User Guide: Ibm Qradar User Behavior Analytics (Uba) App
User Guide: Ibm Qradar User Behavior Analytics (Uba) App
User Guide: Ibm Qradar User Behavior Analytics (Uba) App
app
Version 3.7.0
User Guide
IBM
Note
Before you use this information and the product that it supports, read the information in “Notices” on
page 281.
Product information
This document applies to IBM® QRadar® Security Intelligence Platform V7.3.2 and subsequent releases unless
superseded by an updated version of this document.
Chapter 5. Administering..................................................................................... 41
Assigning user capabilities for the QRadar UBA app................................................................................ 41
Creating watchlists.................................................................................................................................... 41
Viewing the allowlist for trusted users......................................................................................................43
Managing network monitoring tools..........................................................................................................43
Managing restricted programs.................................................................................................................. 44
Adding log sources to the trusted log source group................................................................................. 44
New accounts.............................................................................................................................................44
Dormant accounts......................................................................................................................................45
Chapter 6. Tuning................................................................................................ 49
Enabling indexes to improve performance............................................................................................... 49
Integrating new or existing QRadar content with the UBA app............................................................... 50
Integrate dynamic content in V3.5.0 and later................................................................................... 50
Integrate content into UBA V3.4.0 and earlier....................................................................................51
Reference sets........................................................................................................................................... 52
iii
Installing and configuring UBA instances to support multitenancy.........................................................60
Installing and configuring Machine Learning in Multitenancy.................................................................. 61
UBA user roles for multitenancy............................................................................................................... 62
Rules and tuning for multitenancy in UBA................................................................................................ 64
iv
UBA : Browsed to Scam/Questionable/Illegal Website....................................................................133
UBA : Browsed to Social Networking Website.................................................................................. 134
UBA : Browsed to Uncategorized Website........................................................................................ 136
UBA: User Accessing Risky URL.........................................................................................................137
Cloud........................................................................................................................................................ 139
UBA : Anonymous User Accessed a Resource.................................................................................. 139
UBA : AWS Console Accessed by Unauthorized User....................................................................... 139
UBA : External User Failed Mailbox Login..........................................................................................140
UBA : Failed to Set Mailbox Audit Logging Bypass............................................................................140
UBA : Inbox Set to Forward to External Inbox.................................................................................. 141
UBA : Internal User Failed Mailbox Login Followed by Success.......................................................141
UBA : Mailbox Permission Added and Deleted in a Short Period of Time........................................ 142
UBA : Non-Standard User Accessing AWS Resources...................................................................... 142
UBA : Sharing Link Sent to Guest.......................................................................................................143
UBA : Sharing Policy Changed or Shared External (SharePoint/OneDrive)...................................... 143
UBA : User Added to a Group on SharePoint or OneDrive by Site Admin.........................................144
UBA : User Failed to be Added to Role.............................................................................................. 144
Domain controller.................................................................................................................................... 144
UBA : DPAPI Backup Master Key Recovery Attempted.................................................................... 144
UBA : Kerberos Account Enumeration Detected...............................................................................145
UBA : Multiple Kerberos Authentication Failures from Same User.................................................. 145
UBA : Non-Admin Access to Domain Controller............................................................................... 146
UBA : Pass the Hash...........................................................................................................................147
UBA : Possible Directory Services Enumeration............................................................................... 148
UBA : Possible SMB Session Enumeration on a Domain Controller................................................. 148
UBA : Possible TGT Forgery............................................................................................................... 149
UBA : Possible TGT PAC Forgery........................................................................................................149
UBA : Replication Request from a Non-Domain Controller.............................................................. 150
UBA : TGT Ticket Used by Multiple Hosts......................................................................................... 150
Endpoint...................................................................................................................................................151
UBA : Detect Insecure Or Non-Standard Protocol............................................................................ 151
UBA : Detect Persistent SSH session................................................................................................ 152
UBA : Internet Settings Modified....................................................................................................... 154
UBA : Malware Activity - Registry Modified In Bulk.......................................................................... 156
UBA : Netcat Process Detection (Linux)............................................................................................ 157
UBA : Netcat Process Detection (Windows)......................................................................................158
UBA : Process Executed Outside Gold Disk Whitelist (Linux)........................................................... 159
UBA : Process Executed Outside Gold Disk Whitelist (Windows).....................................................161
UBA : Ransomware Behavior Detected............................................................................................. 162
UBA : Restricted Program Usage....................................................................................................... 163
UBA : User Installing Suspicious Application....................................................................................164
UBA : User Running New Process......................................................................................................166
UBA : Volume Shadow Copy Created................................................................................................ 167
Exfiltration................................................................................................................................................168
UBA : Data Exfiltration by Cloud Services......................................................................................... 168
UBA : Data Exfiltration by Print.......................................................................................................... 169
UBA : Data Exfiltration by Removable Media.................................................................................... 169
UBA : Data Loss Possible................................................................................................................... 170
UBA : Initial Access Followed by Suspicious Activity....................................................................... 171
UBA : Large Outbound Transfer by High Risk User........................................................................... 172
UBA : Multiple Blocked File Transfers Followed by a File Transfer..................................................172
UBA : Potentially Compromised Account.......................................................................................... 174
UBA : Suspicious Access Followed by Data Exfiltration....................................................................174
UBA : Suspicious Activity Followed by Exfiltration........................................................................... 175
UBA : User Potentially Phished..........................................................................................................176
Geography................................................................................................................................................177
UBA : Anomalous Account Created From New Location.................................................................. 177
UBA : Anomalous Cloud Account Created From New Location........................................................ 180
v
UBA : User Access from Multiple Locations...................................................................................... 181
UBA : User Access from Prohibited Location.................................................................................... 183
UBA : User Access from Restricted Location.................................................................................... 185
UBA : User Geography Change.......................................................................................................... 186
UBA : User Geography, Access from Unusual Locations.................................................................. 188
Network traffic and attacks..................................................................................................................... 190
UBA : D/DoS Attack Detected............................................................................................................ 190
UBA : Honeytoken Activity................................................................................................................. 191
UBA : Network Traffic : Capture, Monitoring and Analysis Program Usage..................................... 192
QRadar DNS Analyzer.............................................................................................................................. 193
UBA : Potential Access to Blacklist Domain...................................................................................... 193
UBA : Potential Access to DGA Domain.............................................................................................193
UBA : Potential Access to Squatting Domain.................................................................................... 194
UBA : Potential Access to Tunneling Domain....................................................................................195
Threat intelligence...................................................................................................................................195
UBA : Detect IOCs For Locky............................................................................................................. 195
UBA : Detect IOCs for WannaCry....................................................................................................... 196
UBA : Multiple Sessions to Monitored Log Sources (NIS Directive)................................................. 196
UBA : ShellBags Modified By Ransomware....................................................................................... 197
UBA : User Accessing Risky IP, Anonymization.................................................................................197
UBA : User Accessing Risky IP, Botnet.............................................................................................. 198
UBA : User Accessing Risky IP, Dynamic...........................................................................................198
UBA : User Accessing Risky IP, Malware........................................................................................... 199
UBA : User Accessing Risky IP, Spam................................................................................................199
Supported QRadar content......................................................................................................................200
Unsupported UBA rules...........................................................................................................................202
Rules enabled by default in 3.5.0........................................................................................................... 204
vi
Configuring polling...................................................................................................................................264
Checking that data is added to the reference data collection................................................................265
Creating a rule that responds to LDAP data updates............................................................................. 265
Notices..............................................................................................................281
Trademarks..............................................................................................................................................282
Terms and conditions for product documentation................................................................................. 282
IBM Online Privacy Statement................................................................................................................ 283
General Data Protection Regulation........................................................................................................283
vii
viii
Chapter 1. User Behavior Analytics for QRadar
The User Behavior Analytics for QRadar app helps you to determine the risk profiles of users inside your
network and to take action when the app alerts you to threatening behavior.
Attention: You must install IBM QRadar 7.3.2 Fix Pack 1 or later before you install QRadar UBA
3.6.0 or later.
The User Behavior Analytics for QRadar (UBA) app is a tool for detecting insider threats in your
organization. It is built on top of the app framework to use existing data in your QRadar to generate new
insights around users and risk. UBA adds two major functions to QRadar: risk profiling and unified user
identities.
Risk profiling is done by assigning risk to different security use cases. Examples might include simple
rules and checks such as bad websites, or more advanced stateful analytics that use machine learning.
Risk is assigned to each one depending on the severity and reliability of the incident detected. UBA uses
existing event and flow data in your QRadar system to generate these insights and profile risks of users.
UBA uses three types of traffic that enrich UBA and enable more use cases to profile risk. The three types
are as follows:
1. Traffic around access, authentication, and account changes.
2. User behavior on the network, so devices such as: proxies, firewalls, IPS, and VPNs.
3. Endpoint and application logs, such as from Windows or Linux®, and SaaS applications.
Unifying user identities is accomplished by combining disparate accounts for a user in QRadar. By
importing data from an Active Directory, an LDAP server, Reference table, or CSV file, UBA can be taught
what accounts belong to a user identity. This helps combine risk and traffic across the different user
names in UBA.
Machine Learning (ML) is an add-on tool that augments the UBA app. It enables more rich and in-depth
use cases that perform time series profiling and clustering. It is installed from within the UBA app, on the
Machine Learning settings page. ML adds visualizations to the existing UBA app that show learned
behavior (models), current behavior, and alerts. With 3.3.0 and later, the models can use more than four
weeks of historical data in QRadar to make the predictive models and baselines of what is normal for a
user.
For more information about using the ML app, see Chapter 9, “Machine Learning Analytics app,” on page
207.
Multitenancy support
UBA 3.6.0 (and later) and QRadar 7.4.0 Fix Pack 1 (and later) support multitenancy. For more information,
see Chapter 7, “Multitenancy in UBA,” on page 55.
2 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
In 3.6.0, all of the rules are disabled by default except for the following 3 rules: UBA : Unauthorized
Access, UBA : Dormant Account Used, and UBA : New Account Use Detected. For the list of rules that
were previously enabled by default in 3.5.0 or earlier, see “Rules enabled by default in 3.5.0” on page
204. If you made modifications to rules in 3.5.0 or earlier (such as enabling or disabling a rule), they are
not changed to the new default value in 3.6.0 after you upgrade.
Attention: Rules that were not modified in 3.5.0 or earlier, will be disabled by default after
upgrading.
• Added support for QRadar (7.4.0FP1 or later) multitenancy. For more information, see Chapter 7,
“Multitenancy in UBA,” on page 55.
• Added the ability to import users from a CSV file with the User import wizard. With 3.6.0 and later, you
no longer have to use the separate LDAP app to import users from a CSV file. For more information, see
“Importing users from a CSV file” on page 36.
• Added the ability to customize UBA Dashboard views (by domain or geography). For more information,
see “Managing the UBA dashboard views” on page 11.
• Added use case UBA : Failed to Set Mailbox Audit Logging Bypass. For more information, see “UBA :
Failed to Set Mailbox Audit Logging Bypass” on page 140.
• Added use case UBA : User Failed to be Added to Role. For more information, see “UBA : User Failed to
be Added to Role” on page 144.
• Added use case UBA : Sharing Policy Changed or Shared External (SharePoint/OneDrive). For more
information, see “UBA : Sharing Policy Changed or Shared External (SharePoint/OneDrive)” on page
143.
Important: UBA 3.4.0 introduces the User Import wizard. The User Import wizard allows you to import
users and user data directly from the UBA app. You can use the new wizard or you can continue to import
user data with the Reference Data Import - LDAP app. To import users from a CSV file, you must use the
Reference Data Import - LDAP app.
• Added the User Import wizard so that you can configure LDAP and Active Directory data retrieval and
import LDAP/AD data directly into the UBA app. For more information, see “Importing users” on page
30.
• Added the ability to configure LDAP/AD imports using APIs. For more information, see “User import” on
page 275.
• Added the ability to view domain, manager, and peer information for user profiles on the User Details
page. For more information, see “UBA dashboard and user details” on page 6.
• Added use case UBA : Anonymous User Accessed a Resource. For more information, see “UBA :
Anonymous User Accessed a Resource” on page 139.
• Added use case UBA : Browsed to Social Networking Website “UBA : Browsed to Social Networking
Website” on page 134.
• Added use case UBA : External User Failed Mailbox Login. For more information, see “UBA : External
User Failed Mailbox Login” on page 140.
• Added use case UBA : Inbox Set to Forward to External Inbox. For more information, see “UBA : Inbox
Set to Forward to External Inbox” on page 141.
• Added use case UBA : Internal User Failed Mailbox Login Followed by Success. For more information,
see “UBA : Internal User Failed Mailbox Login Followed by Success” on page 141.
• Added use case UBA : Mailbox Permission Added and Deleted in a Short Period of Time. For more
information, see “UBA : Mailbox Permission Added and Deleted in a Short Period of Time” on page 142.
• Added use case UBA : Terminated User Activity. For more information, see “UBA : Terminated User
Activity” on page 75.
Known issues
The User Behavior Analytics app has required information for upgrading and known issues.
4 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
deleting the data from the reference set. Also, if you previously edited the "UBA : New Account Use
Detected" rule, you should consider reverting it back to the default setting to get the newer version.
• If you updated and saved a value for the Advanced Search Filter field on the ML Configuration page,
when the page loads the value displays as 0 and the ML Configuration page does not save. To save the
ML Configuration page, you can clear the field or enter the previously saved value. To see the previously
saved value, you can change the uri path of the ML Configuration path from /console/plugins/<app
id>/app_proxy/ml/config_page to console/plugins/<app id>/app_proxy/ml/
analytics. The values is at the key dataset importer > parameters > userfilter.
• If you are upgrading the UBA app and you receive a QRadar Notification exception error stating that a
rule set has failed to load, you can ignore it and continue. If the error persists, contact IBM Customer
Support.
• After you upgrade UBA, the Machine Learning Activity Distribution graph on the User Details page can
take up to one day to display.
Process overview
The User Behavior Analytics app works with your QRadar system to collect data about the users inside
your network.
Dashboard
After you install and configure the UBA app, click the User Analytics tab to open the Dashboard.
Note: The supported number of users that the UBA app can monitor is 400,000 users.
In the Viewing: All users field (3.6.0 and later), you can create and select views to customize your
Dashboard view. For more information, see “Managing the UBA dashboard views” on page 11.
6 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
In the Search for User field, you can search for users by name, email address, user name. As you enter a
name, the app shows you the top five results.
The Dashboard is automatically refreshed every minute and shows you the following risk data:
Monitored Users Displays the total number of users that the UBA app is actively monitoring.
High Risk Users Displays the number of users who are currently exceeding the risk score. The
value for determining the risk score is set in the "Risk threshold to trigger
offenses" in UBA Settings.
Users Discovered from Displays the number of users that are discovered from events, excluding
Events imported users.
Users Imported from Displays the number of users that were imported from reference tables.
Directory
Active Analytics • Rules: Indicates the status of the rules content and how many rules are
active. A green status indicates that the rules are installed and active. Gray
indicates that the rules are disabled. Yellow indicates that the installation
is in progress. Click to open the Rules and Tuning page. Note: In a
multitenant environment, only an Admin user can see the rules installation
status for either admin or tenant UBA. Tenant admin and tenant user
always see a green status of rules on the dashboard.
• Machine Learning: Indicates the status of Machine Learning and how many
models are active. A green status indicates that the Machine Learning
Analytics app is installed. Gray indicates that the Machine Learning
Analytics app is not installed. Click to install or configure Machine Learning.
Note: In a multitenant environment, the status is always Green.
Monitored Users Displays the top 10 riskiest users. The first column lists the display name and
the job title and city if available.
• Recent risk: Shows the accumulated risk for the respective user for the last
5 minutes.
• Risk score: Shows a graph that illustrates the user's overall risk score trend
for the last hour and the current risk score. The color of the graph indicates
the overall riskiness.
• Watchlist icon: Add the user to a watchlist or create a watchlist. The
number indicates how many watchlists the user is a member of.
• You can view all the tracked users on the Search page.
Recent Offenses Displays last five most recent offenses that are sorted by the time the
offense was last updated.
[User] Watchlist Watchlists that you created. You can create as many watchlists as you want
and they display on the Dashboard. You can view all the tracked users in the
custom watchlist that you created on the Search page.
• To initiate an investigation on the user, click the Start Investigation icon. When your investigation
is complete, click the End Investigation icon.
• To add the user to a watchlist or create a watchlist, click the Watchlist icon.
Add Custom Alert You can set a custom alert that is displayed by the user name. Click Add
Custom Alert, enter an alert message, and then click Set. To remove the
custom alert for the selected user, click Remove Custom Alert.
8 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Add to Whitelist You must have QRadar administrator privileges. You can add the selected
user to the allowlist so that the user does not generate risk scores and
offenses. To remove the selected user from the list, click Whitelisted. To
review the complete list of users who were added to the whitelist, see
“Viewing the allowlist for trusted users” on page 43.
Generate GDPR You can generate a General Data Protection Regulation (GDPR) compliance
compliant report for report for the user.
user
Important: Generate the report before you click Delete and stop tracking
user.
Delete and stop You must have QRadar administrator privileges. You can click Delete and
tracking user stop tracking user to comply with General Data Protection Regulation
(GDPR). Select Yes to permanently delete and stop tracking the user. To
begin tracking the user again, delete the user's aliases from the UBA : Users
Not Tracked reference set. To view all the user's aliases, download the GDPR
report before you delete the user.
For more information about the UBA : Users Not Tracked reference set, see
“Reference sets” on page 52.
Always track with You must have QRadar administrator privileges. You can click Always track
Machine Learning with Machine Learning to add the user to the UBA: ML Always Tracked
Watchlist reference set. Adding the user to the reference set provides the
highest likelihood that the user is included in a machine learning model. For
more information about reference sets in UBA, see “Reference sets” on page
52. To remove the selected user from the reference set, click Tracked with
Machine Learning.
Note: Available in V2.8.0 or later and only if Machine Learning is installed and
you have QRadar Admin privileges.
You can view the following information about the selected user:
Overall Risk Score The overall risk score shows the risk trends for the user.
Timeline The timeline graph shows Risky Events and User Events. Risky events are risk
events that contribute to risk score. User events are non-risk events. The Y-
axis is event count and X-axis is time. You can click any activity in the
timeline to open the event viewer pane that lists supporting log events that
are associated with the user's activity. Click an event to view more details
such as syslog events and payload information.
• In V3.0.0 and later, timeline activity is grouped by sessions and days.
Sessions are defined in the Application Settings section of the UBA
Settings page. The colors represent the overall riskiness of a session. Click
the Calendar icon to specify the date range (1 - 14 days).
• In 3.1.0 and later, you can customize the metric settings that display for
the timeline by clicking the Metric Settings icon. You can add and remove
the categories that you want to see. The data shown in the Example
metrics section of the Metric Settings screen does not represent real
values.
Note: “Risky Events” and “Use cases” will show the same data where
“Risky Events” is the total number of events for the given use cases. “URL
Categories” and “URLs” will show the same data where “URLs” is the total
number of events for the given “URL Categories”. “Event IDs” and “Events”
Recent Offenses Shows any user type offense, where the user name matched any of the
selected user's aliases. The last five offenses are displayed. Click an offense
to open the Offenses tab in QRadar.
Risk Category Shows the risk categories of the selected user during the last hour.
Breakdown
Add Notes
Click the Add icon to add notes for the selected user. The notes are
automatically deleted after the 30-day retention period.
Tip: To save the note indefinitely, mark the note as important by clicking the
Flag icon.
The following graphs are displayed on the User Details page if the Machine Learning app is installed and
the specified model is enabled. For more information, see “UBA dashboard with Machine Learning” on
page 209.
• Access Activity
• Activity Distribution
• Aggregated Activity
• Authentication Activity
• Data Downloaded
• Data Uploaded to Remote Networks
• Defined Peer Group
• Learned Peer Group
• Outbound Transfer Attempts
• Risk Posture
• Suspicious Activity
• Custom Models (User-defined custom models)
To return to the main Dashboard, click Dashboard.
Related concepts
“UBA dashboard with Machine Learning” on page 209
The IBM QRadar User Behavior Analytics (UBA) app with Machine Learning Analytics includes the
Machine Learning model status and additional details for the selected user.
“Dormant accounts” on page 45
You can see users in your system that have dormant accounts, active accounts, or accounts that have
never been used.
Related tasks
“Creating watchlists” on page 41
You can add a user to a new watchlist or an existing watchlist.
“Viewing the allowlist for trusted users” on page 43
You can view the list of trusted users in the reference set management list.
“Adding log sources to the trusted log source group” on page 44
If you do not want the UBA app to monitor and report certain log sources, you can add them to the UBA :
Trusted Log Source Group. Adding log sources to the group stops the UBA app from monitoring them.
“Installing the Machine Learning Analytics app” on page 208
10 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
As a QRadar Admin, you can install the Machine Learning Analytics (ML) app after you have installed the
UBA app from the Extension Manager.
“Investigating users in QRadar Advisor with Watson” on page 12
You can select users from the User Behavior Analytics (UBA) app to send to QRadar Advisor with Watson
for investigation.
Procedure
1. Select the User Analytics tab.
2. On the Dashboard, from the filter box, click Viewing: All users
3. Click Manage dashboard views.
4. On the Manage dashboard views screen, create or edit views to filter the users that are displayed on
the Dashboard.
5. For each view you want to create, enter the following information:
• View name: Enter a descriptive name for each view. For example, "US employees".
• Attribute: Select from domain, state, country, or city.
• Value: Select one or multiple values based on the attribute selection.
6. Click Save.
7. To create another view, click Create new view. Note that you can create up to 30 views.
The views that you create are available from the Dashboard filter box in step 2.
Procedure
1. Click the User Analytics tab to open the UBA Dashboard.
2. Select a user or search for a user to open the User Details page.
3. Click the Search Watson icon.
When the icon stops spinning, you can review your results in the QRadar Advisor with Watson app.
4. From the Watson tab, on the Incident Overview page, select the user investigation. User
investigations are indicated with the Investigation initiated from UBA icon.
12 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Log source types relevant to the UBA app
The User Behavior Analytics (UBA) app and the ML app can accept and analyze events from certain log
sources.
In general, the UBA app and the ML app require log sources that supply a username. For UBA, if there is
no username, enable the Search assets for username, when username is not available for event or
flow data checkbox in UBA Settings so that UBA can attempt to look up the user from the asset table. If
no user can be determined, UBA does not process the event.
For more details about specific use cases and the corresponding log source types, see Chapter 8, “Rules
and tuning for the UBA app,” on page 67.
