Skip to main content
Skip table of contents

User and Entity Behavior Analytics Module

To avoid a data breach, your organization must detect and respond quickly to anomalous activity. User and entity behavior analytics (UEBA) can help you monitor for known threats and behavioral changes in user data, providing critical visibility to uncover user-based threats that might otherwise go undetected.


LogRhythm UEBA module and CloudAI:

  • Use metadata processed by the SIEM from diverse sources to provide clean sets for effective analytics.
  • Offer a true view of the identity of users and hosts — not just disparate identifiers.
  • Detect potential threats by applying full-spectrum analytics
  • Seamlessly integrate with the other LogRhythm tools so you can streamline the response using integrated playbooks, guided workflows, and approval-driven task automation.

The User and Entity Behavior Analytics Module (UEBAM) is a collection of AI Engine rules (deterministic rules) designed to detect potential malicious user activity that is occurring within your organization. CloudAI is an advanced UEBA solution that leverages machine learning (ML) to perform anomaly detection in order to surface potential threats that could otherwise go undetected due to its complexity.

The UEBA Module contains licensed content that is available only to customers with a valid subscription.

Module Revisions

The following table summarizes the changes that have been made since the last release (v2) of the User and Entity Behavior Module.

AIE Rule ID

AIE Rule Name

New

1490

Exfiltration: CloudAI and File (NGFW) Detection

1491

Exfiltration: CloudAI and Sensitive Data (NGFW) Detection

Modified

1245

Attainment: Abnormal File Access

1246

Attainment: Corroborated Account Anomalies

1247

C2: Abnormal Origin Location

1248

Compromise: Abnormal Process Activity

1249

C2: Blacklist Location Auth

1250

Compromise: Concurrent Authentication Success from Multiple Locations

1251

Recon: Linux sudo Privilege Escalation

1252

Compromise: Windows RunAs Privilege Escalation

1253

Compromise: Auth After Numerous Failed Auths

1254

Compromise: Auth After Security Event

1255

Compromise: Distributed Brute Force

1256

Compromise: External Brute Force Auths

1257

Compromise: Lateral Movement With Account Sweep

1258

Corruption: Audit Disabled by Admin

1259

Disruption: Files Deleted by Admin

1260

Lateral: Abnormal Auth Behavior

1261

Compromise: Account Added to Admin Group

1262

Lateral: Admin Password Modified

1263

Lateral: Auth After Dispersed Failed Auths

1264

Lateral: Brute Force Internal Auth Failure

1265

Lateral: External Attack then Account Creation

1266

Lateral: Failed Auths then Success

1267

Lateral: Internal Attack then Account Creation

1268

Lateral: Internal Recon then Account Creation

1269

Lateral: Multiple Account Passwords Modified by Admin

1270

Lateral: Numerous and Dispersed Internal Failed Auths

1271

Lateral: Numerous Internal Failed Auths

1272

Lateral: Password Modified by Admin

1273

Lateral: Privilege Escalation after Attack

1278

Compromise: CloudAI Multiple User Threat Events

1279

Recon: Disabled Account Auth Failures

1281

Recon: Failed External Auth to Multiple Hosts

1282

Recon: Failed External Auth from Multiple Hosts

1283

Recon: Multiple Lockouts

1284

Progression: to Initial Compromise

1285

Progression: to Command and Control

1286

Progression: to Lateral Movement

1287

Progression: to Target Attainment

1288

Progression: to Exfil, Corruption, Disruption

1289

Progression: to Initial Compromise

1290

Progression: to Command and Control

1291

Progression: to Lateral Movement

1292

Progression: to Target Attainment

1293

Progression: to Exfil, Corruption, Disruption

1294

Progression: to Initial Compromise

1295

Progression: to Command and Control

1296

Progression: to Lateral Movement

1297

Progression: to Target Attainment

1298

Progression: to Exfil, Corruption, Disruption

1299

Compromise: Log Cleared

1300

Compromise: Security Event then Process Starting

1301

Compromise: System Time Change

1302

Compromise: Unusual Auth then Unusual Process

1303

Compromise: Security Event then Scheduled Task

1304

Lateral: Locally Created and Used

1305

Compromise: Change to Host File

1306

Disruption: Critical Windows Binaries Modified/Deleted

1307

Compromise: CloudAI and Recent User Location

1308

Compromise: CloudAI and Location Watch List

1309

Compromise: CloudAI and User Recently Added to a Privileged Group

1310

Compromise: CloudAI and User related Security Classification Event

1336

Compromise: CloudAI Threat Event and Identity Lists

 Unchanged

1312

Compromise: CloudAI Threat Event

Removed

N/A
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.