Overview of Risk Analytics for UEBA category

This document provides an overview of the rule sets in the Risk Analytics for UEBA category, the required data, and configuration you can use to tune the alerts generated by each rule set. These rule sets help identify threats in Google Cloud environments using Google Cloud data.

Rule set descriptions

The following rule sets are available in the Risk Analytics for UEBA category and are grouped by the type of patterns detected:

Authentication

  • New Login by User to Device: a user logged into a new device.
  • Anomalous Authentication Events by User: a single user entity had anomalous authentication events recently, compared to historical usage.
  • Failed Authentications by Device: a single device entity had many failed login attempts recently, compared to historical usage.
  • Failed Authentications by User: a single user entity had many failed login attempts recently, compared to historical usage.

Network traffic analysis

  • Anomalous Inbound Bytes by Device: significant amount of data recently uploaded to single device entity, compared to historical usage.
  • Anomalous Outbound Bytes by Device: significant amount of data recently downloaded from a single device entity, compared to historical usage.
  • Anomalous Total Bytes by Device: a device entity recently uploaded and downloaded a significant amount of data, compared to historical usage.
  • Anomalous Inbound Bytes by User: a single user entity recently downloaded a significant amount of data, compared to historical usage.
  • Anomalous Total Bytes by User: a user entity recently uploaded and downloaded a significant amount of data recently, compared to historical usage.
  • Brute Force then Successful Login by User: a single user entity from one IP address had several failed authentication attempts to a certain application before successfully logging in.

Peer group-based detections

  • Login from Country Never Before Seen for a User Group: the first successful authentication from a country for a user group. This uses group display name, user department, and user manager information from AD Context data.

  • Login to an Application Never Before Seen for a User Group: the first successful authentication to an application for a user group. This uses user title, user manager, and group display name information from AD Context data.

  • Anomalous or Excessive Logins for a Newly Created User: anomalous or excessive authentication activity for a recently created user. This uses creation time from AD Context data.

  • Anomalous or Excessive Suspicious Actions for a Newly Created User: anomalous or excessive activity (including, but not limited to, HTTP telemetry, process execution, and group modification) for a recently created user. This uses creation time from AD Context data.

Suspicious actions

  • Excessive Account Creation by Device: a device entity created several new user accounts.
  • Excessive Alerts by User: a large number of security alerts from an antivirus or endpoint device (for example, connection was blocked, malware was detected) were reported about a user entity, which was much greater than historical patterns. These are events where the security_result.action UDM field is set to BLOCK.

Data loss prevention-based detections

  • Anomalous or Excessive Processes with Data Exfiltration Capabilities: anomalous or excessive activity for processes associated with data exfiltration capabilities such as keyloggers, screenshots, and remote access. This uses file metadata enrichment from VirusTotal.

Required data needed by Risk Analytics for UEBA category

The following section describes the data needed by rule sets in each category to get the greatest benefit. For a list of all supported default parsers, see Supported log types and default parsers.

Authentication

To use any of these rule sets, collect log data from either Azure AD Directory Audit (AZURE_AD_AUDIT) or Windows Event (WINEVTLOG).

Network traffic analysis

To use any of these rule sets, collect log data that captures network activity. For example, from devices such as FortiGate (FORTINET_FIREWALL), Check Point (CHECKPOINT_FIREWALL), Zscaler (ZSCALER_WEBPROXY), CrowdStrike Falcon (CS_EDR), or Carbon Black (CB_EDR).

Peer group-based detections

To use any of these rule sets, collect log data from either Azure AD Directory Audit (AZURE_AD_AUDIT) or Windows Event (WINEVTLOG).

Suspicious actions

Rule sets in this group each use a different type of data.

Excessive Account Creation by Device rule set

To use this rule set, collect log data from either Azure AD Directory Audit (AZURE_AD_AUDIT) or Windows Event (WINEVTLOG).

Excessive Alerts by User rule set

To use this rule set, collect log data that captures endpoint activities or audit data, such as that recorded by CrowdStrike Falcon (CS_EDR), Carbon Black (CB_EDR), or Azure AD Directory Audit (AZURE_AD_AUDIT).

Data loss prevention-based detections

To use any of these rule sets, collect log data that captures process and file activities, such as that recorded by CrowdStrike Falcon (CS_EDR), Carbon Black (CB_EDR), or SentinelOne EDR (SENTINEL_EDR).

Rule sets in this category depend on events with the following metadata.event_type values: PROCESS_LAUNCH, PROCESS_OPEN, PROCESS_MODULE_LOAD.

Tuning alerts returned by rule sets this category

You can reduce the number of detections a rule or rule set generates using rule exclusions.

A rule exclusion defines the criteria used to exclude an event from being evaluated by the rule set, or by specific rules in the rule set. Create one or more rule exclusions to help reduce the volume of detections. See Configure rule exclusions for information about how to do this.

What's next