. It excludes machine logins into Microsoft Windows systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Logins - Unix

This filter identifies successful login attempts to Unix machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Server Login Rule Fire Events

This filter identifies all correlation events from rules monitoring logins to servers.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Windows Events with a Non-Machine User

This filters identified Microsoft Windows events that have a non machine/system user either in the attacker or the target fields.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Actor Associated with Source IP Only

This filter selects all events that can be associated with an actor, where the actor attribution is done using the source IP address.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Machine Exclusions

This filter selects all events which do not match the source IP addresses in either the Excluded Source Machines list or the target IP addresses in the Excluded Target Machines list.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Successful and Unsucessful Logins - Windows 2003

This filter identifies both successful and unsuccessful logins on Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Username Present

This filter checks whether any of attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Account Exclusions

This filter identifies all events which do not match the account IDs listed in the Account Exclusions list.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Logged into non-Windows Server

This filter identifies actor login events to non-Microsoft Windows server machines.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Non-Windows Operating System Logins

This filter identifies login events to non-Microsoft Windows Operating Systems.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Logged into non-Windows Single-User Machine

This filter selects all actor login events to a non-Microsoft Windows single-user machines.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Windows Events

This filter selects all events in which the device product field is Microsoft Windows.

Filter

ArcSight Solutions/UBM/Core Filters/

Unsuccessful Logins for Valid Username - Windows 2003

This filter identifies unsuccessful logins for a valid username on Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Actor Associated with Source IP or Username

This filter identifies events that have an actor associated with them, where the actor attribution is done using either account IDs or the source IP address.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Associated with Target IP Only

This filter selects all events that can be associated with an actor, where the actor attribution is done using the target IP address.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Login Activity by Title and Department

This profile is used to detect patterns of server login activity across various actor title and department combinations.

Profile

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Login Activity by Actors

This profile can be used to detect patterns of server login activity across actors.

Profile

ArcSight Solutions/UBM/Actor Attribution by IP Address/

All Events for Actors Associated by Target IP Only

This query selects all events that can be associated with an actor, where the actor attribution is done using the target IP address.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Department and Source Zone

This query returns actor server logins by department and source zone.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Disabled Actors

This query returns all server logins made by disabled actors.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

All Events for Actors Associated by Source IP Only

This query selects all events that can be associated with an actor, where the actor attribution is done using the source IP address.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Source and Destination Subnets for Actor Logins

This query shows source and destination subnets for actor login events, where the actor attribution is done using account IDs. Data from this query can be used to determine how to create and classify asset zones into single-user or server asset categories.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Department and Title

This query returns actor server logins by department and title.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actors Currently Logged into Servers

This query shows all actors that are currently logged into server machines.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Login Events

This query selects login events that can be associated with an actor, where the actor attribution is done using either the source or target user names.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actors on Server

This query selects all actors that can potentially be associated on a server machine for the given time frame.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Current IP to Actor Associations

This query returns details of current IP-to-actor associations within the given time frame.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Actors with Unique Roles

This query selects roles that are unique to only one actor that has logged into a certain server.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins for Actor

This query shows information about server logins that can be attributed to a certain actor.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Actors with Common Roles

This query shows common roles across two or more actors that have logged into certain servers.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Logins by Country or Region

This query returns actor server logins by country or region.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

All IP to Actor associations

This query selects all IP-to-actor associations within the given time frame.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

IP Associations for Actor

This query selects all the IP associations for an actor within the given time frame.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actors Associated with an IP Address

This query returns details of all actors associated with a specific IP address within the given time frame.

Query

ArcSight Solutions/UBM/Actor Attribution by IP Address/

IP Address to Actor Map

This session list tracks the IP addresses that can be associated with actors. Typically, these IP addresses will belong to single-user machines.

Session List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Server Login Sessions

This session list keeps track of all actor logins into server machines. The list has a default expiration time of 12 hours.

Session List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Shared Accounts Use Case

The Shared Accounts use case reports on the usage of accounts that might be in use by more than one individual. The use case can detect when anyone uses an existing known shared account, as well as detect the use of any account by more than one individual.

In addition, the resources contained in the Shared Accounts use case enables auditors, analysts, and managers to provide the following services:

The use case reports actors that have used known shared accounts. When an event is collected that indicates a known shared account has been used, the actor attributable to the event is determined in one of the following ways:

UBM recommends that this use case be used in conjunction with the Actor Attribution by IP Address Use Case. Configuring the Actor Attribution by IP Address Use Case provides better reporting on the actors using shared accounts. Many login events do not contain enough information to determine the actor associated with an event from the username but the Actor Attribution by IP Address Use Case provides functionality to determine the associated actor from the originating IP address. For more information, see Actor Attribution by IP Address Use Case.

Devices

All the devices that report logins can supply events to this use case but the resources will only process events from devices, when the device generates events that can be attributed to specific actors.

Configure the Windows Audit Policy

To enable this detection on Microsoft Windows operating systems, please configure the following audit policies:

For more information about enabling policies, see your Microsoft Windows operating system documentation.

Configure Resources

Configure the following types of resources for this use case:

Active Lists

The following active lists might need to be configured for this use case:

Filters

Verify that the following filters detect events in your environment that match the expected behavior for each filter:

Rules

Enable the following rules if you want to detect when an account ID is being used by two or more actors:

Enable the Record Account IDs in Use rule. By default the rule invokes the following action:

Enable the Detect Shared Accounts rule to detect new shared accounts. By default the rule invokes the following actions:

By default, the following action of the Detect Shared Accounts rule is disabled. You can optionally enable this action:

The following rules can be configured for this use case:

Enable the Login to Shared Account By Actor rule if you want to track the logins into known shared accounts. If this rule is enabled and this activity is detected, by default the rule invokes the following action:

Enable the Actor Logged in from Two Countries rule if you want to track when an actor has logged in from two countries during a short time period. By default, the following action of the Actor Logged in from Two Countries rule is disabled. You can optionally enable these actions:

You might want to also adjust the time frame (in the Aggregation tab) to reflect an appropriate time period for your environment.

Verify Configuration

After configuring this use case, you can check on shared account usage by viewing the following dashboards:

Detect Shared Accounts

Known Shared Account Logins

Known Shared Account Usage

To view a dashboard:

  1. In the Navigator panel, go to Dashboards.
  2. Navigate to ArcSight Solutions/UBM/Shared Accounts.
  3. Right-click the dashboard and select Show Dashboard.

Depending on the dashboard opened, any detected or known shared accounts will display.

Resources

The following table lists all the resources explicitly assigned to this use case and any dependent resources.

Resources that Support the Shared Accounts Use Case

Resource

Description

Type

URI

Monitor Resources

Logins to Known Shared Accounts

This active channel shows rule trigger events associated with logins to known shared accounts.

Active Channel

ArcSight Solutions/UBM/Shared Accounts/

Known Shared Account Logins

This dashboard shows information about the top applications and addresses that are associated with logins to known shared accounts.

Dashboard

ArcSight Solutions/UBM/Shared Accounts/

Known Shared Account Usage

This dashboard displays statistical information about how known shared accounts are being used.

Dashboard

ArcSight Solutions/UBM/Shared Accounts/

Detected Shared Accounts

This dashboard displays statistical information about detected shared accounts.

Dashboard

ArcSight Solutions/UBM/Shared Accounts/

Top Actors by IP Using Known Shared Accounts

This query viewer returns the top actors that have been identified by a source IP address which are using known shared accounts to log in.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Top Applications with Known Shared Account Logins

This query viewer returns the top applications using known shared accounts within the last two hours.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Top Actors Using Detected Shared Accounts

This query viewer returns the top actors detected as using shared accounts.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Top Detected Shared Accounts

This query viewer returns the top detected shared accounts and their associated applications.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Top Target Addresses with Known Shared Account Logins

This query viewer returns the top target addresses involved in login events to known shared accounts that have occurred within the last two hours.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Top Actors by Name Using Known Shared Accounts

This query viewer shows the top actors that can be identified by the Attacker User Name field and that are using known shared accounts to log in.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Top Applications with Detected Shared Accounts

This query viewer returns the top applications associated with accounts detected as shared.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Actors Logged in from Two Countries

This query viewer shows those actors that have logged in from two countries within a short time interval.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Top Known Shared Accounts in Use

This query viewer shows the number of times each known shared account has been used in login events.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Recent Logins to Known Shared Accounts

This query viewer shows details about recent login events to known shared accounts.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Top Source Addresses with Known Shared Account Logins

This query viewer returns the top source addresses associated with login events to known shared accounts that have occurred within the last two hours.

Query Viewer

ArcSight Solutions/UBM/Shared Accounts/

Detected Shared Accounts

This report returns the details of accounts that have been identified as being shared by two or more actors.

Report

ArcSight Solutions/UBM/Shared Accounts/

Top Roles Using Shared Accounts

This report shows the top roles by number of actors that have been identified as using shared accounts.

Report

ArcSight Solutions/UBM/Shared Accounts/

Top Departments Using Shared Accounts

This report shows the top departments by number of actors that have been identified as using shared accounts.

Report

ArcSight Solutions/UBM/Shared Accounts/

Top Job Titles Using Shared Accounts

This report shows the top job titles by number of actors that have been identified as using shared accounts.

Report

ArcSight Solutions/UBM/Shared Accounts/

Logins to Known Shared Accounts - Details

This report shows details of all login events to known shared accounts.

Report

ArcSight Solutions/UBM/Shared Accounts/

Logins to Known Shared Accounts - Summary

This report shows summary information about logins to known shared accounts.

Report

ArcSight Solutions/UBM/Shared Accounts/

Actor Logins to Detected Shared Accounts

This report shows details of actor login events to accounts that have been detected as being shared.

Report

ArcSight Solutions/UBM/Shared Accounts/

Library - Correlation Resources

Record Account IDs in Use

This rule triggers when it identifies login events from which an association that has not been previously recorded can be made between an actor and a username. The rule records this association in the Account IDs in Use active list.

Rule

ArcSight Solutions/UBM/Shared Accounts/

Actor Logged in from Two Countries

This rule detects if an actor has logged in from two different countries within a short time period. This might indicate either that the actor's account ID has been compromised or that the account ID is being shared.

Rule

ArcSight Solutions/UBM/Shared Accounts/

Login to Known Shared Account by Actor

This rule triggers on login events to known shared accounts.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

Detect Shared Accounts

This rule triggers when it discovers that a single username is being used by one or more actors.

Rule

ArcSight Solutions/UBM/Shared Accounts/

Library Resources

Account IDs in Use

This active list keeps track of all the account IDs that are being used by all actors. Entries are expired every 90 days to prevent the list from becoming too large.

Active List

ArcSight Solutions/UBM/Shared Accounts/

Detected Shared Accounts

This active list is populated when an account and application combination is detected to be shared between one or more actors.

Active List

ArcSight Solutions/UBM/Shared Accounts/

Account Authenticators

This active list is used by the actor global variables to determine what the Identity Management authenticator is, base on the event, so that an actor can be determined from event information.

Active List

ArcSight System/Actor Data Support

Known Shared Accounts

This active list maintains a list of known shared accounts per application. Note that all account IDs must be in uppercase and the Application field must be the same as what appears in the Device Product event field.

Active List

ArcSight Solutions/UBM/Shared Accounts/

Failed Logins to Known Shared Accounts by Application

This data monitor shows a moving average of failed logins to known shared accounts per application.

Data Monitor

ArcSight Solutions/UBM/Shared Accounts/

AttributableActor

This global variable returns all the information for an actor, where the event to actor attribution is done using either attacker or target user name fields, or the source IP address. Note: To turn lookups based on the source IP address, in the Parameters tab, do not use the actorByAccountOrSourceIP local variable to lookup the actor, use the UUID field of the ActorByAccountID global variable instead.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByIP

This global variable returns all the information for an actor, where the event to actor attribution is done using the source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

ActorByAccountID

This global variable maps the account information in an event with an actor. The account information consists of the device vendor and product, and information derived from the attacker or target user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorFromIPMap

This global variable returns an actor's UUID, full name, username used, and login type if the actor is associated with a source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

ActorByIPOrAccount

This global variable attempts to attribute an actor to an event based on source IP or account (in that order).

Global Variable

ArcSight Solutions/UBM/Shared Accounts/

solnPatternDiscoveryConst

This variable returns a constant string that can be used in Pattern Discovery profiles when it is not required to specify either a Source or a Target event field.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByAttackerUserName

This variable maps the account information in an event with an actor. The account information consists of the device vendor, device product, connector address, connector zone, and information derived from the attacker user name.

Global Variable

ArcSight Solutions/UBM/Core Variables

AccountIDForLogins

This global variable determines which event username field to use.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByUUID

This Actor global variable looks for a UUID in Device Custom String1, and retrieves the Actor with that UUID.

Global Variable

ArcSight Solutions/UBM/Core Variables

Events with AttributableActor

This field set selects the fields appropriate for viewing events correlated with either account-id or IP address and can be customized for the UBM active channels.

Field Set

ArcSight Solutions/UBM/Core/

Shared Account Login Events

This field set selects the fields appropriate for viewing login events to shared accounts.

Field Set

ArcSight Solutions/UBM/Shared Accounts/

Logins to Accounts not Known to be Shared from non-IDS Devices

This filter selects login events to accounts that are not classified as Known Shared Accounts and are from non-IDS type devices.

Filter

ArcSight Solutions/UBM/Shared Accounts/

Target Username is a System Account

This filter selects events in which the target user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Successful Logins

This filter identifies successful logins by both administrative and non-administrative users across a variety of operating systems (Unix, Windows 2003, Windows 2008).

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

ActorByAttackerUserName is NULL

This filter selects events which cannot be attributed to an actor based on the attacker user name field.

Filter

ArcSight Solutions/UBM/Core Filters/

Attacker User Name is a System Account

This filter selects events in which the attacker user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Successful Logins - Windows 2003

This filter identifies successful login events to Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Attacker User Name is NOT NULL

This filter selects events in which the attacker user name field is populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Windows 2008 Authentication Ticket Request

This filter identifies Microsoft Windows 2008 events which indicate that a Kerberos authentication ticket was requested.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

ActorByAccountID is NULL

This filter selects events which can not be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

Failed Logins to Known Shared Accounts

This filter identifies failed logins to known shared accounts.

Filter

ArcSight Solutions/UBM/Shared Accounts/

ActorByAccountID is NOT NULL

This filter selects events which can be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

Attributable Actor is NOT NULL

This filter selects events in which an actor can be attributed to an event either by username or by source IP.

Filter

ArcSight Solutions/UBM/Core Filters/

Windows 2003 Authentication Ticket Request

This filter identifies Microsoft Windows Kerberos Authentication Ticket Request events. These events are generated when a user logs into an Active Directory domain.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Address or Username Present

This filter checks whether any of attacker address, attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Record Account ID in Use

This file identifies login events from which an association that has not been previously recorded can be made between an actor and a username.

Filter

ArcSight Solutions/UBM/Shared Accounts/

ActorByIP is NOT NULL

This filter checks if an actor can be associated with the source IP address of the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Shared Account Detector - Pattern Discovery

This filter identifies events to be processed by the Shared Account Detector pattern discovery profile.

Filter

ArcSight Solutions/UBM/Shared Accounts/

Login Attempts

This filter selects any attempts at logging into systems. It excludes machine logins into Microsoft Windows systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Logins - Unix

This filter identifies successful login attempts to Unix machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

All Login Events to Known Shared Accounts

This filter identifies all login events in which a known shared account is being used. For this filter to work correctly, the Known Shared Accounts active list must be populated with all known shared accounts and their associated applications. This filter will identify successful, failed, and attempted logins.

Filter

ArcSight Solutions/UBM/Shared Accounts/

Windows Events with a Non-Machine User

This filters identified Microsoft Windows events that have a non machine/system user either in the attacker or the target fields.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

ActorByAttackerUserName is NOT NULL

This filter selects events in which the attacker user name field is populated, and the event can be attributed to an actor based on that field.

Filter

ArcSight Solutions/UBM/Core Filters/

Unsuccessful Windows Logins for Valid Username

This filter identifies unsuccessful login events for a valid username recorded on Microsoft Windows domain controllers.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful and Unsucessful Logins - Windows 2003

This filter identifies both successful and unsuccessful logins on Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Username Present

This filter checks whether any of attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Unsuccessful Logins for Valid Username - Windows 2008

This filter identifies unsuccessful logins for a valid username on Windows 2008 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Attributable Actor is NULL

This filter selects events which can not be correlated to an actor based on the attacker or target user name fields, or by the attacker address field.

Filter

ArcSight Solutions/UBM/Core Filters/

Windows Events

This filter selects all events in which the device product field is Microsoft Windows.

Filter

ArcSight Solutions/UBM/Core Filters/

Unsuccessful Logins for Valid Username - Windows 2003

This filter identifies unsuccessful logins for a valid username on Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Actor Associated with Source IP or Username

This filter identifies events that have an actor associated with them, where the actor attribution is done using either account IDs or the source IP address.

Filter

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Activity Across Known or Detected Shared Accounts

This filter identifies events where either a known or detected shared account is being used. Login events are excluded so as to determine other activity performed using shared accounts.

Filter

ArcSight Solutions/UBM/Shared Accounts/

Unsuccessful or Attempted Logins

This filter identifies all login events in which the outcome was not a definite success, in other words either a failure or an attempt.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Shared Account Detector

This pattern discovery profile identifies patterns in user login activity. By default, patterns will be identified when the same set of one or more account IDs are accessed from two or more different source addresses. This might assist in the identification of shared accounts. This profile processes successful login events.

Profile

ArcSight Solutions/UBM/Shared Accounts/

Activity Across Shared Accounts

This pattern discovery profile identifies patterns of activity across events where a shared account is used. Login events are excluded to determine other activity performed using shared accounts.

Profile

ArcSight Solutions/UBM/Shared Accounts/

Top Roles Using Known Shared Accounts - Actor by IP

This query returns the top roles by number of actors that are using known shared accounts to log in. The actors in this query are identified by the event source IP address. Only those roles that have are detected across two or more actors are selected.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Roles Using Detected Shared Accounts

This query returns the top roles by number of actors that have been detected as using shared accounts. Only those roles that have are detected across two or more actors are selected.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Source Addresses with Known Shared Account Logins

This query returns the top source addresses associated with login attempts to known shared accounts.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Job Titles Using Known Shared Accounts - Actor by IP

This query returns the top job titles by number of actors that are using known shared accounts to log in. The actors in this query are identified by the event source IP address.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Detected Shared Accounts

This query returns the top detected shared accounts and their associated applications.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Departments Using Known Shared Accounts - Actor by IP

This query returns the top departments by number of actors that are using known shared accounts to log in. The actors in this query are identified by the event source IP address.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Job Titles Using Detected Shared Accounts

This query returns the top job titles by number of actors that have been detected as using shared accounts.

Query

ArcSight Solutions/UBM/Shared Accounts/

Detected Shared Accounts

This query returns details of accounts that have been identified as being shared by two or more actors.

Query

ArcSight Solutions/UBM/Shared Accounts/

Actors Logged in from Two Countries

This query identifies rules that triggered because an actor logged in from two countries within a short time interval.

Query

ArcSight Solutions/UBM/Shared Accounts/

Logins to Known Shared Accounts - Details

This query retrieves the details of each event associated with a login to a known shared account.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Departments Using Detected Shared Accounts

This query returns the top departments by number of actors that have been detected as using shared accounts.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Roles Using Known Shared Accounts - Actor by Name

This query returns the top roles by number of actors that are using known shared accounts to log in. The actors in this query are identified by the Attacker User Name field. Only those roles that have are detected across two or more actors are selected.

Query

ArcSight Solutions/UBM/Shared Accounts/

Actor Logins to Detected Shared Accounts

This query extracts details of actor login events to accounts that have been detected as being shared.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Actors Using Detected Shared Accounts

This query returns the top actors detected as using shared accounts.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Target Addresses with Known Shared Account Logins

This query returns the top target addresses involved in login attempts to known shared accounts.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Applications With Known Shared Account Logins

This query returns the top applications using known shared accounts.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Departments Using Known Shared Accounts - Actor by Name

This query returns the top departments by number of actors that are using known shared accounts to log in. The actors in this query are identified by the Attacker User Name field.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Actors by Attacker User Name Using Known Shared Accounts

This query returns the top actors that can be identified by the Attacker User Name field and that are using known shared accounts to log in.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Actors by IP Using Known Shared Accounts

This query returns the top actors identified by a source IP address that are using known shared accounts to log in.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Job Titles Using Known Shared Accounts - Actor by Name

This query returns the top job titles by number of actors that are using known shared accounts to log in. The actors in this query are identified by the Attacker User Name field.