Related tasks
“Configuring UBA settings” on page 25
To view information in the IBM QRadar User Behavior Analytics (UBA) app, you must configure UBA
application settings.
Procedure
1. Choose one of the following methods to download your app:
• If the IBM QRadar Assistant app is configured on QRadar, use the following instructions to install
User Behavior Analytics: QRadar Assistant app (https://www.ibm.com/support/knowledgecenter/
SS42VS_latest/com.ibm.apps.doc/c_qradar_adm_assist_app.html).
• If the QRadar Assistant app is not configured, download the User Behavior Analytics app archive
from the IBM Security App Exchange (https://apps.xforce.ibmcloud.com/) onto your local
computer. You must have an IBM ID to access the App Exchange.
2. If you downloaded the app from the App Exchange, complete the following steps:
What to do next
• When the installation is complete, clear your browser cache and refresh the browser window before you
use the app.
• Manage permissions for UBA app user roles.
Related tasks
“Enabling indexes to improve performance” on page 49
To improve the performance of your IBM QRadar User Behavior Analytics (UBA) app, enable indexes in
IBM QRadar.
“Assigning user capabilities for the QRadar UBA app” on page 41
Administrators use the User Role Management feature in IBM QRadar to configure and manage user
accounts. As an administrator, you must enable the User Analytics, Offenses, and Log Activity
permissions for each user role that is permitted to use the QRadar UBA app.
Procedure
1. On the QRadar Console, click Admin > Extensions Management.
2. On the INSTALLED tab of the Extension Management window, select User Behavior Analytics app
and click Uninstall.
When you uninstall an app, it is removed from the system.
3. The following content packages are installed when you configure the UBA app. You must uninstall
each content package to completely remove the app.
16 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
• User Behavior Analytics Access and Authentication Content
• User Behavior Analytics Accounts and Privileges Content
• User Behavior Analytics Browsing Behavior Content
• User Behavior Analytics Cloud Content
• User Behavior Analytics DNS Analyzer Content
• User Behavior Analytics Domain Controller Content
• User Behavior Analytics Endpoint Content
• User Behavior Analytics Exfiltration Content
• User Behavior Analytics Geography Content
• User Behavior Analytics Network Traffic and Attacks Content
• User Behavior Analytics Threat Intelligence Content
Procedure
1. Choose one of the following methods to download your app:
• If the IBM QRadar Assistant app is configured on QRadar, use the following instructions to install
User Behavior Analytics: QRadar Assistant app.
• If the QRadar Assistant app is not configured, download the User Behavior Analytics app archive
from the IBM Security App Exchange (https://apps.xforce.ibmcloud.com/) onto your local
computer. You must have an IBM ID to access the App Exchange.
2. If you downloaded the app from the App Exchange, complete the following steps:
a) On the QRadar Console, click Admin > Extensions Management.
b) In the Extension Management window, click Add and select the app archive that you want to
upload to the console.
c) Select the Install immediately checkbox.
Important: You might have to wait several minutes before your app becomes active.
d) To preview the contents of an app after it is added and before it is installed, select it from the list of
extensions, and click More Details. Expand the folders to view the individual content items in each
group.
3. Upgrade the UBA app.
• If the IBM QRadar Assistant app is configured on QRadar, use the following instructions to install
the UBA app: QRadar Assistant app.
• If the QRadar Assistant app is not configured, download the UBA app archive from the IBM Security
App Exchange onto your local computer. You must have an IBM ID to access the App Exchange.
4. In the window that prompts you to update the current app version, leave the Replace existing items
option selected and click Install. All of your existing app data remains intact.
Important: You might have to wait several minutes before your app becomes active. After the UBA
app is upgraded, the content packages are upgraded in the background. The content might not be
visible in QRadar immediately after the app is upgraded.
Note: After the UBA upgrade completes, content packages are upgraded automatically if the Install
and upgrade UBA content packages setting is enabled on the “Configuring content package settings”
on page 26 page. For more information about content packages, see “UBA content pack summary”
on page 68.
5. If Machine Learning is installed, the UBA app automatically upgrades the ML version.
20 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Chapter 4. Configuring the User Behavior Analytics
app
Before you can use the IBM QRadar User Behavior Analytics (UBA) app, you must configure additional
settings.
With 3.6.0 and later, you can import users directly into the UBA app from an LDAP server, Active Directory
server, CSV file, and reference table with the User import wizard.
In 3.5.0 or earlier, you can import user data from a CSV file with the CSV import feature available in the
Reference Data Import LDAP (LDAP) app that is also installed. If you choose to use the LDAP app, you
must configure the LDAP app before you set up the UBA app. The data that the UBA app uses comes from
an LDAP query. The LDAP query retrieves the list of users that is used to populates the UBA app.
Both the UBA app and the LDAP app require separate authorization tokens. You can create the
authorization tokens when you configure each app.
Complete the following setup procedures:
• If you are using LDAP, configure the Reference Data Import LDAP app. Note: Starting with UBA 3.6.0,
the LDAP app is no longer included with the UBA app.
• Configure UBA settings for the UBA app
• Configure user imports
Related tasks
“Importing user data from a CSV file” on page 260
You can upload a CSV file that contains user data with the Reference Data Import - LDAP app
Procedure
6. On the Reference Data Import (LDAP) app main window, click Add Import. The Add a New LDAP
Configuration dialog box opens.
7. On the LDAP Configuration tab, add connection information for the LDAP server. The Filter field is
automatically populated from your Active Directory attributes.
a) Enter a URL that begins with ldap:// or ldaps:// (for TLS) in the LDAP URL field.
b) Enter the point in the LDAP directory tree from where the server must search for users in the Base
DN field. For example, if your LDAP server was on the domain example.com, you might use:
dc=example,dc=com.
22 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
c) Enter the attribute or attributes you want to use to sort the data that is imported into the
reference table in the Filter field. For example, cn=*; uid=*; sn=*. The following default
values work with Active Directory: (&(sAMAccountName=*)(samAccountType=805306368)).
d) Enter the user name that is used to authenticate the LDAP server in the Username field.
e) Enter the password for the LDAP server in the Password field.
8. Click Test Connection or Next to confirm that IBM QRadar can connect to the LDAP server. If your
connection attempt is successful, information from your LDAP server is displayed on the LDAP
Configuration tab.
9. On the Select Attributes tab, select the attributes you want to extract from the LDAP server. The
following default values will work with Active Directory:
userPrincipalName,cn,sn,telephoneNumber,l,co,department,displayName,mail,ti
tle.
10. On the Attribute Mapping tab, set the key for the reference table.
Tip: You can create new LDAP fields by clicking Add and combining two attributes. For example, you
can use the following syntax: "Last: {ln}, First: {fn}".
11. On the Reference Configuration tab, create a new reference map of maps or designate an existing
reference map of maps to which you want to add LDAP data.
a) In the Reference table field, enter the name for a new reference table. Alternatively, add the
name of an existing reference table to which you want to append the LDAP data from the list.
b) The Generate map of sets checkbox is disabled by default. If you enable the checkbox, it sends
data to a reference set format to improve QRadar searching, however, it might impact
performance.
c) In the Time to live section, define how long you want the data to persist in the reference map of
maps. By default, the data you add never expires. When the time-to-live period is exceeded, a
ReferenceDataExpiry event is triggered.
Note: If you append data to an existing reference map of maps, the app uses the original time-to-
live parameters. These parameters cannot be overridden on the Reference Configuration tab.
12. On the Polling tab, define how often you want the app to poll your LDAP server for data.
a) In the Polling interval in minutes field, define in minutes how often you want the app to poll your
LDAP server for data.
24 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Note: The minimum polling interval value is 120. You can also enter a polling interval of zero. If
you enter a polling interval of zero, you must poll the app manually with the poll option that is
displayed in the feed.
b) In the Record retrieval limit field, enter a value for the number of records you want the poll to
return.
By default, 100,000 records are returned. The maximum number of records that can be returned
is 200,000.
c) Optional: The Paged results checkbox is selected by default to avoid limiting the number of
records the LDAP server returns for each poll.
Note: Paged results are not supported by all LDAP servers.
Procedure
What to do next
“Configuring content package settings” on page 26
Procedure
What to do next
“Configuring application settings” on page 27
26 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Configuring application settings
To view information in the IBM QRadar User Behavior Analytics (UBA) app, you must configure UBA
application settings.
Procedure
Monitor By selecting the Monitor imported users only setting, the UBA app will not monitor
imported new users that are discovered from events. UBA will only monitor users that you
users only imported.
Risk threshold Indicates how high a user's risk score should get before an offense is triggered
against that user. A risk score is the summation of all risk events that are detected
by UBA rules.
Select one of the following options:
• Dynamic: The default value is 4.0. The higher the value is, the higher the dynamic
threshold will be, resulting in less offenses. You should turn off Generate an
offense for high risk users until the settings have run for at least a day. The
dynamic threshold value is updated hourly based on risk score distribution in the
system. You can determine if you want to enable the setting based on the number
of offenses that could be triggered. See the Tip for more information.
Note: If there is not enough variety in their scores, the risk score is set to +10 of
the highest risk user. it stays that way to prevent a large number of offenses from
being generated unnecessarily.
• Static: The default value is 100,000. The value is set to a high value by default to
avoid triggering offenses before the environment is analyzed. You can turn on
Generate an offense for high risk users to open an offense with a username type
for users above the risk threshold. You can determine if you want to enable the
setting based on the number of offenses that could be triggered.
Tip: Consider setting up UBA and leaving the default value. Allow the settings to run
for at least a day to see the type of scores that are returned. After a few days,
review the results on the dashboard to determine a pattern. You can then adjust the
threshold. For example, if you see one or two people with scores in the 500s but
most are in the 100s then consider setting the threshold to 200 or 300. So "normal"
for your environment might be 100 or so, and any score above that might require
your attention.
Decay risk by Risk decay is the percentage that the risk score is reduced by every hour. The
this factor per default value is 0.5.
hour
Note: The higher the number, the faster the risk score decays; the lower the
number, the slower the risk score decays.
Date range for The date range that is displayed for the user details graphs on the User Details
user detail page. The default value is 1.
graphs
User inactivity The User Details page shows a timeline with activity grouped by sessions. If a user
interval is inactive for the amount of time entered in the User inactivity interval field, the
session ends. The default value is 15 minutes.
Dormant The number of days that users are inactive before they are considered dormant. The
account default value is 14 days. For more information, see “Dormant accounts” on page
threshold 45.
(Available in V3.2.0 and later.)
Maximum risk Enter a value to set the limit for the maximum risk score on the Rules and Tuning
score page. Current risk scores are not affected by changes to this setting. Note: Rules
that are delivered with the UBA app typically have a risk score in the range of 5 - 25.
Search assets Select the checkbox to search for user names in the asset table. The UBA app uses
for username, assets to lookup a user for an IP address when no user is listed in an event.
when
Important: This feature might cause performance issues in the UBA app and your
username is
QRadar system.
not available
for event or Important: Enabling the Search assets for username, when username is not
flow data available for event or flow data check box on the UBA Settings page can cause
the User Details page to not load. Review the Rules pages to determine if the
enabled rules require this setting. It should be disabled if it is not needed.
Tip: If the query timeout threshold is exceeded, the app does not return any data. If
you receive an error message on the UBA Dashboard, clear the checkbox and click
Refresh.
Display Clear the checkbox if you do not want to display country and region flags for IP
country/ addresses.
region flags
for IP
addresses
28 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
What to do next
For UBA V3.4.0 or later, you can import users from the User import wizard. For more information, see
“Importing users” on page 30.
Importing users
You can import users from within the UBA app. The User Import wizard helps you to import users from an
LDAP server, an Active Directory server, from reference tables, and CSV files.
Procedure
1. On the User Imports window, click Add.
2. From the following options, select the source that you want to use to import user data:
• LDAP/AD
• Reference Table
• CSV file
The following example shows User Import wizard for 3.6.0 and later:
30 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
3. After you add an import, you can view the status information for each configuration.
• Retrieval limit: The maximum number of users to poll per poll.
• Polling interval: The time in hours after the last successful poll.
• Last edited: The last time the configured changed.
• Users extracted: The total number of users in the current import configuration.
Note: The number of users extracted in each poll might be limited by a particular LDAP server. For
example, when Paged results is not selected, an Active Director Server could only return up to
1000 records.
• Last poll date: The last time a poll was attempted.
• Last poll status: The status of the last poll (Failed, Idle, Warning, Running, Coalescing, Succeeded).
You can edit or delete the configuration. Clicking the Delete icon removes the entry but does not
remove the users from UBA. You can also select the Import data now icon to poll the server for data
at any time.
Tip: To improve performance, you should delete import configurations that you no longer use.
What to do next
Configure the import from your LDAP/AD server or a reference table.
Procedure
1. On the User Imports window, click Add and then click LDAP/AD.
2. In the Protocol field, select ldap:// or ldaps:// for TLS.
3. In the LDAP Server Host field, enter an IP address or hostname. For example, 10.10.10.10 or
sample.ldap.server.
4. In the Port field, enter the port for the LDAP server.
5. In the Username (Bind DN) field, enter the user name that is used to authenticate the LDAP server
and enter the password in the Password field.
6. Click Advanced Settings. Note: You can change the Base DN; otherwise, when you click Test
Connection the system determines the default values that are most applicable and populates the
Base DN.
7. In the Base DN field, the field is auto-populated or you can enter the point in the LDAP directory tree
from where the server must search for users. For example, if your LDAP server was on the domain
example.com, you might use: dc=example,dc=com.
8. In the Filter field, enter the attribute or attributes you want to use to identify the users in a search
request. For example: cn=*; uid=*; sn=*. The following default values will work with Active
Directory: (&(sAMAccountName=*)(samAccountType=805306368)). For more information, see
https://ldap.com/ldap-filters/.
9. In the Certificate field, click the Upload icon to add a root certificate authority (PEM) file.
10. The Paged results checkbox is selected by default to avoid limiting the number of records the LDAP
server returns for each poll. Paged results are not supported by all LDAP servers.
11. Click Test Connection to confirm that UBA can connect to the LDAP server.
12. Click Next.
32 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
13. On the Other import settings screen, in the Configuration name field, enter a name to represent the
configuration.
14. In the Polling interval field, define how often you want the app to poll your LDAP server for data. You
can enter a polling interval of zero to manually poll. If you enter a polling interval of zero, you must
poll the app manually with the poll option that is displayed in the feed.
15. In the Retrieval limit field, enter a value for the number of records you want the poll to return.
The maximum number of records that can be returned is 500,000.
What to do next
You can add more import configurations or continue tuning your existing import configurations.
Related tasks
Importing users
You can import users from within the UBA app. The User Import wizard helps you to import users from an
LDAP server, an Active Directory server, from reference tables, and CSV files.
Importing users from a reference table
You can import user data, directly into the UBA app, from a reference table.
Importing users from a CSV file
You can import user data, directly into the UBA app, from a CSV file.
Tuning user import configurations
After completing the import configurations, you can tune the configurations by selecting attributes to
define valid usernames that combine users and enrich data that is displayed in UBA by defining attributes
for display data.
Procedure
1. On the User Imports window, click Add and then click Reference table.
2. From the Reference table name list, select a reference table.
34 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Note: The fields will populate based on the information in the selected reference table.
3. Click Next.
4. In the Polling interval field, define how often you want the app to poll for data from the reference
table. You can enter a polling interval of zero to manually poll. If you enter a polling interval of zero,
you must poll the app manually with the poll option that is displayed in the feed.
5. In the Retrieval limit field, enter a value for the number of records you want the poll to return.
The maximum number of records that can be returned is 500,000.
6. Click Next to review the summary of the configuration and then click Save.
What to do next
You can add more import configurations or continue tuning your existing import configurations.
Related tasks
Importing users
You can import users from within the UBA app. The User Import wizard helps you to import users from an
LDAP server, an Active Directory server, from reference tables, and CSV files.
Importing users with LDAP or Active Directory
You can import user data, directly into the UBA app, from an LDAP or Active Directory server.
Importing users from a CSV file
Procedure
1. On the User Imports window, click Add and then click CSV File.
2. Upload a CSV file. You can drag or click browse to open the file.
Important: The CSV file must be in UTF-8 format must not be greater than 10 MB. It must contain a
header that has column names, use commas to delimit, and must contain at least one column with
unique data.
3. Click Next to review the summary of the configuration and then click Save.
What to do next
You can add more import configurations or continue tuning your existing import configurations.
36 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Related tasks
Importing users
You can import users from within the UBA app. The User Import wizard helps you to import users from an
LDAP server, an Active Directory server, from reference tables, and CSV files.
Importing users with LDAP or Active Directory
You can import user data, directly into the UBA app, from an LDAP or Active Directory server.
Importing users from a reference table
You can import user data, directly into the UBA app, from a reference table.
Tuning user import configurations
After completing the import configurations, you can tune the configurations by selecting attributes to
define valid usernames that combine users and enrich data that is displayed in UBA by defining attributes
for display data.
Procedure
1. On the User Imports window, click Tuning.
2. In the User Coalescing section, click Edit.
3. On the Edit: User Coalescing pane, select at least one attribute from the current imports, which UBA
can use to identify and combine activity from the different user names of each user.
Note:
Attributes added in the user coalesing section should be unique to an individual. Attributes that
contain usernames for various accounts used throughout the enterprise should be selected, such as
'samaccountname' or 'distinguished name'. Selecting values that are shared among many users,
4. In the Display Fields section, click Edit to customize the attributes that you want to display on the
User Details page. You can also click Add to select attributes for the selected display field.
Note:
The order that the attributes are shown, determines the order that UBA gets the value for the
attributes to be displayed on the User Details page. For example, if the order of the attributes is
“displayname” followed by “cn”, then when user coalescing, if “displayname” has a value for that
user, that value is used, and will not find the value of “cn”. If “displayname” has no value, it will go to
find the next attributes for “cn”. If “cn” has no value, it will go to find the next attribute and so on.
Important: The Custom group display attribute is a special attribute that is used to define a grouping
attribute that can be selected as the grouping mechanism for the Defined Peer Group Machine
Learning analytic. This attribute is not displayed on the user profile page like the other display
attributes. An attribute from the configured LDAP, reference table, or CSV file user import can be
selected. The selected attribute should be one that allows for clustering of the user population.
Examples of Active Directory attributes that might be useful for such grouping are
"physicalDeliveryOfficeName", "memberOf " and "divison". Attributes that are unique per individual
should not be selected. Do not use Custom group for any other purposes.
38 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
5. Click Save.
Note: After you click Save, the data that is imported from all sources is reprocessed based on the new
selections of coalescing aliases and display keys.
Results
Tip:
If you chose the wrong attribute for user coalescing and encounter issues, you can make adjustments on
the Tuning page and then clear UBA data from the Help and Support page.
Related tasks
Importing users
You can import users from within the UBA app. The User Import wizard helps you to import users from an
LDAP server, an Active Directory server, from reference tables, and CSV files.
Importing users with LDAP or Active Directory
You can import user data, directly into the UBA app, from an LDAP or Active Directory server.
Importing users from a reference table
You can import user data, directly into the UBA app, from a reference table.
Importing users from a CSV file
You can import user data, directly into the UBA app, from a CSV file.
Procedure
Creating watchlists
You can add a user to a new watchlist or an existing watchlist.
Procedure
1. From the UBA Dashboard or the User Details page, click the Watchlist icon.
2. From the menu, select Create new watchlist. To add a user to an existing watchlist, click Add to
your watchlist.
3. On the General Settings tab, enter a watchlist name.
4. You can artificially increase or decrease the user's risk score by changing the value in the Scale risk
by factor field. The default factor of '1' leaves the risk score unchanged.
Note: If a user is in more than one watchlist, the largest scale factor is applied.
5. In the Machine Learning tracking priority section, select the priority for how users are tracked by
the Machine Learning analytics.
7. On the Membership Settings tab, you can automatically populate the watchlist with users from a
reference set, a regular expression, or both.
8. In the Import from QRadar reference set field, search for a reference set or click to select a
reference set from the list to import all entries from the reference set. Note: The list might contain
reference sets that do not have user names. After you select a reference set, click the link to review.
9. In the Add from Monitored Users with regex filter field, you can select a user property and enter a
valid Python regular expression to select users who are already found in the UBA database.
10. In the Refresh interval field, enter the number of hours for how often you want the user list to be
updated.
For example, if you enter 10, the user list is updated every 10 hours.
If the Refresh interval is set to a value of 0 (zero), you can manually update the watchlist by clicking
Refresh.
11. Click Save.
42 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Viewing the allowlist for trusted users
You can view the list of trusted users in the reference set management list.
Procedure
Procedure
Chapter 5. Administering 43
2. In the System Configuration section, click Reference Set Management.
3. On the Reference Set Management window, select the UBA : Network Capture, Monitoring and
Analysis Program Filenames reference set.
4. Click View Contents.
5. To add an application to manage, click Add and enter the values in the box.
6. To remove an application, select an application and click Delete.
What to do next
Enable the UBA : Network Capture, Monitoring and Analysis Program Filenames rule.
Procedure
What to do next
Enable the UBA : Restricted Program Filenames rule.
Procedure
New accounts
A user can have several accounts (aliases) associated to them. This association is achieved by configuring
coalescing when you tune your Import Configurations for User Imports. Accounts that are owned by a
user are added to UBA by using three methods:
44 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
• Importing attributes from an LDAP source.
• Adding users from a QRadar reference set from a watchlist that is created within UBA. 3
• Discovering users from a sense event. This can be limited to the first two methods by setting the
Monitor imported users only in the Application settings section on UBA Settings page.
An account added to UBA from LDAP or watchlist will not have a score until they are seen on any event
consumed by QRadar. An account added from a sense event will have a score, immediately, from the
sense event that detected it.
Dormant accounts
You can see users in your system that have dormant accounts, active accounts, or accounts that have
never been used.
Dormant An account that UBA has seen at least one event from in the past but has not
seen any new events during the dormant account threshold time period.
Never Used An account for which UBA has never seen an event with that user name in a
QRadar log source.
Accounts identified as "Never Used" can be caused by the following activities:
• Accounts that have never been logged by a QRadar log source for the
associated user name account.
• The event occurred before UBA V3.2.0 was installed. Note: When you first
install the UBA app, only events that occurred in the last hour are analyzed to
Chapter 5. Administering 45
User Account Status Description
determine when an account was last accessed. After the initial analysis, the
UBA app queries events that occurred between executions of the background
task that watches for account usage.
Note: Accounts that are categorized as "Never Used" were likely imported from
the LDAP app.
