|
NOTE: The BuiltinPlugin is associated with this condition and provides important settings. |
Categorized as a Behavior condition, this type of condition always causes the risk score to increase if the authentication is determined to be abnormal. The following parameters are available:
Parameter | Description | Associated default condition |
---|---|---|
Identifier |
Enter a name for the condition. |
Abnormal Authentication (Default) |
Description |
Enter a description for the condition. |
Authentication deviated from previously established pattern. |
Period, Minutes |
The number of minutes to check for failed authentication attempts. A maximum of 9999 minutes can be checked. |
60 |
Maximum Attempts |
The maximum number of failed authentication attempts to allow for a user within the specified time period (Period, Minutes parameter). A maximum of 7 attempts are allowed. |
3 |
The following procedure explains how the Security Analytics Engine checks the access attempts to determine if it is abnormal authentication behavior for the user.
How the Security Analytics Engine checks for abnormal authentication
|
NOTE: The BuiltinPlugin is associated with this condition and provides important settings. |
Categorized as a Behavior condition, this type of condition always causes the risk score to increase if the access request does not fall within the normal access time pattern previously established by the user. The following parameters are available:
Parameter | Description | Associated default condition |
---|---|---|
Identifier |
Enter a name for the condition. |
Abnormal Time (Default) |
Description |
Enter a description for the condition. |
Request failed to follow normal time pattern established by the user. |
Days To Check |
The number of days to check the access times for a user. For example, if set to 3 the data from the last three days is used for comparison. A maximum of 365 days can be checked. |
30 |
Minimum Count |
The minimum number of access times required to establish a normal access time. This cannot exceed 99 access times. |
1 |
Tolerance, Hours |
The number of hours before and after the access time to accept. For example, if the user habitually logs in at 8 a.m. and the tolerance is set to 1, any time between 7 a.m. and 9:59 a.m. is considered acceptable. The maximum tolerance setting is 12 hours. |
1 |
The following procedure explains how the Security Analytics Engine checks the time of an access attempt to determine if it is an abnormal access time for the user.
How the Security Analytics Engine checks for an abnormal time
The Security Analytics Engine gathers the normal access time information and checks the current access attempt to see if it falls within the pattern established by the user. If this check returns as true (there is both enough data to determine an access pattern and the access attempt fits within this pattern), the access time is considered normal and the risk score is not affected.
|
NOTE: This condition is associated with the SonicWALLPlugin type which requires that the Security Analytics Engine Installer - SonicWALL Processor Service.msi and SonicWALL firewall be installed and configured. See the Security Analytics Engine SonicWALL Configuration Guide for more information. |
|
NOTE: The SonicWALLPlugin is associated with this condition and provides important settings. |
Categorized as a Behavior condition, this type of condition always causes the risk score to increase if the user or IP address is associated with a configured application category. The following parameters are available:
Parameter | Description | Associated default condition | ||
---|---|---|---|---|
Identifier |
Enter a name for the condition. |
Associated w/ Application Category (Default) | ||
Description |
Enter a description for the condition. |
Application category association detected for the user or IP address. | ||
Days To Check |
The number of days to check for application category association. A maximum of 365 days can be checked. |
7 | ||
Minimum Count |
The minimum number of times an application category has been detected per day. This must be a value between 1-9999. |
1 | ||
Minimum Days |
The minimum number of days that meet the Minimum Count criteria. A maximum of 365 days can be entered. The number of days entered must be equal to or lower than the Days To Check parameter. |
1 | ||
Categories |
Select the application categories from the drop-down menu to check for association. Although an initial list of categories is automatically displayed, additional time is required for the list to update once the SonicWALL firewall is integrated with the Security Analytics Engine. Depending on the configuration, fully populating the list should take 10 to 60 minutes. |
8 item(s) selected - BACKUP-APPS, DOWNLOAD-APPS, GAMING, P2P, PROXY-ACCESS, REMOTE-ACCESS, REMOTE-DEBUG, SCADA-APPS
|
The following procedure explains how the Security Analytics Engine checks the username and IP address attempting to access an application for an application category association.
How the Security Analytics Engine checks for application category association
A user attempts to access an application that uses an Associated w/ Application Category condition type to check if the username or IP address is associated with the specified application categories.
|
NOTE: If there is no user ID or IP address available, or the IP address is in a configured DynamicNetwork range, checking the selected application categories is not relevant. Therefore, the request is considered not associated with a category and the risk score is not affected. |
|
NOTE: This condition is associated with the SonicWALLPlugin type which requires that the Security Analytics Engine Installer - SonicWALL Processor Service.msi and SonicWALL firewall be installed and configured. See the Security Analytics Engine SonicWALL Configuration Guide for more information. |
|
NOTE: The SonicWALLPlugin is associated with this condition and provides important settings. |
Categorized as a Behavior condition, this type of condition always causes the risk score to increase if the user or IP address is associated with a configured application threat level. The following parameters are available:
Parameter | Description | Associated default condition |
---|---|---|
Identifier |
Enter a name for the condition. |
Associated w/ Application Threat Level (Default) |
Description |
Enter a description for the condition. |
Application threat level association detected for the user or IP address. |
Days To Check |
The number of days to check for application threat level association. A maximum of 365 days can be checked. |
7 |
Minimum Count |
The minimum number of times a threat level has been detected per day. This must be a value between 1 to 9999. |
1 |
Minimum Days |
The minimum number of days that meet the Minimum Count criteria. A maximum of 365 days can be entered. The number of days entered must be equal to or lower than the Days To Check parameter. |
1 |
Threat Level |
Select an application threat level to monitor for:
|
High |
Include Higher Threat Levels |
Select this check box to include any threat levels returned that are higher than the one selected. |
(Selected) |
The following procedure explains how the Security Analytics Engine checks the username and IP address attempting to access an application for an application threat level association.
How the Security Analytics Engine checks for application threat level association
A user attempts to access an application that uses an Associated w/ Application Threat Level condition type to check if the username or IP address is associated with the specified application threat level(s).
|
NOTE: If there is no user ID or IP address available, or the IP address is in a configured DynamicNetwork range, checking the selected application threat levels is not relevant. Therefore, the request is considered not associated with a threat level and the risk score is not affected. |
© 2024 One Identity LLC. ALL RIGHTS RESERVED. Términos de uso Privacidad Cookie Preference Center