Query

ArcSight Solutions/UBM/Shared Accounts/

Known Shared Account Usage

This query returns the number of times each known shared account and application combination has been used in login events.

Query

ArcSight Solutions/UBM/Shared Accounts/

Top Applications with Detected Shared Accounts

This query returns the top applications associated with accounts detected as shared.

Query

ArcSight Solutions/UBM/Shared Accounts/

IP Address to Actor Map

This session list tracks the IP addresses that can be associated with actors. Typically, these IP addresses will belong to single-user machines.

Session List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Actor Threat Score Use Case

The Actor Threat Score use case provides a method for tracking the level of suspicious activity exhibited by monitored users. Analysts are notified when an actor's suspicious activity exceeds configurable levels. Actors with high threat scores are monitored at a higher level of scrutiny.

This use case also provides:

The UBM solution tracks the suspicious behavior of actors using a threat score. The rules provided in the Suspicious Activity Use Case increase the threat score associated with each actor. These threat scores are used by the Actor Threat Score Use Case to report on the suspicious activities of actors.

The cumulative threat score associated with an actor reflects all the suspicious activity associated with all accounts attributed that specific individual, not just the behavior of a single account. For example, if suspicious activity for Jane Doe has already been detected for Jane Doe’s database account resulting in a current threat score of 15, when it is detected that Jane Doe’s Windows account clears an audit log, 5 more points are added to the threat score resulting in a cumulative threat score of 20. When the threat score for an actor reaches 30, the actor is considered malicious. If the Actor Changes rule is enabled and configured, a notification is sent to an analyst and a case is created when an actor’s threat score reaches 30.

The Suspicious Activity Use Case rules feed the threat score of actors. These rules determine the actor attributable to an event, using a global variable.

Each suspicious activity rule takes the actor’s UUID and full name returned from the global variable and populates the following event fields in the generated correlation event:

deviceCustomString1 field with the UUID

deviceCustomString2 field with full name of the actor

Regardless of which global variable the rule invokes to get the attributable actor, the UUID (Universally Unique Identifier) and full name are always placed into the same Device Custom Strings fields of the generated correlation event. The values in the deviceCustomString1 and deviceCustomString2 are available for consumption by the Actor Threat Score Use Case resources. For example, the Threat Score Rule Firings for Actors on the Threat Score List query invokes the ActorByUUID global variable to determine the events associated with actors with suspicious behavior. The ActorByUUID global variable uses the UUID stored in deviceCustomString1 and returns the actor associated with that UUID.

The UUID is the Universally Unique Identifier for the actor assigned by the Identity Management System. The UUID is the Universally Unique Identifier for the actor assigned by the Identity Management System.

The generated correlation event is populated with an agent severity that corresponds to the threat score associated with rule as specified in the following table. The value to add to the existing actor’s threat score for a specific suspicious activity is stored in the Increase Actor Threat Score active list.

Association Between Agent Severity and Threat Score Increase

Agent Severity

Threat Score Increase

Result of Rule Trigger

Medium

+1

When a rule with a agent severity of medium is triggered, the rule adds +1 to the threat score of the actor attributed to generating the event.

High

+5

When a rule with a agent severity of high is triggered, the rule adds +5 to the threat score of the actor attributed to generating the event.

Very High

+25

When a rule with a agent severity of very high is triggered, the rule adds +25 to the threat score of the actor attributed to generating the event.

The relationship between the Agent Severity and the Threat Score is by convention only.

The Increase Actor Threat Score active list contains the suspicious activity rules that trigger an increase to the threat score and the values that should be added to the actor’s threat score when that suspicious behavior is detected.

The suspicious activity rules generate correlation events and these correlation events trigger the Increase Actor Threat Score and Add Actor to Threat Score List rules:

The threat score associated with an actor is cumulative and by default always increases. An actor does not age off the Actor Threat Score active list. You can however, manually edit the threat score for an actor. For example, if you have investigated an actor and determined that his behavior is not malicious, you can lower his threat score manually, or remove the actor and threat score from the active list. (For more information, see Customizing the Threat Score Associated with a Suspicious Activity—Optional.) Once the threat score of an actor reaches 500, the Actor Changes rule stops firing and the threat score for the actor stops increasing.

Threat Score Mechanics

The following steps show an example of how suspicious activity is detected and processed by a rule in the Suspicious Activity Use Case. The steps listed below correspond to the orange numbered arrows located at the top of Threat Score Mechanics:

  1. One of the suspicious activity rules is triggered. In this example, the AuditLogCleared s rule is triggered when an event indicating an audit log has been detected.
  2. When the rule is triggered, it invokes either an ActorByX global variable or the AttributableActor global variable to determine the UUID associated with the triggering event, where X is the event field used to determine the UUID. The UUID is a unique identifier that is used as a key to an actor. For example, the AuditLogChanges rule invokes the ActorByAccountID global variable to determine the UUID associated with the Account ID of the triggering event.
  3. The suspicious activity rule generates a correlation event. The suspicious activity rule populates the following fields in the correlation event:

In this example, a correlation event is generated by the Audit Log Cleared rule.

  1. Because the actor who generated the event already has a threat score, the Increase Actor Threat Score triggers.
  2. The rule action takes the new threat score associated with the UUID and updates the Actor Changes active list.

Threat Score Associated with Suspicious Rules and Stored in the Active List

Suspicious Activity Rule

Threat Score

Account Lockout

1

Activity from Badged Out Employee

5

Activity from Disabled Actor

5

Actor Added and Removed From Privileged Group Within a Short Time

5

After Hours Building Access by At Risk Actor

1

After Hours Database Access by At Risk Actor

5

Anonymous Proxy Access

25

Audit Log Cleared

5

Compromise - Attempt

5

Database Brute Force Login Success

25

Default Vendor Account Attempt

5

Excessive Printing

1

Failed Building Access

5

Hacker Tool Website Access

5

IPC Share Browsing

1

Job Hunting

1

Large Email to Competition

5

Large Email to Public Webmail Servers

1

Leak of Company Information

5

Leak of Personal Information

5

Local Admin Created

1

Login to Known Shared Account by Actor

1

Multiple Failed Database Access Attempts

5

Network Scan

5

Non-DBA Added to Oracle DBA Role

5

Physical Plus VPN Access

5

Printing After Hours

1

Printing Confidential Documents

5

Printing Suspicious Documents

5

Resume Emailed by At Risk Actor

1

Role Violation

1

Security Software Disabled

25

Suspicious Activity by Privileged Actor

5

Traffic to Competition

1

Traffic to Country of Concern

1

Using Different Usernames

1

VPN Login from Competition Domain

5

Devices

The following types of devices supply events to this use case:

Configure Resources

This use case requires that the desired Suspicious Activity Use Case rules are deployed and enabled. The Actor Threat Score Use Case rules update threat scores of actors when the Suspicious Activity Use Case rule fire.

Configure the following types of resources for this use case:

In addition, consider the following optional configurations for this use case:

Manually Adjusting the Threat Score—Optional

Aging Actors Off the Actor Threat Score Active List—Optional

Customizing the Threat Score Associated with a Suspicious Activity—Optional

Adding Your Suspicious Activity Rules—Optional

Rules

The following rules can be configured for this use case:

Enable the Increase Actor Threat Score rule. This rule is the foundation of this use case and must be enabled.

By default, all the following actions of this rule are enabled:

Enable the Add Actor to Actor Threat Score List rule. This rule is the foundation of this use case and must be enabled.

By default, all the following actions of this rule are enabled:

Enable the Actor Removed from Actor Threat Score rule if you want to track when ESM users remove an actor from the Actor Threat Score active list.

By default, the following action of this rule is enabled:

By default, the following actions of the Actor Removed from Actor Threat Score rule are disabled. You can optionally enable these actions:

Send Notification—Sends a notification to the destinations configured in the CERT Team. For more information, .

Add to Existing Case—Adds a case to the specified URI. For more information, see .

You can add exclusions to the filter referenced by this rule, to prevent this rule from firing for specific ESM users. For more information, see Filters.

Enable the Actor Changes rule if you want to track when the behavior of an individual is considered to be malicious because a threat score greater than 29 is associated with the actor. If this rule is enabled and this activity is detected, by default the rule invokes the following action:

By default, the following action of the Actor Removed from Actor Threat Score rule is disabled. You can optionally enable this action:

Enable the Actors Removed from Actor Threat Score rule if you want to track when ESM users reduce a threat score in the Actor Threat Score active list.

By default, the following action of this rule is enabled:

By default, the following actions of the Actor Removed from Threat Score List rule are disabled. You can optionally enable these actions:

You can add exclusions to the filter reference by this rule, to prevent this rule from firing for specific ESM users. For more information, see Filters.

Filters

The following filters can be configured for this use case:

For example, if the ESM user called admin is expected to remove or change the threat scores in the Actor Threat Score active list, add a condition to the filters to exclude audit events generated by that ESM user.

Trends

Reports and query viewers in this use case are based on the trends listed below. Before enabling these trends, verify that these trends collect the expected events for your environment. In addition, you might want to customize the trend before enabling. For more information, see .

Enable the following trends for this use case:

Manually Adjusting the Threat Score—Optional

The Actor Threat Score active list contains the actors which have been linked to suspicious activity and their associated threat score. This active list is dynamically populated by the Increase Actor Threat Score rule when suspicious events are detected. You might however, want to manually initially populate with some actors and threat scores or adjust the threat score associated with an actor.

To customize a threat score of an actor in the Actor Threat Score active list:

  1. In the Navigator panel, select the Resources tab and the Lists option.
  2. Expand the ArcSight Solutions/UBM/Actor Threat Score group.
  3. Right-click the Actor Threat Score active list and select Show Entries.
  4. Change, add or delete entries:

Aging Actors Off the Actor Threat Score Active List—Optional

By default, actors stay on the Actor Threat Score indefinitely and their threat score is always increasing. You can manually decrease the threat score associated with an actor as described in Manually Adjusting the Threat Score—Optional. You can also add default time-out period to the Actor Changes active list by editing the TTL Days value in the active list editor. For example, you could set the TTL for the Actor Changes active list to 30 days and if no suspicious activity is detected for that actor, the actor is removed from the active list. Once the threat score of an actor reaches 500, the Actor Changes rule stops increasing the threat score for the actor. Such actors are phased off the list based on the TTL.

Customizing the Threat Score Associated with a Suspicious Activity—Optional

You can customize the threat scores associated with suspicious activities to reflect your environment. For example, if clearing an audit log is considered very suspicious in your environment, you might want to change the threat score associated with that activity in the Increase Actor Threat Score active list. For a full listing of the default suspicious activity rules and their associated threat score see Threat Score Associated with Suspicious Rules and Stored in the Active List .

To customize a threat score of an actor in the Actor Changes active list:

  1. In the Navigator panel, select the Resources tab and the Lists option.
  2. Expand the ArcSight Solutions/UBM/Actor Threat Score group.
  3. Right-click the Actor Changes active list and select Show Entries.
  4. Right-click an entry in the Viewer and select Edit.
  5. Adjust the threat score appropriately.

The threat scores stored in the Increase Actor Threat Score active list (Threat Score Associated with Suspicious Rules and Stored in the Active List ) correspond to the agent severity of correlation events generated by the suspicious activity rules as specified in Association Between Agent Severity and Threat Score Increase.

If you customize the threat score of any of the suspicious activity rules, you should also change the corresponding agent severity of the generated correlation event. For example, if you change the threat score associated with the Account Lockout rule from 1 to 5, ArcSight recommends that you also change the agent severity in the Actions tab of the Account Lockout rule from Medium to High.

Adding Your Suspicious Activity Rules—Optional

If you have custom rules that report suspicious activity in your environment, these rules can also increase the threat score associated with actors. The rule must be able to attribute events to actors. For more information, see Creating Custom Suspicious Activity Rules.

To add a rule to the Increase Actor Threat Score active list:

  1. In the Navigator panel, select the Resources tab and the Lists option.
  2. Expand the ArcSight Solutions/UBM/Actor Threat Score group.
  3. Right-click the Actor Changes active list and select Show Entries.
  4. To add an entry to the list, click the Add icon in the list header.
  5. In the Entry editor of the Inspect/Edit panel, enter values for the required fields of the list:
  1. Click Add.

Verify Configuration

After configuring this use case and the Suspicious Activity Use Case, verify that the actor threat score information is being populated.

  1. In the Navigator panel, go to Dashboards.
  2. Navigate to ArcSight Solutions/UBM/Actor Threat Score/.
  3. Right-click Actor Threat Score Overview and select Show Dashboard.

Resources

The following table lists all the resources explicitly assigned to this use case and any dependent resources.

Resources that Support the Actor Threat Score Use Case

Resource

Description

Type

URI

Monitor Resources

Suspicious Level Actor Activity

This active channel shows activity attributable to actors on the actor threat score list whose threat score is in the suspicious range.

Active Channel

ArcSight Solutions/UBM/Actor Threat Score/

Watch Level Actor Activity

This active channel shows activity attributable to actors on the Actor Threat Score list whose threat score is in the watch range.

Active Channel

ArcSight Solutions/UBM/Actor Threat Score/

Malicious Level Actor Activity

This active channel shows activity attributable to actors on the Actor Threat Score list whose threat score is in the malicious range.

Active Channel

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score Changes

This active channel shows increases and additions to the Actor Threat Score active list.

Active Channel

ArcSight Solutions/UBM/Actor Threat Score/

Malicious Level Actor Activity

This dashboard shows activity attributable to actors on the Actor Threat Score list whose threat score is in the malicious range.

Dashboard

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score Overview

This dashboard shows a summary of top threat score actors and the rules that have caused their threat scores to increase.

Dashboard

ArcSight Solutions/UBM/Actor Threat Score/

Top Threat Score Contributors

This dashboard shows information about top threat score contributor rules by threat score contribution, number of actors for which the rule triggered and the number of times the rule triggered.

Dashboard

ArcSight Solutions/UBM/Actor Threat Score/

Watch Level Actor Activity

This dashboard shows activity attributable to actors on the Actor Threat Score list whose threat score is in the watch range.

Dashboard

ArcSight Solutions/UBM/Actor Threat Score/

Suspicious Level Actor Activity

This dashboard shows activity attributable to actors on the Actor Threat Score list whose threat score is in the suspicious range.

Dashboard

ArcSight Solutions/UBM/Actor Threat Score/

Top Threat Score Contributors by Number of Actors

This query viewer shows the top rules that contribute to actor threat scores by number of unique actors for each rule.

Query Viewer

ArcSight Solutions/UBM/Actor Threat Score/

Threat Score Rule Firings for Actors on the Threat Score List

This query viewer shows correlation events that contribute to the Actor Threat Score.

Query Viewer

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score by Department

This query viewer shows the composite threat score for each department associated with actors on the Actor Threat Score active list.

Query Viewer

ArcSight Solutions/UBM/Actor Threat Score/

New Actors on Threat Score List

This query viewer shows the actors recently added to the Actor Threat Score active list.

Query Viewer

ArcSight Solutions/UBM/Actor Threat Score/

Top Threat Score Contributors by Number of Rule Firings

This query viewer shows the top rules that contribute to actor threat scores by the total number of times each rule was triggered.

Query Viewer

ArcSight Solutions/UBM/Actor Threat Score/

Top Actors on Threat Score List

This query viewer displays a chart of the actors with the highest threat scores.

Query Viewer

ArcSight Solutions/UBM/Actor Threat Score/

Top Threat Score Contributors by Threat Score Contribution

This query viewer shows the top rules that contribute to actor threat scores by the threat score contribution, which is the product of the total number of times the rule triggered and the threat score assigned to each rule.

Query Viewer

ArcSight Solutions/UBM/Actor Threat Score/

Threat Score with Actor Details

This query viewer shows the threat score for each actor along with actor base attributes.

Query Viewer

ArcSight Solutions/UBM/Actor Threat Score/

Recent Activity by Actors on the Threat Score List

This query viewer shows information from events attributed to actors on the Actor Threat Score active list over the last three hours.

Query Viewer

ArcSight Solutions/UBM/Actor Threat Score/

Top Actors on Threat Score List

This report displays a chart and table of the actors with the highest Threat scores.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Top Threat Score Contributors

This report shows information that identifies the top rules that contribute to actor threat scores.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score Changes Over Time

This report shows all those events that identify all the changes to the specified actor's threat score over time.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score by Country or Region

This report shows a composite threat score for each country associated with actors on the Actor Threat Score active list.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Department Threat Score Over Time

This report shows the composite threat score for a given department over time.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score by Title

This report shows a composite threat score for each title associated with actors on the Actor Threat Score active list.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score by Department

This report shows a composite threat score for each department associated with actors on the Actor Threat Score active list.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Activity by Actors on Threat Score List

This report shows information from events attributed to actors on the Actor Threat Score active list.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Login Attempts by Actors on Threat Score List

This report shows events that indicate login attempts to target systems and that are attributable to actors on the Actor Threat Score active list.

Report

ArcSight Solutions/UBM/Actor Threat Score/

New Actors on Threat Score List

This report shows actors newly added to the Actor Threat Score active list.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Rule Firings for Actors on Threat Score List

This report displays correlation events that contribute to the Actor Threat Score.

Report

ArcSight Solutions/UBM/Actor Threat Score/

Library - Correlation Resources

Actor Threat Score Reached Malicious Level

This rule is triggered when an actor's threat score reaches the malicious level. A notification is sent to the appropriate party for response.

Rule

ArcSight Solutions/UBM/Actor Threat Score/

Increase Actor Threat Score

This rule adds the attributable actor to the Actor Threat Score active list and calculates a new threat score for the actor.

Rule

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score Reduced

This rule triggers on audit events generated by ArcSight ESM when an actor's threat score is reduced in the Actor Threat Score active list.

Rule

ArcSight Solutions/UBM/Actor Threat Score/

Add Actor to Actor Threat Score List

This rule adds the attributable actor to the Actor Threat Score active list when a suspicious activity rule is triggered.

Rule

ArcSight Solutions/UBM/Actor Threat Score/

Actor Removed from Actor Threat Score List

This rule triggers on audit events generated by ArcSight ESM when an actor's entry is removed from the Actor Threat Score active list.

Rule

ArcSight Solutions/UBM/Actor Threat Score/

Library Resources

Increase Actor Threat Score

This active list contains a list of suspicious activity rules and their customizable threat scores. When an actor causes one of these rules to trigger, their threat score is increased by the rule's threat score as defined in this list.

Active List

ArcSight Solutions/UBM/Actor Threat Score/

Account Authenticators

This active list is used by the actor global variables to determine what the Identity Management authenticator is, base on the event, so that an actor can be determined from event information.

Active List

ArcSight System/Actor Data Support

Actor Threat Score

This list maintains a running threat score for actors exhibiting suspicious activity.

Active List

ArcSight Solutions/UBM/Actor Threat Score/

Last Events by Watch Level Actors

This data monitor shows the last events attributable to actors on the Actor Threat Score list whose threat score is in the watch range.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Threat Score Moving Averages

This data monitor shows the moving average of the top Actor Threat Scores, sorted by percentage change.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Top Malicious Level Actors

This data monitor shows the top active actors on the Actor Threat Score list whose threat score is in the malicious range.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Malicious Level Actor Activity

This data monitor shows activity attributable to actors on the Actor Threat Score list whose threat score is in the malicious range.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Watch Level Actor Activity

This data monitor shows activity attributable to actors on the Actor Threat Score list whose threat score is in the watch range.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Threat Score Increases

This data monitors shows information from events indicating that an actor's Threat Score increased.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Last Events by Malicious Level Actors

This data monitor shows the last events attributable to actors on the Actor Threat Score list whose threat score is in the malicious range.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Last Events by Suspicious Level Actors

This data monitor shows the last events attributable to actors on the Actor Threat Score List whose threat score is in the suspicious range.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Top Suspicious Level Actors

This data monitor shows the top active actors on the Actor Threat Score list whose threat score is in the suspicious range.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Top Watch Level Actors

This data monitor shows the top active actors on the Actor Threat Score list whose threat score is in the watch range.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

Suspicious Level Actor Activity

This data monitor shows activity attributable to actors on the Actor Threat Score list whose threat score is in the suspicious range.