46 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
You can add a user to a new watchlist or an existing watchlist.
Chapter 5. Administering 47
48 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Chapter 6. Tuning
Procedure
5. Click Save.
6. Select Low Level Category and then click Enable Index.
7. Click Save.
8. On the Index Management page, in the search box, enter sense.
50 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
On QRadar V7.3.2 and later, a task runs every hour that pulls any rules that have been edited to include a
sense value in the description into the Rule Data table to be managed in the Rules and Tuning page. For
more information, see “Integrate content into UBA V3.4.0 and earlier” on page 51.
Restriction: When you start managing the rules from the Rules and Tuning page, the risk score can be
changed only from the Rules and Tuning page.
Procedure
Add eventname and details to the reference table by using the API doc or command line.
data schema: {"eventName": {"ruleName": "string", "risk": integer, "category":
"string", "desc": "string"}, "eventName": {...}}
Option Description
eventName (required) The exact string that appears in the new event section of the Rule Wizard
ruleName (required) The exact string that appears in the Rule Wizard
category (optional) An existing UBA category or custom category name. If omitted, rules will
appear in the "Custom Rule Integration" category.
Chapter 6. Tuning 51
Procedure
1. Create a copy of the existing rule. This prevents updates to the base rule from affecting the edits made
to the new rule.
2. Open the rule in the Rule Wizard and then navigate to the Rule Response section.
3. Enable or edit the Dispatch New Event option by making sure the Event Description text is formatted
in the following way: senseValue=#
4. Click Finish to save the changes.
Note: If the rule works on flow data, you must enable the Search assets for username, when
username is not available for event or flow data option so that events with no usernames can
attempt a lookup for user mapping.
Reference sets
The User Behavior Analytics app and the Machine Learning app use reference sets for storing user
information. Some reference sets are reserved for app use only and you should not modify them or use
them in creating custom rules.
UBA : ML Always The UBA : ML Always Tracked Watchlist reference set is built from the users
Tracked Watchlist you select to Track with Machine Learning in the Advanced Settings section
on the User Details page. You can add user names to the UBA : ML Always
Tracked Watchlist reference set but do not use for rules or reports.
52 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
• UBA - Previous Peer Group ML Tracked Users
Chapter 6. Tuning 53
54 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Chapter 7. Multitenancy in UBA
The User Behavior Analytics (UBA) app 3.6.0 and later supports multitenant environments in QRadar
7.4.0 Fix Pack 1 and later.
Multitenant environments allow Managed Security Service Providers (MSSPs) and multi-divisional
organizations to provide security services to multiple client organizations from a single, shared IBM®
QRadar® deployment. You don't have to deploy a unique QRadar instance for each customer.
With QRadar 7.4.0 Fix Pack 1 or later and UBA 3.6.0 and later, you can create multiple tenants from a
single deployment instead of managing multiple deployments. For example, as an MSSP partner, you
could host 20 clients on a single instance of QRadar with each client managing approximately 1000
employees.
Overview
Multitenancy in UBA requires the QRadar Administrator or an MSSP Administrator (QRadar Admin) to
complete several setup procedures that include specific configuration tasks in QRadar 7.4.0 Fix Pack 1.
The QRadar Admin must use the QRadar Assistant app 3.0 or later to install and configure the first or
"admin" UBA instance and the additional non-admin or tenant instances. After the non-admin instances
are established, the QRadar Admin must also assign user roles and specific permissions. The user roles
for the non-admin instances include "UBA tenant admin" and "UBA tenant" users.
Deployment guidance
The number of UBA instances supported is directly related to the QRadar environment. In general,
tenants should be added one at a time and after each addition, you should verify that QRadar is healthy
and the remaining apps are also performing as expected.
QRadar system performance was confirmed on 3 different environments differing in number of users and
Events Per Second (EPS). Each environment contained a QRadar Console with 128 GB RAM and 56 Cores,
Event Processor with 128 GB RAM and 56 Cores, and an App Host with 372 GB RAM and 72 Cores.
Security profiles
UBA 3.6.0 and later does not support multiple domains under one security profile. A security profile can
only have one domain assigned to it for UBA to work as expected.
Dashboard
On the Dashboard, only the QRadar Admin can see the rules installation status for the UBA tenant admin
user and the UBA tenant user. The UBA tenant admin user and the UBA tenant user always see a green
status of rules on the dashboard.
If you have Machine Learning installed, the status for Machine Learning on the Dashboard is always
shown as green. If you do not have ML installed, the status that is shown is always gray.
Upgrading
If you are upgrading from a previous version of UBA, you will not be able to keep using the existing UBA
instance and also run multitenancy. As soon as a second instance of UBA is seen in QRadar, the upgraded
UBA instance will change into a limited-functionality instance. Note that the data is not removed but it no
longer gets updated.
For the best experience with MT, do not upgrade from 3.4 or 3.5. Instead, consider installing 3.6.0 (or
later) and not upgrading. You do not need to uninstall UBA but you need to uninstall ML.
Warnings
You must set up your multitenant environment as specified or you could experience problems with UBA
and Machine Learning. Consider the following warnings:
• Ensure any edits to reference sets in QRadar are domain specific, otherwise users might show up in
unintended tenant instances.
• The admin instance of UBA is only responsible for upgrading ML and Rules.
• The admin instance of UBA will not ingest user data.
• Each instance can only have a single tenant and each tenant can only have a single domain.
56 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
• Tenants cannot be provided an admin authorized service token.
• Do not install Machine Learning on the admin instance of UBA.
• The QRadar Admin should not allowlist or remove users because it will also allowlist and remove users
for all tenant instances.
Table 1. QRadar configurations to support UBA multitenancy. The following table outlines the process
that is required to complete before you begin to configure your UBA instances.
Step More information
1 Define IBM Sense log source for each Each domain requires it's own IBM Sense log source for
domain. each UBA instance to function properly. When the log
source is defined, take note of each unique identifier for
use when configuring the tenant UBA instance.
Domains and log sources in multitenant environments
2 Determine data provisioning. You can assign specific log sources, log source groups,
or event collectors to provide data for each domain. You
can create the log source groups. Assign the IBM Sense
from step one to the specific group if one is created.
58 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Related concepts
UBA user roles for multitenancy
The User Behavior Analytics (UBA) app 3.6.0 and later supports multitenant environments in QRadar
7.4.0 Fix Pack 1 or later.
Rules and tuning for multitenancy in UBA
The rules are enabled or disabled by default for every UBA instance to support multitenancy in User
Behavior Analytics (UBA) app 3.6.0 and later. If you require changes to rules for a subsets of instances,
you need to manually change the rule behavior.
Related tasks
Installing and configuring UBA instances to support multitenancy
With 3.6.0 and later, you can set up UBA to work in a multitenant environment in QRadar 7.4.0 Fix Pack 1
or later.
Installing and configuring Machine Learning in Multitenancy
Procedure
1. Find the User Behavior Analytics extension in the QRadar Assistant app.
What to do next
Repeat these steps for all instances of UBA that you want.
Related concepts
QRadar configurations for setting up multitenancy in UBA
60 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
You must configure your QRadar system to support UBA 3.6.0 and later in a multitenant environment.
UBA user roles for multitenancy
The User Behavior Analytics (UBA) app 3.6.0 and later supports multitenant environments in QRadar
7.4.0 Fix Pack 1 or later.
Rules and tuning for multitenancy in UBA
The rules are enabled or disabled by default for every UBA instance to support multitenancy in User
Behavior Analytics (UBA) app 3.6.0 and later. If you require changes to rules for a subsets of instances,
you need to manually change the rule behavior.
Related tasks
Installing and configuring Machine Learning in Multitenancy
With 3.6.0 and later, you can install and configure Machine Learning to work in a multitenant environment
in QRadar 7.4.0 Fix Pack 1 or later.
Procedure
1. Find the User Behavior Analytics extension in the QRadar Assistant app.
2. Select the UBA instance that you want to install Machine Learning on.
3. Select Option > Configure Instance > Machine Learning Settings.
4. Configure the appropriate size for the Machine Learning instance. Note: The size of the Machine
Learning instance must be the same for every instance. For example, if instance A uses a 5 GB
Machine Learning instance, instances B and C must either use no Machine Learning or 5 GB.
5. Select Install ML App.
The instance is now ready for the tenant admin and tenant users to access.
What to do next
Repeat these steps for instances of UBA that you want to install Machine Learning on.
Related concepts
QRadar configurations for setting up multitenancy in UBA
You must configure your QRadar system to support UBA 3.6.0 and later in a multitenant environment.
UBA user roles for multitenancy
The User Behavior Analytics (UBA) app 3.6.0 and later supports multitenant environments in QRadar
7.4.0 Fix Pack 1 or later.
Rules and tuning for multitenancy in UBA
62 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
3. Create a new role for the tenant admin user. For example, tenantAdmin.
4. Select the checkboxes as indicated in the following screen shot to add the permissions to the role.
5. Click Save.
64 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
6. Make sure the original rule is disabled.
Known issue
In QRadar 7.4.0 Fix Pack 1, there is no way to make the rule limiter domain aware. Each rule that applies
to more than a single domain will be limited across domains. For example, if Domain1 and Domain2 both
have a "John Doe" that triggers the same rule within the limitation time frame, only one of the users will
be flagged by the rule.
Related concepts
QRadar configurations for setting up multitenancy in UBA
You must configure your QRadar system to support UBA 3.6.0 and later in a multitenant environment.
UBA user roles for multitenancy
The User Behavior Analytics (UBA) app 3.6.0 and later supports multitenant environments in QRadar
7.4.0 Fix Pack 1 or later.
Related tasks
Installing and configuring UBA instances to support multitenancy
With 3.6.0 and later, you can set up UBA to work in a multitenant environment in QRadar 7.4.0 Fix Pack 1
or later.
Installing and configuring Machine Learning in Multitenancy
With 3.6.0 and later, you can install and configure Machine Learning to work in a multitenant environment
in QRadar 7.4.0 Fix Pack 1 or later.
Enabled by default
False
Default senseValue
5
68 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
Detects authentication failure brute force attack (Horizontal and Vertical).
Support rules
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Failures
• BB:UBA : Detecting Authentication Bruteforce Attempts (Horizontal)
• BB:UBA : Detecting Authentication Bruteforce Attempts (Vertical)
Enabled by default
False
Default senseValue
10
Description
Detects activity from a locked machine.
Support rules
BB:UBA : Common Event Filters
BB:UBA : Windows Process Created
BB:UBA : Workstation Locked
BB:UBA : Workstation Unlocked
Enabled by default
False
Default senseValue
15
Description
Detects when a non-executive user logs on to an asset that is for executive use only. Two empty reference
sets will be imported with this rule : "UBA : Executive Users" and "UBA : Executive Assets". Edit the
reference sets to add or remove any accounts and IP addresses that are flagged from your environment.
Enable this rule after you configure the reference sets.
Support rules
• BB:UBA : Common Event Filters
70 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
• BB:CategoryDefinition: Authentication Success
• BB:CategoryDefinition: Firewall or ACL Accept
Required configuration
Add the appropriate values to the following reference set: "UBA : Executive Users" and "UBA : Executive
Assets".
Enabled by default
False
Default senseValue
15
Description
Detects when a user involved in incidents (offenses) access to critical asset.
Support rules
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Success
Required configuration
Add the appropriate values to the following reference set: "Critical Assets".
72 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Orchestrator, IBM Tivoli Access Manager for e-business, IBM WebSphere Application Server, IBM i, IBM
z/OS, IBM zSecure Alert, Illumio Adaptive Security Platform, Imperva SecureSphere, Itron Smart Meter,
Juniper Junos OS Platform, Juniper MX Series Ethernet Services Router, Juniper Networks Firewall and
VPN, Juniper Networks Intrusion Detection and Prevention (IDP), Juniper Networks Network and Security
Manager,Juniper Steel-Belted Radius, Juniper WirelessLAN, Kaspersky Security Center, Lieberman
Random Password Manager, Linux OS, Mac OS X, McAfee Application/Change Control, McAfee Firewall
Enterprise, McAfee IntruShield Network IPS Appliance, McAfee ePolicy Orchestrator, Metainfo MetaIP,
Microsoft DHCP Server, Microsoft Exchange Server, Microsoft IAS Server, Microsoft IIS, Microsoft ISA,
Microsoft Office 365, Microsoft Operations Manager, Microsoft SCOM, Microsoft SQL Server,Microsoft
Windows Security Event Log, Motorola SymbolAP, NCC Group DDos Secure, Netskope Active, Niara, Nortel
Application Switch, Nortel Contivity VPN Switch, Nortel Contivity VPN Switch (obsolete), Nortel Ethernet
Routing Switch 2500/4500/5500, Nortel Ethernet Routing Switch 8300/8600, Nortel Multiprotocol
Router, Nortel Secure Network Access Switch (SNAS), Nortel Secure Router, Nortel VPN Gateway, Novell
eDirectory, OS Services Qidmap, OSSEC, ObserveIT, Okta, OpenBSD OS, Oracle Acme Packet SBC, Oracle
Audit Vault, Oracle BEA WebLogic, Oracle Database Listener, Oracle Enterprise Manager, Oracle RDBMS
Audit Record, Oracle RDBMS OS Audit Record, PGP Universal Server, Palo Alto Endpoint Security
Manager, Palo Alto PA Series,Pirean Access: One, ProFTPD Server, Proofpoint Enterprise Protection/
Enterprise Privacy, Pulse Secure Pulse Connect Secure, RSA Authentication Manager, Radware AppWall,
Radware DefensePro, Redback ASE, Riverbed SteelCentral NetProfiler Audit, SIM Audit,SSH
CryptoAuditor, STEALTHbits StealthINTERCEPT, SafeNet DataSecure/KeySecure, Salesforce Security
Auditing, Salesforce Security Monitoring, Sentrigo Hedgehog, Skyhigh Networks Cloud Security Platform,
Snort Open Source IDS, Solaris BSM,Solaris Operating System Authentication Messages, Solaris
Operating System Sendmail Logs, SonicWALL SonicOS, Sophos Astaro Security Gateway, Squid Web
Proxy, Starent Networks Home Agent (HA), Stonesoft Management Center, Sybase ASE, Symantec
Endpoint Protection, TippingPoint Intrusion Prevention System (IPS), TippingPoint X Series Appliances,
Trend Micro Deep Discovery Email Inspector, Trend Micro Deep Security, Tripwire Enterprise, Tropos
Control, Universal DSMVMware vCloud Director, VMware vShield, Venustech Venusense Security
Platform, Verdasys Digital Guardian, Vormetric Data Security, WatchGuard Fireware OS, genua genugate,
iT-CUBE agileSI
Enabled by default
False
Default senseValue
5
Description
Detects any VPN account login failures from the "UBA : Multiple VPN Accounts Failed Login From Single
IP" reference set.
Support rules
• UBA : Populate Multiple VPN Accounts Failed Login From Single IP
• BB:UBA : VPN Login Failed
Required configuration
Enable the following rule: "UBA : Populate Multiple VPN Accounts Failed Login From Single IP"
Enabled by default
False
Default senseValue
5
Description
Maps multiple VPN users that are coming from the same IP address and then raises the risk score. When
the rule detects VPN users coming from the same IP address, the IP address is added to the "UBA :
Multiple VPN Accounts Logged In From Single IP". Before enabling this rule, make sure the rule "UBA :
Populate Multiple VPN Accounts Logged In From Single IP" is enabled and the "UBA : Multiple VPN
Accounts Logged In From Single IP" reference set has data.
Support rules
• UBA : Populate Multiple VPN Accounts Logged In from Single IP
• BB:UBA : VPN Login Successful
Required configuration
Enable the following rule: "UBA : Populate Multiple VPN Accounts Logged In from Single IP"
Enabled by default
False
Default senseValue
10
Description
Indicates that repeat unauthorized access activities were found.
Support rule
UBA : Unauthorized Access
74 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Required configuration
Enable the following rule: "UBA : Unauthorized Access"
Enabled by default
False
Description
Detects activity from any user that is listed as terminated or resigned.
Required configuration
Add the appropriate values to the following reference sets: "UBA : Terminated Users".
Note: This rule does not ignore any log sources.
Enabled by default
True
Default senseValue
10
Description
Indicates that unauthorized access activities were found.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : Access Denies
• BB:UBA : Application Denies
76 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Guardium, IBM IMS, IBM Lotus Domino, IBM Proventia Network Intrusion Prevention System (IPS), IBM
Resource Access Control Facility (RACF), IBM Security Access Manager for Mobile, IBM Security Identity
Manager, IBM Security Network IPS (GX), IBM Tivoli Access Manager for e-business, IBM WebSphere
Application Server, IBM i, IBM z/OS, IBM zSecure Alert, ISC BIND, Illumio Adaptive Security Platform,
Imperva Incapsula, Imperva SecureSphere, Juniper Junos OS Platform, Juniper Networks Firewall and
VPN, Juniper Networks Intrusion Detection and Prevention (IDP), Juniper Networks Network and Security
Manager, Juniper WirelessLAN, Juniper vGW, Kaspersky Security Center, Kisco Information Systems
SafeNet/i, Lieberman Random Password Manager, Linux DHCP Server, Linux OS, Linux iptables Firewall,
Mac OS X, McAfee Firewall Enterprise, McAfee IntruShield Network IPS Appliance, McAfee Web Gateway,
McAfee ePolicy Orchestrator, Microsoft DHCP Server, Microsoft Exchange Server, Microsoft IAS Server,
Microsoft IIS, Microsoft ISA, Microsoft Office 365, Microsoft Operations Manager, Microsoft SQL Server,
Microsoft Windows Security Event Log, NCC Group DDos Secure, Nortel Contivity VPN Switch, Nortel
Multiprotocol Router, Nortel VPN Gateway, OS Services Qidmap, OSSEC, Okta, Open LDAP Software,
OpenBSD OS, Oracle Audit Vault, Oracle BEA WebLogic, Oracle Database Listener, Palo Alto PA Series,
PostFix MailTransferAgent, ProFTPD Server, Proofpoint Enterprise Protection/Enterprise Privacy, Pulse
Secure Pulse Connect Secure, RSA Authentication Manager, Radware AppWall, Radware DefensePro,
Riverbed SteelCentral NetProfiler Audit, SSH CryptoAuditor, STEALTHbits StealthINTERCEPT, Solaris
Operating System Authentication Messages, Solaris Operating System DHCP Logs, SonicWALL SonicOS,
Sophos Astaro Security Gateway, Sophos Enterprise Console, Sophos Web Security Appliance, Squid Web
Proxy, Stonesoft Management Center, Sun ONE LDAP, Symantec Critical System Protection, Symantec
Endpoint Protection, Symantec Gateway Security (SGS) Appliance, Symantec System Center, Symark
Power Broker, TippingPoint Intrusion Prevention System (IPS), TippingPoint X Series Appliances, Top
Layer IPS, Trend InterScan VirusWall, Trend Micro Deep Security, Universal DSM, Venustech Venusense
Security Platform,Vormetric Data Security, WatchGuard Fireware OS, Zscaler Nss, genua genugate, iT-
CUBE agileSI
Enabled by default
False
Default senseValue
15
Description
Detects any interactive session (through GUI and CLI, both local and remote login) that is initiated by a
service or machine account in UNIX and Linux servers. Accounts and allowed interactive sessions are
listed in the UBA : Service, Machine Account and the UBA : Allowed Interaction Session reference sets.
Edit the reference sets to add or remove any interactive session that you want to flag from your
environment.
Support rules
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Firewall or ACL Accept
• BB:CategoryDefinition: Authentication Success
Required configuration
Add the appropriate values to the following reference sets: "UBA : Service, Machine Account" and "UBA :
Allowed Interactive Session".
Enabled by default
False
Default senseValue
5
Description
This rule detects authentication failures for systems located in the Critical Assets reference set.
Support Rules
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Failures
Required configuration
Add the appropriate values to the following reference set: "Critical Assets".
78 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Security Platform, Imperva SecureSphere, Infoblox NIOS, Itron Smart Meter, Juniper Junos OS Platform,
Juniper Junos WebApp Secure, Juniper Networks Firewall and VPN, Juniper Networks Intrusion
Detection and Prevention (IDP), Juniper Networks Network and Security Manager, Juniper Steel-Belted
Radius, Juniper WirelessLAN, Lieberman Random Password Manager, LightCyber Magna, Linux OS, Mac
OS X, McAfee Application/Change Control, McAfee Firewall Enterprise, McAfee IntruShield Network IPS
Appliance, McAfee ePolicy Orchestrator, Microsoft IAS Server, Microsoft IIS, Microsoft ISA, Microsoft
Office 365, Microsoft SCOM, Microsoft SQL Server, Microsoft SharePoint, Microsoft Windows Security
Event Log, Motorola SymbolAP, Netskope Active, Nortel Application Switch, Nortel Contivity VPN
Switch,Nortel Contivity VPN Switch (obsolete), Nortel Ethernet Routing Switch 2500/4500/5500, Nortel
Ethernet Routing Switch 8300/8600, Nortel Multiprotocol Router, Nortel Secure Network Access Switch
(SNAS), Nortel Secure Router, Nortel VPN Gateway, Novell eDirectory, OS Services Qidmap, OSSEC, Okta,
Open LDAP Software, OpenBSD OS, Oracle Acme Packet SBC, Oracle Audit Vault, Oracle BEA WebLogic,
Oracle Database Listener, Oracle Enterprise Manager,Oracle RDBMS Audit Record, Oracle RDBMS OS
Audit Record, PGP Universal Server, Palo Alto PA Series,Pirean Access: One, ProFTPD Server, Proofpoint
Enterprise Protection/Enterprise Privacy, Pulse Secure Pulse Connect Secure,RSA Authentication
Manager, Radware AppWall, Radware DefensePro, Riverbed SteelCentral NetProfiler Audit, SSH
CryptoAuditor, STEALTHbits StealthINTERCEPT, SafeNet DataSecure/KeySecure, Salesforce Security
Monitoring, Skyhigh Networks Cloud Security Platform, Snort Open Source IDS, Solaris BSM, Solaris
Operating System Authentication Messages, SonicWALL SonicOS, Sophos Astaro Security Gateway, Squid
Web Proxy, Starent Networks Home Agent (HA), Stonesoft Management Center, Sybase ASE, Symantec
Endpoint Protection, TippingPoint Intrusion Prevention System (IPS), TippingPoint X Series Appliances,
Top Layer IPS, Trend Micro Deep Discovery Inspector, Trend Micro Deep Security,Tripwire Enterprise,
Tropos Control, Universal DSM, VMware vCloud Director, Venustech Venusense Security Platform,
Vormetric Data Security, WatchGuard Fireware OS, genua genugate, iT-CUBE agileSI
Enabled by default
False
Default senseValue
10
Description
UBA : User Access First Access to Critical Assets: Indicates that this is the first time the user accessed
a critical asset. The "Critical Systems Users Seen" reference collection governs the time-to-live of an
observation. By default this rule detects the first access in three months.
