Using Splunk User Behavior Analytics
Using Splunk User Behavior Analytics
External Threat Feeds: FS-ISAC, Collective Intelligence Splunk UBA adds automation to either a standalone
Framework (CIF), etc. enterprise deployment or an enterprise security
deployment. In an enterprise security deployment, it
Cloud Applications: AWS CloudTrail, Box,
automatically pushes threat information into Splunk
Office 365, etc.
ES, which then becomes a notable event. Threats
Endpoint: application and security logs from laptops, discovered by Splunk UBA will be taken into account
desktops and servers or third party endpoint solutions as part of the risk scoring algorithms within Splunk
ES. This enables Splunk Enterprise Security users
Custom Apps: live event streaming via JavaScript, to continue leveraging the Splunk ES Risk Scoring
Java, REST, Syslog Framework and Splunk ES Incident Review workflow
for threat management. In addition, all Splunk UBA
Automated Continuous Threat Monitoring anomalies are also fed into Splunk ES for additional
Splunk UBA visualizes threats along the kill chain insight. This combined solution offers prevention,
and provides supporting evidence so that the detection and response capabilities.
security analyst can take immediate action based
on a prioritized list of significant threats to
investigate. This approach avoids overloading the
analyst with alerts and false positives.
Download Splunk for free or get started with the free cloud trial. Whether cloud, on-premises, or for large or small teams,
Splunk has a deployment model that will fit your needs.
© 2017 Splunk Inc. All rights reserved. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light
and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,
product names, or trademarks belong to their respective owners. TB-Splunk-UBA-103