Data Monitor

ArcSight Solutions/UBM/Actor Threat Score/

AttributableActor

This global variable returns all the information for an actor, where the event to actor attribution is done using either attacker or target user name fields, or the source IP address. Note: To turn lookups based on the source IP address, in the Parameters tab, do not use the actorByAccountOrSourceIP local variable to lookup the actor, use the UUID field of the ActorByAccountID global variable instead.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByAccountID

This global variable maps the account information in an event with an actor. The account information consists of the device vendor and product, and information derived from the attacker or target user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorFromIPMap

This global variable returns an actor's UUID, full name, username used, and login type if the actor is associated with a source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

ActorScoreFromActorThreatScoreUpdates

This global variable gets the threat score associated with an update to the Actor Threat Score active list.

Global Variable

ArcSight Solutions/UBM/Actor Threat Score/

ActorByUUIDThreatScore

This global variable retrieves an actor's threat score based on the UUID provided by the ActorByUUID global variable.

Global Variable

ArcSight Solutions/UBM/Actor Threat Score/

solnPatternDiscoveryConst

This variable returns a constant string that can be used in Pattern Discovery profiles when it is not required to specify either a Source or a Target event field.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorFromActorThreatScoreUpdates

This global variable gets details of the actor associated with updates to the Actor Threat Score active list.

Global Variable

ArcSight Solutions/UBM/Actor Threat Score/

solnGetAuthenticator

This global variable extracts the authenticator from the event by looking up the Account Authenticators list using event fields.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByIPThreatScore

This global variable retrieves an actor's threat score based on the UUID provided by the ActorFromIPMap global variable.

Global Variable

ArcSight Solutions/UBM/Actor Threat Score/

solnGetUsername

This global variable returns user name in an event from target user name or attacker user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

AttributableActorThreatScore

This global variable retrieves an actor's threat score based on the UUID provided by the AttributableActor global variable.

Global Variable

ArcSight Solutions/UBM/Actor Threat Score/

ActorByAccountIDThreatScore

This global variable retrieves an actor's threat score based on the UUID provided by the ActorByAccountID global variable.

Global Variable

ArcSight Solutions/UBM/Actor Threat Score/

ActorByUUID

This Actor global variable looks for a UUID in Device Custom String1, and retrieves the Actor with that UUID.

Global Variable

ArcSight Solutions/UBM/Core Variables

Events with ActorByAccountID

This field set selects the fields appropriate for viewing events correlated with actor and can be customized for the UBM active channels.

Field Set

ArcSight Solutions/UBM/Core/

Threat Score Increases

This field set can be used for viewing increases and additions to the Actor Threat Score active list.

Field Set

ArcSight Solutions/UBM/Actor Threat Score/

Events with AttributableActor

This field set selects the fields appropriate for viewing events correlated with either account-id or IP address and can be customized for the UBM active channels.

Field Set

ArcSight Solutions/UBM/Core/

Events with ActorByUUID

This field set selects the fields appropriate for viewing events correlated with actor and can be customized for the UBM active channels.

Field Set

ArcSight Solutions/UBM/Core/

Deleted Entry from Actor Threat Score List

This filter identifies events that indicate an entry has been deleted from the Actor Threat Score active list.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Activity by Actors on Threat Score list

This filter selects events attributable to actors on the Actor Threat Score list.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Address or Username Present

This filter checks whether any of attacker address, attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Target Username is a System Account

This filter selects events in which the target user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Changes to the Actor Threat Score List

This filter captures all events that identify changes to the Actor Threat Score List.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Malicious Level Actor Activity

This filter selects activity attributable to actors on the Actor Threat Score list whose threat score is in the malicious range.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Target User Name is NOT NULL

This filter selects events in which the attacker user name field is populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Login Attempts

This filter selects any attempts at logging into systems. It excludes machine logins into Microsoft Windows systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Threat Score Increases

This filter selects events indicating that an actor's Threat Score increased.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Attacker User Name is a System Account

This filter selects events in which the attacker user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Windows Events with a Non-Machine User

This filters identified Microsoft Windows events that have a non machine/system user either in the attacker or the target fields.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Active List Entry Updated

This filter identifies events which indicate that an active list entry has been updated.

Filter

ArcSight Solutions/UBM/Core Filters/

Watch Level Actor Activity

This filter selects activity attributable to actors on the Actor Threat Score list whose threat score is in the watch range.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Threat Score Contributors

This filter selects rule trigger events that contribute to the Actor Threat Score.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

ActorByAccountID is NULL

This filter selects events which can not be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

Username Present

This filter checks whether any of attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Suspicious Level Actor Activity

This filter selects activity attributable to actors on the Actor Threat Score list whose threat score is in the suspicious range.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score Updated

This filter selects events that can be associated with an update to the Actor Threat Score active list.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

ActorByAccountID is NOT NULL

This filter selects events which can be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

Target User Name is NULL

This filter selects events in which the target user name field is not populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Windows Events

This filter selects all events in which the device product field is Microsoft Windows.

Filter

ArcSight Solutions/UBM/Core Filters/

Actor Threat Score NULL

This filter selects events for which the attributable actor does not have an established threat score.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Rule Firings for Threat Score Contributors

This profile detects patterns of actor threat score correlation events.

Profile

ArcSight Solutions/UBM/Actor Threat Score/

Threat Score Contributors - Trend

This query gets aggregated information about correlation events for rules that contribute to an actor's threat score.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Top Threat Score Contributors

This query identifies the top rules that contribute to actor threat scores.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Activity by Actors on Threat Score List

This query selects information from events attributed to actors on the Actor Threat Score active list.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Top Threat Score Contributors by Number of Actors

This query identifies the top rules that contribute to actor threat scores by number of unique actors for each rule.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score by Title

This query returns a composite threat score for each title associated with actors on the Actor Threat Score active list.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score Changes Over Time

This query selects all those events that identify all the changes to the specified actor's threat score over time.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Threat Score with Actor Details

This query retrieves threat score for each actor along with actor base attributes.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Threat Score Rule Firings for Actors on the Threat Score List

This query selects correlation events that contribute to the Actor Threat Score.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score by Country or Region

This query returns a composite threat score for each country associated with actors on the Actor Threat Score active list.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Top Threat Score Contributors by Threat Score Contribution

This query identifies the top rules that contribute to actor threat scores by the threat score contribution, which is the product of the number of times each rule triggered and the threat score assigned to each rule.

Query

ArcSight Solutions/UBM/Actor Threat Score/

All Actions for Actor

This query gets aggregated information about events that might be attributable to actors.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Overview/

Department Threat Score Over Time

This query gets the composite threat score for a given department over time.

Query

ArcSight Solutions/UBM/Actor Threat Score/

New Actors on Actor Threat Score List

This query selects the actors recently added to the Actor Threat Score active list.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Login Attempts by Actors on Threat Score List

This query selects login attempts attributable to actors on the Actor Threat Score active list.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Top Threat Score Contributors by Number of Rule Firings

This query identifies the top rules that contribute to actor threat scores, by the total number of times each rule triggered.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Actor Threat Score by Department

This query returns a composite threat score for each department associated with actors on the Actor Threat Score active list.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Top Actors on Threat Score List

This query selects the actors with the highest threat scores.

Query

ArcSight Solutions/UBM/Actor Threat Score/

IP Address to Actor Map

This session list tracks the IP addresses that can be associated with actors. Typically, these IP addresses will belong to single-user machines.

Session List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Weekly Department Threat Score

This trend collects a composite threat score for each department that has actors on the threat score list and records that score weekly.

Trend

ArcSight Solutions/UBM/Actor Threat Score/

All Actions for Actor

This hourly trend collects aggregated information about events that might be attributable to actors.

Trend

ArcSight Solutions/UBM/User Activity Monitoring/

Threat Score Contributors

This trend captures a summary of all rules that trigger and contribute to the threat scores of actors.

Trend

ArcSight Solutions/UBM/Actor Threat Score/

Suspicious Activity Use Case

The Suspicious Activity use case provides resources that can be used to discover and analyze suspicious activity occurring on your network. When triggered, the suspicious activity rules can contribute to the resources of the Actor Threat Score Use Case.

This use case provides the following:

This use case reports on the following suspicious activity:

The Suspicious Activity Use Case rules determine the actor attributable to an event, using global variables.

Here are some examples:

Each suspicious activity rule takes the actor’s UUID and full name returned from the global variable and populates the following event fields in the generated correlation event:

deviceCustomString1 field with the UUID

deviceCustomString2 field with full name of the actor

Regardless of which global variable the rule invokes to get the attributable actor, the UUID and full name is placed into the deviceCustomString1 and deviceCustomString2 fields of correlation event for consumption by the resources in the Actor Threat Score Use Case. For more information, see Actor Threat Score Use Case.

The UUID is the Universally Unique Identifier for the actor assigned by the Identity Management System.

Account Management

The Suspicious Activity Use Case reports on the following potential misuse of accounts:

At Risk User Activity

The Suspicious Activity Use Case reports on the following suspicious activity by at-risk identities represented by actors. An at-risk actor represents a user that should be monitored at a higher level of scrutiny, such as:

The set of identities that are considered at risk is defined by the filter.

The following suspicious behavior is tracked for at-risk actors:

Traffic from an Area of Concern

The Suspicious Activity Use Case monitors network traffic to countries and web sites that might be of a concern to your organization.

Database Access Attempts

The Suspicious Activity Use Case reports on the following suspicious database access attempts:

Email Failures

The Suspicious Activity Use Case reports on rejected emails and email errors.

General Security Breaches

The Suspicious Activity Use Case reports on breaches of general security practices and policies, such as:

Information Leakage

The Suspicious Activity Use Case monitors for information leakage, such as:

Network Based Anomaly Detection

The Suspicious Activity Use Case monitors the following network-based activities:

Physical Location Anomalies

The Suspicious Activity Use Case monitors for physical location anomalies by tracking the badge status of employees and correlating it other factors:

Policy Violations

The Suspicious Activity Use Case monitors when policy violations occur, such as:

Printing

The Suspicious Activity Use Case monitors suspicious printing activities, such as:

Role Violations

The Suspicious Activity Use Case monitors and reports on role violations involving an identity. A role violation occurs when an identity access systems that belong to a different department or they do not have proper role to access. In addition, authorizations on monitored systems such as privilege grants or assignments to groups can be analyzed for consistency with role information stored in the Identity Management System. For example, if Jane Doe was granted the DBA role on a database system but in the Identity Management System she was not granted this role, this role violation would be reported.

The resources provided in the Suspicious Activity Use Case enables auditors, analysts, and managers to provide the following services:

Web Interaction

The Suspicious Activity Use Case monitors the following identity interactions with the web:

Devices

The following devices can supply events to this use case:

All the devices listed above can supply events to this use case but the resources will only process events from devices, when the device generates events that can be attributed to specific actors.

Categorize Assets

This use case requires categorization of monitored assets into the UBM network domains. For more information, see . For example, a role violation is detected if a user in the Human Resources department accesses a server asset categorized as Finance.

This use case contains resources with conditions that check if incoming events involve assets categorized with the asset categories listed in following table. Classify assets appropriately with these categories to trigger the resources during run time.

Asset Categories used by Suspicious Activity Use Case

Asset Category

Configuration

Competition

Categorize the assets of the competition. You can categorize the competition assets and/or add the competition domains to the Competition Domains active list. For more information, see Active Lists.

Destinations/Anonymous Proxies

Categorize additional public proxy servers. Events sent via a proxy server could indicate that someone is trying to hide their identity. By default, the following proxy servers are categorized:

  • anonybrowser.com
  • anonymizer.com
  • proxify.com
  • proxify.com1
  • proxify.com2
  • proxify.com3
  • proxify.com4
  • pureprivacy.com
  • webproxy.kaxy.com

Destinations/Career Sites

Categorize additional job hunting web sites. By default, the following career web sites are categorized:

  • FindAJob.org
  • Get-A-Job-Now.com
  • careerbuilder.com
  • careerpage.org
  • dice.com
  • hotjobs.com
  • iHireJobNetwork.com
  • ieee.careercast.com
  • indeed.com
  • jobdeputy.com
  • linkedin.com
  • monster.com
  • monster.com1
  • officialjobboard.com
  • thingamajob.com
  • web.hj.scd.yahoo.com

Destinations/Hacker Sites

Categorize additional hacker tool web sites. By default, the following hacker tool web sites are categorized:

  • 2600.com
  • astalavista.com
  • hackerhighschool.org
  • insecure.org
  • metasploit.com
  • nessus.org
  • packetstormsecurity.org

Destinations/Prohibited Sites-Other

This category is not explicitly used by UBM solution resources, but can be used to categorize other types of prohibited destinations.

The Classification Level - Lower to Higher and Classification Level - Higher to Lower filters uses the security level categories, Confidential, Secret, Top Secret. Classify your assets into the appropriate Information Classification/National Security category.

Configure Resources

Configure the following types of resources for this use case:

Active Lists

Configure the active lists listed in the following table for this use case. These active lists are available from the following location:

ArcSight Solutions/UBM/Suspicious Activity

Populate Suspicious Activity Active Lists

Active List

Description

Configuration

Competition Domains

This active list is used to define DNS domain names of competitive companies.

Populate with competition DNS domain names.

Countries of Concern

This active list contains the country code of countries with whom information exchange might be suspect.

Add ISO country codes for countries of concern from http://www.iso.org/iso/en/prods-services/iso3166ma/02iso-3166-code-lists/list-en1.html

Default Vendor Accounts

This active list contains default user accounts that ship with products.

Optional—By default, this list is populated with default vendor user accounts provided with common applications and operating systems. Add any additional vendor user accounts for applications and operating systems used by your organization.

Disgruntled Actors

This list contains the full names and UUID of disgruntled identities. The activity of the actors on this list are monitored at a higher level of scrutiny

Add the UUID and full name of any disgruntled employees. For more information, see .

This list should be maintained manually.

New Hire Actors

This active list contains the full names and UUID of newly hired employees. The activity of the actors on this list are monitored with greater suspicion.

Optional—This lists is automatically populated when new actors are added to the IDM. You might want you set the time period that a new hire is considered new, by editing the TTL Days value for this active list in the active list editor.

Notice-Given Actors

This active list contains the full names and UUID of employees who have given notice. The activity of the actors on this list can be monitored with a higher level of scrutiny.

Add UUID and the full name of employees who have given notice. For more information, see .

This list should be maintained manually.

Public Webmail

This list contains all the DNS domains for public webmail servers, for example gmail.com. This list is used to detect when large emails are sent to those domains, indicating suspicious activity.

Optional—By default, this list is populated with the set of default public Webmail servers. Add additional public Webmail servers.

Role Violations

The rule places an actor on the Actor Changes active list when an actor accesses a target system belonging to a department to which they do not belong, and for which they do not have the defined role. The rule triggers the first time an actor/target system combination is detected. Subsequent role violations by the same actor/target system combination are not reported unless a time out period is specified.

Optional—This is automatically populated with actors by Actor Changes rule.

To configure the Actor Changes rule to report subsequent role violations after a specified time period, edit the list and set the one of the TTL fields to a value.

Filters

Configure the following filters for this use case:

Rules

By default, all the rules in this use case are disabled. Enable only the rules that are significant for your organization. Each suspicious activity rule contains an action that generates a correlation event and by default these rule actions are enabled.

Enabling many rules can impact the performance of the ESM Manager. Significant tuning might be required for the UBM solution rules.

Trends and Queries

Reports and query viewers in this use case are based on the trends listed below.

Before enabling the trends listed below, verify that these trends collect the expected events for your environment. In addition, you might want to customize the trend before enabling. For more information, see .

Enable the following trends for this use case:

Creating Custom Suspicious Activity Rules

If you have custom rules that report suspicious activity in your environment, these rules can also increase the threat score associated with actors. The rule must be able to attribute events to actors.

You can create custom suspicious activity rules that report suspicious activity in your environment. The rule must be able to attribute events to actors. In your rule, use one of the global variables (listed in ) to attribute the actor to the suspicious activity.

To create your own rule, you can copy one of the following template rules and customize it for your suspicious activity.

Add the rule to the Increase Actor Threat Score active list with the appropriate threat score. For detailed instructions, see Adding Your Suspicious Activity Rules—Optional.

Verify Configuration

After configuring this use case, verify events are being processed by the suspicious activity rules by viewing the Actor Changes active channel:

  1. In the Navigator panel, go to Active Channels.
  2. Navigate to ArcSight Solutions/UBM/Suspicious Activity.
  3. Right-click Actor Changes and select Show Active Channel.

All rule fire events for this use case should display.

Resources

The following table lists all the resources explicitly assigned to this use case and any dependent resources.

Resources that Support the Suspicious Activity Use Case

Resource

Description

Type

URI

Monitor Resources

Suspicious Activity

This active channel shows all suspicious events.

Active Channel

ArcSight Solutions/UBM/Suspicious Activity/

Role Violations

This active channel displays events in which an actor accesses a target system for which they do not have the defined role.

Active Channel

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Activity from Disabled Actors

This active channel shows events in which the actor associated with the attacker or target user name has been disabled.

Active Channel

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

Suspicious Activity Rule Firings

This active channel shows correlation events from the Suspicious Activity use case.

Active Channel

ArcSight Solutions/UBM/Suspicious Activity/

Information Leak Events

This active channel shows information leak events.

Active Channel

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Hacker Tool Web Site Access

This active channel shows all activity where the target is a known hacker tool Web site.

Active Channel

ArcSight Solutions/UBM/Suspicious Activity/Web/

Job Hunting Web Site Access

This active channel shows all activity where the target is a known job hunting Web site.

Active Channel

ArcSight Solutions/UBM/Suspicious Activity/Web/

Network Based Anomaly Detection

This dashboard shows network-based anomaly detection traffic.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Suspicious Activity Rule Firings

This dashboard shows a composite view of suspicious activity correlation events across actors, departments and job titles.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Information Leak by Data Type

This dashboard shows events indicating possible information leaks.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Suspicious Activity

This dashboard shows a composite view of suspicious activity across actors, departments and job titles.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Leaked Files

This filter shows all leaked files.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Information Leak Status

This dashboard shows traffic related to information leaks.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Role Violations

This dashboard shows event graphs of role violations by employee type and department.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Classification Level Violations

This dashboard shows traffic that violates information classification rules

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Email Errors

This dashboard shows email related errors.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/Email/

Competitive Email Communications

This dashboard shows events indicating emails to or from a competitor's email DNS domain.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Concerns

This dashboard shows events that are a concern for many organizations. Examples include traffic to or from countries of concern, possible data leaks, and national security concerns.

Dashboard

ArcSight Solutions/UBM/Suspicious Activity/Concerns/

Top Actors with Suspicious Activity Rule Firings

This query viewer shows the top actors by number of UBM suspicious activity correlation events.

Query Viewer

ArcSight Solutions/UBM/Suspicious Activity/

Suspicious Activity Rule Firings

This query viewer shows correlation events for UBM suspicious activity rules.

Query Viewer

ArcSight Solutions/UBM/Suspicious Activity/

Top Job Titles with Suspicious Activity Rule Firings

This query viewer shows the top job titles by number of UBM suspicious activity correlation events.

Query Viewer

ArcSight Solutions/UBM/Suspicious Activity/

Top Suspicious Activity Rules

This query viewer shows the top suspicious activity rules by the total number of times each rule triggered.

Query Viewer

ArcSight Solutions/UBM/Suspicious Activity/

Top Departments with Suspicious Activity Rule Firings

This query viewer shows the top departments by number of UBM suspicious activity correlation events.

Query Viewer

ArcSight Solutions/UBM/Suspicious Activity/

Traffic to Competition

This report details all communication with competitive organizations as defined by the asset categories or the Competition active list.

Report

ArcSight Solutions/UBM/Suspicious Activity/Information Leak/

Suspicious Document Transferred

This report shows events indicating that a suspicious document has been transferred.

Report

ArcSight Solutions/UBM/Suspicious Activity/Information Leak/

Suspicious Activity Rule Firings for Actor

This report shows information about UBM suspicious activity correlation events for the specified actor.

Report

ArcSight Solutions/UBM/Suspicious Activity/

Suspicious Activity by Privileged Actors

This report shows information from events indicating suspicious activity by privileged actors.

Report

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Failed Building Access Events

This report shows events indicating failed building access.

Report

ArcSight Solutions/UBM/Suspicious Activity/Physical/

Role Violations for Department

This report shows a summary chart and detailed table of role violations for the specified department.

Report

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Specific Document Printed

This report shows events indicating that the specified document has been printed.

Report

ArcSight Solutions/UBM/Suspicious Activity/Information Leak/

Role Violations by Target Asset Role

This report shows a summary chart and detailed table of role violations by target asset role.

Report

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Oracle Privilege Grants

This report shows privileges granted in Oracle.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Role Violations for Target Asset Role

This report shows a summary chart and detailed table of role violations for the specified target asset role.