UBA : Critical Systems Users Seen Update: Updates the last seen value in the "Critical Systems Users
Seen" reference collection for Destination IP/Username matches that already exist.
Support rules
• BB:CategoryDefinition: Authentication Success
• BB:UBA : Common Event Filters
Required configuration
Add the appropriate values to the following reference set: "Critical Assets".
80 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
UBA : User Access from Multiple Hosts
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : UBA : User Access from Multiple Hosts
Enabled by default
False
Default senseValue
5
Description
Detects when a single user logs in from more than an allowed number of devices.
Support rule
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
10
Description
Detects when a user uses a jump server to access the VPN or internal servers.
Support Rules
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Success
Required configuration
Add the appropriate values to the following reference sets: "UBA : Jump Servers" and "UBA : Internal
Servers".
82 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Module (WiSM), Citrix Access Gateway, Citrix NetScaler, CloudPassage Halo, Configurable Authentication
message filter, CorreLog Agent for IBM zOS, CrowdStrike Falcon Host, Custom Rule Engine, Cyber-Ark
Vault, DCN DCS/DCRS Series, EMC VMWare, ESET Remote Administrator, Enterasys Matrix K/N/S Series
Switch, Enterasys XSR Security Routers, Enterprise-IT-Security.com SF-Sherlock, Epic SIEM, Event CRE
Injected, Extreme 800-Series Switch,Extreme Dragon Network IPS, Extreme HiPath, Extreme Matrix E1
Switch, Extreme Networks ExtremeWare Operating System (OS), Extreme Stackable and Standalone
Switches, F5 Networks BIG-IP APM, F5 Networks BIG-IP LTM, F5 Networks FirePass, Flow Classification
Engine, ForeScout CounterACT, Fortinet FortiGate Security Gateway, Foundry Fastiron, FreeRADIUS, H3C
Comware Platform, HBGary Active Defense, HP Network Automation, HP Tandem, Huawei AR Series
Router, Huawei S Series Switch, HyTrust CloudControl, IBM AIX Audit, IBM AIX Server, IBM BigFix, IBM
DB2, IBM DataPower, IBM Fiberlink MaaS360, IBM IMS, IBM Lotus Domino,IBM Proventia Network
Intrusion Prevention System (IPS), IBM QRadar Network Security XGS, IBM Resource Access Control
Facility (RACF), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security Access Manager
for Mobile, IBM Security Identity Governance, IBM Security Identity Manager, IBM SmartCloud
Orchestrator, IBM Tivoli Access Manager for e-business, IBM WebSphere Application Server, IBM i, IBM
z/OS, IBM zSecure Alert, Illumio Adaptive Security Platform, Imperva SecureSphere, Itron Smart Meter,
Juniper Junos OS Platform, Juniper MX Series Ethernet Services Router, Juniper Networks Firewall and
VPN, Juniper Networks Intrusion Detection and Prevention (IDP), Juniper Networks Network and Security
Manager,Juniper Steel-Belted Radius, Juniper WirelessLAN, Kaspersky Security Center, Lieberman
Random Password Manager, Linux OS, Mac OS X, McAfee Application/Change Control, McAfee Firewall
Enterprise, McAfee IntruShield Network IPS Appliance, McAfee ePolicy Orchestrator, Metainfo MetaIP,
Microsoft DHCP Server, Microsoft Exchange Server, Microsoft IAS Server, Microsoft IIS, Microsoft ISA,
Microsoft Office 365, Microsoft Operations Manager, Microsoft SCOM, Microsoft SQL Server,Microsoft
Windows Security Event Log, Motorola SymbolAP, NCC Group DDos Secure, Netskope Active, Niara, Nortel
Application Switch, Nortel Contivity VPN Switch, Nortel Contivity VPN Switch (obsolete), Nortel Ethernet
Routing Switch 2500/4500/5500, Nortel Ethernet Routing Switch 8300/8600, Nortel Multiprotocol
Router, Nortel Secure Network Access Switch (SNAS), Nortel Secure Router, Nortel VPN Gateway, Novell
eDirectory, OS Services Qidmap, OSSEC, ObserveIT, Okta, OpenBSD OS, Oracle Acme Packet SBC, Oracle
Audit Vault, Oracle BEA WebLogic, Oracle Database Listener, Oracle Enterprise Manager, Oracle RDBMS
Audit Record, Oracle RDBMS OS Audit Record, PGP Universal Server, Palo Alto Endpoint Security
Manager, Palo Alto PA Series,Pirean Access: One, ProFTPD Server, Proofpoint Enterprise Protection/
Enterprise Privacy, Pulse Secure Pulse Connect Secure, RSA Authentication Manager, Radware AppWall,
Radware DefensePro, Redback ASE, Riverbed SteelCentral NetProfiler Audit, SIM Audit,SSH
CryptoAuditor, STEALTHbits StealthINTERCEPT, SafeNet DataSecure/KeySecure, Salesforce Security
Auditing, Salesforce Security Monitoring, Sentrigo Hedgehog, Skyhigh Networks Cloud Security Platform,
Snort Open Source IDS, Solaris BSM,Solaris Operating System Authentication Messages, Solaris
Operating System Sendmail Logs, SonicWALL SonicOS, Sophos Astaro Security Gateway, Squid Web
Proxy, Starent Networks Home Agent (HA), Stonesoft Management Center, Sybase ASE, Symantec
Endpoint Protection, TippingPoint Intrusion Prevention System (IPS), TippingPoint X Series Appliances,
Trend Micro Deep Discovery Email Inspector, Trend Micro Deep Security, Tripwire Enterprise, Tropos
Control, Universal DSMVMware vCloud Director, VMware vShield, Venustech Venusense Security
Platform, Verdasys Digital Guardian, Vormetric Data Security, WatchGuard Fireware OS, genua genugate,
iT-CUBE agileSI
Enabled by default
False
Default senseValue
5
Support rules
• BB:UBA : Common Event Filters
• Multiple Login Failures for Single Username
Required configuration
Enable the following rule: "Multiple Login Failures for Single Username"
Enabled by default
False
Default senseValue
15
Description
Indicates that a user is accessing internal resources from an anonymous source such as TOR or a VPN.
Support Rules
• BB:CategoryDefinition: Authentication Success
• BB:UBA : Common Event Filters
Required Configuration
Set "Enable X-Force Threat Intelligence Feed" to Yes in Admin Settings > System Settings.
84 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Vault, DCN DCS/DCRS Series, EMC VMWare, ESET Remote Administrator, Enterasys Matrix K/N/S Series
Switch, Enterasys XSR Security Routers, Enterprise-IT-Security.com SF-Sherlock, Epic SIEM, Event CRE
Injected, Extreme 800-Series Switch,Extreme Dragon Network IPS, Extreme HiPath, Extreme Matrix E1
Switch, Extreme Networks ExtremeWare Operating System (OS), Extreme Stackable and Standalone
Switches, F5 Networks BIG-IP APM, F5 Networks BIG-IP LTM, F5 Networks FirePass, Flow Classification
Engine, ForeScout CounterACT, Fortinet FortiGate Security Gateway, Foundry Fastiron, FreeRADIUS, H3C
Comware Platform, HBGary Active Defense, HP Network Automation, HP Tandem, Huawei AR Series
Router, Huawei S Series Switch, HyTrust CloudControl, IBM AIX Audit, IBM AIX Server, IBM BigFix, IBM
DB2, IBM DataPower, IBM Fiberlink MaaS360, IBM IMS, IBM Lotus Domino,IBM Proventia Network
Intrusion Prevention System (IPS), IBM QRadar Network Security XGS, IBM Resource Access Control
Facility (RACF), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security Access Manager
for Mobile,IBM Security Identity Governance, IBM Security Identity Manager, IBM SmartCloud
Orchestrator, IBM Tivoli Access Manager for e-business, IBM WebSphere Application Server, IBM i, IBM
z/OS, IBM zSecure Alert, Illumio Adaptive Security Platform, Imperva SecureSphere, Itron Smart Meter,
Juniper Junos OS Platform, Juniper MX Series Ethernet Services Router, Juniper Networks Firewall and
VPN, Juniper Networks Intrusion Detection and Prevention (IDP), Juniper Networks Network and Security
Manager,Juniper Steel-Belted Radius, Juniper WirelessLAN, Kaspersky Security Center, Lieberman
Random Password Manager, Linux OS, Mac OS X, McAfee Application/Change Control, McAfee Firewall
Enterprise, McAfee IntruShield Network IPS Appliance,McAfee ePolicy Orchestrator, Metainfo MetaIP,
Microsoft DHCP Server, Microsoft Exchange Server, Microsoft IAS Server, Microsoft IIS, Microsoft ISA,
Microsoft Office 365, Microsoft Operations Manager, Microsoft SCOM, Microsoft SQL Server,Microsoft
Windows Security Event Log, Motorola SymbolAP, NCC Group DDos Secure, Netskope Active, Niara, Nortel
Application Switch, Nortel Contivity VPN Switch, Nortel Contivity VPN Switch (obsolete), Nortel Ethernet
Routing Switch 2500/4500/5500,Nortel Ethernet Routing Switch 8300/8600, Nortel Multiprotocol
Router, Nortel Secure Network Access Switch (SNAS), Nortel Secure Router, Nortel VPN Gateway, Novell
eDirectory, OS Services Qidmap, OSSEC, ObserveIT, Okta, OpenBSD OS, Oracle Acme Packet SBC, Oracle
Audit Vault, Oracle BEA WebLogic, Oracle Database Listener, Oracle Enterprise Manager, Oracle RDBMS
Audit Record, Oracle RDBMS OS Audit Record, PGP Universal Server, Palo Alto Endpoint Security
Manager, Palo Alto PA Series,Pirean Access: One, ProFTPD Server, Proofpoint Enterprise Protection/
Enterprise Privacy, Pulse Secure Pulse Connect Secure, RSA Authentication Manager, Radware AppWall,
Radware DefensePro, Redback ASE, Riverbed SteelCentral NetProfiler Audit, SIM Audit,SSH
CryptoAuditor, STEALTHbits StealthINTERCEPT, SafeNet DataSecure/KeySecure, Salesforce Security
Auditing, Salesforce Security Monitoring, Sentrigo Hedgehog, Skyhigh Networks Cloud Security Platform,
Snort Open Source IDS, Solaris BSM,Solaris Operating System Authentication Messages, Solaris
Operating System Sendmail Logs, SonicWALL SonicOS, Sophos Astaro Security Gateway, Squid Web
Proxy, Starent Networks Home Agent (HA), Stonesoft Management Center, Sybase ASE, Symantec
Endpoint Protection, TippingPoint Intrusion Prevention System (IPS), TippingPoint X Series Appliances,
Trend Micro Deep Discovery Email Inspector, Trend Micro Deep Security, Tripwire Enterprise, Tropos
Control, Universal DSMVMware vCloud Director, VMware vShield, Venustech Venusense Security
Platform, Verdasys Digital Guardian, Vormetric Data Security, WatchGuard Fireware OS, genua genugate,
iT-CUBE agileSI
Enabled by default
False
Default senseValue
5
Support rules
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Success
• BB:UBA : Unusual Times, Evening
• BB:UBA : Unusual Times, Overnight
86 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Auditing, Salesforce Security Monitoring, Sentrigo Hedgehog, Skyhigh Networks Cloud Security Platform,
Snort Open Source IDS, Solaris BSM,Solaris Operating System Authentication Messages, Solaris
Operating System Sendmail Logs, SonicWALL SonicOS, Sophos Astaro Security Gateway, Squid Web
Proxy, Starent Networks Home Agent (HA), Stonesoft Management Center, Sybase ASE, Symantec
Endpoint Protection, TippingPoint Intrusion Prevention System (IPS), TippingPoint X Series Appliances,
Trend Micro Deep Discovery Email Inspector, Trend Micro Deep Security, Tripwire Enterprise, Tropos
Control, Universal DSMVMware vCloud Director, VMware vShield, Venustech Venusense Security
Platform, Verdasys Digital Guardian, Vormetric Data Security, WatchGuard Fireware OS, genua genugate,
iT-CUBE agileSI
Enabled by default
False
Default senseValue
10
Description
Detects when a Cisco VPN is accessed by a service or machine account. Accounts are listed in the 'UBA :
Service, Machine Account' reference set. Edit this list to add or remove any accounts to flag from your
environment.
Support rule
BB:UBA : VPN Mapping (logic)
Required configuration
Add the appropriate values to the following reference sets: "UBA : Service, Machine Account".
Enabled by default
False
Note: If you plan to use the UBA : VPN Certificate Sharing rule, you must update the Cisco Firewall DSM to
the following:
• For V7.3.1 and later: DSM-CiscoFirewallDevices-7.3-20170619132427.noarch.rpm
Default senseValue
15
Support rules
• BB:UBA : VPN Mapping (logic)
• UBA : Subject_CN and Username Map Update
• UBA : Subject_CN and Username Mapping
These rules update the associated reference sets with the required data.
Required configuration
Enable the following rules:
• UBA : Subject_CN and Username Map Update
• UBA : Subject_CN and Username Mapping
Enabled by default
False
Default senseValue
15
Description
Detects any interactive session (RDP, local login) that is initiated by a service or machine account in
Windows Server. Accounts are listed in the UBA : Service, Machine Account reference set. Edit the list to
add or remove any accounts to flag from your environment.
Support rules
BB:UBA : Common Event Filters
Required configuration
Add the appropriate values to the following reference sets: "UBA : Service, Machine Account".
88 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Accounts and privileges
UBA : Account or Group or Privileges Added
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Account or Group or Privileges Added (formerly called UBA : Account, Group or Privileges Added or
Modified)
Enabled by default
False
Default senseValue
5
Description
Detects events that a user performs and that fit into one of the following categories. The rule dispatches
an IBM Sense event to increment the originating user's risk score.
• Authentication.Group Added
• Authentication.Group Changed
• Authentication.Group Member Added
• Authentication.Computer Account Added
• Authentication.Computer Account Changed
• Authentication.Policy Added
• Authentication.Policy Change
• Authentication.Trusted Domain Added
• Authentication.User Account Added
• Authentication.User Account Changed
• Authentication.User Right Assigned
Note: To tune the impact of this rule on users' overall risk scores, consider modifying the building block
rule "CategoryDefinition: Authentication User or Group Added or Changed" by adding event categories of
interest to your organization.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : Authentication User or Group or Policy Added
90 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (First Observed Privilege Use)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (Rarely Used Privilege)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use Disabled Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use a Suspended Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
10
Description
Indicates when a user account was affected by an action which changes the user’s effective privileges,
either up or down.
False positive note: This event might misattribute modifications to an account name to the user making
the changes. If you want to reduce this false positive possibility you can add the test 'and when Username
equals AccountName'.
False negative note: This event might not detect all cases of account modifications for a user.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : Authentication User or Group or Policy Changed
Enabled by default
False
Default senseValue
10
Description
Detects DoS attack by checking the number of account deletion events against a fixed threshold within
fixed time span.
92 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : User Account Deleted
94 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Solaris BSM (EventID: delete user)
SonicWALL SonicOS (EventID: 559, 1157, 1158)
Trend Micro Deep Security (EventID: 651)
Universal DSM (EventID: Computer Account Removed, User Account Removed)
VMware vCloud Director (EventID: com/vmware/vcloud/event/user/remove, com/vmware/vcloud/event/
user/delete)
Vormetric Data Security (EventID: DAO0090I)
iT-CUBE agileSI (EventID: AU8, U0)
Related concepts
UBA : Account or Group or Privileges Added
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Account or Group or Privileges Modified
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Account Created and Deleted in a Short Period of Time
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Dormant Account Used
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Dormant Account Use Attempted
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Expired Account Used
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : First Privilege Escalation
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : New Account Use Detected
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (First Observed Privilege Use)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (Rarely Used Privilege)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use Disabled Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use a Suspended Account
Enabled by default
False
Default senseValue
15
Description
Detects when an user account is created and deleted in a short period of time.
Support rules
• BB:UBA : User Account Created
• BB:UBA : User Account Deleted
• BB:UBA : Common Event Filters
96 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (Rarely Used Privilege)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use Disabled Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use a Suspended Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
True
Default senseValue
10
Description
Detects the successful log in from an account that has been determined to be dormant.
For details on how accounts are determined to be dormant, see “Dormant accounts” on page 45.
Support rule
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Failures
Enabled by default
False
Default senseValue
5
Description
Detects the failed log in attempt from an account that has been determined to be dormant.
For details on how accounts are determined to be dormant, see “Dormant accounts” on page 45.
Support rule
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Failures
98 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Infrastructure Services, Check Point,Cilasoft QJRN/400, Cisco ACS,Cisco Adaptive Security Appliance
(ASA), Cisco Aironet, Cisco Call Manager, Cisco CatOS for Catalyst Switches, Cisco FireSIGHT
Management Center,Cisco Firewall Services Module (FWSM),Cisco IOS,Cisco Identity Services
Engine,Cisco Intrusion Prevention System (IPS),Cisco IronPort,Cisco NAC Appliance, Cisco Nexus, Cisco
PIX Firewall, Cisco VPN 3000 Series Concentrator, Cisco Wireless LAN Controllers, Cisco Wireless
Services Module (WiSM), Citrix Access Gateway, Citrix NetScaler, CloudPassage Halo, Configurable
Authentication message filter, CorreLog Agent for IBM zOS,CrowdStrike Falcon Host,Custom Rule Engine,
Cyber-Ark Vault, CyberGuard TSP Firewall/VPN, DCN DCS/DCRS Series, DG Technology MEAS, EMC
VMWare, ESET Remote Administrator, Enterprise-IT-Security.com SF-Sherlock, Epic SIEM,Event CRE
Injected,Extreme 800-Series Switch, Extreme Dragon Network IPS, Extreme HiPath, Extreme Matrix E1
Switch,Extreme Matrix K/N/S Series Switch,Extreme Networks ExtremeWare Operating System (OS),
Extreme Stackable and Standalone Switches, Extreme XSR Security Routers, F5 Networks BIG-IP APM,
F5 Networks BIG-IP LTM, F5 Networks FirePass, Flow Classification Engine, Forcepoint Sidewinder,
ForeScout CounterACT, Fortinet FortiGate Security Gateway, Foundry Fastiron, FreeRADIUS, H3C
Comware Platform, HBGary Active Defense, HP Network Automation, HP Tandem,Huawei AR Series
Router, Huawei S Series Switch, HyTrust CloudControl, IBM AIX Audit, IBM AIX Server, IBM Bluemix
Platform, IBM DB2, IBM DataPower,IBM Fiberlink MaaS360, IBM Guardium, IBM Lotus Domino, IBM
Proventia Network Intrusion Prevention System (IPS), IBM QRadar Network Security XGS,IBM Resource
Access Control Facility (RACF),IBM Security Access Manager for Enterprise Single Sign-On, IBM Security
Access Manager for Mobile, IBM Security Identity Governance, IBM Security Identity Manager,IBM
SmartCloud Orchestrator, IBM Tivoli Access Manager for e-business,IBM WebSphere Application
Server,IBM i,IBM z/OS,IBM zSecure Alert, ISC BIND, Illumio Adaptive Security Platform, Imperva
SecureSphere, Infoblox NIOS, Itron Smart Meter, Juniper Junos OS Platform, Juniper Junos WebApp
Secure, Juniper Networks Firewall and VPN, Juniper Networks Intrusion Detection and Prevention (IDP),
Juniper Networks Network and Security Manager, Juniper Steel-Belted Radius, Juniper WirelessLAN,
Lieberman Random Password Manager, LightCyber Magna, Linux OS, Mac OS X, McAfee Application/
Change Control,McAfee Network Security Platform,McAfee ePolicy Orchestrator, Microsoft IAS Server,
Microsoft IIS, Microsoft ISA, Microsoft Office 365, Microsoft SCOM, Microsoft SQL Server, Microsoft
SharePoint, Microsoft Windows Security Event Log, Motorola SymbolAP, Netskope Active, Nortel
Application Switch, Nortel Contivity VPN Switch, Nortel Contivity VPN Switch (obsolete), Nortel Ethernet
Routing Switch 2500/4500/5500, Nortel Ethernet Routing Switch 8300/8600, Nortel Multiprotocol
Router, Nortel Secure Network Access Switch (SNAS), Nortel Secure Router, Nortel VPN Gateway, Novell
eDirectory, OS Services Qidmap, OSSEC, Okta,OpenBSD OS, Open LDAP Software, Oracle Acme Packet
SBC, Oracle Audit Vault, Oracle BEA WebLogic, Oracle Enterprise Manager, Oracle RDBMS Audit Record,
Palo Alto PA Series, Pirean Access: One, PostFix MailTransferAgent, ProFTPD Server, Proofpoint
Enterprise Protection/Enterprise Privacy, Pulse Secure Pulse Connect Secure, RSA Authentication
Manager, Radware AppWall, Radware DefensePro, Riverbed SteelCentral NetProfiler Audit, SSH
CryptoAuditor, STEALTHbits StealthINTERCEPT, SafeNet DataSecure/KeySecure, Salesforce Security
Monitoring, Skyhigh Networks Cloud Security Platform, Snort Open Source IDS, Solaris BSM, Solaris
Operating System Authentication Messages, SonicWALL SonicOS, Sophos Astaro Security Gateway, Squid
Web Proxy, Starent Networks Home Agent (HA), Stonesoft Management Center, Sun ONE LDAP, Sybase
ASE,Symantec Encryption Management Server, Symantec Endpoint Protection, TippingPoint Intrusion
Prevention System (IPS), TippingPoint X Series Appliances, Top Layer IPS, Trend Micro Deep Discovery
Email Inspector, Trend Micro Deep Discovery Inspector, Trend Micro Deep Security, Tripwire Enterprise,
Tropos Control, Universal DSM, VMware vCloud Director, Venustech Venusense Security Platform,
Vormetric Data Security, WatchGuard Fireware OS, genua genugate, iT-CUBE agileSI
Related concepts
UBA : Account or Group or Privileges Added
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Account or Group or Privileges Modified
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : DoS Attack by Account Deletion
Enabled by default
False
Default senseValue
10
Description
Indicates that a user attempted to log in to a disabled or an expired account on a local system. This rule
might also suggest that an account was compromised.