Report

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Information Leak - Top Rule Firings

This report shows the top information leak rules triggered.

Report

ArcSight Solutions/UBM/Suspicious Activity/Information Leak/

DBA_USERS Access

This report shows all SELECT operations on the dba_users table in Oracle.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Oracle NOAUDIT

This report shows all the users who have had auditing disabled.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Suspicious Notice-Given User Activity

This report shows suspicious events by actors in the Notice Given list.

Report

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Suspicious Disgruntled User Activity

This report shows suspicious events by actors on the Disgruntled list.

Report

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Role Violations by Employee Type

This report shows a summary chart and detailed table of role violations by employee type.

Report

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Oracle Users Created

This report shows all the new users that have been created within Oracle.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Files Emailed

This report shows all files that have been emailed.

Report

ArcSight Solutions/UBM/Suspicious Activity/Information Leak/

DBA_USERS UPDATES

This report shows all updates to the dba_users table in Oracle.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Suspicious Activity Rule Firings for Department

This report shows information about UBM suspicious activity correlation events for the specified department.

Report

ArcSight Solutions/UBM/Suspicious Activity/

All Suspicious Activity for Department

This report shows the actor full name, vendor, product, event name, and count of all suspicious events that can be correlated to an actor belonging to the specified department.

Report

ArcSight Solutions/UBM/Suspicious Activity/

Oracle Grant Role DBA

This report shows all successful dba role grants by the user who executed the grant.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Failed Database Authentication Review

This report shows all failed authentications to databases.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Resumes Emailed

This report shows events indicating that a resume was emailed.

Report

ArcSight Solutions/UBM/Suspicious Activity/Information Leak/

Confidential Document To Competition

This report shows all users who have sent a confidential document to a competitor.

Report

ArcSight Solutions/UBM/Suspicious Activity/Information Leak/

Audit Table Delete

This report shows all deletions from the audit table.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Specific Document Transferred

This report shows events indicating that the specified document was transferred.

Report

ArcSight Solutions/UBM/Suspicious Activity/Information Leak/

Suspicious Activity by Threat Score Actors

This report shows information from suspicious events attributed to actors having a threat score greater than zero.

Report

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Traffic to Countries of Concern

This report details all communication with countries of concern as defined by the Countries of Concern active list.

Report

ArcSight Solutions/UBM/Suspicious Activity/Information Leak/

Database Table Access Review

This report shows all database tables that have been accessed, and the users accessing them.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Printing Suspicious Documents

This report shows events indicating the printing of suspicious documents.

Report

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Role Violations for Employee Type

This report shows a summary chart and detailed table of role violations for the specified employee type.

Report

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Suspicious Activity Rule Firings for Job Title

This report shows information about UBM suspicious activity correlation events for the specified job title.

Report

ArcSight Solutions/UBM/Suspicious Activity/

Privileges Granted without Proper Role

This report shows events indicating that elevated privileges were granted to a non-privileged actor.

Report

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

All Suspicious Activity for Role

This report shows the actor's full name, unique ID, product, event name, and count of all suspicious events that can be correlated to an actor having the specified role.

Report

ArcSight Solutions/UBM/Suspicious Activity/

Audit Options Table Delete

This report shows any user attempting to delete their audit settings directly from the table audit options table.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Suspicious New Hire Activity

This report shows suspicious events from new hires.

Report

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Database Authentication Review

This report shows all successful database authentications.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

All Suspicious Activity for Employee Type

This report shows the actor full name, vendor, product, event name, and count of all suspicious events that can be correlated to an actor having the specified employee type.

Report

ArcSight Solutions/UBM/Suspicious Activity/

Suspicious Activity Rule Firings for Role

This report shows information about UBM suspicious activity correlation events for the specified role.

Report

ArcSight Solutions/UBM/Suspicious Activity/

Activity from Disabled Actors

This report shows information from events in which the actor associated with the attacker or target user name in the event has been disabled.

Report

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

After Hours Database Accesses

This report shows events indicating after hours database access.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Suspicious Activity Rule Firings for Employee Type

This report shows information about UBM suspicious activity correlation events for the specified employee type.

Report

ArcSight Solutions/UBM/Suspicious Activity/

Role Violations by Department

This report shows a summary chart and detailed table of role violations by department.

Report

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

DBA_USERS DELETES

This report shows all delete operations to the dba_users table in Oracle.

Report

ArcSight Solutions/UBM/Suspicious Activity/Database/

Rejected Email Senders

This report shows the sender, relay, and time of rejected email events.

Report

ArcSight Solutions/UBM/Suspicious Activity/Email/

All Suspicious Activity

This report shows information from all suspicious events that can be correlated to an actor.

Report

ArcSight Solutions/UBM/Suspicious Activity/

Printing Activity After Hours

This report shows events indicating after hours printing activity.

Report

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Library - Correlation Resources

Printing Suspicious Documents

This rule detects any document names being printed that match the filter for suspicious documents.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Account Lockout

This rule detects Microsoft Windows account lockout events and adds the target username and associated actor to the Account Lockouts active list.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

Anonymous Proxy Access

This rule triggers on connections to anonymous proxy servers. This activity could indicate that someone is attempting to access prohibited sites or hide their web surfing activity.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Web/

Hacker Tool Website Access

This rule monitors network traffic targeting known hacker Web sites. The servers are assets categorized as Hacker Sites. This activity could indicate that someone is trying to engage in malicious activity by downloading hacker tools or accessing hacker-related information.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Web/

Activity from Disabled Actor

This rule triggers on events in which the actor associated with the attacker or target user name in the event has been disabled.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

Role Violation

This rule triggers on events in which an actor accesses a target system belonging to a department to which they do not belong, and for which they do not have the defined role.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Job Hunting

This rule monitors network traffic targeting known public job Web sites. The job sites are assets categorized as Career Sites. This activity could indicate that someone is trying to either post his resume online or is looking for new job opportunities.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Web/

After Hours Building Access by At Risk Actor

This rule looks for after hours building access attempts by high risk actors.

Rule

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Non-DBA Added to Oracle DBA Role

This rule triggers on events indicating that an Oracle user account was granted the role of dba, but the actor owning the account is not defined as a dba in the actor model.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Login to Known Shared Account by Actor

This rule triggers on login events to known shared accounts.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

Failed Building Access

This rule detects failed building access.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Physical/

Large Email to Public Webmail Servers

This rule looks for large email messages being sent to public Web mail accounts such as Yahoo.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Activity from Badged Out Employee

This rule detects network activity on an internal network segment even though the employee is not physically present in the building.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Physical/

Database Brute Force Login Success

This rule looks for brute force database logins followed by a successful login.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Database/

Physical Plus VPN Access

This rule detects possible compromised VPN accounts by looking for VPN authentications from actors that are physically present in the building.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Physical/

Suspicious Activity Template - ActorByAccountID

This rule can be used as a template to add custom suspicious activity rules to your UBM deployment. In this rule, the attributable actor is determined by the ActorByAccountID global variable. Add your condition first before enabling it.

Rule

ArcSight Solutions/UBM/Suspicious Activity/

Using Different Usernames

This rule detects people connecting with two different user names.

Rule

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Leak of Company Information

This rule triggers when a leak of company information is detected.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Multiple Failed Database Access Attempts

This rule looks for multiple failed logins by the same user targeting a database.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Database/

After Hours Database Access by At Risk Actor

This rule detects database access after hours by at-risk actors.

Rule

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Resume Emailed by At Risk Actor

This rule triggers if high risk actors send resumes through email.

Rule

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Local Admin Created

This rule identifies the creation of a local administrator account in Microsoft Windows.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

Network Scan

This rule triggers when network scan events are reported, indicating reconnaissance activity.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Traffic From Competition

This rule monitors for connections coming from machines classified as belonging to competitors.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Large Email to Competition

This rule detects emails sent to competitors.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Excessive Printing

This rule looks for excessive printing activity.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Traffic to Country of Concern

This rule monitors for traffic going to countries of concern. Countries of concern can be configured using the Countries of Concern active list.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Suspicious Activity Template - AttributableActor

This rule can be used as a template to add custom suspicious activity rules to your UBM deployment. In this rule, the attributable actor is determined by the AttributableActor global variable. Add your condition first before enabling it.

Rule

ArcSight Solutions/UBM/Suspicious Activity/

Compromise - Attempt

This rule detects any attempt to compromise a device from a source that is not listed on a trusted active list. It triggers whenever an event is categorized as attempt and compromise. On the first event, agent severity is set to high, the attacker address is added to the Hostile active list, and the target address is added to the Hit active list.

Rule

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Suspicious Activity by Privileged Actor

This rule triggers on detection of suspicious activity caused by a privileged user.

Rule

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

VPN Login from Competition Domain

This rule triggers on events indicating a VPN login has occurred, and the source IP address belongs to a competitor's domain.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Leak of Personal Information

This rule triggers when a leak of personal information is detected.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

IPC Share Browsing

This rule looks for any attempts to browse Microsoft Windows system shares.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Policy Violations/

Printing Confidential Documents

This rule detects any document names being printed that match the filter for confidential documents.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Traffic to Competition

This rule monitors for traffic going to competitors.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Audit Log Cleared

This rule monitors for the clearing of host audit logs.

Rule

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Security Software Disabled

This rule is triggered when a Microsoft Windows security software service has been disabled.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Policy Violations/

Default Vendor Account Attempt

This rule triggers when a user tries to access a default vendor account. Default vendor account identifiers are maintained in the Default Vendor Accounts active list.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

Printing After Hours

This rule detects printing activity after hours.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Library Resources

Badged In Actors

This active list maintains a list of actors who have badged into the building. By default, actors expire from the list in 1 day.

Active List

ArcSight Solutions/UBM/User Activity Monitoring/Physical Access/

Public Webmail

This list contains all the DNS domains for public webmail servers. For example hotmail.com. This list is used to detect when big emails are sent to those domains, being a possible information leak.

Active List

ArcSight Solutions/UBM/Suspicious Activity/

Countries of Concern

This active list contains the country code of countries with whom information exchange might be suspect.

Active List

ArcSight Solutions/UBM/Suspicious Activity/

Competition Domains

This active list is used to define DNS domain names of competitors, and can be used to detect information leakage to those domains.

Active List

ArcSight Solutions/UBM/Suspicious Activity/

Disgruntled Actors

This active list contains a list of disgruntled actors. It should be populated with actors who require additional monitoring.

Active List

ArcSight Solutions/UBM/Suspicious Activity/

Increase Actor Threat Score

This active list contains a list of suspicious activity rules and their customizable threat scores. When an actor causes one of these rules to trigger, their threat score is increased by the rule's threat score as defined in this list.

Active List

ArcSight Solutions/UBM/Actor Threat Score/

Notice-Given Actors

This active list contains a list of actors scheduled for termination, which might require a higher level of monitoring.

Active List

ArcSight Solutions/UBM/Suspicious Activity/

Default Vendor Accounts

This active list contains user accounts that might ship as standard accounts with many vendors products.

Active List

ArcSight Solutions/UBM/Suspicious Activity/

Privileged User Roles

This active list is used to define user groups with elevated privileges.

Active List

ArcSight Solutions/UBM/Privileged User Monitoring/

Account Authenticators

This active list is used by the actor global variables to determine what the Identity Management authenticator is, base on the event, so that an actor can be determined from event information.

Active List

ArcSight System/Actor Data Support

Role Violations

This active list contains a list of actors who have accessed systems for which they do not have the correct role or department. Further role violation events will not occur as long as the Actor and Target Asset Group are in this list.

Active List

ArcSight Solutions/UBM/Suspicious Activity/

Known Shared Accounts

This active list maintains a list of known shared accounts per application. Note that all account IDs must be in uppercase and the Application field must be the same as what appears in the Device Product event field.

Active List

ArcSight Solutions/UBM/Shared Accounts/

New Hire Actors

This active list maintains a list of new hire actors. The default expiration is two weeks from the date the actor is added to the system.

Active List

ArcSight Solutions/UBM/Suspicious Activity/

Actor Threat Score

This list maintains a running threat score for actors exhibiting suspicious activity.

Active List

ArcSight Solutions/UBM/Actor Threat Score/

Hacker Sites

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM/Destinations

Secret

This is a site asset category.

Asset Category

Site Asset Categories/Business Impact Analysis/Classification

Top Secret

This is a site asset category.

Asset Category

Site Asset Categories/Business Impact Analysis/Classification

Protected

This is a site asset category.

Asset Category

Site Asset Categories/Address Spaces

Confidential

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM/Information Classification/National Security

National Security

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM/Information Classification

Anonymous Proxies

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM/Destinations

Career Sites

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM/Destinations

Network Domains

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM

Competition

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM

Suspicious Activity Rule Firings

This data monitor shows the last suspicious activity rules triggered and the actor responsible.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/

Top Actors with Suspicious Activity

This data monitor shows the top actors exhibiting suspicious activity.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Last Company Concerns

This data monitor shows the latest traffic flagged as a potential concern for the company.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Concern/

Top Information Leaks by Destination Address

This data monitor shows the top information leaks by destination address.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

New Hosts

This data monitor shows new hosts detected on the network.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Top Failed Email Senders

This data monitor shows the senders causing the most errors with their email traffic.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Email/

Top Departments with Suspicious Activity

This data monitor shows the top departments exhibiting suspicious activity.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Role Violations by Department - Event Graph

This data monitor shows an event graph of role violations by department and actor along with the asset category of the target system.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Top Information Leaks by User

This data monitor shows the top information leaks by user.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Last 10 Information Leak Events

This data monitor shows the last ten events classified as information leaks.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Top Company Information Leaks by User

This data monitor shows the top information leaks of company data by user.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Last Nation State Concerns

This data monitor shows the latest traffic flagged as a potential concern for the nation state.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Concern/

Information Leaks by Destination - Graph

This data monitor shows a graph of information leaks by destination.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Role Violations by Employee Type - Event Graph

This data monitor shows an event graph of role violations by employee type and actor along with the asset category of the target system.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Top Company Information Leaks by Address

This data monitor shows the top information leaks of company data by address.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Leaked Files by User - Graph

This data monitor shows a graph of leaked files per user.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Top Information Leaks by Address

This data monitor shows the top information leaks by address.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Competitive Inbound Email Communication

This data monitor shows events indicating emails from a competitor's email DNS domain.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Top Information Leaks by Destination User

This data monitor shows the top information leaks by destination user.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Top Personal Information Leaks by User

This data monitor shows the top information leaks of personal data by user.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Top Senders to Job Addresses

This data monitor shows the top senders of email to job-related email addresses.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Email/

Scans

This data monitor shows scanning activity.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Top Failed Email Recipients

This data monitor shows the recipients causing the most errors with their email traffic.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Email/

New Services

This data monitor shows new services that were detected on machines.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Anomalous Traffic

This data monitor shows anomalous traffic.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Classification Level Traffic High to Low

This data monitor shows all traffic originating from a higher level classification and targeting a lower level classification.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Last 10 Company Data Leaks

This data monitor shows the last ten leaks of company data.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Classification Level Traffic Low to High

This data monitor shows all traffic originating from a lower level classification and targeting a higher level classification.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Top Personal Information Leaks by Address

This data monitor shows the top information leaks of personal data by address.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Last 10 Personal Data Leaks

This data monitor shows the last ten leaks of personal data.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Country of Concern Traffic

This data monitor shows events whose source or destination addresses are from a country of concern as specified on the Countries of Concern active list.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Concern/

Top Rejected Senders

This data monitor shows the top rejected sender addresses.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Email/

Top Files Leaked

This data monitor shows a list of the top files that were leaked.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Top Job Titles with Suspicious Activity

This data monitor shows the top job titles exhibiting suspicious activity.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Top Information Leak Policies

This data monitor shows information leak events.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Competitive Outbound Email Communication

This data monitor shows events indicating emails to a competitor's email DNS domain.

Data Monitor

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

AttributableActor

This global variable returns all the information for an actor, where the event to actor attribution is done using either attacker or target user name fields, or the source IP address. Note: To turn lookups based on the source IP address, in the Parameters tab, do not use the actorByAccountOrSourceIP local variable to lookup the actor, use the UUID field of the ActorByAccountID global variable instead.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByIP

This global variable returns all the information for an actor, where the event to actor attribution is done using the source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

ActorByAccountID

This global variable maps the account information in an event with an actor. The account information consists of the device vendor and product, and information derived from the attacker or target user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorFromIPMap

This global variable returns an actor's UUID, full name, username used, and login type if the actor is associated with a source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

ActorByAttackerUserName

This variable maps the account information in an event with an actor. The account information consists of the device vendor, device product, connector address, connector zone, and information derived from the attacker user name.

Global Variable

ArcSight Solutions/UBM/Core Variables

solnPatternDiscoveryConst

This variable returns a constant string that can be used in Pattern Discovery profiles when it is not required to specify either a Source or a Target event field.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByTargetUserName

This variable maps the account information in an event with an actor. The account information consists of the device vendor, device product, connector address, connector zone, and information derived from the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables

solnGetAuthenticator

This global variable extracts the authenticator from the event by looking up the Account Authenticators list using event fields.

Global Variable

ArcSight Solutions/UBM/Core Variables/

solnGetUsername

This global variable returns user name in an event from target user name or attacker user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

solnTargetAssetGroup

This global variable extracts group name from the URI of the target asset's asset category, assuming the asset category exists in the Network Domains.

Global Variable

ArcSight Solutions/UBM/Suspicious Activity/

ActorByAccountIDThreatScore

This global variable retrieves an actor's threat score based on the UUID provided by the ActorByAccountID global variable.

Global Variable

ArcSight Solutions/UBM/Actor Threat Score/

AccountIDForLogins

This global variable determines which event username field to use.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByUUID

This Actor global variable looks for a UUID in Device Custom String1, and retrieves the Actor with that UUID.

Global Variable

ArcSight Solutions/UBM/Core Variables

Email

This field set is used for the active channel showing email traffic.

Field Set

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Events with ActorByAccountID

This field set selects the fields appropriate for viewing events correlated with actor and can be customized for the UBM active channels.

Field Set

ArcSight Solutions/UBM/Core/

Events with AttributableActor

This field set selects the fields appropriate for viewing events correlated with either account-id or IP address and can be customized for the UBM active channels.

Field Set

ArcSight Solutions/UBM/Core/

Hacker Tool Web Site

This field set is used for the Hacker Tool Web Site active channel.

Field Set

ArcSight Solutions/UBM/Suspicious Activity/Web/

Events with ActorByUUID

This field set selects the fields appropriate for viewing events correlated with actor and can be customized for the UBM active channels.

Field Set

ArcSight Solutions/UBM/Core/

Information Leak

This field set is used for the Information Leak active channel.

Field Set

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Job Hunting FS

This field set is used for the Job Traffic active channel.

Field Set

ArcSight Solutions/UBM/Suspicious Activity/Web/

Role Violations

This field set selects the fields appropriate for viewing events in which an actor accessed a target system for which they do not have the defined role.

Field Set

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Scanning

This filter selects events that indicate scanning activity.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Employee Type - Contractor

This filter selects events attributable to actors having an employee type of contractor.

Filter

ArcSight Solutions/UBM/My Filters/Actor Attribute Filters/

Successful Logins

This filter identifies successful logins by both administrative and non-administrative users across a variety of operating systems (Unix, Windows 2003, Windows 2008).

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

New Service Detected

This filter selects events indicating that a new service was detected.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Internal Source

This filter is looking for events coming from inside the company network.

Filter

/All Filters/ArcSight Foundation/Common/Network Filters/Boundary Filters

Information Leak of Company Data from User

This filter selects events indicating improper transmission of company data where the attacker username is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Suspicious Documents

This filter defines suspicious documents. Add the fileNames of suspicious documents to the condition of this filter to monitor these documents.

Filter

ArcSight Solutions/UBM/My Filters/

Suspicious Activity

This filter selects events indicating suspicious activity that merits investigation.

Filter

ArcSight Solutions/UBM/Suspicious Activity/General Security/

ArcSight Events

This filter selects events in which the Device Vendor and Device Product is ArcSight.

Filter

ArcSight Solutions/UBM/Core Filters/

Proxy Traffic

This filter selects events indicating proxy traffic. Modify this filter to select events that match your environment if needed.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Traffic Analysis

This filter selects traffic analysis events such as those from network based anomaly detection systems.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Physical Access System Events

This filter selects all events from physical access systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

ActorByAccountID is NULL

This filter selects events which can not be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

ActorByAccountID is NOT NULL

This filter selects events which can be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

Information Leak of Company Data

This filter selects events indicating the improper transmission of confidential data where the data was company information.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Information Leak Events to Address

This filter selects events indicating the improper transmission of confidential data where the target address is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Blocked Web Page Access

This filter shows blocked Web page access reported generally by proxies.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Information Leak of Personal Data

This filter selects events indicating the improper transmission of confidential data where the data was personal information.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Status - Disabled

This filter selects events in which the actor associated with the attacker or target user name in the event has been disabled.

Filter

ArcSight Solutions/UBM/My Filters/Actor Attribute Filters/

Rejected Emails

This filter selects events indicating emails which were rejected by the email server.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Target User Name is NOT NULL

This filter selects events in which the attacker user name field is populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Information Leak Rule Firings

This filter selects UBM information leak correlation events.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Information Leak Events from User

This filter selects events indicating the improper transmission of confidential data where the attacker username is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

All Login Events to Known Shared Accounts

This filter identifies all login events in which a known shared account is being used. For this filter to work correctly, the Known Shared Accounts active list must be populated with all known shared accounts and their associated applications. This filter will identify successful, failed, and attempted logins.

Filter

ArcSight Solutions/UBM/Shared Accounts/

Failed Email Communications

This filter selects events that indicate failed email communications.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Information Leak of Personal Data from Address

This filter selects all information leak events related to personal information where the attacker address is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Email Traffic

This filter selects events indicating successful email communications.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Information Leak of Files to Address

This filter selects events indicating improper transmission of files, where the target address is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

New Hire Actors

This filter selects events attributable to actors on the New Hire Actors active list.

Filter

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Hacker Tool Website Access

This filter selects base events indicating access to hacker tool websites.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Web/

Unsuccessful Windows Logins for Valid Username

This filter identifies unsuccessful login events for a valid username recorded on Microsoft Windows domain controllers.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Role - DBA

This filter selects events attributable to actors having a role of dba.

Filter

ArcSight Solutions/UBM/My Filters/Actor Attribute Filters/

Events with Actor

This filter identifies events that can be attributed to an actor either by virtue of the event user name or the originating IP address.

Filter

ArcSight Solutions/UBM/Actor Management/

After Hours

This filter defines the time period of after hours. Change this filter to adjust the default settings.

Filter

ArcSight Solutions/UBM/My Filters/

Traffic to Competition

This filter selects events destined for competitors' domains.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Traffic from Competition

This filter selects events coming from competitors' domains.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Information Leak Events

This filter selects events indicating the improper transmission of confidential data.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Email To Public Webmail Servers

This filter selects events indicating emails going to public webmail servers such as AOL, Yahoo, or Hotmail.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Email/

Unsuccessful or Attempted Logins

This filter identifies all login events in which the outcome was not a definite success, in other words either a failure or an attempt.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Classification Level - Higher to Lower

This filter shows traffic from a higher classification level to a lower level.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

ASM Events

This filter selects internal monitoring events involving data monitor resources.

Filter

ArcSight Solutions/UBM/Core Filters/

Confidential Documents

This filter defines confidential documents. Add the fileNames of confidential documents to the condition of this filter to monitor these documents.

Filter

ArcSight Solutions/UBM/My Filters/

Building Access Events

This filter selects all building access events, such as a user badging into a building.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Job Hunting

This filter looks for traffic that might indicate possible job hunting activity, including both base events and triggers rules.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Web/

Information Leak Events to User

This filter selects events indicating the improper transmission of confidential data where the target username is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Privileged Actor Activity

This filter selects events attributable to actors having a privileged role such as administrator or dba.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Successful Building Access Events

This filter selects successful building access events.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Emails To Job Addresses

This filter monitors emails being sent to addresses of the form jobs@ or similar forms.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Email/

Printing Activity

This filter selects events indicating printing activity.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Audit Options Table Delete

This filter selects events indicating that a user has attempted to delete their audit settings directly from the table audit options table.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Database/

Status - Deleted

This filter selects events in which the actor associated with the attacker or target user name in the event has been disabled.

Filter

ArcSight Solutions/UBM/My Filters/Actor Attribute Filters/

All Printing Events

This filter selects events indicating printing activity.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Traffic to or from Competition

This filter selects events indicating traffic to or from competitors' domains.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Target User Name is NULL

This filter selects events in which the target user name field is not populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Traffic to Competition - Email

This filter selects events indicating emails sent to a competitor's email DNS domain.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Role Violations

This filter selects events in which an actor accesses a target system belonging to a department to which they do not belong, and for which they do not have a defined role.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Target Username is a System Account

This filter selects events in which the target user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Windows Account Lockouts

This filter defines the event that is generated if a Microsoft Windows user account gets locked out.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

Attacker User Name is a System Account

This filter selects events in which the attacker user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Traffic from Competition - Email

This filter selects events indicating emails from a competitor's email DNS domain.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Windows 2008 Authentication Ticket Request

This filter identifies Microsoft Windows 2008 events which indicate that a Kerberos authentication ticket was requested.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Information Leak of Personal Data from User

This filter selects all information leak events related to personal information where attacker username is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Information Leak Events from Address

This filter selects events indicating the improper transmission of confidential data where the attacker address is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Information Leak of Company Data from Address

This filter selects events indicating the improper transmission of confidential data where the data included company information and the attacker address was not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Nation State Concern Traffic

This filter selects traffic that is of concern to nation states. For example, such traffic might include export control violations and terrorist threats.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Concern/

Windows 2003 Authentication Ticket Request

This filter identifies Microsoft Windows Kerberos Authentication Ticket Request events. These events are generated when a user logs into an Active Directory domain.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Audit Table Delete

This filter selects all deletions from the audit table.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Database/

Non-ArcSight Events

This filter selects events in which the Device Vendor and Device Product is not ArcSight.

Filter

ArcSight Solutions/UBM/Core Filters/

Member Added to Privileged Group - Windows 2003

This filter identifies Windows 2003 events that indicate a user has added to a domain local, global or universal security group. These groups are defined in the Privileged User Roles active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Oracle User Added to DBA Role

This filter selects events indicating an Oracle user account was given the role of dba.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Printing Resumes

This filter detects printing events in which the documents being printed looks like resumes.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Login Attempts

This filter selects any attempts at logging into systems. It excludes machine logins into Microsoft Windows systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

New Host Detected

This filter selects events indicating that a new host was detected on the network.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Successful Logins - Unix

This filter identifies successful login attempts to Unix machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Suspicious Activity by Threat Score Actors

This filter selects events indicating suspicious activity from actors whose threat score is greater than zero.

Filter

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Windows Events with a Non-Machine User

This filters identified Microsoft Windows events that have a non machine/system user either in the attacker or the target fields.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Anomalous Connections

This filter selects events indicating anomalous network connections.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Network Based Anomaly Detection/

Successful and Unsucessful Logins - Windows 2003

This filter identifies both successful and unsuccessful logins on Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Threat Score Contributors

This filter selects rule trigger events that contribute to the Actor Threat Score.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Employee Type - Part Time

This filter selects events involving users having an employee status type of Part Time.

Filter

ArcSight Solutions/UBM/My Filters/Actor Attribute Filters/

Information Leak of Files from User

This filter selects events indicating the improper transmission of files where the attacker username is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Member Added to Privileged Group - Windows 2008

This filter identifies Windows 2008 events that indicate a user is added to a domain local, global or universal security group. These groups are defined in the Privileged User Roles active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Non-ArcSight Internal

This filter excludes internal ArcSight events.

Filter

ArcSight Solutions/UBM/Core Filters/

Attributable Actor is NULL

This filter selects events which can not be correlated to an actor based on the attacker or target user name fields, or by the attacker address field.

Filter

ArcSight Solutions/UBM/Core Filters/

Traffic to or from Competition - Email

This filter selects events indicating emails to or from a competitor's email DNS domain.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Information Leak of Files

This filter selects events indicating the improper transmission of confidential data where the file name is not null.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Countries of Concern Traffic

This filter selects events whose source or destination addresses are from a country of concern as specified on the Countries of Concern active list.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Concern/

At Risk Actor

This filter's conditions define the types of actors who might be considered at risk, and who should be monitored at a higher level of scrutiny.

Filter

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Member Added to Privileged Group - Windows

This filter selects events indicating a Windows object was added to a privileged group. Privileged groups are defined in the Privileged User Groups active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Audit Log Cleared

This filter selects events indicating that a host audit log was cleared.

Filter

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Successful Logins - Windows 2003

This filter identifies successful login events to Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Classification Level - Lower to Higher

This filter shows traffic from a lower classification level to a higher level.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Attributable Actor is NOT NULL

This filter selects events in which an actor can be attributed to an event either by username or by source IP.

Filter

ArcSight Solutions/UBM/Core Filters/

Database Authentication

This filter selects database authentication events.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

Suspicious Activity by Privileged Actor

This filter selects events indicating suspicious activity from an actor with a privileged role.

Filter

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Address or Username Present

This filter checks whether any of attacker address, attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

ActorByIP is NOT NULL

This filter checks if an actor can be associated with the source IP address of the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Suspicious Activity Rule Firings

This filter selects UBM suspicious activity correlation events.

Filter

ArcSight Solutions/UBM/Suspicious Activity/

Arcsight Internal Events

This filter selects ArcSight ESM internally generated events.

Filter

ArcSight Solutions/UBM/Core Filters/

Failed Building Access Events

This filter selects failed building access events.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Physical/

Proxy Event Categorization

This filter selects events indicating proxy traffic. The filter conditions are written considering the categorization of known proxy events.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Company Concern Traffic

This filter selects suspicious events that are a concern for many organizations. For example, such events might include accessing forbidden Web sites, leaking data, and performing job searches.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Concern/

Large Email To Public Webmail Servers

This filter looks for large emails going to Public Webmail servers.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Email/

Disgruntled Actors

This filter selects events attributable to actors on the Disgruntled Actors active list.

Filter

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Username Present

This filter checks whether any of attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Printing After Hours

This filter selects events that indicate printing activity occurring after hours.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Unsuccessful Logins for Valid Username - Windows 2008

This filter identifies unsuccessful logins for a valid username on Windows 2008 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Actor Threat Score > 0

This filter identifies events from Actors whose threat score is greater than 0.

Filter

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Windows Events

This filter selects all events in which the device product field is Microsoft Windows.

Filter

ArcSight Solutions/UBM/Core Filters/

Unsuccessful Logins for Valid Username - Windows 2003

This filter identifies unsuccessful logins for a valid username on Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Building Egress Events

This filter selects all building egress events, such as a user badging out of a building.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Suspicious Activity

This profile helps detect patterns of suspicious activity across actors.

Profile

ArcSight Solutions/UBM/Suspicious Activity/

Suspicious Activity Rule Firings

This profile detects patterns of suspicious activity rules triggered across actors.

Profile

ArcSight Solutions/UBM/Suspicious Activity/

Failed Database Authentication Review

This query returns all failed authentications to databases.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

Role Violations Detail for Target Asset Role

This query selects information about the actor, target host, device and count of events in which the user does not have the proper role to access assets belonging to the specified category.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Resumes Emailed

This query returns events indicating that a resume was emailed.

Query

ArcSight Solutions/UBM/Suspicious Activity/Email/

Role Violations Detail for Employee Type

This query selects information about the actor, target asset, device and count of events in which the user does not have the proper role to access the asset for actors belonging to the specified employee type.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Privileges Granted without Proper Role - Oracle

This query returns events indicating that an Oracle account belonging to a non-dba actor was given the role of dba.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Role Violations Summary for Employee Type

This query returns the actor's full name, target asset categories, and the number of role violations for the specified employee type.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Oracle NOAUDIT

This query returns all the users for whom auditing has been disabled.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

Oracle Privilege Grants

This query returns privileges granted in Oracle.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

Top Actors with Suspicious Activity Rule Firings

This query gets the top actors by number of UBM suspicious activity correlation events.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Oracle Users Created

This query returns the new users that have been created within Oracle.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

All Suspicious Activity for Role

This query selects the actor's full name, unique ID, vendor, product, event name, and count of all events that can be correlated to an actor having the specified role.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Information Leak - Top Rule Firings

This query returns the top information leak rules triggered.

Query

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Suspicious Activity Rule Firings

This query selects correlation events for UBM suspicious activity rules.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Printing Activity After Hours

This query returns events indicating after-hours printing activity.

Query

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Suspicious Activity Rule Firings for Role

This query gets information about UBM suspicious activity correlation events for the specified role.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Top Job Titles with Suspicious Activity Rule Firings

This query gets the top job titles by number of UBM suspicious activity correlation events.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Rejected Email Senders

This query returns the sender, relay, and time of rejected email events.

Query

ArcSight Solutions/UBM/Suspicious Activity/Email/

Suspicious Activity by Threat Score Actors

This query selects information from suspicious events attributed to actors having a threat score greater than zero.

Query

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

DBA_USERS DELETES

This query selects all DELETE operations on the dba_users table in Oracle.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

All Actions for Actor

This query gets aggregated information about events that might be attributable to actors.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Overview/

All Suspicious Activity

This query selects information from all suspicious events that can be correlated to an actor.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Activity from Disabled Actors

This query returns information from events in which the actor associated with the attacker or target user name in the event has been disabled.

Query

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

All Suspicious Activity for Employee Type

This query selects the actor's full name, unique ID, vendor, product, event name, and count of all suspicious events that can be correlated to an actor having the specified employee type.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Suspicious Activity Rule Firings for Job Title

This query gets information about UBM suspicious activity correlation events for the specified job title.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Files Emailed

This query returns all files that have been emailed.

Query

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Top Threat Score Contributors by Number of Rule Firings

This query identifies the top rules that contribute to actor threat scores, by the total number of times each rule triggered.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Role Violations Detail by Employee Type

This query selects information regarding the actor, target asset and count of events in which the user does not have the proper role to access the asset.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Printing Suspicious Documents

This query returns events indicating printing of suspicious documents.

Query

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Role Violations Summary by Employee Type

This query selects the actor's employee type, target asset categories, and count of events in which the user does not have the proper role to access the asset.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Role Violations Summary by Department

This query selects the actor's department, target asset categories, and count of events in which the user does not have the proper role to access the asset.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Top Departments with Suspicious Activity Rule Firings

This query gets the top departments by number of UBM suspicious activity correlation events.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Database Table Access Review

This query returns all database tables that have been accessed and the users accessing them.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

Suspicious New Hire Activity

This query selects suspicious events from actors on the New Hire active list.

Query

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Failed Building Access Events

This query returns events indicating failed building access.

Query

ArcSight Solutions/UBM/Suspicious Activity/Physical/

Role Violations Detail by Target Asset Role

This query selects information regarding the actor, target asset and count of events in which the user does not have the proper role to access the asset.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Role Violations Summary for Department

This query returns the actor's full name, target asset categories, and number of role violations for the specified department.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Role Violations Detail for Department

This query selects information regarding the actor, target asset, device and count of events in which the user does not have the proper role to access the asset for actors belonging to the specified department.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Audit Table Delete

This report shows all deletions from the audit table.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

Suspicious Activity Rule Firings for Actor

This query gets information about UBM suspicious activity correlation events for the specified actor.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Audit Options Table Delete

This query selects any user attempting to delete their audit settings directly from the table audit options table.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

Suspicious Notice-Given Actor Activity

This query selects suspicious events by actors on the Notice Given list.

Query

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Role Violations Summary for Target Asset Role

This query returns the number of role violations per user and target asset for the specified target asset category.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Role Violations Summary by Target Asset Role

This query selects target asset categories, target host name and count of events in which the user does not have the proper role to access the asset.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Oracle Grant Role DBA

This query returns all successful dba role grants by the user who executed the grant.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

DBA_USERS Access

This query returns all SELECT operations on the dba_users table in Oracle.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

Suspicious Activity Rule Firings for Employee Type

This query gets information about UBM suspicious activity correlation events for the specified employee type.

Query

ArcSight Solutions/UBM/Suspicious Activity/

DBA_USERS UPDATES

This query returns all updates to the dba_users table in Oracle.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

After Hours Database Accesses

This query selects events indicating after hours database access.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

Threat Score Contributors - Trend

This query gets aggregated information about correlation events for rules that contribute to an actor's threat score.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Specific Document Printed

This query returns events indicating that the specified document has been printed.

Query

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Suspicious Disgruntled User Activity

This query selects suspicious events by actors on the Disgruntled list.

Query

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Suspicious Activity by Privileged Actors

This query returns information from events indicating suspicious activity from an actor having a privileged role.

Query

ArcSight Solutions/UBM/Suspicious Activity/At Risk Users/

Specific Document Transferred

This query returns events indicating that the specified document was transferred.

Query

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Role Violations Detail by Department

This query selects information regarding the actor, target asset and count of events in which the user does not have the proper role to access the asset.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Traffic to Competition

This query returns all communication with competitive organizations as defined by the asset categories or the Competition active list.

Query

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Suspicious Document Transferred

This query returns events indicating that a suspicious document has been transferred.

Query

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Traffic to Countries of Concern

This query returns all communication with countries of concern as defined by the Countries of Concern active list.

Query

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

Suspicious Activity Rule Firings for Department

This query gets information about UBM suspicious activity correlation events for the specified department.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Privileges Granted without Proper Role - Windows

This query returns events indicating that an account belonging to a non-privileged actor was added to a privileged NT security group.

Query

ArcSight Solutions/UBM/Suspicious Activity/Role Violations/

Database Authentication Review

This query returns all successful database authentications.

Query

ArcSight Solutions/UBM/Suspicious Activity/Database/

All Suspicious Activity for Department

This query selects the actor full name, unique ID, vendor, product, event name, and count of all suspicious events that can be correlated to an actor belonging to the specified department.

Query

ArcSight Solutions/UBM/Suspicious Activity/

Confidential Document To Competition

This query returns users who have sent a confidential document to a competitor.

Query

ArcSight Solutions/UBM/Suspicious Activity/Information Leakage/

IP Address to Actor Map

This session list tracks the IP addresses that can be associated with actors. Typically, these IP addresses will belong to single-user machines.

Session List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

All Actions for Actor

This hourly trend collects aggregated information about events that might be attributable to actors.

Trend

ArcSight Solutions/UBM/User Activity Monitoring/

Threat Score Contributors

This trend captures a summary of all rules that trigger and contribute to the threat scores of actors.

Trend

ArcSight Solutions/UBM/Actor Threat Score/

User Activity Monitoring Use Case

The User Activity Monitoring use case contains resources designed to enable analysts to monitor the activity of users on the network. Many resources break down activity by actors' employee type, department, or other attributes.

By correlating events to an actor and its attributes, analysts, auditors, and managers can monitor and generate activity reports on a per department/employee type/role basis. For example, using this resources in the use case, the following reports can be generated:

The use case distinguishes between server login activity, application login activity, and activity within applications so that they can be reported on and tracked separately.

The resources provided in the User Activity Reporting use case enable analysts, auditors, and managers to provide the following services:

Configure Resources

Configure the following types of resources for this use case:

Active List

Configure the active list listed in the following table. This active list is available from the following location:

ArcSight Solutions/UBM/User Activity Monitoring

Populate User Activity Monitoring Active List

Active List

Description

Configuration

My DNS Domains

This active list is used to define the DNS domain names which are owned by the organization.

Configure with all the case sensitive variations of the email DNS domain names used in your organization, for example:

  • MyCompany.com
  • mycompany.com
  • MYCOMPANY.COM

Filters

Configure the following filters for this use case:

Verify that the following filters detect appropriate proxy events in your environment:

Rules

The following rules can be configured for this use case:

By default, all the following actions of this rule are enabled:

Enable the Actor Changes rule if you want to track building egress.

By default, all the following actions of this rule are enabled:

Enable the Add to Daily Active and Remove from Pending Stale rule if you want to track stale accounts.

By default, all the following actions of this rule are enabled:

Enable the Add to Pending Stale rule if you want to track stale accounts.

By default, all the following actions of this rule are enabled:

Enable the Stale Account Detected rule if you want to track stale accounts.

By default, all the following actions of this rule are enabled:

Trends

Reports and query viewers in this use case are based on the trends listed below. Before enabling these trends, verify that these trends collect the expected events for your environment. In addition, you might want to customize the trend before enabling.

Enable the following trends to track proxy activity:

Enable the All Actions for Actor trend to track events that might be attributable to actors. Enable the Building Access and Egress trend to track building access and egress (exit) events.

Build FlexConnector(s) for Physical Access Devices

The UBM solution contains use cases that make use of feeds from physical access systems, such as badge readers. This process is only required if you want to activate the UBM solution content that leverages feeds from physical access systems. If you do not complete this process, the content that leverages feeds from physical access systems will remain dormant.