Although not required, you can enable Search assets for username, when username is not available for
event or flow data in Admin Settings > UBA Settings.
Support rules
• BB:UBA : Common Event Filters
100 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
• BB:CategoryDefinition: Authentication to Expired Account
• BB:UBA : Expired Accounts (Kerberos)
Enabled by default
False
Default senseValue
10
Description
Indicates that a user executed privileged access for the first time. This reporting rule can be disabled to
allow the tracking of user behaviors for baselining purposes.
Support rule
BB:UBA : Privileged User, First Time Privilege Use (logic)
102 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Operations Manager, Microsoft SCOM, Microsoft SQL Server, Microsoft SharePoint, Microsoft Windows
Security Event Log, NCC Group DDos Secure, Netskope Active, Niara, Nortel Application Switch, Nortel
Ethernet Routing Switch 2500/4500/5500, Nortel Ethernet Routing Switch 8300/8600, Nortel Secure
Network Access Switch (SNAS), Nortel Secure Router, Nortel VPN Gateway, Novell eDirectory, OS
Services Qidmap, OSSEC, ObserveIT, Okta, OpenBSD OS,Oracle Acme Packet SBC, Oracle Audit Vault,
Oracle BEA WebLogic, Oracle Database Listener, Oracle Enterprise Manager, Oracle RDBMS Audit Record,
Oracle RDBMS OS Audit Record, PGP Universal Server, Palo Alto Endpoint Security Manager, Palo Alto PA
SeriesPirean Access: One, PostFix MailTransferAgent, Proofpoint Enterprise Protection/Enterprise
Privacy, Pulse Secure Pulse Connect Secure, RSA Authentication Manager, Radware AppWall, Radware
DefensePro, Riverbed SteelCentral NetProfiler Audit, SIM Audit, SSH CryptoAuditor, STEALTHbits
StealthINTERCEPT, SafeNet DataSecure/KeySecure, Salesforce Security Auditing, Samhain HIDS,
Sentrigo Hedgehog, Skyhigh Networks Cloud Security Platform, Snort Open Source IDS, Solaris BSM,
Solaris Operating System Authentication Messages, Solaris Operating System Sendmail Logs, SonicWALL
SonicOS, Squid Web Proxy, Starent Networks Home Agent (HA), Stonesoft Management Center,Sybase
ASE, Symantec Critical System Protection, Symantec Endpoint Protection, Symantec System Center,
System Notification, ThreatGRID Malware Threat Intelligence Platform, TippingPoint Intrusion Prevention
System (IPS),TippingPoint X Series Appliances, Top Layer IPS, Trend Micro Control Manager, Trend Micro
Deep Discovery Email Inspector, Trend Micro Deep Discovery Inspector, Trend Micro Deep Security,
Tripwire Enterprise, Universal DSM, VMware vCloud Director, VMware vShield, Venustech Venusense
Security Platform, Verdasys Digital Guardian, Vormetric Data Security, WatchGuard Fireware OS, genua
genugate, iT-CUBE agileSI
Related concepts
UBA : Account or Group or Privileges Added
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Account or Group or Privileges Modified
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : DoS Attack by Account Deletion
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Account Created and Deleted in a Short Period of Time
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Dormant Account Used
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Dormant Account Use Attempted
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Expired Account Used
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : New Account Use Detected
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (First Observed Privilege Use)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (Rarely Used Privilege)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use Disabled Account
Enabled by default
True
Default senseValue
5
Description
Provides reporting functions that indicate an account successfully used for the first time. Accounts are
tracked and monitored by the UBA app.
Note: Prior to UBA V3.5.0 this rule monitored every event coming into QRadar and added any new user
account seen on an event to UBA. It populated a reference set that stored all of the user accounts and
compared every event to this reference set. Starting in V3.5.0 this rule now triggers when the app sends
in an event indicating the account is new. All accounts are stored in the UBA database instead of a
reference table. For more information on how new accounts are detected, see “New accounts” on page
44.
104 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : First Privilege Escalation
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (First Observed Privilege Use)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (Rarely Used Privilege)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use Disabled Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use a Suspended Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
5
Description
Indicates that a user executed a privileged action that the user never executed before. Observations are
kept in "UBA : Observed Activities by Low Level Category and Username" map-of-sets.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : Privileged Activity
106 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Dormant Account Use Attempted
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Expired Account Used
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : First Privilege Escalation
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : New Account Use Detected
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (Rarely Used Privilege)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use Disabled Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use a Suspended Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
10
Description
Indicates that a user executed a privileged action that the user has not executed recently. Observations
are kept in "UBA : Recent Activities by Low Level Category and Username" map-of-sets. The sensitivity of
this event can be modified by changing the TTL (time-to-live) of the Reference Map-of-Sets for "UBA :
Recent Activities by Low Level Category and Username". Increasing the TTL reduces the sensitivity.
Decreasing the TTL increases the sensitivity.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : Privileged Activity
108 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Account Created and Deleted in a Short Period of Time
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Dormant Account Used
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Dormant Account Use Attempted
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Expired Account Used
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : First Privilege Escalation
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : New Account Use Detected
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Suspicious Privileged Activity (First Observed Privilege Use)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use Disabled Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Attempt to Use a Suspended Account
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
10
Description
Detects when a user tries to access the organization resources by using a disabled account.
Support rules
• BB:CategoryDefinition: Authentication to Disabled Account
• BB:UBA : Disabled Accounts (Kerberos)
• BB:UBA : Common Log Source Filters
110 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
10
Description
Detects when a user tries to access the organization resources by using suspended or blocked privileges.
Although not required, you can enable Search assets for username, when username is not available for
event or flow data in Admin Settings > UBA Settings.
Browsing behavior
UBA : Browsed to Business/Service Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Business/Service Website
Enabled by default
False
Default senseValue
5
Description
A user has accessed a URL that might indicate an elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
112 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Information Technology Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Job Search Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to LifeStyle Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Malicious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Mixed Content/Potentially Adult Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Phishing Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Pornography Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Religious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Uncategorized Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA: User Accessing Risky URL
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
5
Support rule
BB:UBA : URL Category Filter
114 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Uncategorized Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA: User Accessing Risky URL
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
5
Description
Detected user browsing a website associated with education content.
Support rule
BB:UBA : URL Category Filter
Enabled by default
False
Default senseValue
5
116 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
A user accessed a URL that might indicate elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
Enabled by default
False
Default senseValue
5
Description
A user accessed a URL that might indicate elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
118 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Information Technology Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Job Search Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to LifeStyle Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Malicious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Mixed Content/Potentially Adult Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Phishing Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Pornography Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Religious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Uncategorized Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA: User Accessing Risky URL
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
5
Support rule
BB:UBA : URL Category Filter
120 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Uncategorized Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA: User Accessing Risky URL
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
5
Description
A user accessed a URL that might indicate elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
Enabled by default
False
Default senseValue
15
122 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
A user accessed a URL that might indicate elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
Enabled by default
False
Default senseValue
5
Description
A user has accessed a URL that might indicate an elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
124 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Government Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Information Technology Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Job Search Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Malicious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Mixed Content/Potentially Adult Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Phishing Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Pornography Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Religious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Uncategorized Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA: User Accessing Risky URL
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
15
Support rule
BB:UBA : URL Category Filter
126 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Uncategorized Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA: User Accessing Risky URL
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
10
Description
A user accessed a URL that might indicate elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
Enabled by default
False
Default senseValue
15
128 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
A user accessed a URL that might indicate elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
Enabled by default
False
Default senseValue
10
Description
A user accessed a URL that might indicate elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
130 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Government Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Information Technology Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Job Search Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to LifeStyle Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Malicious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Mixed Content/Potentially Adult Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Phishing Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Religious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Uncategorized Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA: User Accessing Risky URL
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
5
Support rule
BB:UBA : URL Category Filter
132 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Uncategorized Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA: User Accessing Risky URL
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
5
Description
A user accessed a URL that might indicate elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
Enabled by default
False
Default senseValue
15
134 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
A user accessed a website that is categorized as Social Networking.
Support rules
BB:UBA : URL Category Filter
Enabled by default
False
Default senseValue
5
Description
A user accessed a URL that might indicate an elevated security or legal risk.
Support rule
BB:UBA : URL Category Filter
136 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Government Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Information Technology Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Job Search Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to LifeStyle Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Malicious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Mixed Content/Potentially Adult Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Phishing Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Pornography Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Religious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA: User Accessing Risky URL
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Description
This rule detects when a local user is accessing questionable online content.
Required configuration
• Set Enable X-Force Threat Intelligence Feed to Yes in Admin Settings > System Settings.
• Enable the following rule: X-Force Risky URL.
138 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Religious Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Scam/Questionable/Illegal Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Social Networking Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Browsed to Uncategorized Website
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Cloud
UBA : Anonymous User Accessed a Resource
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Anonymous User Accessed a Resource
Enabled by default
False
Default senseValue
15
Description
Detects an anonymous user accessing a resource.
Support rules
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
10
Support rules
BB:UBA : Common Event Filters
Required configuration
• Install the following package from the IBM Security App Exchange: IBM QRadar Content Extension for
Monitoring Amazon AWS.
• Add the appropriate values to the following reference set: "AWS - Standard Users"
• Configure the following log source: Amazon AWS CloudTrail
Enabled by default
False
Default senseValue
10
Description
Detects repeated failures to log in to mailbox from an external user.
Support rules
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
10
140 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
Detects when a user failed to correctly set mailbox audit logging bypass.
Support rules
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
15
Description
Detects if a mailbox is set to forward to a domain that is not listed in the Trust Domains reference set.
Support rules
BB:UBA : Common Event Filters
Required configuration
Add the appropriate values to the following reference sets: "UBA : Trusted Domains".
Enabled by default
False
Default senseValue
5
Description
Detects several mailbox login failures before a successful login from an internal user.
Enabled by default
False
Default senseValue
10
Description
Detects mailbox permissions that are added and deleted within an hour.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : Remove Mailbox Permission Succeeded
• BB:UBA : Add Mailbox Permission Succeeded
Enabled by default
False
Default senseValue
10
Description
Detects a non-standard user who is attempting to access Amazon Web Services (AWS) resources.
Support rules
• BB:UBA : Common Event Filters
142 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
• AWS Cloud: S3 Bucket accessed by Non-Standard User
Enabled by default
False
Default senseValue
10
Description
Detects a sharing invitation being sent to a guest.
Support rule
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
15
Description
Detects when an item's sharing policy is changed to share with a guest user.
Support rule
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
10
Description
Detects a user being added to a group in Sharepoint or OneDrive by a System Admin.
Support rule
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
10
Description
Detects when an attempt to add a user to a role fails.
Support rule
BB:UBA : Common Event Filters
Domain controller
UBA : DPAPI Backup Master Key Recovery Attempted
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : DPAPI Backup Master Key Recovery Attempted
144 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enabled by default
False
Default senseValue
10
Description
Detects when recovery is attempted for a DPAPI Master Key.
Support rule
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
10
Description
Detects Kerberos account enumeration by detecting high number of user names being used to make
Kerberos requests from same source IP.
Support rule
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
15
Support rules
• BB:UBA : Common Log Source Filters
• BB:UBA : Kerberos Authentication Failures
Required configuration
Enable Search assets for username, when username is not available for event or flow data in Admin
Settings > UBA Settings.
Enabled by default
False
Default senseValue
5
Description
Detects non-admin account access attempts to domain controller.
Support rule
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Success
• BB:CategoryDefinition: Authentication Failures
Required configuration
Add the appropriate values to the following reference sets: "UBA : Domain Controllers" and "UBA :
Domain Controller Administrators"
146 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Module (WiSM), Citrix Access Gateway, Citrix NetScaler, CloudPassage Halo, Configurable Authentication
message filter, CorreLog Agent for IBM zOS, CrowdStrike Falcon Host, Custom Rule Engine, Cyber-Ark
Vault, DCN DCS/DCRS Series, EMC VMWare, ESET Remote Administrator, Enterasys Matrix K/N/S Series
Switch, Enterasys XSR Security Routers, Enterprise-IT-Security.com SF-Sherlock, Epic SIEM, Event CRE
Injected, Extreme 800-Series Switch, Extreme Dragon Network IPS, Extreme HiPath, Extreme Matrix E1
Switch, Extreme Networks ExtremeWare Operating System (OS), Extreme Stackable and Standalone
Switches, F5 Networks BIG-IP APM, F5 Networks BIG-IP LTM, F5 Networks FirePass, Flow Classification
Engine, ForeScout CounterACT, Fortinet FortiGate Security Gateway, Foundry Fastiron, FreeRADIUS, H3C
Comware Platform, HBGary Active Defense, HP Network Automation, HP Tandem, Huawei AR Series
Router, Huawei S Series Switch, HyTrust CloudControl, IBM AIX Audit, IBM AIX Server, IBM BigFix, IBM
DB2, IBM DataPower, IBM Fiberlink MaaS360, IBM IMS, IBM Lotus Domino, IBM Proventia Network
Intrusion Prevention System (IPS), IBM QRadar Network Security XGS, IBM Resource Access Control
Facility (RACF), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security Access Manager
for Mobile, IBM Security Identity Governance, IBM Security Identity Manager, IBM SmartCloud
Orchestrator, IBM Tivoli Access Manager for e-business, IBM WebSphere Application Server, IBM i, IBM
z/OS, IBM zSecure Alert, Illumio Adaptive Security Platform, Imperva SecureSphere, Itron Smart Meter,
Juniper Junos OS Platform, Juniper MX Series Ethernet Services Router, Juniper Networks Firewall and
VPN, Juniper Networks Intrusion Detection and Prevention (IDP), Juniper Networks Network and Security
Manager, Juniper Steel-Belted Radius, Juniper WirelessLAN, Kaspersky Security Center, Lieberman
Random Password Manager, Linux OS, Mac OS X, McAfee Application/Change Control, McAfee Firewall
Enterprise, McAfee IntruShield Network IPS Appliance, McAfee ePolicy Orchestrator, Metainfo MetaIP,
Microsoft DHCP Server, Microsoft Exchange Server, Microsoft IAS Server, Microsoft IIS, Microsoft ISA,
Microsoft Office 365, Microsoft Operations Manager, Microsoft SCOM, Microsoft SQL Server, Microsoft
Windows Security Event Log, Motorola SymbolAP, NCC Group DDos Secure, Netskope Active, Niara, Nortel
Application Switch, Nortel Contivity VPN Switch, Nortel Contivity VPN Switch (obsolete), Nortel Ethernet
Routing Switch 2500/4500/5500, Nortel Ethernet Routing Switch 8300/8600, Nortel Multiprotocol
Router, Nortel Secure Network Access Switch (SNAS), Nortel Secure Router, Nortel VPN Gateway, Novell
eDirectory, OS Services Qidmap, OSSEC, ObserveIT, Okta, OpenBSD OS, Oracle Acme Packet SBC, Oracle
Audit Vault, Oracle BEA WebLogic, Oracle Database Listener, Oracle Enterprise Manager, Oracle RDBMS
Audit Record, Oracle RDBMS OS Audit Record, PGP Universal Server, Palo Alto Endpoint Security
Manager, Palo Alto PA Series, Pirean Access: One, ProFTPD Server, Proofpoint Enterprise Protection/
Enterprise Privacy, Pulse Secure Pulse Connect Secure, RSA Authentication Manager, Radware AppWall,
Radware DefensePro, Redback ASE, Riverbed SteelCentral NetProfiler Audit, SIM Audit, SSH
CryptoAuditor, STEALTHbits StealthINTERCEPT, SafeNet DataSecure/KeySecure, Salesforce Security
Auditing, Salesforce Security Monitoring, Sentrigo Hedgehog, Skyhigh Networks Cloud Security Platform,
Snort Open Source IDS, Solaris BSM, Solaris Operating System Authentication Messages, Solaris
Operating System Sendmail Logs, SonicWALL SonicOS, Sophos Astaro Security Gateway, Squid Web
Proxy, Starent Networks Home Agent (HA), Stonesoft Management Center, Sybase ASE, Symantec
Endpoint Protection, TippingPoint Intrusion Prevention System (IPS), TippingPoint X Series Appliances,
Trend Micro Deep Discovery Email Inspector, Trend Micro Deep Security, Tripwire Enterprise, Tropos
Control, Universal DSM, VMware vCloud Director, VMware vShield, Venustech Venusense Security
Platform, Verdasys Digital Guardian, Vormetric Data Security, WatchGuard Fireware OS, genua genugate,
iT-CUBE agileSI
Enabled by default
False
Default senseValue
15
Support rule
BB:UBA : Common Event Filters
Required configuration:
Add the appropriate values to the following reference set: UBA : Trusted Domains.
Enabled by default
False
Default senseValue
5
Description
Detects reconnaissance attempts to Directory Service Enumeration.
Support rule
BB:UBA : Common Event Filters
Required configuration
Add the appropriate values to the following reference set: "UBA : Domain Controller Administrators"
Enabled by default
False
Default senseValue
10
148 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
Detects attempts at SMB enumeration against a domain controller.
Support rule
BB:UBA : Common Event Filters
Required configuration
Add the appropriate values to the following reference sets:
• UBA : Domain Controllers
• UBA : Domain Controller Administrators
Enabled by default
False
Default senseValue
15
Description
Detects Kerberos TGTs that contain Domain Name anomalies. These possibly indicate tickets that are
generated by using pass the ticket exploits.
Support rule
BB:UBA : Common Event Filters
Required configuration
Add the appropriate values to the following reference sets: UBA : Trusted Domains.
Enabled by default
False
Description
Detects use of Forged PAC certificate to get a Service Ticket from Kerberos TGS.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : TCT PAC Forgery Patched Server
• BB:UBA : TCT PAC Forgery Unpatched Server
Required configuration
Add the appropriate values to the following reference set: "UBA : Domain Controller Administrators".
Enabled by default
False
Default senseValue
5
Description
Detects replication requests from an illegitimate Domain Controller
Support rules
BB:UBA : Common Event Filters
Required configuration
Add the appropriate values to the following reference set: "UBA : Domain Controller Administrators".
150 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enabled by default
False
Default senseValue
15
Description
Detects Kerberos TGT ticket being used on two (or more) different computers.
Support rule
BB:UBA : Common Event Filters
UBA : Kerberos Account Mapping
This rule updates the associated reference sets with the required data.
Required configuration
Enable the following rules: "UBA : Kerberos Account Mapping"
Endpoint
UBA : Detect Insecure Or Non-Standard Protocol
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Detect Insecure Or Non-Standard Protocol
Enabled by default
False
Default senseValue
5
Description
Detects any user that is communicating over unauthorized protocols that are regarded as insecure or non-
standard protocols. Authorized protocols are listed in the UBA : Ports of Authorized Protocols reference
set with default value 0, which is the port of QRadar events. Edit the UBA : Ports of Authorized Protocols
reference set to flag from your environment before you enable this rule.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : Insecure Ports
•
Required configuration
Add the appropriate values to the following reference set: UBA : Ports Of Authorized Protocols.
Enabled by default
False
152 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Default senseValue
10
Description
Detects SSH sessions that are active for more than 10 hours.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : SSH Session Closed
• BB:UBA : SSH Session Opened
Required configuration
This rule requires both SSH Opened and SSH Closed events to occur for an accurate detection. If the log
source that is used does not have an eventID for both events, you might receive inaccurate results. See
the Data sources to determine eventIDs for the log source in use.
154 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enabled by default
False
Default senseValue
15
Description
Detects modifications of internet settings on the system.
Support rule
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
15
Description
Detects processes that modify multiple registry values in bulk within a shorter interval.
Support rule
BB:UBA : Common Event Filters
156 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Installing Suspicious Application
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Running New Process
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Volume Shadow Copy Created
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
15
Description
Detects netcat process on a Linux system.
Support rule
BB:UBA : Common Log Source Filters
Required configuration
Enable Search assets for username, when username is not available for event or flow data in Admin
Settings > UBA Settings.
Enabled by default
False
Default senseValue
15
Description
Detects Netcat process on a Windows system.
Support rule
BB:UBA : Common Event Filters
158 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Internet Settings Modified
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Malware Activity - Registry Modified In Bulk
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Netcat Process Detection (Linux)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Process Executed Outside Gold Disk Whitelist (Linux)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Process Executed Outside Gold Disk Whitelist (Windows)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Ransomware Behavior Detected
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Restricted Program Usage
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Installing Suspicious Application
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Running New Process
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Volume Shadow Copy Created
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
15
Description
Detects processes that are created on a Linux system and alerts when the process is outside of the
golden disk process whitelist.
Note: The rule is disabled by default. Enable the rule only after you populate or modify the process names
to be whitelisted in the reference set 'UBA : Gold Disk Process Whitelist - Linux'.
Support rule
BB:UBA : Common Log Source Filters
160 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
15
Description
Detects processes that are created on a Windows system and alerts when the process is outside the
golden disk process whitelist.
Note: The rule is disabled by default. Enable the rule only after you populate or modify the process names
to be whitelisted in the reference set 'UBA : Gold Disk Process Whitelist - Windows'.
Required configuration
Add the appropriate values to the following reference set: "UBA : Gold Disk Process Whitelist - Windows".
Enabled by default
False
Default senseValue
15
Description
Detects behavior that is typically seen during a ransomware infection.
Support rule
BB:UBA : Common Event Filters
Required configuration
Add the appropriate values to the following reference set: "UBA : Windows Common Processes".
162 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Netcat Process Detection (Linux)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Netcat Process Detection (Windows)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Process Executed Outside Gold Disk Whitelist (Linux)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Process Executed Outside Gold Disk Whitelist (Windows)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Restricted Program Usage
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Installing Suspicious Application
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Running New Process
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Volume Shadow Copy Created
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
5
Description
Indicates that a process is created and the process name matches one of the binary names listed in the
reference set "UBA : Restricted Program Filenames". This reference set is blank by default so that you can
customize it. You can populate the reference set with file names that you want to monitor for risk
management.
For more information about adding or removing programs for monitoring, see Managing restricted
programs.
Support rule
BB:UBA : Common Event Filters
164 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enabled by default
False
Default senseValue
15
Description
Detects application installation events and then alerts when suspicious applications are seen. Note:
Populate the reference set "UBA : Authorized Applications" with the application names that are
authorized in the organization. Rule "UBA : Populate Authorized Applications" can be enabled for a short
duration to populate this reference set.
Rule "UBA : Populate Authorized Applications" populates the reference set "UBA : Authorized
Applications" with the names of applications that are installed while this rule is enabled. Note: The rule is
disabled by default. Enable for a shorter duration to populate the names while users are installing
applications.