To enable these use cases, develop a FlexConnector according to the instructions in the ArcSight FlexConnector Developer’s Guide with the following field mappings to map the key event data into the ArcSight event schema:

ArcSight Field

Physical Access System Value

deviceEventClassId

Unique value for event type used for categorization

deviceReceiptTime

Access Time

destinationUserId

Users badge Id

deviceCustomString1

Location Accessed / Building

Use the following event categories for the following event types:

Event type

Object

Behavior

Technique

Device Group

Outcome

Significance

Successful building access

/Location

/Authentication/Verify

 

/Physical Access System

/Success

/Normal

Building access rejected

/Location

/Authentication/Verify

 

/Physical Access System

/Failure

/Information/Warning

Badge-out (someone is leaving a building) [not all badge reader systems support this]

/Location

/Access/Stop

 

/Physical Access System

/Success

/Normal

Account created/deleted/modified - [Success assumed; in case of a failure, the Outcome needs to reflect that and the significance is /Informational/Error]

/Actor/User

/Authentication/

[Add|Delete|Modify

 

/Physical Access System

/Success

/Informational

Giving someone access to another room/building - [Success assumed; in case of a failure, the Outcome needs to reflect that and the significance is /Informational/Error]

/Actor/User

/Authorization/Modify

 

/Physical Access System

/Success

/Informational

Granting access to a room/building for an entire group of users

/Actor/Group

/Authorization/Modify

 

/Physical Access System

/Success

/Informational

You can add more user context to the events generated by your badge reader by creating a connector event mappings file. For more information, see ArcSight FlexConnector Developer’s Guide.

In addition, an entry for the badge ID must be added to the Account Attributes table for each actor. An entry for the FlexConnector must be also added to the Account Authenticators active list with the badge system as the authenticator.

Devices

The following device types can supply events to this use case:

All the devices listed above can supply events to this use case but the resources will only process events from devices, when the device generates events that can be attributed to specific actors.

Resources

The following table lists all the resources explicitly assigned to this use case and any dependent resources.

Resources that Support the User Activity Monitoring Use Case

Resource

Description

Type

URI

Monitor Resources

Activity - Contractor

This active channel shows events attributable to actors having an employee type of contractor.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Activity - Full Time Employee

This active channel shows events attributable to actors having an employee type of Full Time.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Physical Access System Events

This active channel shows events generated by physical access systems.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Database Activity

This active channel shows all database activity.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

Activity - DBA

This filter selects events attributable to actors having a role of dba.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Activity - Part Time Employee

This active channel shows events attributable to actors having an employee type of Full Time.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

All Login Events

This active channel shows login events to servers and applications.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Email Traffic

This active channel shows events generated due to email traffic.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Proxy Traffic

This active channel shows events generated due to proxy traffic.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Printing Activity

This active channel shows all printing activity.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

All Events from Specified Actor

This active channel shows all events that can be correlated to a specific actor.

Active Channel

ArcSight Solutions/UBM/User Activity Monitoring/User Investigation/

Printing Activity

This dashboard shows all printing activity.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Login Activity by Employee Type

This dashboard shows event graphs of login activity to applications and servers by employee type.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Email Communicators

This dashboard shows the top entities involved in email traffic.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Proxy Traffic

This dashboard shows various pieces of information about proxy traffic.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Badged In Actors

This dashboard shows information regarding actors that are currently badged in.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Email Relays

This dashboard shows information related to email relays.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

User Authorization Changes

This dashboard summarizes user authorization changes, such as group membership and privilege assignments in operating systems and applications.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Bandwidth Usage

This dashboard shows bandwidth usage information for actors.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Login Activity by Department

This dashboard shows event graphs of login activity to applications and servers by department.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Email Graphs

This dashboard shows email traffic graphs.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Database Activity

This dashboard shows database related activity.

Dashboard

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

All Activity for Known Actors

This query viewer shows all events that can be attributed to any actor in the system.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/

Top Countries with Badged In Actors

This query viewer shows the top countries that have the most number of successful building access events.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Pending Stale Accounts

This query viewer shows a list of pending stale account IDs with the associated actor and device information.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Uncommon Websites

This query viewer shows those websites that were accessed by few actors.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Actors by Account ID - Websites Accessed

This query viewer shows websites accessed by actors who were derived from the base events by virtue of their account IDs.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Stale Accounts

This query viewer shows a list of stale account IDs with the associated actor and device information.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Total Number of Badged In Actors

This query viewer shows the total number of currently badged in actors.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Badged In Actor Details

This query viewer shows relevant actor base attribute information for those actors that are currently badged in.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Top Bandwidth - Download - by IP

This query viewer shows the top actors that have the most number of bytes downloaded via proxy servers. The actors are derived by virtue of the event source IP address.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Departments with Badged In Actors

This query viewer shows the top departments that have the most number of successful building access events.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Top Bandwidth - Upload - by IP

This query viewer shows the top actors that have the most number of bytes uploaded via proxy servers. The actors are derived from by virtue of the event source IP address.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Bandwidth - Upload - by Account ID

This query viewer shows the top actors that have the most number of bytes uploaded via proxy servers. The actors are derived by virtue of their account IDs.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Actor By IP - Websites Accessed

This query viewer shows websites accessed by actors who were derived from the base events by virtue of the event source IP address.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Bandwidth - Download - by Account ID

This query viewer shows the top actors that have the most number of bytes downloaded via proxy servers. The actors are derived by virtue of their account IDs.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Roles with Badged In Actors

This query viewer shows the top roles that have the most number of successful building access events. For a role to be selected at least two actors must have the same role.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Top Actors Badging In

This query viewer shows those actors that have the most number of successful building access events.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Daily Active Accounts

This query viewer shows a list of pending stale account IDs with the associated actor and device information.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Top Badged In Locations

This query viewer shows the top locations that have the most number of successful building access events.

Query Viewer

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Successful Server Logins for Employee Type

This report shows a stacked bar chart of successful server logins by user for a given employee type. A table is also included. Enter the employee type parameter at runtime to restrict the report to users of a certain employee type, such as Full Time.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Printing Volume in Pages Review

This report shows printing volume in pages by user.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Top Blocked Actors by Account ID

This report shows the top actors by number of events and data transferred that have requests blocked by proxy servers. The actors are derived by virtue of their account IDs.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Email Senders (Size)

This report shows the top email senders based on the size of emails sent.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Successful Server Logins for Role

This report shows a stacked bar chart of server logins by user for a given role. A table is also included. Enter the role parameter at runtime to restrict the report to users with a certain role, such as Developers.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Physical Access System Events Over the Past Day

This report shows a count of building access and egress events per hour over the past day.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Websites Accessed by Actor - Month

This report shows all the websites visited by the specific actor over the past month.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Blocked Actors by IP

This query selects the top actors by number of events and data transferred that have requests blocked by proxy servers. The actors are derived by virtue of the event source IP address.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Failed Server Logins for Department

This report shows a stacked bar chart of failed server logins by user for a given department. A table is also included. Enter the department parameter at runtime to restrict the report to users in a certain department, such as Engineering.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Email Receivers (Amount)

This report shows the top email recipients based on number of emails received.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Accessed Websites (Size)

This report shows the top accessed web sites by data transferred.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Activity Based Modeling by Employee Type

This report shows the asset categories, vendors, and applications accessed by employees of each employee type.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Attribute/

Failed Server Logins for Employee Type

This report shows a stacked bar chart of failed server logins by user for a given employee type. A table is also included. Enter the employee type parameter at runtime to restrict the report to users of a certain employee type, such as Full Time.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Application Logins for Employee Type

This report shows a stacked bar chart of successful application logins by user for a given employee type. A table is also included. Enter the employee type parameter at runtime to restrict the report to users of a certain employee type, such as Full Time.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Accessed Websites

This report shows the top accessed websites by number of events.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

SU and SUDO Activity

This report shows activity related to su or sudo on UNIX machines. The attackerUser is trying to execute code with the privileges of the targetUser.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/OS/

Activity Based Modeling by Role

This report shows the asset categories, vendors, and applications accessed by employees of each combination of roles.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Attribute/

All Activity for Employee Type

This report shows the actor full name, vendor, product, event name, and count of all events that can be correlated to an actor having the specified employee type.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Attribute/

Failed Application Logins for Department

This report shows a stacked bar chart of failed application logins by user for a given department. A table is also included. Enter the department parameter at runtime to restrict the report to users in a certain department, such as Engineering.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

UBM - Case Chart

This report shows a count of cases per operational impact and stage.

Report

ArcSight Solutions/UBM/User Activity Monitoring/

All UBM Cases

This report shows all cases in the UBM case group.

Report

ArcSight Solutions/UBM/User Activity Monitoring/

Top Proxy Users (Size)

This report shows the top users accessing web pages by data transferred.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

All Activity for Known Actors

This report shows all events that can be attributed to any actor in the system.

Report

ArcSight Solutions/UBM/User Activity Monitoring/

All Activity for Specific Actor

This report shows a summary of all activity that can be attributed to the specified actor.

Report

ArcSight Solutions/UBM/User Activity Monitoring/User Investigation/

Failed Application Logins for Role

This report shows a stacked bar chart of failed application logins by user for a given role. A table is also included. Enter the role parameter at runtime to restrict the report to users with a certain role, such as Developers.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Websites Accessed by Actor - Day

This report shows all the websites visited by the specific actor over the past day.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Physical Access System Events for Actor

This report shows building access and egress events for the specified actor.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

UBM - Top Rule Firings

This report shows the rules that trigger the most in the UBM solution.

Report

ArcSight Solutions/UBM/User Activity Monitoring/

Successful Server Logins for Department

This report shows a stacked bar chart of successful server logins by user for a given department. A table is also included. Enter the department parameter at runtime to restrict the report to users in a certain department, such as Engineering.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

UBM - Open Cases

This report shows the current status of all open UBM cases

Report

ArcSight Solutions/UBM/User Activity Monitoring/

Successful Application Logins for Department

This report shows a stacked bar chart of successful application logins by user for a given department. A table is also included. Enter the department parameter at runtime to restrict the report to users in a certain department, such as Engineering.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

All Activity for Department

This report shows the actor full name, vendor, product, event name, and count of all events that can be correlated to an actor belonging to the specified department.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Attribute/

Top Email Senders (Amount)

This report shows the top email senders based on the number of emails sent.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Blocked Websites (Size)

This report shows the top websites blocked by proxy servers by data transferred.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Email Receivers (Size)

This report shows the top email recipients based on the size of emails received.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Successful Application Logins for Role

This report shows a stacked bar chart of successful application logins by user for a given role. A table is also included. Enter the role parameter at runtime to restrict the report to users with a certain role, such as Developers.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Activity Based Modeling by Department

This report shows the asset categories, vendors, and applications accessed by employees in each department.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Attribute/

Physical Access System Events for Department

This report shows building access and egress events for the specified department.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

All Activity for Role

This report shows the actor full name, vendor, product, event name, and count of all events that can be correlated to an actor having the specified role.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Attribute/

Top Proxy Users

This report shows the top users accessing web pages by number of events

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Printing Activity for Specific Actor

This report shows all printing activity for the specified actor.

Report

ArcSight Solutions/UBM/User Activity Monitoring/User Investigation/

Failed Application Logins for Employee Type

This report shows a stacked bar chart of failed application logins by user for a given employee type. A table is also included. Enter the employee type parameter at runtime to restrict the report to users of a certain employee type, such as Full Time.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Authorization Changes for Department

This report shows events indicating authorization changes within applications. The events are limited to actors within the specified department.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Physical Access System Events

This report shows successful building access events.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Authorization Changes

This report shows events indicating authorization changes within applications.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Failed Server Logins for Role

This report shows a stacked bar chart of failed server logins by user for a given role. A table is also included. Enter the role parameter at runtime to restrict the report to users with a certain role, such as Developers.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Printing Volume in Bytes Review

This report shows printing volume in bytes by user.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Hourly Login Averages for User vs. Role

This report compares a given user's login activity to servers and applications compared to a given role.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

URLs Accessed

This report shows the accessed URLs for a specified period of time.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Largest Emails

This report shows the largest emails that have been sent.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Blocked Websites

This report shows the top websites blocked by proxy servers by the number of requests blocked.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Physical Access System Events Over the Past Week

This report shows a count of building access and egress events per day over the past week.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Stale Accounts

This report shows the accounts on the Stale Accounts active list.

Report

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

After Hours Building Accesses

This report shows events indicating after hours building access.

Report

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Library - Correlation Resources

Remove Actor from Badged In List

This rule detects when someone leaves a building and removes the actor's full name from the badged in actors active list.

Rule

ArcSight Solutions/UBM/User Activity Monitoring/Physical Access/

Add Actor to Badged In List

This rule detects successful building access and adds the actor's full name to the badged in actors active list

Rule

ArcSight Solutions/UBM/User Activity Monitoring/Physical Access/

Add to Pending Stale

This rule triggers when an account expires off of the Daily Active Accounts active list, indicating it has not been logged into in 24 hours since the previous login. The rule adds the account information to the Pending Stale Accounts active list.

Rule

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Add to Daily Active and Remove from Pending Stale

This rule triggers when a user successfully authenticates to an application, and adds pertinent information from the event to the Daily Active Accounts active list. It will not trigger if a user is already in the list.

Rule

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Stale Account Detected

This rule triggers on events indicating that a user has expired from the Pending Stale Accounts active list, indicating the account has not been used in 6 months. The rule adds the account information to the Stale Accounts active list.

Rule

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Library Resources

My DNS Domains

This active list defines the DNS domain names which are owned by the organization.

Active List

ArcSight Solutions/UBM/User Activity Monitoring/

Badged In Actors

This active list maintains a list of actors who have badged into the building. By default, actors expire from the list in 1 day.

Active List

ArcSight Solutions/UBM/User Activity Monitoring/Physical Access/

Account Authenticators

This active list is used by the actor global variables to determine what the Identity Management authenticator is, base on the event, so that an actor can be determined from event information.

Active List

ArcSight System/Actor Data Support

Pending Stale Accounts

This active list maintains relevant information about accounts that have not been used since they expired off of the Daily Active Accounts active list. Accounts will remain in this list for 6 months unless the account is used, when it will be removed from the list.

Active List

ArcSight Solutions/UBM/User Activity Monitoring/

Stale Accounts

This active list contains the accounts that have expired off of the Pending Stale Accounts active list, indicating they have not been used in over 6 months.

Active List

ArcSight Solutions/UBM/User Activity Monitoring/

Daily Active Accounts

This active list keeps a list of relevant information about actors with active accounts. The default expiration is one day.

Active List

ArcSight Solutions/UBM/User Activity Monitoring/

Servers

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM/Network Domains

Network Domains

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM

Last Users Printing Resumes

This data monitor shows the last users printing resumes.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Server Logins by Department - Event Graph

This data monitor shows an event graph of server logins grouped by the actors departments.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Outbound Email Recipients

This data monitor shows the top recipients of outbound email.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Printing Users

This data monitor shows the users with the most printing activity.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Outbound Email

This data monitor shows outbound email traffic.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Outbound Email Senders

This data monitor shows the top actors sending emails to external addresses.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Blocked Web Pages

This data monitor shows the top Web pages blocked by proxies.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Database Table Access - Graph

This data monitor shows a graph of database table access.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

Top Relays Incoming

This data monitor shows the top 10 relays that were used by for sending incoming email.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

User Privilege Added or Revoked - Event Graph

This data monitor creates an event graph of events indicating a specific privilege was added or revoked. The application, privilege, and actor are included in the graph.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Inbound Email

This data monitor shows inbound email traffic.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Traffic by Source

This data monitor shows the actors with the most traffic registered by proxies.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

User Group Membership Changed - Event Graph

This data monitor creates an event graph of events indicating a user group membership change within an application. The application, group, and actor are included in the graph.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Last Users Printing After Hours

This data monitor shows the last users that printed after hours.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Application Logins by Department - Event Graph

This data monitor shows an event graph of application logins from users and their departments.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Relays Outgoing

This data monitor shows the top 10 relays that were used by for sending outgoing email.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Inbound Email Recipients

This data monitor shows the top actors receiving inbound email.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Server Logins by Employee Type - Event Graph

This data monitor shows an event graph of server logins from users and their employee type.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Accessed Web Pages

This data monitor shows the top accessed Web pages.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Database Access - Graph

This data monitor shows a graph of database machine access.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

Application Logins by Employee Type - Event Graph

This data monitor shows an event graph of application logins from users and their employee type.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Inbound Email Senders

This data monitor shows the top senders of inbound email traffic.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Blocked Sources

This data monitor shows the top actors blocked by proxies.

Data Monitor

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

AttributableActor

This global variable returns all the information for an actor, where the event to actor attribution is done using either attacker or target user name fields, or the source IP address. Note: To turn lookups based on the source IP address, in the Parameters tab, do not use the actorByAccountOrSourceIP local variable to lookup the actor, use the UUID field of the ActorByAccountID global variable instead.

Global Variable

ArcSight Solutions/UBM/Core Variables/

solnGetAuthenticator

This global variable extracts the authenticator from the event by looking up the Account Authenticators list using event fields.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByIP

This global variable returns all the information for an actor, where the event to actor attribution is done using the source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

solnGetUsername

This global variable returns user name in an event from target user name or attacker user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByAccountID

This global variable maps the account information in an event with an actor. The account information consists of the device vendor and product, and information derived from the attacker or target user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorFromIPMap

This global variable returns an actor's UUID, full name, username used, and login type if the actor is associated with a source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

solnGetPhysicalAccessEvent

This global variable returns whether a successful badge in or badge out event occurred for physical access events.

Global Variable

ArcSight Solutions/UBM/User Activity Monitoring/

solnPatternDiscoveryConst

This variable returns a constant string that can be used in Pattern Discovery profiles when it is not required to specify either a Source or a Target event field.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByAttackerUserName

This variable maps the account information in an event with an actor. The account information consists of the device vendor, device product, connector address, connector zone, and information derived from the attacker user name.

Global Variable

ArcSight Solutions/UBM/Core Variables

AccountIDForLogins

This global variable determines which event username field to use.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorByTargetUserName

This variable maps the account information in an event with an actor. The account information consists of the device vendor, device product, connector address, connector zone, and information derived from the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables

Group Membership Changed

This field set selects the fields appropriate for viewing events indicating user group membership changes within an application.

Field Set

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Physical Access System Events

This field set selects the fields appropriate for viewing physical access system events correlated with actor.

Field Set

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Email

This field set is used for the active channel showing email traffic.

Field Set

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Events with ActorByAccountID

This field set selects the fields appropriate for viewing events correlated with actor and can be customized for the UBM active channels.

Field Set

ArcSight Solutions/UBM/Core/

Printing

This field set is used for the printing activity active channel.

Field Set

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Print/

Privilege Added or Revoked

This field set selects the fields appropriate for viewing events indicating a specific privilege was added or revoked.

Field Set

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Proxy

This field set is used for the active channel showing proxy traffic.

Field Set

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Database Activity

This field set selects the fields appropriate for viewing database activity.

Field Set

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

Employee Type - Contractor

This filter selects events attributable to actors having an employee type of contractor.

Filter

ArcSight Solutions/UBM/My Filters/Actor Attribute Filters/

Successful Logins

This filter identifies successful logins by both administrative and non-administrative users across a variety of operating systems (Unix, Windows 2003, Windows 2008).

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Target Username is a System Account

This filter selects events in which the target user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Actor and Address Present

This filter identifies events where an actor can be attributed to the event as well and both the attacker and target addresses are present.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/

Successful Logins - Non-Windows and Non-Unix

This filter selects login events that cannot be attributed to either Microsoft Windows or Unix.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

User Expired from Daily Active Accounts List

This filter selects events indicating an actor has expired from the Daily Active Accounts active list. This means that the actor has not logged in within 24 hours of their last login.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Attacker User Name is a System Account

This filter selects events in which the attacker user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

ArcSight Events

This filter selects events in which the Device Vendor and Device Product is ArcSight.

Filter

ArcSight Solutions/UBM/Core Filters/

Outbound Email

This filter selects events indicating email traffic from internal domains to external domains.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Windows 2008 Authentication Ticket Request

This filter identifies Microsoft Windows 2008 events which indicate that a Kerberos authentication ticket was requested.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Logins - Server

This filter selects events indicating successful logins to servers.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Proxy Traffic

This filter selects events indicating proxy traffic. Modify this filter to select events that match your environment if needed.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

ActorByAccountID is NULL

This filter selects events which can not be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

Inbound Email

This filter selects events indicating email traffic from external domains to internal domains.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Physical Access System Events

This filter selects all events from physical access systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

ActorByAccountID is NOT NULL

This filter selects events which can be correlated to an actor based on the attacker or target user name fields.