Enabled by default
False
Default senseValue
15
Description
Detects processes that are created by the user and then alerts when a user runs a new process.
Rule "UBA: Populate Process Filenames" populates the reference set "UBA : Process Filenames" used as
a utility rule for "UBA : User Running New Process." Note: The rule is disabled by default. Enable the rule
for a shorter duration to populate the filenames.
Support rule
BB:UBA : Common Event Filters, UBA : Populate Process Filenames
Required configuration
Add the appropriate values to the following reference set: "UBA : Process Filenames".
166 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Netcat Process Detection (Linux)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Netcat Process Detection (Windows)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Process Executed Outside Gold Disk Whitelist (Linux)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Process Executed Outside Gold Disk Whitelist (Windows)
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Ransomware Behavior Detected
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Restricted Program Usage
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Installing Suspicious Application
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Volume Shadow Copy Created
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
15
Description
Detects shadow copies that were created using vssadmin.exe or Windows Management Instrumentation
Command-line (WMIC).
Support rule
BB:UBA : Common Event Filters
Exfiltration
UBA : Data Exfiltration by Cloud Services
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Data Exfiltration by Cloud Services
Enabled by default
False
Default senseValue
5
168 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
Detects users that are uploading files to personal cloud services.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : File Transfer to Cloud services
Enabled by default
False
Default senseValue
5
Description
Detects users that are sending files to print or that are using screen capture tools such as Print Screen
and Snipping Tool.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : File Transfer to Print
Enabled by default
False
Default senseValue
5
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : File Transfer to CD
• BB:UBA : File Transfer to USB
Enabled by default
False
Default senseValue
15
Description
Detects possible data loss determined by either the data source, event category or specific events related
to data loss detection and prevention.
Support rules
• BB:UBA : Data Loss Categories
• BB:UBA : Data Loss Devices
• BB:UBA : Data Loss Events
170 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
TippingPoint Intrusion Prevention System (IPS) (EventID: 26335,26334, 26336,27318, 27494, 27515)
Universal DSM (EventID: Data Loss Possible, Data Loss Prevention Policy Violation)
Verdasys Digital Guardian (EventID: ADE Screen Capture, Application Data Exchange, Attach Mail, CD
Burn, File Archive, File Copy, File Delete, File Move, File Recycle, File Rename, File Save As, Network
Transfer Download, Network Transfer Upload, Print, Print Screen, ADE Print Process)
WatchGuard Fireware OS (EventID: 1CFF0011, 1AFF002F, 1AFF0030, 1AFF0031, 1BFF0024, 1BFF0025,
1BFF0026, 1BFF0027, 1CFF0012, 1CFF0013, 1CFF0014)
Enabled by default
False
Default senseValue
15
Description
Detects the scenario of phishing or malware activity followed by suspicious access activity within 24
hours. Note: Edit the supported building blocks to monitor any rules that are appropriate for the
environment.
Support rules
BB:UBA : Compromised Account - Initial Access
• UBA : Browsed to Malicious Website
• UBA : Browsed to Phishing Website
• UBA : Browsed to Scam/Questionable/Illegal Website
• UBA : User Accessing Risky IP, Botnet
• UBA : User Accessing Risky IP, Malware
BB:UBA : Compromised Account - Execution
• UBA : User Geography Change
• UBA : Unauthorized Access
• UBA : User Access - Failed Access to Critical Assets
• UBA : User Access Login Anomaly
• UBA : User Accessing Account from Anonymous Source
• UBA : Account or Group or Privileges Added
• UBA : Account or Group or Privileges Modified
• UBA : User Account Created and Deleted in a Short Period of Time
• UBA : Dormant Account Use Attempted
• UBA : Dormant Account Used
• UBA : User Time, Access at Unusual Times
• “UBA : Suspicious Privileged Activity (Rarely Used Privilege)” on page 107
Enabled by default
False
Default senseValue
15
Description
Detects an outbound transfer of 200,000 bytes or more by a high risk user.
Support rules
BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
10
Description
Detects exfiltration by checking for file uploads that were initially blocked but were followed by a
successful upload within a span of 5 minutes.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : Blocked File Transfer
• BB:UBA : Successful File Transfer
172 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Required configuration
This rule requires both Blocked file transfers and Successful file transfers events to occur for an accurate
detection. If the log source that is used does not have an eventID for both events, you might receive
inaccurate results. See the Data sources to determine eventIDs for the log source in use.
Enabled by default
False
Default senseValue
25
Description
Detects scenario of suspicious activity followed by exfiltration within 24 hours.
Support rules
UBA : Initial Access Followed by Suspicious Activity
UBA : Suspicious Activity Followed by Exfiltration
Required configuration
See supported rules
Enabled by default
False
Default senseValue
15
174 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
Detects access from unusual, restricted, or prohibited locations followed by a data exfiltration attempt.
Support rule
• BB:UBA : Common Event Filters
• BB:UBA : Data Exfiltration
• UBA : User Access from Restricted Location
• UBA : User Access from Prohibited Location
• UBA : User Geography, Access from Unusual Locations
Required configuration
Enable the following rules:
• UBA : User Access from Restricted Location
• UBA : User Access from Prohibited Location
• UBA : User Geography, Access from Unusual Locations
Enabled by default
False
Default senseValue
15
Description
Detects scenario of suspicious activity followed by exfiltration within 24 hours.
Support rules
BB:UBA : Compromised Account - Execution
• “UBA : User Geography Change” on page 186
• “UBA : Unauthorized Access” on page 76
• “UBA : User Access - Failed Access to Critical Assets” on page 78
• “UBA : User Access Login Anomaly” on page 83
• “UBA : User Accessing Account from Anonymous Source” on page 84
• UBA : Account or Group or Privileges Added
Required configuration
See supported rules
Enabled by default
False
Default senseValue
10
Description
Detects 3 or more instances of potential phishing attacks on a single user within an hour. Note: Edit the
supported building block to monitor any rules that are appropriate for the environment.
Support rules
BB:UBA : Compromised Account - Initial Access
• UBA : Browsed to Malicious Website
• UBA : Browsed to Phishing Website
• UBA : Browsed to Scam/Questionable/Illegal Website
• UBA : User Accessing Risky IP, Botnet
• UBA : User Accessing Risky IP, Malware
Required configuration
See supported rules
176 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Geography
UBA : Anomalous Account Created From New Location
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Anomalous Account Created From New Location
Enabled by default
False
Default senseValue
5
Description
Detects anomalous account creation activity from new location.
Support rules
• BB:UBA : Cloud Endpoints
• BB:UBA : User Account Created
• BB:UBA : Common Event Filters
• UBA : User Geography Change
Required configuration
Enable the following rule: "UBA : User Geography Change".
178 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
McAfee ePolicy Orchestrator (EventID: 20792)
Microsoft ISA (EventID: user added)
Microsoft SQL Server (EventID: CR - SU, CR - US, CR - SL, CR - LX, CR - AR, CR - WU, 24127, 24121,
24075)
Microsoft SharePoint (EventID: 37)
Microsoft Windows Security Event Log (EventID: 624, 645, 1318, 4720, 4741)
NCC Group DDos Secure (EventID: 1003)
Netskope Active (EventID: Create Admin, Created new admin)
Novell eDirectory (EventID: CREATE_ACCOUNT)
OS Services Qidmap (EventID: User Account Added)
OSSEC (EventID: 5902, 18110)
Okta (EventID: app.user_management.push_new_user_success, app.generic.import.details.add_user,
app.generic.import.new_user, app.user_management.provision_user,
app.user_management.push_new_user, app.user_management.push_profile_success,
core.user.config.user_creation.success, core.user_group_member.user_add,
cvd.user_profile_bootstrapped, cvd.appuser_profile_bootstrapped)
OpenBSD OS (EventID: add user)
Oracle Enterprise Manager (EventID: User Create (successful), Computer Create (successful))
Oracle RDBMS Audit Record (EventID: 51:1, 51:0, CREATE USER-Standard:1, CREATE USER-Standard:0)
Oracle RDBMS OS Audit Record (EventID: 51)
Pirean Access: One (EventID: IsimUserRegistration;*;1)
Pulse Secure Pulse Connect Secure (EventID: ADM23303, ADM20265, AUT20167, ADM30407,
AUT20168)
RSA Authentication Manager (EventID: Added user, unknown, REMOTE_PRINCIPAL_CREATE,
CREATE_PRINCIPAL, CREATE_AM_PRINCIPAL)
SIM Audit (EventID: Configuration-UserAccount-AccountAdded)
STEALTHbits StealthINTERCEPT (EventID: Active DirectorycomputerObject AddedTrueFalse, Console ?
user/group added, Console � user/group added, Active DirectoryuserObject AddedTrueFalse, Console -
user/group added)
SafeNet DataSecure/KeySecure (EventID: Added user)
Salesforce Security Auditing (EventID: Created new Customer User, Created new user)
Skyhigh Networks Cloud Security Platform (EventID: 10016)
Solaris BSM (EventID: create user)
SonicWALL SonicOS (EventID: 558)
Symantec Encryption Management Server (EventID: ADMIN_IMPORTED_USER)
ThreatGRID Malware Threat Intelligence Platform (EventID: user-account-creation)
Trend Micro Deep Discovery Email Inspector (EventID: SYSTEM_EVENT_ACCOUNT_CREATED)
Trend Micro Deep Security (EventID: 650)
Universal DSM (EventID: Computer Account Added, User Account Added)
VMware vCloud Director (EventID: com/vmware/vcloud/event/user/create, com/vmware/vcloud/event/
user/import)
Vormetric Data Security (EventID: DAO0089I)
Enabled by default
False
Default senseValue
10
Description
Detects cloud account creation activities from a new location.
Support rules
• BB:UBA : Common Event Filters
• BB:UBA : Cloud Endpoints
• BB:UBA : User Account Created
• UBA : User Geography Change
Required configuration
Enable the following rule: "UBA : User Geography Change".
180 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Related concepts
UBA : Anomalous Account Created From New Location
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Access from Multiple Locations
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Access from Prohibited Location
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Access from Restricted Location
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Geography Change
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Geography, Access from Unusual Locations
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
5
Description
Indicates that multiple locations or sources are using the same user account simultaneously. Adjust the
match and duration parameters to tune responsiveness.
Support rule
BB:UBA : Common Event Filters
182 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Geography, Access from Unusual Locations
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
15
Description
Detects user access from a location not in the "UBA : Allowed Location List."
Support rules:
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Success
•
Required configuration
Add the appropriate values to the following reference set: UBA : Allowed Location List
184 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
Default senseValue
15
Description
Detects user access from a location on the "UBA : Restricted Location List." You can add countries from
"geographic location" to the "UBA : Restricted Location List."
Support rules
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Success
•
Required configuration
Add the appropriate values to the following reference set: UBA : Restricted Location List
186 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enabled by default
False
Default senseValue
5
Description
A match indicates that a user logged in remotely from a country that is different from the country of the
user's last remote login. This rule might also indicate an account compromise, particularly if the rule
matches occurred closely in time.
Support rules
• BB:UBA : Common Event Filters
• BB:CategoryDefinition: Authentication Success
• UBA : User Geography Map
Required configuration
Enable the following rule: UBA : User Geography Map
Support rule
User Geography Map
This rule updates the associated reference sets with the required data.
Related concepts
UBA : Anomalous Account Created From New Location
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Anomalous Cloud Account Created From New Location
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Access from Multiple Locations
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Access from Prohibited Location
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Access from Restricted Location
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : User Geography, Access from Unusual Locations
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
Enabled by default
False
188 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Default senseValue
15
Description
Indicates that users were able to authenticate in countries that are unusual for your network, as defined
by the building block rule "UBA : BB : Unusual Source Locations".
Support rules
• BB:UBA : Unusual Source Locations
• BB:CategoryDefinition: Authentication Success
• BB:UBA : Common Event Filters
Enabled by default
False
Default senseValue
15
Description
Detects network Denial of Service (DoS) attacks by a user.
Note: Before you can use this rule, complete the following steps:
1. From the Admin tab, click UBA Settings.
190 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
2. Select the Search assets for username, when username is not available for event or flow data
checkbox to search for user names in the asset table. The UBA app uses assets to look up a user for an
IP address when no user is listed in an event.
3. The event rule needs "Snort Open Source IDS" log source to work.
Support rules
• BB:UBA : Common Log Source Filters
• BB:CategoryDefinition: DDoS Attack Events
• BB:CategoryDefinition: Network DoS Attack
• BB:CategoryDefinition: Service DoS
Required configuration
Enable Search assets for username, when username is not available for event or flow data in Admin
Settings > UBA Settings.
Enabled by default
False
Description
Detects activity using a Honeytoken account.
Support rules
BB:UBA : Common Event Filters
Required configuration
Add the appropriate values to the following reference sets: UBA : Honeytoken Accounts
Add the appropriate log sources to the following log source groups: UBA : Systems with Honeytoken
Accounts.
Enabled by default
False
Default senseValue
15
Description
Indicates that a process is created and the process name matches one of the binary names that are listed
in the reference set "UBA : Network Capture, Monitoring and Analysis Program Filenames". This reference
set lists the binary names of network packet capturing software. The reference set is pre-populated with
the names of some common network protocol analysis software filenames.
For more information about adding or removing programs for monitoring, see Managing network
monitoring tools.
Support rule
BB:UBA : Common Event Filters
192 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Required configuration
Add the appropriate values to the following reference set: UBA : Network Capture, Monitoring and
Analysis Program Filenames.
Enabled by default
False
Default senseValue
5
Description
Detects events that indicate the user potentially accessed a blacklist domain. Requires the IBM QRadar
DNS Analyzer app.
Required configuration
Before enabling this rule, you must install the IBM QRadar DNS Analyzer app. For more information, see
IBM QRadar DNS Analyzer.
Support rule
BB:UBA : DNS Common Filter
Default senseValue
5
Description
Detects events that indicate the user potentially accessed a DGA (Domain Generated by Algorithm)
domain. Requires the IBM QRadar DNS Analyzer app.
Required configuration
Before enabling this rule, you must install the IBM QRadar DNS Analyzer app. For more information, see
IBM QRadar DNS Analyzer.
Support rule
BB:UBA : DNS Common Filter
Enabled by default
False
Default senseValue
5
Description
Detects events that indicate the user potentially accessed a squatting domain. Requires the IBM QRadar
DNS Analyzer app.
Required configuration
Before enabling this rule, you must install the IBM QRadar DNS Analyzer app. For more information, see
IBM QRadar DNS Analyzer.
Support rule
BB:UBA : DNS Common Filter
194 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
UBA : Potential Access to Tunneling Domain
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Potential Access to Tunneling Domain
Enabled by default
False
Default senseValue
5
Description
Detects events that indicate the user potentially accessed a tunneling domain. Requires the IBM DNS
Analyzer app.
Required configuration
Before enabling this rule, you must install the IBM QRadar DNS Analyzer app. For more information, see
IBM QRadar DNS Analyzer.
Support rule
BB:UBA : DNS Common Filter
Threat intelligence
UBA : Detect IOCs For Locky
The QRadar User Behavior Analytics (UBA) app supports use cases based on rules for certain behavioral
anomalies.
UBA : Detect IOCs For Locky
Enabled by default
False
Default senseValue
10
Description
Detects user computers that show Indicators of Compromise (IOCs) for Locky by using URLs or IPs that
are populated from X-Force campaign feeds.
Support rules
• BB:UBA : Common Log Source Filters
• BB:UBA : Detect Locky Using IP
• BB:UBA : Detect Locky Using URL
Enabled by default
False
Default senseValue
10
Description
Detects user computers that show Indicators of Compromise (IOCs) for WannaCry by using URLs, IPs, or
hashes that are populated from X-Force campaign feeds.
Support rules
• BB:UBA : Common Log Source Filters
• BB:UBA : Detect WannaCry Using Hashes
• BB:UBA : Detect WannaCry Using IP
• BB:UBA : Detect WannaCry Using URL
Required configuration
• Add the appropriate values to the following reference sets: UBA : Malware Activity WannaCry - Hash,
UBA : Malware Activity WannaCry - IP, and UBA : Malware Activity WannaCry - URL.
• Enable Search assets for username, when username is not available for event or flow data in Admin
Settings > UBA Settings.
Enabled by default
False
196 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Default senseValue
15
Description
Detects more than 2 connections to the same QRadar log source system within 5 minutes from a single
user.
Support rules
BB:UBA : Common Event Filters
BB:CategoryDefinition: Authentication Success
Required configuration
Add the appropriate values to the following reference sets: "UBA : Monitored Log Sources (NIS
Directive)".
Enabled by default
False
Default senseValue
10
Description
Detects ShellBag registry modifications that indicate typical malware or ransomware behavior.
Support rules
BB:UBA : Common Event Filters
Description
This rule detect when a local user or host is connecting to an external anonymization service.
Support rules
• X-Force Risky IP, Anonymization
• BB:UBA : Common Event Filters
Required configuration
• Set "Enable X-Force Threat Intelligence Feed" to Yes in Admin Settings > System Settings.
• Enable the following rule: X-Force Risky IP, Anonymization.
Enabled by default
False
Description
This rule detects when a local user or host is connecting to a botnet command and control server.
Support rules
• X-Force Risky IP, Botnet
• BB:UBA : Common Event Filters
Required configuration
• Set "Enable X-Force Threat Intelligence Feed" to Yes in Admin Settings > System Settings.
• Enable the following rule: X-Force Risky IP, Botnet.
Enabled by default
False
198 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Description
This rule detects when a local user or host is connecting to a dynamically assigned IP address.
Support rules
• X-Force Risky IP, Dynamic
• BB:UBA : Common Event Filters
Required configuration
• Set "Enable X-Force Threat Intelligence Feed" to Yes in Admin Settings > System Settings.
• Enable the following rule: X-Force Risky IP, Dynamic.
Enabled by default
False
Description
This rule detects when a local user or host is connecting to a malware host.
Support rules
• X-Force Risky IP, Malware
• BB:UBA : Common Event Filters
Required configuration
• Set "Enable X-Force Threat Intelligence Feed" to Yes in Admin Settings > System Settings.
• Enable the following rule: X-Force Risky IP, Malware.
Enabled by default
False
Description
This rule detects when a local user or host is connecting to a spam-sending host.
Required configuration
• Set "Enable X-Force Threat Intelligence Feed" to Yes in Admin Settings > System Settings.
• Enable the following rule: X-Force Risky IP, Spam.
Content dependencies
For more information about other supported QRadar content and required apps, see the following table.
200 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Required Apps Supported Rules
IBM QRadar Content Extension for Amazon AWS • AWS Cloud: Cloud activity by root user
• AWS Cloud: Critical EC2 Instance Has Been
Stopped OR Terminated
• AWS Cloud: Detected A Successful Login To AWS
Console From Different Geographies
• AWS Cloud: Logs Have Been Deleted / Disabled
or Stopped
• AWS Cloud: Multiple Console Login Failures From
Different Source IPs
• AWS Cloud: Multiple Console Login Failures from
Same Source IP
• AWS Cloud: Multiple Failed API Requests From
Different Source IPs
• AWS Cloud: Multiple Failed API Requests From
Same Source IP
• AWS Cloud: Multiple Failed API Requests From
The Same Username
202 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
UBA : User Accessing Risky Resources
204 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
• UBA : Browsed to Malicious Website
• UBA : Browsed to Mixed Content/Potentially Adult Website
• UBA : Browsed to Phishing Website
• UBA : Browsed to Pornography Website
• UBA : Browsed to Religious Website
• UBA : Browsed to Scam/Questionable/Illegal Website
• UBA : Browsed to Social Networking Website
• UBA : Browsed to Uncategorized Website
• UBA : Bruteforce Authentication Attempts
• UBA : Data Loss Possible
• UBA : Detect Persistent SSH session
• UBA : Dormant Account Use Attempted
• UBA : Dormant Account Used
• UBA : Expired Account Used
• UBA : First Privilege Escalation
• UBA : Internet Settings Modified
• UBA : Kerberos Account Enumeration Detected
• UBA : Malware Activity - Registry Modified In Bulk
• UBA : Multiple Blocked File Transfers Followed by a File Transfer
• UBA : Multiple VPN Accounts Failed Login from Single IP
• UBA : Multiple VPN Accounts Logged In from Single IP
• UBA : Netcat Process Detection (Linux)
• UBA : Netcat Process Detection (Windows)
• UBA : New Account Use Detected
• UBA : Populate Multiple VPN Accounts Failed Login from Single IP
• UBA : Populate Multiple VPN Accounts Logged In from Single IP
• UBA : Repeat Unauthorized Access
• UBA : Replication Request from a Non-Domain Controller
• UBA : ShellBags Modified By Ransomware
• UBA : Suspicious Privileged Activity (First Observed Privilege Use)
• UBA : Suspicious Privileged Activity (Rarely Used Privilege)
• UBA : Terminated User Activity
• UBA : Unauthorized Access
• UBA : UNIX/Linux System Accessed With Service or Machine Account
• UBA : User Access - Failed Access to Critical Assets
• UBA : User Access - First Access to Critical Assets
• UBA : User Access from Multiple Locations
• UBA : User Access Login Anomaly
• UBA : User Accessing Account from Anonymous Source
• UBA : User Accessing Risky IP, Anonymization
• UBA : User Accessing Risky IP, Botnet
• UBA : User Accessing Risky IP, Dynamic
• UBA : User Accessing Risky IP, Malware
206 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Chapter 9. Machine Learning Analytics app
The Machine Learning Analytics (ML) app extends the capabilities of your QRadar system and the QRadar
User Behavior Analytics (UBA) app by adding use cases for machine learning analytics. With the Machine
Learning Analytics models, you can gain additional insight into user behavior with predictive modeling.
The ML app helps your system to learn the expected behavior of the users in your network.
Attention: You must install IBM QRadar 7.3.2 or later before you install the UBA app and the ML
app. You must also have admin permissions.
Note: For the best experience with Machine Learning, you should consider running the UBA app and the
ML app on an App Host. For more information, see App Host.
Important:
• It is best to enable Machine Learning Analytics Settings one day after you initially configure the UBA
app. This waiting period ensures that the UBA app has sufficient time to create risk profiles for users.
• The QRadar console limits the amount of memory that can be used by apps. The ML app installation size
options are based on how much memory QRadar currently has for applications.
– The minimum amount of free memory required to install the ML app is 2 GB. However, 5 GB or higher
is recommended.
– The number of users monitored by the ML app depends on the ML app installation size and the
specific Machine Learning analytic. Starting at 5 GB the maximum number of monitored users by any
Machine Learning model is 40,000 per 5 GB up to 160,000 users total. For example, 5 GB would be
up to 40,000 users and 15 GB would be up to 120,000 users.
• The installation might fail due to a lack of available memory. This situation can occur if the amount of
memory available for applications is decreased because other applications are installed.
Procedure
208 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
3. On the Machine Learning Settings page, click Install ML App.
4. At the prompt, click Yes to install the app. The ML app takes several minutes to install.
What to do next
When the installation is complete, you can enable ML use cases and then click Save Configuration.
Dashboard
After you enable the Machine Learning models, click the User Analytics tab to open the dashboard.
The Status of Machine Learning Models section shows you the ingestion and the building progress for
each model you have enabled.
• The light blue progress bar indicates that the model is ingesting data.
• The blue progress bar indicates that the model is building.
Click the ML Settings icon to open the Machine Learning Analytics page and edit the configuration
for the Machine Learning Analytics models.
Note: If you edit the configuration after it has been saved, a new model will be built and the time to wait
for the ingestion and model building is reset.
Access Activity Shows actual and expected user activity behavior patterns by Access high-level
category. The actual values are the number of events per high-level category for that
user during the selected time period. The expected values are the predicted number
of events per high-level category for that user during the selected time period. A red
circle indicates that an anomaly was detected and a sense event was generated by
machine learning.
On the Access Activity graph, you can:
• Click the Calendar icon to specify a time and date.
• Click a category to open the timeline graph for the selected category.
210 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
On the timeline graph for the selected category, you can:
• Click a data node and get a query listing of the events that represent that node.
• Click the Calendar icon to specify a custom date range.
Activity Shows dynamic behavior clusters for all users that are monitored by machine
Distribution learning. The clusters are inferred by the low-level activity categories for all users
that are monitored by machine learning. The actual values are the percent match to
that cluster. The expected values are the predicted percent match to that cluster.
Each color in the graph represents a unique dynamic behavior cluster for all users
monitored by machine learning. A color used to denote a particular group is the
same for all users. A red vertical line indicates that an anomaly was detected and a
sense event was generated by machine learning.
On the Activity Distribution graph, you can:
• Hover over each cluster to view the actual and predicted activity percentiles and
the top 3 contributing low-level categories.
• Click the Calendar icon to specify a date range.
Aggregated Shows the actual and expected (learned) amount of activity of users throughout the
Activity day. The actual values are the number of events for that user during the selected
time period. The expected values are the number of events predicted for that user
during the selected time period. A red circle indicates that an anomaly was detected
and a sense event was generated by machine learning.
On the Aggregated Activity graph, you can:
• Click a data node and get a query listing of the events that make up the anomaly.
• Click the Calendar icon to specify a custom date range.
Authentication Shows actual and expected user activity behavior patterns by Authentication high-
Activity level category. The actual values are the number of events per high-level category
for that user during the selected time period. The expected values are the predicted
number of events per high-level category for that user during the selected time
period. A red circle indicates that an anomaly was detected and a sense event was
generated by machine learning.
On the Authentication Activity graph, you can:
• Click the Calendar icon to specify a time and date.
• Click a category to open the timeline graph for the selected category.
On the timeline graph for the selected category, you can:
• Click a data node and get a query listing of the events that represent that node.
• Click the Calendar icon to specify a custom date range.
Data Downloaded Shows if a user's inbound traffic usage has deviated from their expected behavior.
The actual values are the volume of data received during the selected time period.
Learned Peer Shows how much the user deviated from the inferred peer group they were expected
Group to be in. The Learned Peer Group is inferred by the low-level activity categories for
the user.
A red circle indicates that an anomaly was detected and a sense event was
generated by machine learning. Anomaly triggered by lists the low-level category
that is detected by the algorithm that caused the deviation. Deviation from peer
212 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
group signifies the percentage a user has deviated from their inferred peer group.
Confidence is based on the amount of data gathered to build the model from users
in the group to make accurate predictions. An alert is triggered if the deviation and
the confidence both exceed their thresholds.
On the Learned Peer Group graph, you can:
• Click a data point to view the Peers in Group table.
• Click the Calendar icon to specify a date range.
The Peers in Group table shows you all the users that are expected and that are
actually in the group. You can:
• Click a user name to open the User Details page
• Expected match shows how confident the analytic is for that user to be in the
group
• Click the drop-down list to select the user attributes to display
• Search to filter the user names
Outbound Shows if a user's outbound traffic usage has deviated from their expected behavior.
Transfer The actual values are the number of transfer attempts for that user during the
Attempts selected time period. The learned values are the model's predicted number of
transfer attempts. A red circle indicates that an anomaly was detected and a sense
event was generated by machine learning.
On the Abnormal Outbound Transfer Attempts graph, you can:
• Click a node and get a query listing of the events.
• Click the Calendar icon to specify a custom date range.
Risk Posture Shows if a user's risk score deviates from their expected risk score pattern. The
actual values are the sum of the sense values for the sense events for that user
during the selected time period. The expected values are the predicted sum of the
sense values for the sense events for that user during the selected time period. A red
circle indicates that an anomaly was detected and a sense event was generated by
machine learning.
On the Risk Posture graph, you can:
• Click a node and get a query listing of the events.
• Click the Calendar icon to specify a custom date range.
Related tasks
“Enabling user models” on page 214
To view information in the Machine Learning Analytics app, you must configure Machine Learning settings
for User Models.
214 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Example
Access Activity
Enable the Access Activity machine learning model to display the user’s activity in the Access high-level
category on the User Details page.
Procedure
3. On the Machine Learning Settings page, click Enabled to turn on the Access Activity
model.
4. Click Access Activity if you want to edit the default settings.
5. In the Risk value of sense event field, enter the amount to increase the user's risk score when a
sense event is triggered. The default value is 5.
216 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
6. Enable the toggle to scale the risk value. When enabled, the base risk value is multiplied by a factor
(range 1 - 10). This factor is determined by how much the user deviates from their expected behavior
and not just that they deviated.
7. In the Confidence interval to trigger anomaly field, enter the percentage for how confident the
machine learning algorithm should be before it triggers an anomalous event. The default value is
0.95.
8. In the Data Retention Period field, set the number of days you want to save the model data. The
default value is 30.
9. The Show graph on User Details page toggle is enabled by default to display the Access Activity
graph on the User Details page. If you do not want to display the Access Activity graph on the User
Details page, click the toggle.
10. In the AQL Search Filter field, you can add an AQL filter to narrow the data that the analytic queries
for in QRadar. By filtering with an AQL query, you can reduce the number of users or the types of data
the analytic is analyzing. Before you save your settings, click Validate Query to launch a full AQL
query in QRadar so that you can review the query and verify the results.
Important: If you modify the AQL filter, the existing model is marked invalid and is then rebuilt. The
length of time the rebuild takes depends on the amount of data that is returned by the modified filter.
You can filter on specific log sources, network names, or reference sets that contain specific users.
See the following examples:
• REFERENCESETCONTAINS('Important People', username)
• LOGSOURCETYPENAME(devicetype) in ('Linux OS', 'Blue Coat SG Appliance',
'Microsoft Windows Security Event Log')
• INCIDR('172.16.0.0/12', sourceip) or INCIDR('10.0.0.0/8', sourceip) or
INCIDR('192.168.0.0/16', sourceip)
For more information, see Ariel Query Language.
11. Click Save.
218 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enable the Data Downloaded machine learning model to display data that is downloaded for each user on
the User Details page.
Data Uploaded to Remote Networks
Enable the Data Uploaded to Remote Networks machine learning model to display the actual and
expected (learned) amount of local to remote upload volume for each user on the User Details page.
Defined Peer Group
Configure the Defined Peer Group machine learning model to display how much a user's event activity
deviates from the event activity of their defined peer group on the User Details page.
Learned Peer Group
Enable the Learned Peer Group machine learning model to display how much the user deviated from the
inferred peer group they were expected to be in on the User Details page.
Outbound Transfer Attempts
Enable the Outbound Transfer Attempts machine learning model to display outbound traffic usage for
each user on the User Details page.
Risk Posture
Enable the Risk Posture machine learning model to display the user's risk score deviation on the User
Details page.
Suspicious Activity
Enable the Suspicious Activity machine learning model to display the actual and expected (learned)
amount of Suspicious Activity high-level category on the User Details page.
Creating a custom model
Create a custom model to measure and baseline a numeric feature for a person per hour.
Activity Distribution
Configure the Activity Distribution machine learning model to display dynamic behavior clusters for all
users that are monitored by machine learning on the User Details page.
Procedure
220 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Results
It can take a minimum of 1 hour for the app to ingest data and build an initial model.
Related tasks
Access Activity
Enable the Access Activity machine learning model to display the user’s activity in the Access high-level
category on the User Details page.
Aggregated Activity
Enable the Aggregated Activity machine learning model to display the user’s general activity by time on
the User Details page.
Authentication Activity
Enable the Authentication Activity machine learning model to display the user’s activity in the
Authentication high-level category on the User Details page.
Data Downloaded
Aggregated Activity
Enable the Aggregated Activity machine learning model to display the user’s general activity by time on
the User Details page.
Procedure
3. On the Machine Learning Settings page, click Enabled to turn on the Aggregated Activity
model.
222 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
4. Click Aggregated Activity if you want to edit the default settings.
5. In the Risk value of sense event field, enter the amount to increase the user's risk score when a
sense event is triggered. The default value is 5.
6. Enable the toggle to scale the risk value. When enabled, the base risk value is multiplied by a factor
(range 1 - 10). This factor is determined by how much the user deviates from their expected behavior
and not just that they deviated.
7. In the Confidence interval to trigger anomaly field, enter the percentage for how confident the
machine learning algorithm should be before it triggers an anomalous event. The default value is
0.95.
8. In the Data Retention Period field, set the number of days you want to save the model data. The
default value is 30.
9. The Show graph on User Details page toggle is enabled by default to display the Aggregated Activity
graph on the User Details page. If you do not want to display the Aggregated Activity graph on the
User Details page, click the toggle.
10. In the AQL Search Filter field, you can add an AQL filter to narrow the data that the analytic queries
for in QRadar. By filtering with an AQL query, you can reduce the number of users or the types of data
the analytic is analyzing. Before you save your settings, click Validate Query to launch a full AQL
query in QRadar so that you can review the query and verify the results.
Important: If you modify the AQL filter, the existing model is marked invalid and is then rebuilt. The
length of time the rebuild takes depends on the amount of data that is returned by the modified filter.
You can filter on specific log sources, network names, or reference sets that contain specific users.
See the following examples:
• REFERENCESETCONTAINS('Important People', username)
• LOGSOURCETYPENAME(devicetype) in ('Linux OS', 'Blue Coat SG Appliance',
'Microsoft Windows Security Event Log')
• INCIDR('172.16.0.0/12', sourceip) or INCIDR('10.0.0.0/8', sourceip) or
INCIDR('192.168.0.0/16', sourceip)
For more information, see Ariel Query Language.
11. Click Save.
224 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enable the Data Downloaded machine learning model to display data that is downloaded for each user on
the User Details page.
Data Uploaded to Remote Networks
Enable the Data Uploaded to Remote Networks machine learning model to display the actual and
expected (learned) amount of local to remote upload volume for each user on the User Details page.
Defined Peer Group
Configure the Defined Peer Group machine learning model to display how much a user's event activity
deviates from the event activity of their defined peer group on the User Details page.
Learned Peer Group
Enable the Learned Peer Group machine learning model to display how much the user deviated from the
inferred peer group they were expected to be in on the User Details page.
Outbound Transfer Attempts
Enable the Outbound Transfer Attempts machine learning model to display outbound traffic usage for
each user on the User Details page.
Risk Posture
Enable the Risk Posture machine learning model to display the user's risk score deviation on the User
Details page.
Suspicious Activity
Enable the Suspicious Activity machine learning model to display the actual and expected (learned)
amount of Suspicious Activity high-level category on the User Details page.
Creating a custom model
Create a custom model to measure and baseline a numeric feature for a person per hour.
Authentication Activity
Enable the Authentication Activity machine learning model to display the user’s activity in the
Authentication high-level category on the User Details page.
226 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Procedure
3. On the Machine Learning Settings page, click Enabled to turn on the Authentication
Activity model.
4. Click Authentication Activity if you want to edit the default settings.
5. In the Risk value of sense event field, enter the amount to increase the user's risk score when a
sense event is triggered. The default value is 5.
6. Enable the toggle to scale the risk value. When enabled, the base risk value is multiplied by a factor
(range 1 - 10). This factor is determined by how much the user deviates from their expected behavior
and not just that they deviated.
7. In the Confidence interval to trigger anomaly field, enter the percentage for how confident the
machine learning algorithm should be before it triggers an anomalous event. The default value is
0.95.
8. In the Data Retention Period field, set the number of days you want to save the model data. The
default value is 30.
9. The Show graph on User Details page toggle is enabled by default to display the Authentication
Activity graph on the User Details page. If you do not want to display the Authentication Activity
graph on the User Details page, click the toggle.
10. In the AQL Search Filter field, you can add an AQL filter to narrow the data that the analytic queries
for in QRadar. By filtering with an AQL query, you can reduce the number of users or the types of data
the analytic is analyzing. Before you save your settings, click Validate Query to launch a full AQL
query in QRadar so that you can review the query and verify the results.
Important: If you modify the AQL filter, the existing model is marked invalid and is then rebuilt. The
length of time the rebuild takes depends on the amount of data that is returned by the modified filter.
You can filter on specific log sources, network names, or reference sets that contain specific users.
See the following examples:
• REFERENCESETCONTAINS('Important People', username)
• LOGSOURCETYPENAME(devicetype) in ('Linux OS', 'Blue Coat SG Appliance',
'Microsoft Windows Security Event Log')
• INCIDR('172.16.0.0/12', sourceip) or INCIDR('10.0.0.0/8', sourceip) or
INCIDR('192.168.0.0/16', sourceip)
For more information, see Ariel Query Language.
11. Click Save.
228 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enable the Data Downloaded machine learning model to display data that is downloaded for each user on
the User Details page.
Data Uploaded to Remote Networks
Enable the Data Uploaded to Remote Networks machine learning model to display the actual and
expected (learned) amount of local to remote upload volume for each user on the User Details page.
Defined Peer Group
Configure the Defined Peer Group machine learning model to display how much a user's event activity
deviates from the event activity of their defined peer group on the User Details page.
Learned Peer Group
Enable the Learned Peer Group machine learning model to display how much the user deviated from the
inferred peer group they were expected to be in on the User Details page.
Outbound Transfer Attempts
Enable the Outbound Transfer Attempts machine learning model to display outbound traffic usage for
each user on the User Details page.
Risk Posture
Enable the Risk Posture machine learning model to display the user's risk score deviation on the User
Details page.
Suspicious Activity
Enable the Suspicious Activity machine learning model to display the actual and expected (learned)
amount of Suspicious Activity high-level category on the User Details page.
Creating a custom model
Create a custom model to measure and baseline a numeric feature for a person per hour.
Data Downloaded
Enable the Data Downloaded machine learning model to display data that is downloaded for each user on
the User Details page.
Procedure
230 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Results
It can take a minimum of 1 hour for the app to ingest data and build an initial model.
Related tasks
Access Activity
Enable the Access Activity machine learning model to display the user’s activity in the Access high-level
category on the User Details page.
Activity Distribution
Configure the Activity Distribution machine learning model to display dynamic behavior clusters for all
users that are monitored by machine learning on the User Details page.
Aggregated Activity
Enable the Aggregated Activity machine learning model to display the user’s general activity by time on
the User Details page.
Authentication Activity
Procedure
232 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
3. On the Machine Learning Settings page, click Enabled to turn on the Data Uploaded to
Remote Networks model.
4. Click Data Uploaded to Remote Networks if you want to edit the default settings.
5. In the Risk value of sense event field, enter the amount to increase the user's risk score when a
sense event is triggered. The default value is 5.
6. Enable the toggle to scale the risk value. When enabled, the base risk value is multiplied by a factor
(range 1 - 10). This factor is determined by how much the user deviates from their expected behavior
and not just that they deviated.
7. In the Confidence interval to trigger anomaly field, enter the percentage for how confident the
machine learning algorithm should be before it triggers an anomalous event. The default value is
0.95.
8. In the Data Retention Period field, set the number of days you want to save the model data. The
default value is 30.
9. The Show graph on User Details page toggle is enabled by default to display the Data Uploaded to
Remote Networks graph on the User Details page. If you do not want to display the Data Uploaded to
Remote Networks graph on the User Details page, click the toggle.
10. In the AQL Search Filter field, you can add an AQL filter to narrow the data that the analytic queries
for in QRadar. By filtering with an AQL query, you can reduce the number of users or the types of data
the analytic is analyzing. Before you save your settings, click Validate Query to launch a full AQL
query in QRadar so that you can review the query and verify the results.
Important: If you modify the AQL filter, the existing model is marked invalid and is then rebuilt. The
length of time the rebuild takes depends on the amount of data that is returned by the modified filter.
You can filter on specific log sources, network names, or reference sets that contain specific users.
See the following examples:
• REFERENCESETCONTAINS('Important People', username)
• LOGSOURCETYPENAME(devicetype) in ('Linux OS', 'Blue Coat SG Appliance',
'Microsoft Windows Security Event Log')
• INCIDR('172.16.0.0/12', sourceip) or INCIDR('10.0.0.0/8', sourceip) or
INCIDR('192.168.0.0/16', sourceip)
For more information, see Ariel Query Language.
11. Click Save.
234 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enable the Authentication Activity machine learning model to display the user’s activity in the
Authentication high-level category on the User Details page.
Data Downloaded
Enable the Data Downloaded machine learning model to display data that is downloaded for each user on
the User Details page.
Defined Peer Group
Configure the Defined Peer Group machine learning model to display how much a user's event activity
deviates from the event activity of their defined peer group on the User Details page.
Learned Peer Group
Enable the Learned Peer Group machine learning model to display how much the user deviated from the
inferred peer group they were expected to be in on the User Details page.
Outbound Transfer Attempts
Enable the Outbound Transfer Attempts machine learning model to display outbound traffic usage for
each user on the User Details page.
Risk Posture
Enable the Risk Posture machine learning model to display the user's risk score deviation on the User
Details page.
Suspicious Activity
Enable the Suspicious Activity machine learning model to display the actual and expected (learned)
amount of Suspicious Activity high-level category on the User Details page.
Creating a custom model
Create a custom model to measure and baseline a numeric feature for a person per hour.
3. On the Machine Learning Settings page, click Enabled to turn on the Defined Peer Group
model.
Important: You must have 7 days of data available for the analytic to generate a model.
4. Click Defined Peer Group if you want to edit the default settings.
5. In the Risk value of sense event field, enter the amount to increase the user's risk score when a
sense event is triggered. The default value is 5.
6. Enable the toggle to scale the risk value. When enabled, the base risk value is multiplied by a factor
(range 1 - 10). This factor is determined by how much the user deviates from their expected behavior
and not just that they deviated.
7. In the Confidence interval to trigger anomaly field, enter the percentage for how confident the
machine learning algorithm should be before it triggers an anomalous event. The default value is
0.99.
8. In the Data Retention Period field, set the number of days you want to save the model data. The
default value is 30.
9. The Show graph on User Details page toggle is enabled by default to display the Defined Peer Group
graph on the User Details page. If you do not want to display the Defined Peer Group graph on the
User Details page, click the toggle.
10. In the Group By field, select the group that you want the Defined Peer Group analytic to use.
11. In the AQL Search Filter field, you can add an AQL filter to narrow the data that the analytic queries
for in QRadar. By filtering with an AQL query, you can reduce the number of users or the types of data
the analytic is analyzing. Before you save your settings, click Validate Query to launch a full AQL
query in QRadar so that you can review the query and verify the results.
Important: If you modify the AQL filter, the existing model is marked invalid and is then rebuilt. The
length of time the rebuild takes depends on the amount of data that is returned by the modified filter.
You can filter on specific log sources, network names, or reference sets that contain specific users.
See the following examples:
• REFERENCESETCONTAINS('Important People', username)
• LOGSOURCETYPENAME(devicetype) in ('Linux OS', 'Blue Coat SG Appliance',
'Microsoft Windows Security Event Log')
• INCIDR('172.16.0.0/12', sourceip) or INCIDR('10.0.0.0/8', sourceip) or
INCIDR('192.168.0.0/16', sourceip)
For more information, see Overview of Ariel Query Language.
12. Click Save.
236 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Results
It can take a minimum of 1 hour for the app to ingest data and build an initial model.
Related tasks
Access Activity
Enable the Access Activity machine learning model to display the user’s activity in the Access high-level
category on the User Details page.
Activity Distribution
Configure the Activity Distribution machine learning model to display dynamic behavior clusters for all
users that are monitored by machine learning on the User Details page.
Aggregated Activity
Enable the Aggregated Activity machine learning model to display the user’s general activity by time on
the User Details page.
Authentication Activity
Procedure
238 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
3. On the Machine Learning Settings page, click Enabled to turn on the Learned Peer Group
model.
Important: You must have 7 days of data available for the analytic to generate a model.
4. Click Learned Peer Group if you want to edit the default settings.
5. In the Risk value of sense event field, enter the amount to increase the user's risk score when a
sense event is triggered. The default value is 5.
6. Enable the toggle to scale the risk value. When enabled, the base risk value is multiplied by a factor
(range 1 - 10). This factor is determined by how much the user deviates from their expected behavior
and not just that they deviated.
7. In the Confidence interval to trigger anomaly field, enter the percentage for how confident the
machine learning algorithm should be before it triggers an anomalous event. The default value is
0.99.
8. In the Data Retention Period field, set the number of days you want to save the model data. The
default value is 30.
9. The Show graph on User Details page toggle is enabled by default to display the Learned Peer Group
graph on the User Details page. If you do not want to display the Learned Peer Group graph on the
User Details page, click the toggle.
10. In the AQL Search Filter field, you can add an AQL filter to narrow the data that the analytic queries
for in QRadar. By filtering with an AQL query, you can reduce the number of users or the types of data
the analytic is analyzing. Before you save your settings, click Validate Query to launch a full AQL
query in QRadar so that you can review the query and verify the results.
Important: If you modify the AQL filter, the existing model is marked invalid and is then rebuilt. The
length of time the rebuild takes depends on the amount of data that is returned by the modified filter.
You can filter on specific log sources, network names, or reference sets that contain specific users.