Filter

ArcSight Solutions/UBM/Core Filters/

Windows 2003 Authentication Ticket Request

This filter identifies Microsoft Windows Kerberos Authentication Ticket Request events. These events are generated when a user logs into an Active Directory domain.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Non-ArcSight Events

This filter selects events in which the Device Vendor and Device Product is not ArcSight.

Filter

ArcSight Solutions/UBM/Core Filters/

All Events from Actor

This filter selects all events that can be attributed to the actor specified in the filter conditions.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/User Investigation/

Failed Database Authentication

This filter selects all failed database authentications.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

User Privilege Added

This filter selects events indicating that new rights were assigned to a user.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

SU activity

This filter selects events indicating that someone is executing a su or executing a command under another user account (sudo)

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/OS/

Blocked Web Page Access

This filter shows blocked Web page access reported generally by proxies.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Rejected Emails

This filter selects events indicating emails which were rejected by the email server.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Attacker and Target User NOT SYSTEM

This filter excludes events in which both the attacker and target user name are system or admin accounts, or one is a system account and the other is NULL.

Filter

ArcSight Solutions/UBM/Core Filters/

Oracle User Added to DBA Role

This filter selects events indicating an Oracle user account was given the role of dba.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Printing Resumes

This filter detects printing events in which the documents being printed looks like resumes.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Target User Name is NOT NULL

This filter selects events in which the attacker user name field is populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Login Attempts

This filter selects any attempts at logging into systems. It excludes machine logins into Microsoft Windows systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Logins - Unix

This filter identifies successful login attempts to Unix machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Logins - Application - Actor NOT NULL

This filter selects events indicating successful logins to servers where the actor can be derived from the event.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Logouts - Application

This filter selects events indicating successful application logouts.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Building Egress Events

This filter selects successful building egress events.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Windows Events with a Non-Machine User

This filters identified Microsoft Windows events that have a non machine/system user either in the attacker or the target fields.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Failed Email Communications

This filter selects events that indicate failed email communications.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Email Traffic

This filter selects events indicating successful email communications.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Windows Security Enabled Group Membership Change

This filter selects events indicating a Windows object was added to or removed from a security enabled group.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Unsuccessful Windows Logins for Valid Username

This filter identifies unsuccessful login events for a valid username recorded on Microsoft Windows domain controllers.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Role - DBA

This filter selects events attributable to actors having a role of dba.

Filter

ArcSight Solutions/UBM/My Filters/Actor Attribute Filters/

Successful and Unsucessful Logins - Windows 2003

This filter identifies both successful and unsuccessful logins on Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Employee Type - Part Time

This filter selects events involving users having an employee status type of Part Time.

Filter

ArcSight Solutions/UBM/My Filters/Actor Attribute Filters/

After Hours

This filter defines the time period of after hours. Change this filter to adjust the default settings.

Filter

ArcSight Solutions/UBM/My Filters/

User Privilege Added or Revoked

This filter selects events indicating a specific privilege was added or revoked.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Non-ArcSight Internal

This filter excludes internal ArcSight events.

Filter

ArcSight Solutions/UBM/Core Filters/

Failed Logins - Application

This filter selects events indicating login failures to applications.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Unsuccessful or Attempted Logins

This filter identifies all login events in which the outcome was not a definite success, in other words either a failure or an attempt.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

All Database Activity

This filter selects all database activity.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

All Failed Logins

This filter selects all events indicating that a user failed authentication.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

User Expired from Pending Stale Accounts List

This filter selects events indicating that a user has expired from the Pending Stale Accounts active list, indicating the account has not been used in 6 months.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Successful Logins - Application

This filter selects events indicating successful logins to applications.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

ASM Events

This filter selects internal monitoring events involving data monitor resources.

Filter

ArcSight Solutions/UBM/Core Filters/

Successful Logins - Windows 2003

This filter identifies successful login events to Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Web Page Access

This filter identifies successful Web page access reported by proxy servers. Modify this filter to select events that match your environment if needed.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Unix Events

This filter selects events that are coming from Unix devices.

Filter

ArcSight Solutions/UBM/Core Filters/

User Privilege Revoked

This filter selects events indicating that user rights were removed.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Successful Print Job

This filter shows successful print jobs.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Building Access Events

This filter selects all building access events, such as a user badging into a building.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Employee Type - Full Time

This filter selects events attributable to actors having an employee type of Full Time.

Filter

ArcSight Solutions/UBM/My Filters/Actor Attribute Filters/

Database Authentication

This filter selects database authentication events.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

Database Table Access

This filter looks at access patterns of tables in a database.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

Successful Logins - Windows 2008

This filter identifies successful login events to Windows 2008 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Address or Username Present

This filter checks whether any of attacker address, attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Attacker and Target Username Not Equal

This filter selects events in which the attacker and target user names are both populated, and with differing values.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/

Failed Logins - Server

This filter selects events indicating login failures to servers.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Logouts - Server

This filter selects events indicating successful server logouts.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

User Group Membership Changes

This filter selects events indicating a user group membership change within an application.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Successful Building Access Events

This filter selects successful building access events.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Arcsight Internal Events

This filter selects ArcSight ESM internally generated events.

Filter

ArcSight Solutions/UBM/Core Filters/

Successful Logins - Server - Actor NOT NULL

This filter selects events indicating successful logins to servers where the target user name can be correlated to an actor.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Proxy Event Categorization

This filter selects events indicating proxy traffic. The filter conditions are written considering the categorization of known proxy events.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Printing Activity

This filter selects events indicating printing activity.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Username Present

This filter checks whether any of attacker username, or target username are present in the event.

Filter

ArcSight Solutions/UBM/Core Filters/

Successful Database Access

This filter selects events indicating successful access of databases.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Database/

All Printing Events

This filter selects events indicating printing activity.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Printing After Hours

This filter selects events that indicate printing activity occurring after hours.

Filter

ArcSight Solutions/UBM/Suspicious Activity/Printing/

Unsuccessful Logins for Valid Username - Windows 2008

This filter identifies unsuccessful logins for a valid username on Windows 2008 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Target User Name is NULL

This filter selects events in which the target user name field is not populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Windows Events

This filter selects all events in which the device product field is Microsoft Windows.

Filter

ArcSight Solutions/UBM/Core Filters/

Unsuccessful Logins for Valid Username - Windows 2003

This filter identifies unsuccessful logins for a valid username on Windows 2003 domain controller machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Building Egress Events

This filter selects all building egress events, such as a user badging out of a building.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Logins - Successful - User to IP Address

This pattern discovery profile identifies patterns in user login activity. By default, patterns will be identified when the same set of two or more target IP addresses are logged into by two or more different users.

Profile

ArcSight Solutions/UBM/User Activity Monitoring/

URL Access - Time Based

This pattern discovery profile identifies patterns in URL browsing activity. By default, patterns will be identified when the same set of two or more URLs are visited by two or more different users. Snapshots generated by this profile will show the percentage of events that occur in the same sequence. The events processed by this profile must match the Proxy Traffic filter.

Profile

ArcSight Solutions/UBM/User Activity Monitoring/

User Activity

This pattern discovery profile identifies patterns in user activity. By default, patterns will be identified when the same set of two or more events are seen from two or more different users.

Profile

ArcSight Solutions/UBM/User Activity Monitoring/

Logins - Failed - Address to User

This pattern discovery profile identifies patterns in failed login activity. By default, patterns will be identified when the same set of two or more accounts have failed logins from two or more different machines.

Profile

ArcSight Solutions/UBM/User Activity Monitoring/

User Activity - Differing Hosts

This pattern discovery profile identifies patterns in user activity. By default, patterns will be identified when the same users are seen communicating across two or more different attacker and target address pairs.

Profile

ArcSight Solutions/UBM/User Activity Monitoring/

Logins - Successful - User to Application

This pattern discovery profile identifies patterns in successful application login activity. By default, patterns will be identified when the same set of two or more accounts have successful logins to two or more different applications.

Profile

ArcSight Solutions/UBM/User Activity Monitoring/

Logins - Successful - User to Hostname

This pattern discovery profile identifies patterns in user login activity. By default, patterns will be identified when the same set of two or more target hostnames are successful logged into by two or more different users.

Profile

ArcSight Solutions/UBM/User Activity Monitoring/

URL Access

This pattern discovery profile identifies patterns in URL browsing activity. By default, patterns will be identified when the same set of two or more URLs on a given server are visited by two or more different users. The events processed by this profile must match the Proxy Traffic filter.

Profile

ArcSight Solutions/UBM/User Activity Monitoring/

User Activity - Differing Attacker and Target Usernames

This pattern discovery profile identifies patterns in user activity. By default, patterns will be identified when the same set of two or more events are seen from two or more groupings of differing attacker and target user names. This might happen, for example, when administrators make the same modifications to multiple user accounts. The events processed by this profile must have a username present.

Profile

ArcSight Solutions/UBM/User Activity Monitoring/

All Activity for Known Actors

This query selects all events that can be attributed to any actor in the system.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Overview/

After Hours Building Accesses

This query selects events indicating after hours building access.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Failed Server Logins for Employee Type

This query selects the actor's full name, device product, and count from events indicating a failed login to a server by an actor having the specified employee type.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Blocked Actors by Account ID

This query selects the top actors by number of events that have requests blocked by proxy servers. The actors are derived by virtue of their account IDs.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Physical Access Activity for Department

This query shows all the physical access activity for the specified department.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Top Bandwidth - Download - by IP

This query selects the top actors that have the most number of bytes downloaded via proxy servers. The actors are derived by virtue of the event source IP address.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Blocked Actors by IP (Size)

This query selects the top actors by data transferred that have requests blocked by proxy servers. The actors are derived by virtue of the event source IP address.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Email Receivers (Amount)

This query selects the top email recipients based on the number of emails received.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

All Activity for Specific Actor - Details

This query selects information from events attributable to the specified actor.

Query

ArcSight Solutions/UBM/User Activity Monitoring/User Investigation/

Building Access and Egress Totals - Trend

This query captures the total number of building access and egress events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Group Membership Changes

This query selects information from events indicating a user group membership change within an application.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Printing Activity for Specific Actor

This query selects printing activity for the specified actor.

Query

ArcSight Solutions/UBM/User Activity Monitoring/User Investigation/

Proxy Trend

This query selects information needed to capture aggregated proxy usage over the short term.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Successful Application Logins for Employee Type

This query selects the actor's full name, device product, and count from events indicating a successful login to an application by an actor having the specified employee type.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Blocked Actors by Account ID (Size)

This query selects the top actors by data transferred that have requests blocked by proxy servers. The actors are derived by virtue of their account IDs.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Stale Accounts

This query retrieves a list of stale account IDs with the associated actor and device information.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Top Actors Badging In

This query selects those actors that have the most number of successful building access events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Top Email Senders (Size)

This query selects the top email senders based on the size of emails sent.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Accessed Websites (Size)

This query selects the top accessed web sites by data transferred.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Blocked Websites

This query selects the top blocked websites by number of events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Successful Server Logins for Role

This query selects the actor's full name, device product, and count from events indicating a successful login to a server by an actor having the specified role.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Failed Application Logins for Role

This query selects the actor's full name, device product, and count from events indicating a failed login to an application by an actor in the specified role.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Bandwidth - Upload - by Account ID

This query selects the top actors that have the most number of bytes uploaded via proxy servers. The actors are derived by virtue of their account IDs.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Failed Application Logins for Employee Type

This query selects the actor's full name, device product, and count from events indicating a failed login to an application by an actor having the specified employee type.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

UBM - Open Cases

This query selects the open UBM cases.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Overview/

Successful Application Logins for Department

This query selects the actor's full name, device product, and count from events indicating a successful login to an application by an actor in the specified department.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

All Activity for Role

This query selects the actor full name, vendor, product, event name, and count of all events that can be correlated to an actor having the specified role.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Top Blocked Actors by IP

This query selects the top actors by number of events that have requests blocked by proxy servers. The actors are derived by virtue of the event source IP address.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Successful Building Access Events Over the Past Day

This query selects successful building access events per hour over the past day.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Building Egress Events Over the Past Week

This query captures the total number of building egress events per day over the past week.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Privilege Added or Revoked for Department

This query selects information from events indicating a specific privilege was added or revoked. The search is limited to actors in the specified department.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Successful Server Logins for Employee Type

This query selects the actor's full name, device product, and count from events indicating a successful login to a server by an actor having the specified employee type.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

All Activity for Employee Type

This query selects the actor full name, vendor, product, event name, and count of all events that can be correlated to an actor having the specified employee type.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Top Largest Emails

This report shows the largest emails that have been sent.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Websites Accessed by Actor - Month

This query selects all the websites visited by the specific actor over the past month.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

All Actions for Actor

This query gets aggregated information about events that might be attributable to actors.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Overview/

Top Blocked Web Pages (Size)

This query selects the top blocked web pages by data transferred.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

UBM - Top Rule Firings

This query selects the rules that trigger the most in the UBM solution.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Overview/

Printing Volume in Pages Review

This query selects printing volume in pages by user.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Top Accessed Web Pages (Size)

This query selects the top accessed web pages by data transferred.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Successful Server Logins for Department

This query selects the actor's full name, device product, and count from events indicating a successful login to a server by an actor in the specified department.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

SU and SUDO Activity

This query selects all activity related to su or sudo on UNIX machines. The attackerUser is trying to execute code with the privileges of the targetUser.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/OS/

Building Egress Events Over the Past Day

This query captures the total number of building egress events per hour over the past day.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Physical Access Activity for Actor

This query shows all the physical access activity for the specified actor.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Top Bandwidth - Download - by Account ID

This query selects the top actors that have the most number of bytes downloaded via proxy servers. The actors are derived by virtue of their account IDs.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Email Receivers (Size)

This query selects the top email recipients based on the size of emails received.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Top Accessed Web Pages

This query selects the top accessed web pages by number of events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

All Activity for Specific Actor - Chart

This query selects the application and count of events attributable to the specified actor.

Query

ArcSight Solutions/UBM/User Activity Monitoring/User Investigation/

Uncommon Websites

This query identifies those websites that were accessed by less than three actors by default. To change the default number of actors, modify the Group By conditions in the query.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

All Activity for Department - Chart

This query selects the application and count of all events that can be correlated to an actor belonging to the specified department.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Top Email Senders (Amount)

This query selects the top email senders based on the number of emails sent.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Email/

Actor by IP - Websites Accessed

This query selects websites accessed by actors who were derived from the base events by virtue of the event source IP address.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Bandwidth - Upload - by IP

This query selects the top actors that have the most number of bytes uploaded via proxy servers. The actors are derived from by virtue of the event source IP address.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Badged In Actor Details

This query shows relevant actor base attribute information for those actors that are currently badged in.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Hourly Application Access Per User

This query selects the device product, hour, and count from events indicating a successful application login by the specified actor.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Privilege Added or Revoked for Employee Type

This query selects information from events indicating a specific privilege was added or revoked. The search is limited to actors having the specified employee type.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Privilege Added or Revoked

This query selects information from events indicating a specific privilege was added or revoked.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Top Blocked Websites (Size)

This query selects the top blocked websites by data transferred.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Actors by Account ID - Websites Accessed

This query identifies websites accessed by actors who were derived from the base events by virtue of their account IDs.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Physical Access System Events

This report shows successful building access events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Activity Based Modeling by Employee Type

This query selects the vendor, product, and target asset network domain from events which can be correlated to an actor. The actor's employee type is also selected.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Group Membership Changes for Department

This query selects information from events indicating a user group membership change within an application. The search is limited to actors within the specified department.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Authorization Changes/

Weekly Proxy Trend

This query selects information needed to capture aggregated proxy usage over a week.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Activity Based Modeling by Department

This query selects the vendor, product, and target asset network domain from events which can be correlated to an actor. The actor's department is also selected.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Pending Stale Accounts

This query retrieves a list of pending stale account IDs with the associated actor and device information.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

Top Badged In Locations

This query selects the top locations that have the most number of successful building access events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Websites Accessed by Actor - Day

This query selects all the websites visited by the specific actor over the past day.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Failed Application Logins for Department

This query selects the actor's full name, device product, and count from events indicating a failed login to an application by an actor in the specified department.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Failed Server Logins for Department

This query selects the actor's full name, device product, and count from events indicating a failed login to a server by an actor in the specified department.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Departments with Badged In Actors

This query selects the top departments that have the most number of successful building access events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Average of Hourly Application Access

This query selects the actor's unique id, device product, hour, and count from events indicating a successful login by an actor having the specified role.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Application Logins for Role

This query selects the actor's full name, device product, and count from events indicating a successful login to an application by an actor having the specified role.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

All Activity for Department

This query selects the actor full name, vendor, product, event name, and count of all events that can be correlated to an actor belonging to the specified department.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Activity Based Modeling by Role

This query selects the vendor, product, and target asset network domain from events which can be correlated to an actor. The actor's role is also selected.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Top Proxy Users (Size)

This query selects the top users accessing websites by data transferred.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Accessed Websites

This query selects the top accessed web sites by number of events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Top Roles with Badged In Actors

This query selects the top roles that have the most number of successful building access events. For a role to be selected at least two actors must have the same role.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Successful Building Access Events Over the Past Week

This query selects successful building access events per day over the past week.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Failed Server Logins for Role

This query selects the actor's full name, device product, and count from events indicating a failed login to a server by an actor having the specified employee type.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Top Proxy Users

This query selects the top users accessing websites by number of events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Hourly Server Access Per User

This query selects the server name, hour, and count from events indicating a successful application login by the specified actor.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

UBM - Case Chart

This query selects cases per operational impact and stage.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Overview/

Top Countries with Badged In Actors

This query selects the top countries that have the most number of successful building access events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

Top Blocked Web Pages

This query selects the top blocked web pages by number of events.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Printing Volume in Bytes Review

This query selects printing volume in bytes by actor.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Printing/

Average of Hourly Server Access

This query selects the actor's unique id, device product, hour, and count from events indicating a successful login to a server by an actor having the specified role.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

All Activity for Employee Type - Chart

This query selects the application and count of all events that can be correlated to an actor having the specified employee type.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By User Attribute/

Daily Active Accounts

This query retrieves a list of pending stale account IDs with the associated actor and device information.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Stale Accounts/

URLs Accessed

This query selects the accessed URLs and the number of times they were accessed.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Web/

Total Number of Badged In Actors

This query selects the total number of currently badged in actors.

Query

ArcSight Solutions/UBM/User Activity Monitoring/By Application/Physical/

All UBM Cases

This query selects all cases in the UBM case group.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Overview/

IP Address to Actor Map

This session list tracks the IP addresses that can be associated with actors. Typically, these IP addresses will belong to single-user machines.

Session List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Weekly Proxy Activity

This weekly trend collects information needed to capture aggregated proxy usage.

Trend

ArcSight Solutions/UBM/User Activity Monitoring/

Proxy Activity

This hourly trend collects information needed to capture aggregated proxy usage.

Trend

ArcSight Solutions/UBM/User Activity Monitoring/

Building Access and Egress

This hourly trend captures the total number of building access and egress events.

Trend

ArcSight Solutions/UBM/User Activity Monitoring/

All Actions for Actor

This hourly trend collects aggregated information about events that might be attributable to actors.

Trend

ArcSight Solutions/UBM/User Activity Monitoring/

Privileged User Monitoring Use Case

The Privileged User Monitoring use case monitors the usage and authorization of privileged accounts.

The resources provided in the Privileged User Monitoring use case enable auditors, analysts, and managers to provide the following services:

This use case determines that actors have been added or removed from a privileged group by processing events from the sources:
-Events from devices
-Internal events indicating a manual change to an actor using the ESM Console
-Internal events indicating a change to an actor by the Actor Model Import connector

Devices

The following devices can supply events to this use case:

All devices listed above can supply events to this use case but the resources will only process events from devices, when the device generates events that can be attributed to specific actors.

Configure Resources

Configure the following types of resources for this use case:

Active Lists

The following active lists should be configured for this use case:

Rules

The following rules should be enabled for this use case:

Enable the Actor Added to Privileged Group rule for this use case. By default, this rule invokes the following action:

By default, the following action of this rule is disabled. You can optionally enable this action:

Enable the Monitor Actor Added to Privileged Group rule for this use case. By default this rule invokes the following actions:

Enable the Actor Removed From Privileged Group rule for this use case. By default, this rule invokes the following action:

By default, the following action of this rule is disabled. You can optionally enable this action:

The following rule can be enabled for this use case:

Enable the Actor Added and Removed From Privileged Group Within Short Time rule if you want to track when an actor has been added and then removed in a short amount of time. By default, this rule invokes the following actions:

By default, the following action of this rule is disabled. You can optionally enable this action:

Filters

Verify that the following filters detect events in your environment when an account is added or removed from a group:

Trends and Queries

Reports and query viewers in this use case are based on the following trends:

Before enabling the Threat Score Contributors trend, customize the following queries to reflect the privileged roles used in your environment:

All Actions for Actor—This trend is included with the User Activity Monitoring Use Case. Several resources in this use case require that this trend be enabled. Before enabling the Actor Changes trend, customize the query to reflect the privileged roles used in your environment.

Before enabling these trends, verify that these trends collect the expected events for your environment. In addition, you might want to customize the trends before enabling.

Verify Configuration

Verify that actors with privileged roles are detected:

  1. In the Navigator panel, go to Dashboards.
  2. Navigate to ArcSight Solutions/UBM/Privileged User Monitoring/.
  3. Right-click Privileged User Summary and select Show Dashboard.

Resources

The following table lists all the resources explicitly assigned to this use case and any dependent resources.

Resources that Support the Privileged User Monitoring Use Case

Resource

Description

Type

URI

Monitor Resources

Failed Privileged User Actions

This dashboard displays Failed Administrative Actions information.

Dashboard

ArcSight Solutions/UBM/Privileged User Monitoring/

Privileged User Summary

This dashboard shows some important aspects of actors added to privileged groups.

Dashboard

ArcSight Solutions/UBM/Privileged User Monitoring/

Unsuccessful Privileged User Logins

This dashboard displays information around failed privileged user logins.

Dashboard

ArcSight Solutions/UBM/Privileged User Monitoring/

Privileged User Activity

This query viewer displays the latest activity by privileged users.

Query Viewer

ArcSight Solutions/UBM/Privileged User Monitoring/

Actors with Privileged Roles

This query viewer shows actors with privileged roles and the total number of roles each such actor has.

Query Viewer

ArcSight Solutions/UBM/Privileged User Monitoring/

Threat Score Rule Firings for Non-Privileged Users

This query gets information about actor threat score correlation events for non-privileged users.

Query Viewer

ArcSight Solutions/UBM/Privileged User Monitoring/

Suspicious Activity by Privileged Users

This query viewer shows the latest information from all suspicious events that can be correlated to a privileged user.

Query Viewer

ArcSight Solutions/UBM/Privileged User Monitoring/

Non-Admins with Privileged Roles

This query viewer shows actors that have privileged roles but do not have Admin as part of their DN.

Query Viewer

ArcSight Solutions/UBM/Privileged User Monitoring/

Threat Score Rule Firings for Privileged Users

This query viewer gets information about actor threat score correlation events for privileged users.

Query Viewer

ArcSight Solutions/UBM/Privileged User Monitoring/

Successful Privileged User Logins for Role

This report shows a count of successful logins by privileged users with the specified roles.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Actor Added to Privileged Group

This report shows actors who were added to privileged groups such as the Administrators group.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Failed Privileged User Logins

This report shows a count of failed privileged user logins per actor.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Actor Removed from Privileged Group

This report shows actors who were removed from privileged groups such as the Administrators group.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Failed Privileged User Logins for Department

This report shows a count of failed logins by privileged users in the specified department.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Actor Added and Removed from a Privileged Group in a Short Time

This report shows events indicating an actor was added and removed from a privileged group in a short period of time.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Activity Summary for Privileged Actors

This report shows a count of the number of events for each privileged actor per product.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

All Privileged User Activity for Department

This report shows a summary of events that can be correlated to a privileged actor belonging to the specified department.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

All Privileged User Activity for Employee Type

This report shows a summary of events that can be correlated to a privileged actor having the specified employee type.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Successful Privileged User Logins for Department

This report shows a count of successful logins by privileged users in the specified department.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Activity Summary for Privileged Actors on the Threat Score List

This report shows a count of the number of events for each privileged actor that is on the threat score list per product.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

All Privileged User Activity for Role

This report shows a summary of events that can be attributed to a privileged user with a specified role.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Successful Privileged User Logins for Actor Full Name

This report shows a count of successful logins for the specified privileged user.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Failed Privileged User Logins for Role

This report shows a count of failed logins by privileged users with the specified roles.

Report

ArcSight Solutions/UBM/Privileged User Monitoring/

Library - Correlation Resources

Actor Added to Privileged Group

This rule triggers when an actor is assigned a privileged role.

Rule

ArcSight Solutions/UBM/Privileged User Monitoring/

Monitor Actor Added to Privileged Group

This rule creates an entry in an active list when an actor is added to privileged group. The active list is used to track additions and removals of actors to privileged groups in a short time period.

Rule

ArcSight Solutions/UBM/Privileged User Monitoring/

Actor Added and Removed From Privileged Group Within a Short Time

This rule detects when actors are added and then removed from a privileged group in a short period of time.

Rule

ArcSight Solutions/UBM/Suspicious Activity/Account Management/

Actor Removed From Privileged Group

This rule triggers when an actor is removed from a privileged role.

Rule

ArcSight Solutions/UBM/Privileged User Monitoring/

Library Resources

Actor Added to Privileged Group

This active list stores actors who were added to a privileged group. It helps detects when this privilege is added and then removed within a short period of time.

Active List

ArcSight Solutions/UBM/Privileged User Monitoring/

Privileged User Roles

This active list is used to define user groups with elevated privileges.

Active List

ArcSight Solutions/UBM/Privileged User Monitoring/

Increase Actor Threat Score

This active list contains a list of suspicious activity rules and their customizable threat scores. When an actor causes one of these rules to trigger, their threat score is increased by the rule's threat score as defined in this list.

Active List

ArcSight Solutions/UBM/Actor Threat Score/

Account Authenticators

This active list is used by the actor global variables to determine what the Identity Management authenticator is, base on the event, so that an actor can be determined from event information.

Active List

ArcSight System/Actor Data Support

Actor Threat Score

This list maintains a running threat score for actors exhibiting suspicious activity.

Active List

ArcSight Solutions/UBM/Actor Threat Score/

Network Domains

This is a solutions asset category.

Asset Category

ArcSight Solutions/UBM

Top 10 Privileged Users with Unsuccessful Logins

This data monitor displays privileged actor names with the most failed logins.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Failed Privileged User Actions by Username Moving Average

This data monitor shows a moving average of failed actions by privileged users.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Last 20 Actors Added to Privileged Groups

This data monitor shows the last 20 actors who were added to privileged groups.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Failed Privileged User Actions by Device Moving Average

This data monitor shows a moving average of failed privileged user actions per device.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Last 20 Failed Privileged User Action Events

This data monitor shows the last 20 failed privileged user actions.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Actors Added and Removed from Privileged Group in a Short Time

This data monitor show the last time an actor was added and removed from a privileged group in a short period of time.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Top 10 Privileged Users with Failed Actions

This data monitor shows the top 10 privileged users with failed actions in the last hour.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Top 10 Network Domains with Unsuccessful Privileged User Logins

This data monitor provides an ordered list of the Network Domains with the most privileged user login failures.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Top 10 Devices with Failed Privileged User Actions

This data monitor shows the top 10 devices products with failed actions by privileged users in the last hour.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Last 20 Unsuccessful Privileged User Logins

This data monitor provides a list of the last 20 unsuccessful privileged user logins.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

Top 10 Hosts with Unsuccessful Privileged User Logins

This data monitor displays the hosts with most unsuccessful privileged user logins.

Data Monitor

ArcSight Solutions/UBM/Privileged User Monitoring/

ActorByAccountID

This global variable maps the account information in an event with an actor. The account information consists of the device vendor and product, and information derived from the attacker or target user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ActorFromIPMap

This global variable returns an actor's UUID, full name, username used, and login type if the actor is associated with a source IP address.

Global Variable

ArcSight Solutions/UBM/Actor Attribution by IP Address/

ActorByAttackerUserName

This variable maps the account information in an event with an actor. The account information consists of the device vendor, device product, connector address, connector zone, and information derived from the attacker user name.

Global Variable

ArcSight Solutions/UBM/Core Variables

solnPatternDiscoveryConst

This variable returns a constant string that can be used in Pattern Discovery profiles when it is not required to specify either a Source or a Target event field.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ARST_IDV_ActorUUIDByAuditOrBaseEvt

This global variable retrieves the Actor UUID from an audit, base, or correlation event.

Global Variable

ArcSight Solutions/UBM/Privileged Users/

ActorByTargetUserName

This variable maps the account information in an event with an actor. The account information consists of the device vendor, device product, connector address, connector zone, and information derived from the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables

ARST_IDV_DeletedRole

This global variable returns the deleted role from actor audit events.

Global Variable

ArcSight Solutions/UBM/Actor Management/

ARST_IDV_ActorFullNameByAuditOrBaseEvt

This global variable retrieves the actor Full Name from an audit, base or correlation event.

Global Variable

ArcSight Solutions/UBM/Privileged Users/

solnGetAuthenticator

This global variable extracts the authenticator from the event by looking up the Account Authenticators list using event fields.

Global Variable

ArcSight Solutions/UBM/Core Variables/

solnGetUsername

This global variable returns user name in an event from target user name or attacker user name, with preference to the target user name.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ARST_IDV_getAuthenticator

This global variable gets the default authenticator for the event.

Global Variable

ArcSight Solutions/UBM/Core Variables/

ARST_IDV_ActorFromAuditEvt

This global variable returns the modified Actor from actor audit events.

Global Variable

ArcSight Solutions/UBM/Privileged Users/

ARST_IDV_AddedRole

This global variable returns the added role from actor audit events.

Global Variable

ArcSight Solutions/UBM/Actor Management/

ARST_IDV_ActorByDeviceCustomString6

This global variable retrieves the actor using account information in deviceCustomString6. This can be useful for event Ids 632, 636 and 660 in Windows 2003.

Global Variable

ArcSight Solutions/UBM/Privileged Users/

Events with ActorByAccountID

This field set selects the fields appropriate for viewing events correlated with actor and can be customized for the UBM active channels.

Field Set

ArcSight Solutions/UBM/Core/

Actor Added and Removed from a Privileged Group in a Short Time

This filter identifies correlation events indicating an actor was added and removed from a privileged role within a short time.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Failed Privileged User Actions

This filter identifies failed actions by privileged users.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Target Username is a System Account

This filter selects events in which the target user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Successful Logins

This filter identifies successful logins by both administrative and non-administrative users across a variety of operating systems (Unix, Windows 2003, Windows 2008).

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Member Removed from Privileged Group

This filter identifies events indicating a user was removed from a privileged group as defined by the Privileged User Roles active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Member Added to Privileged Group - Windows

This filter selects events indicating a Windows object was added to a privileged group. Privileged groups are defined in the Privileged User Groups active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

ActorByAttackerUserName is NULL

This filter selects events which cannot be attributed to an actor based on the attacker user name field.

Filter

ArcSight Solutions/UBM/Core Filters/

Login Attempts

This filter selects any attempts at logging into systems. It excludes machine logins into Microsoft Windows systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

All Failed Logins

This filter selects all events indicating that a user failed authentication.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Actor Removed from Privileged Group

This filter identifies actors who were removed from a privileged role.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Attacker User Is Privileged User

This filter checks whether the attacker user is an administrator.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Attacker User Name is a System Account

This filter selects events in which the attacker user name is a system account.

Filter

ArcSight Solutions/UBM/My Filters/

Suspicious Activity

This filter selects events indicating suspicious activity that merits investigation.

Filter

ArcSight Solutions/UBM/Suspicious Activity/General Security/

Member Removed from Privileged Group - Windows 2008

This filter identifies Windows 2008 events that indicate a user is removed from a domain local, global or universal security group. These groups are defined in the Privileged User Roles active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Member Removed from Privileged Group - Windows

This filter selects events indicating a Windows object was removed from a privileged group. Privileged groups are defined in the Privileged User Groups active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Windows 2008 Authentication Ticket Request

This filter identifies Microsoft Windows 2008 events which indicate that a Kerberos authentication ticket was requested.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Attacker User Name is NOT NULL

This filter selects events in which the attacker user name field is populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Actor from Audit Event is NOT NULL

This filter checks if an actor can be retrieved from an actor audit event.

Filter

ArcSight Solutions/UBM/Core Filters/

Privileged Role Added (Audit Event)

This filter identifies when a privileged role is added to an actor, based on the actor audit event.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Unsuccessful Privileged User Login

This filter identifies events that indicate unsuccessful logins by a privileged user.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Actor Audit Events - Role Changes

This filter selects actor audit events generated by ESM when an actor resource's role attribute is updated.

Filter

ArcSight Solutions/UBM/Actor Management/

Actor Added to Privileged Group

This filter identifies actors who were given a privileged role.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Windows 2003 Authentication Ticket Request

This filter identifies Microsoft Windows Kerberos Authentication Ticket Request events. These events are generated when a user logs into an Active Directory domain.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Privileged Actor Activity Excluding Common Events

This filter selects events, that are not common such as login events and can be attributable to actors having a privileged role such as administrator or dba. This filter is primarily used in pattern discovery profiles to find patterns of uncommon activity across privileged users. Modify this filter as needed to exclude other common events.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Member Added to Privileged Group - Windows 2003

This filter identifies Windows 2003 events that indicate a user has added to a domain local, global or universal security group. These groups are defined in the Privileged User Roles active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Windows Events with a Non-Machine User

This filters identified Microsoft Windows events that have a non machine/system user either in the attacker or the target fields.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Member Removed from Privileged Group - Windows 2003

This filter identifies Windows 2003 events that indicate a user is removed from a domain local, global or universal security group. These groups are defined in the Privileged User Roles active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Privileged Actor Activity

This filter selects events attributable to actors having a privileged role such as administrator or dba.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Unsuccessful Logins

This filter identifies failed logins attempts.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Target User Name is NOT NULL

This filter selects events in which the attacker user name field is populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Login Attempts

This filter selects any attempts at logging into systems. It excludes machine logins into Microsoft Windows systems.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Successful Logins - Unix

This filter identifies successful login attempts to Unix machines.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Actor Audit Events - Role Added

This filter selects actor audit events generated by ESM when an actor resource's role attribute is added.

Filter

ArcSight Solutions/UBM/Actor Management/

Windows Events with a Non-Machine User

This filters identified Microsoft Windows events that have a non machine/system user either in the attacker or the target fields.

Filter

ArcSight Solutions/UBM/User Activity Monitoring/Login Events/

Actor Audit Events - Role Deleted

This filter selects actor audit events generated by ESM when an actor resource's role attribute is deleted.

Filter

ArcSight Solutions/UBM/Actor Management/

ActorByAttackerUserName is NOT NULL

This filter selects events in which the attacker user name field is populated, and the event can be attributed to an actor based on that field.

Filter

ArcSight Solutions/UBM/Core Filters/

Threat Score Contributors

This filter selects rule trigger events that contribute to the Actor Threat Score.

Filter

ArcSight Solutions/UBM/Actor Threat Score/

Privileged Role Removed (Audit Event)

This filter identifies when a privileged role is removed from an actor, based on the actor audit event.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Target User Name is NULL

This filter selects events in which the target user name field is not populated.

Filter

ArcSight Solutions/UBM/Core Filters/

Member Added to Privileged Group - Windows 2008

This filter identifies Windows 2008 events that indicate a user is added to a domain local, global or universal security group. These groups are defined in the Privileged User Roles active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Windows Events

This filter selects all events in which the device product field is Microsoft Windows.

Filter

ArcSight Solutions/UBM/Core Filters/

Actor Audit Events

This filter selects all actor audit events generated by ESM when an actor resource is updated.

Filter

ArcSight Solutions/UBM/Actor Management/

Member Added to Privileged Group

This filter identifies when a user is added to a privileged group as defined in the Privileged User Roles active list.

Filter

ArcSight Solutions/UBM/Privileged User Monitoring/

Privileged Role Additions

This profile can be used to detect patterns of privileged role additions.

Profile

ArcSight Solutions/UBM/Privileged User Monitoring/

Privileged Role Deletions

This profile can be used to detect patterns of privileged role deletions.

Profile

ArcSight Solutions/UBM/Privileged User Monitoring/

Privileged User Activity - Title

This pattern discovery profile identifies patterns in the activity of privileged users across job title. By default, patterns will be identified when the same set of two or more events are seen across two or more different privileged job titles. The events processed by this profile must have a username present that can be attributed to an actor that belongs to privileged groups.

Profile

ArcSight Solutions/UBM/Privileged User Monitoring/

Privileged User Activity

This pattern discovery profile identifies patterns in the activity of privileged users. By default, patterns will be identified when the same set of two or more events are seen from two or more different privileged actors. The events processed by this profile must have a username present that can be attributed to an actor that belongs to privileged groups.

Profile

ArcSight Solutions/UBM/Privileged User Monitoring/

Successful Privileged User Logins for Role

This query selects events indicating successful logins by a privileged user with a particular role.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

All Activity for Privileged Employee Type

This query gets a summary of events that can be correlated to a privileged actor having the specified employee type.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Actor Added and Removed from a Privileged Group in a Short Time

This query selects correlation events that indicate an actor was added and removed from a privileged group within a short period of time.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Successful Privileged User Logins for Full Name

This query selects events indicating successful logins by a privileged user with a particular full name.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Actor Added to Privileged Group

This query retrieves actors who were added to privileged groups, indicating they were given a privileged role.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

All Privileged User Activity for Role

This query gets a summary of events that can be correlated to an actor having the specified role.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Actor Removed from Privileged Group

This query retrieves actors who were removed from privileged groups, indicating they were removed from a privileged role.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

All Activity for Privileged Employee Type - Chart

This query selects the application and count of all events that can be correlated to a privileged actor having the specified employee type.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Non Admins with Privileged Roles - Summary

This query selects actors that have privileged roles but do not have Admin as part of their DN.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Actions for Privileged Users - Trend

This query selects all actions that can be attributable to privileged users.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Privileged User Activity

This query displays the latest events that include a privileged user.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Actors with Privileged Roles - Summary

This query queries actors with privileged roles and shows the total number of roles each such actor has.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Threat Score Contributors - Trend

This query gets aggregated information about correlation events for rules that contribute to an actor's threat score.

Query

ArcSight Solutions/UBM/Actor Threat Score/

Failed Privileged User Logins for Role

This query selects events indicating a failed login by a privileged user with a particular role.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

All Privileged Activity for Department - Chart

This query selects the application and count of all events that can be correlated to a privileged user belonging to the specified department.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Suspicious Activity by Privileged Users

This query selects the latest information from all suspicious events that can be attributed to a privileged user.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Threat Score Rule Firings for Privileged Users

This query gets information about actor threat score correlation events for privileged users.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Failed Privileged User Logins

This query selects events indicating a failed login by a privileged user.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Activity Summary for Privileged Actors on the Threat Score List

This query counts the number of events for each privileged actor on the threat score list per product.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Threat Score Rule Firings for Non-Privileged Users

This query gets information about actor threat score correlation events for non-privileged users.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

All Actions for Actor

This query gets aggregated information about events that might be attributable to actors.

Query

ArcSight Solutions/UBM/User Activity Monitoring/Overview/

All Privileged Activity for Department

This query gets a summary of events that can be correlated to a privileged actor belonging to the specified department.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Successful Privileged User Logins for Department

This query selects events indicating a successful login by a privileged user in a particular department.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Failed Privileged User Logins for Department

This query selects events indicating a failed login by a privileged user in a particular department.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Threat Score Rule Firings for Privileged Users - Trend

This query gets information about actor threat score correlation events for privileged users.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

Activity Summary for Privileged Actors

This query counts the number of events for each privileged actor per product.

Query

ArcSight Solutions/UBM/Privileged User Monitoring/

IP Address to Actor Map

This session list tracks the IP addresses that can be associated with actors. Typically, these IP addresses will belong to single-user machines.

Session List

ArcSight Solutions/UBM/Actor Attribution by IP Address/

Privileged User Actions

This hourly trend collects aggregated information about events that might be attributable to privileged users.

Trend

ArcSight Solutions/UBM/Privileged User Monitoring/

Threat Score Contributors for Privileged Users

This trend captures a summary of all the rules that triggered and contribute to the threat scores of privileged users.

Trend

ArcSight Solutions/UBM/Privileged User Monitoring/

All Actions for Actor

This hourly trend collects aggregated information about events that might be attributable to actors.

Trend

ArcSight Solutions/UBM/User Activity Monitoring/

Threat Score Contributors

This trend captures a summary of all rules that trigger and contribute to the threat scores of actors.

Trend

ArcSight Solutions/UBM/Actor Threat Score/