See the following examples:
• REFERENCESETCONTAINS('Important People', username)
• LOGSOURCETYPENAME(devicetype) in ('Linux OS', 'Blue Coat SG Appliance',
'Microsoft Windows Security Event Log')
• INCIDR('172.16.0.0/12', sourceip) or INCIDR('10.0.0.0/8', sourceip) or
INCIDR('192.168.0.0/16', sourceip)
For more information, see Ariel Query Language.
11. Click Save.
240 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enable the Authentication Activity machine learning model to display the user’s activity in the
Authentication high-level category on the User Details page.
Data Downloaded
Enable the Data Downloaded machine learning model to display data that is downloaded for each user on
the User Details page.
Data Uploaded to Remote Networks
Enable the Data Uploaded to Remote Networks machine learning model to display the actual and
expected (learned) amount of local to remote upload volume for each user on the User Details page.
Defined Peer Group
Configure the Defined Peer Group machine learning model to display how much a user's event activity
deviates from the event activity of their defined peer group on the User Details page.
Outbound Transfer Attempts
Enable the Outbound Transfer Attempts machine learning model to display outbound traffic usage for
each user on the User Details page.
Risk Posture
Enable the Risk Posture machine learning model to display the user's risk score deviation on the User
Details page.
Suspicious Activity
Enable the Suspicious Activity machine learning model to display the actual and expected (learned)
amount of Suspicious Activity high-level category on the User Details page.
Creating a custom model
Create a custom model to measure and baseline a numeric feature for a person per hour.
Procedure
242 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Results
It can take a minimum of 1 hour for the app to ingest data and build an initial model.
Related tasks
Access Activity
Enable the Access Activity machine learning model to display the user’s activity in the Access high-level
category on the User Details page.
Activity Distribution
Configure the Activity Distribution machine learning model to display dynamic behavior clusters for all
users that are monitored by machine learning on the User Details page.
Aggregated Activity
Risk Posture
Enable the Risk Posture machine learning model to display the user's risk score deviation on the User
Details page.
Procedure
244 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
2. In QRadar 7.3.2 or later, click Apps > User Analytics > Machine Learning Settings.
3. On the Machine Learning Settings page, click Enabled to turn on the Risk Posture model.
4. Click Risk Posture if you want to edit the default settings.
5. In the Risk value of sense event field, enter the amount to increase the user's risk score when a
sense event is triggered. The default value is 5.
6. Enable the toggle to scale the risk value. When enabled, the base risk value is multiplied by a factor
(range 1 - 10). This factor is determined by how much the user deviates from their expected behavior
and not just that they deviated.
7. In the Confidence interval to trigger anomaly field, enter the percentage for how confident the
machine learning algorithm should be before it triggers an anomalous event. The default value is
0.95.
8. In the Data Retention Period field, set the number of days you want to save the model data. The
default value is 30.
9. The Show graph on User Details page toggle is enabled by default to display the Risk Posture graph
on the User Details page. If you do not want to display the Risk Posture graph on the User Details
page, click the toggle.
10. In the AQL Search Filter field, you can add an AQL filter to narrow the data that the analytic queries
for in QRadar. By filtering with an AQL query, you can reduce the number of users or the types of data
the analytic is analyzing. Before you save your settings, click Validate Query to launch a full AQL
query in QRadar so that you can review the query and verify the results.
Important: If you modify the AQL filter, the existing model is marked invalid and is then rebuilt. The
length of time the rebuild takes depends on the amount of data that is returned by the modified filter.
You can filter on specific log sources, network names, or reference sets that contain specific users.
See the following examples:
• REFERENCESETCONTAINS('Important People', username)
• LOGSOURCETYPENAME(devicetype) in ('Linux OS', 'Blue Coat SG Appliance',
'Microsoft Windows Security Event Log')
• INCIDR('172.16.0.0/12', sourceip) or INCIDR('10.0.0.0/8', sourceip) or
INCIDR('192.168.0.0/16', sourceip)
For more information, see Ariel Query Language.
11. Click Save.
246 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enable the Authentication Activity machine learning model to display the user’s activity in the
Authentication high-level category on the User Details page.
Data Downloaded
Enable the Data Downloaded machine learning model to display data that is downloaded for each user on
the User Details page.
Data Uploaded to Remote Networks
Enable the Data Uploaded to Remote Networks machine learning model to display the actual and
expected (learned) amount of local to remote upload volume for each user on the User Details page.
Defined Peer Group
Configure the Defined Peer Group machine learning model to display how much a user's event activity
deviates from the event activity of their defined peer group on the User Details page.
Learned Peer Group
Enable the Learned Peer Group machine learning model to display how much the user deviated from the
inferred peer group they were expected to be in on the User Details page.
Outbound Transfer Attempts
Enable the Outbound Transfer Attempts machine learning model to display outbound traffic usage for
each user on the User Details page.
Suspicious Activity
Enable the Suspicious Activity machine learning model to display the actual and expected (learned)
amount of Suspicious Activity high-level category on the User Details page.
Creating a custom model
Create a custom model to measure and baseline a numeric feature for a person per hour.
Suspicious Activity
Enable the Suspicious Activity machine learning model to display the actual and expected (learned)
amount of Suspicious Activity high-level category on the User Details page.
Procedure
3. On the Machine Learning Settings page, click Enabled to turn on the Suspicious Activity
model.
4. Click Suspicious Activity if you want to edit the default settings.
5. In the Risk value of sense event field, enter the amount to increase the user's risk score when a
sense event is triggered. The default value is 5.
6. Enable the toggle to scale the risk value. When enabled, the base risk value is multiplied by a factor
(range 1 - 10). This factor is determined by how much the user deviates from their expected behavior
and not just that they deviated.
7. In the Confidence interval to trigger anomaly field, enter the percentage for how confident the
machine learning algorithm should be before it triggers an anomalous event. The default value is
0.95.
8. In the Data Retention Period field, set the number of days you want to save the model data. The
default value is 30.
248 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
9. The Show graph on User Details page toggle is enabled by default to display the Suspicious Activity
graph on the User Details page. If you do not want to display the Suspicious Activity graph on the
User Details page, click the toggle.
10. In the AQL Search Filter field, you can add an AQL filter to narrow the data that the analytic queries
for in QRadar. By filtering with an AQL query, you can reduce the number of users or the types of data
the analytic is analyzing. Before you save your settings, click Validate Query to launch a full AQL
query in QRadar so that you can review the query and verify the results.
Important: If you modify the AQL filter, the existing model is marked invalid and is then rebuilt. The
length of time the rebuild takes depends on the amount of data that is returned by the modified filter.
You can filter on specific log sources, network names, or reference sets that contain specific users.
See the following examples:
• REFERENCESETCONTAINS('Important People', username)
• LOGSOURCETYPENAME(devicetype) in ('Linux OS', 'Blue Coat SG Appliance',
'Microsoft Windows Security Event Log')
• INCIDR('172.16.0.0/12', sourceip) or INCIDR('10.0.0.0/8', sourceip) or
INCIDR('192.168.0.0/16', sourceip)
For more information, see Ariel Query Language.
11. Click Save.
250 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enable the Authentication Activity machine learning model to display the user’s activity in the
Authentication high-level category on the User Details page.
Data Downloaded
Enable the Data Downloaded machine learning model to display data that is downloaded for each user on
the User Details page.
Data Uploaded to Remote Networks
Enable the Data Uploaded to Remote Networks machine learning model to display the actual and
expected (learned) amount of local to remote upload volume for each user on the User Details page.
Defined Peer Group
Configure the Defined Peer Group machine learning model to display how much a user's event activity
deviates from the event activity of their defined peer group on the User Details page.
Learned Peer Group
Enable the Learned Peer Group machine learning model to display how much the user deviated from the
inferred peer group they were expected to be in on the User Details page.
Outbound Transfer Attempts
Enable the Outbound Transfer Attempts machine learning model to display outbound traffic usage for
each user on the User Details page.
Risk Posture
Enable the Risk Posture machine learning model to display the user's risk score deviation on the User
Details page.
Creating a custom model
Create a custom model to measure and baseline a numeric feature for a person per hour.
252 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
9. In the Confidence interval to trigger anomaly field, enter the percentage for how confident the
machine learning algorithm should be before it triggers an anomalous event. The default value is
0.95.
10. In the Data Retention Period field, set the number of days you want to save the model data. The
default value is 30.
11. The Show graph on User Details page toggle is enabled by default to display the custom model
graph on the User Details page. If you do not want to display the graph on the User Details page,
click the toggle.
12. In the AQL Search Filter field, you can add an AQL filter to narrow the data that the analytic queries
for in QRadar. By filtering with an AQL query, you can reduce the number of users or the types of data
the analytic is analyzing. Before you save your settings, click Validate Query to launch a full AQL
query in QRadar so that you can review the query and verify the results.
Important: If you modify the AQL filter, the existing model is marked invalid and is then rebuilt. The
length of time the rebuild takes depends on the amount of data that is returned by the modified filter.
You can filter on specific log sources, network names, or reference sets that contain specific users.
See the following examples:
• REFERENCESETCONTAINS('Important People', username)
• LOGSOURCETYPENAME(devicetype) in ('Linux OS', 'Blue Coat SG Appliance',
'Microsoft Windows Security Event Log')
• INCIDR('172.16.0.0/12', sourceip) or INCIDR('10.0.0.0/8', sourceip) or
INCIDR('192.168.0.0/16', sourceip)
For more information, see Ariel Query Language.
13. Click Save.
254 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Enable the Authentication Activity machine learning model to display the user’s activity in the
Authentication high-level category on the User Details page.
Data Downloaded
Enable the Data Downloaded machine learning model to display data that is downloaded for each user on
the User Details page.
Data Uploaded to Remote Networks
Enable the Data Uploaded to Remote Networks machine learning model to display the actual and
expected (learned) amount of local to remote upload volume for each user on the User Details page.
Defined Peer Group
Configure the Defined Peer Group machine learning model to display how much a user's event activity
deviates from the event activity of their defined peer group on the User Details page.
Learned Peer Group
Enable the Learned Peer Group machine learning model to display how much the user deviated from the
inferred peer group they were expected to be in on the User Details page.
Outbound Transfer Attempts
Enable the Outbound Transfer Attempts machine learning model to display outbound traffic usage for
each user on the User Details page.
Risk Posture
Enable the Risk Posture machine learning model to display the user's risk score deviation on the User
Details page.
Suspicious Activity
Enable the Suspicious Activity machine learning model to display the actual and expected (learned)
amount of Suspicious Activity high-level category on the User Details page.
Application Events
Procedure
• Event Name : UBA : Custom Analytic Anomaly
• senseValue = 5
• Required configuration: System is monitoring events that have QRadar high level category of
Application.
• Log source types: APC UPS, Apache HTTP Server, Application Security DbProtect, Array Networks SSL
VPN Access Gateways, Aruba ClearPass Policy Manager, Aruba Mobility Controller, Avaya VPN
Gateway, Barracuda Web Application Firewall, Barracuda Web Filter, Blue Coat Web Security Service,
BlueCat Networks Adonis, CRE System, Centrify Infrastructure Services, Check Point, Cilasoft QJRN/
400, Cisco Call Manager, Cisco CatOS for Catalyst Switches, Cisco FireSIGHT Management Center,
Cisco IOS, Cisco Identity Services Engine, Cisco Intrusion Prevention System (IPS), Cisco IronPort,
Cisco Meraki, Cisco Nexus, Cisco PIX Firewall, Cisco Stealthwatch, Cisco Umbrella, Cisco Wireless
Services Module (WiSM), Citrix Access Gateway, Citrix NetScaler, Custom Rule Engine, Cyber-Ark
Vault, DG Technology MEAS, EMC VMWare, Event CRE Injected, Extreme Matrix K/N/S Series Switch,
Extreme Stackable and Standalone Switches, F5 Networks BIG-IP AFM, F5 Networks BIG-IP ASM, F5
Networks BIG-IP LTM, Fidelis XPS, FireEye, Flow Classification Engine, Flow Device Type, Forcepoint
Sidewinder, Forcepoint V Series, Fortinet FortiGate Security Gateway, FreeRADIUS, H3C Comware
Platform, Huawei S Series Switch, HyTrust CloudControl, IBM AIX Audit, IBM AIX Server, IBM DB2,
IBM DataPower, IBM Lotus Domino, IBM Proventia Network Intrusion Prevention System (IPS), IBM
Resource Access Control Facility (RACF), IBM Security Directory Server, IBM Tivoli Access Manager for
e-business, IBM i, IBM z/OS, ISC BIND, Imperva SecureSphere, Infoblox NIOS, Juniper Junos OS
Platform, Juniper MX Series Ethernet Services Router, Juniper Networks AVT, Juniper Networks
Firewall and VPN, Juniper Networks Intrusion Detection and Prevention (IDP), Juniper WirelessLAN,
Kisco Information Systems SafeNet/i, Linux DHCP Server, McAfee Network Security Platform, McAfee
Web Gateway, Metainfo MetaIP, Microsoft DHCP Server, Microsoft DNS Debug, Microsoft Exchange
Server, Microsoft IIS, Microsoft Office 365, Microsoft Operations Manager, Microsoft Windows Security
Event Log, Motorola SymbolAP, NGINX HTTP Server, Nortel Contivity VPN Switch, Nortel VPN Gateway,
SourceIP
Procedure
• Event Name : UBA : Custom Analytic Anomaly
• sensevalue: 5
• Log source types: Any log source that contains username and source ip in the events.
Destination Port
Procedure
• Event Name : UBA : Custom Analytic Anomaly
• sensevalue: 5
• Log source types: Any log source that contains username and destination port in the events
Procedure
• Event Name : UBA : Custom Analytic Anomaly
• sensevalue: 5
• Required configuration : System is monitoring event that have QRadar event names that include the
word "file".
• Log source type: Microsoft Office 365
AWS Access
Procedure
• Event Name : UBA : Custom Analytic Anomaly
• sensevalue: 5
• Required configuration: System is monitoring events that contain QRadar event names that include the
word "bucket".
• Log source types: Amazon AWS Cloudtrail
Process
Procedure
• Event Name : UBA : Custom Analytic Anomaly
• sensevalue: 5
• Required configuration: Custom event property 'Process' must exist for the desired log source type.
256 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
• Log source types: Microsoft Windows Security Event Log; Linux OS
Website
Procedure
• Event Name : UBA : Custom Analytic Anomaly
• sensevalue: 5
• Support rules: 'UBA : Browsed to Entertainment Website', 'UBA : Browsed to LifeStyle Website', 'UBA :
Browsed to Business/Service Website', 'UBA : Browsed to Communications Website'
• Required configuration: Custom event property 'Web Category' must exist for the desired log source
type.
• Log source types: Blue Coat SG Appliance, Cisco IronPort, McAfee Web Gateway, Check Point, Squid
Web Proxy, Palo Alto PA Series; Forcepoint V Series, Fortinet FortiGate Security Gateway
Risky IP
Procedure
• Event Name : UBA : Custom Analytic Anomaly
• sensevalue: 5
• Required configuration: Set "Enable X-Force Threat Intelligence Feed" to Yes in Admin Settings >
System Settings.
• Log source types: Any log source with events that have a user name.
Procedure
What to do next
You must clear your browser cache before logging back in to the QRadar Console.
Procedure
3. On the Reference Data Import (File) window, click Configure to create an authorized service token.
4. On the Reference Data Import (File) window, click Import.
5. On the Add user data screen, browse for a CSV file that contains user data.
Note:
The file must be 5 MB or less, contain a header row with the column names, and must have at least
one column that contains unique data.
6. Click Next and select whether you want to merge data with an existing reference table or to create a
reference table.
• If you choose to merger into an existing reference table, click Next and select an existing reference
table.
• If you choose to create a reference table, click Next and create a reference table.
7. Click Next.
8. On the Attribute Mapping screen, set the attribute names and the key for the reference table and click
Import.
260 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Procedure
1. On the Reference Data Import - LDAP app window, click Configure.
2. In the Configure Authorized Service Token dialog box, click Manage Authorized Services.
3. In the Manage Authorized Services window, click Add Authorized Service.
4. Add the relevant information in the following fields and click Create Service:
a) In the Service Name field, type a name for this authorized service. The name can be up to 255
characters in length.
b) From the User Role list, select Admin.
c) From the Security Profile list, select the security profile that you want to assign to this authorized
service. The security profile determines the networks and log sources that this service can access
on the QRadar user interface.
d) In the Expiry Date list, type or select a date for this service to expire. If an expiry date is not
necessary, select No Expiry.
5. Click the row that contains the service you created, select and copy the token string in the Selected
Token field on the menu bar, and close the Manage Authorized Services window.
6. In the Configure Authorized Service Token dialog box, paste the token string into the Token field,
and click OK.
7. Deploy changes for the new authorized service token to take effect.
What to do next
“Adding an LDAP configuration” on page 261
Procedure
Procedure
1. On the Reference Data Import - LDAP app window, click Add Import.
2. Enter the following information on the LDAP Configuration tab:
a) Enter a URL that begins with ldap:// or ldaps:// (for TLS) in the LDAP URL field.
b) Enter the point in the LDAP directory tree from where the server must search for users in the Base
DN field.
For example, if your LDAP server was on the domain example.com, you might use:
dc=example,dc=com
What to do next
“Selecting attributes” on page 262.
Related tasks
Creating an authorized service token
Before you can configure your LDAP server to add data to a reference table, you must create an
authorized service token.
Adding LDAP attribute mappings
You can add aliases and set the key for the reference table.
“Adding a private root certificate authority ” on page 261
You can upload a private root certificate authority (CA) bundle to IBM QRadar for use with the LDAP app.
Selecting attributes
Select the attributes to extract from your LDAP server.
Procedure
1. On the Select Attributes tab, search for specific attributes and select the attributes that you want to
extract from your LDAP server.
2. Click Next.
What to do next
Add LDAP attribute mappings.
Procedure
1. On the Attribute Mapping tab, set the key for the reference table.
Tip: You can create new LDAP Attribute fields by clicking Add and combining two attributes. For
example, you can use the following syntax: "Last: {ln}, First: {fn}".
2. Click Next.
What to do next
Configure a reference data table to store LDAP data..
262 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Related tasks
Adding a reference data configuration
Use the Reference Configuration tab to set up a reference data table to store LDAP data.
Creating a rule that responds to LDAP data updates
After you have configured the IBM QRadar Reference Data Import - LDAP app to store data from your
LDAP server in a reference table in QRadar, you can use the data to create event rules.
Procedure
1. Use the Reference Configuration tab to enter a new reference table or designate an existing reference
table to which you want to add LDAP data.
a) Enter a name for the reference data collection in the Reference Data field or select an existing
reference data collection from the list.
b) The Generate map of sets checkbox is disabled by default. If you enable the checkbox, it sends
data to a reference set format to improve QRadar searching and might impact performance.
c) Use the Time to live fields to define how long you want the data to persist in the reference table. By
default, the data you add never expires. When the time-to-live period is exceeded, a
ReferenceDataExpiry event is triggered.
Note: If you append data to an existing reference map of maps, the app uses the original time-to-
live parameters. These parameters cannot be overridden on the Reference Configuration tab.
2. Click Next.
What to do next
Set the polling interval.
Related tasks
Configuring polling
Configuring polling
Use the Polling Interval tab to configure how often the app polls your LDAP server for new information.
Procedure
1. Use the Polling Interval in minutes field to define in minutes how often you want the app to poll your
LDAP server for data.
The minimum permissible polling interval value is 120.
2. Enter a value for the number of records you want the poll to return in the Record retrieval limit field.
By default, 100,000 records are returned. The maximum number of records that can be returned is
200,000.
3. The Paged results checkbox is selected by default to avoid limiting the number of records the LDAP
server returns for each poll.
Note: Paged results are not supported by all LDAP servers.
4. Click Save.
Results
Data from your LDAP server is added to the reference data collection you selected at the interval you
configured. You can use the API page on your IBM QRadar console to check that data was added to the
reference data collection.
Related tasks
Checking that data is added to the reference data collection
264 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
You can use the IBM QRadar API documentation page to test if data was added to the reference data
collection you created.
Procedure
1. Log in to the QRadar API Documentation page.
https://<Console_IP>/api_doc
2. In the navigation tree, open the most recent API.
3. Go to /reference_data > /table > /name > GET
4. In the Value field of the Name parameter, enter the name of the reference data collection you created
to store LDAP information, and click Try it out!.
The data added by the app is returned in the Response Body field.
Procedure
1. Click Log Activity > Rules > Actions > New Event Rule.
2. On the Rule Wizard introduction page, click Next.
3. Ensure that the Events radio button is selected, and click Next.
4. Enter a name for the rule in the field provided.
5. Select a test from the Test Group list, and click the + icon beside the test you want to use:
The rule test you select depends on the information you want to retrieve from the reference data
collection that holds your LDAP data.
The following reference maps of maps event property test is designed to test events that triggered
when the Reference Data Import - LDAP app reference table is updated:
when any of these event properties is the key of the first map
and any of these event properties is the key of the second map
and any of these event properties is the value
in any of these reference map of maps.
To use this event property test, you must create custom event properties for the outer key (the key
of the first map), inner key (the key of the second map) and value fields. In the following example,
the Reference Data Import - LDAP app was configured to import information on users whose password
is expired from an LDAP server at example.com.
266 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
The outer key
This property contains the data entered in the LDAP fields specified in the Base DN and Filter
fields in the app LDAP configuration tab. The regex for the custom event property might look like
this:
(uid=(.*?),dc=example,dc=com)
The inner key
This property contains the data entered in the LDAP fields specified in the Attribute field in the
app LDAP configuration tab. You can use attribute aliases in this field. The regex for the custom
event property might look like this:
(passwordIsExpired)
The value field
This property contains the data retrieved for passwordIsExpired LDAP attribute for each user.
The regex for the custom event property might look like this:
(\['true'\])
For more information about custom event properties, see the IBM QRadar SIEM Users Guide.
6. Click Next.
7. Select the rule action, rule response and rule limiter you want to apply to the rule and click Finish.
For more information on custom event rules, see the IBM QRadar SIEM Users Guide.
Results
The next time you poll your LDAP server and the reference data collection you created is updated, your
rule is triggered.
Related tasks
Adding LDAP attribute mappings
You can add aliases and set the key for the reference table.
Adding a reference data configuration
Use the Reference Configuration tab to set up a reference data table to store LDAP data.
• From the User Analytics tab, click the Help and Support icon.
Administrative functions
You must have QRadar® administrator privileges to view log files and complete administrative functions.
Administrative functions include the ability to complete the following actions:
• Click Clear UBA Data to remove all UBA user data but maintain all of your current UBA configuration
settings. Clearing UBA data makes the UBA app behave as if you just installed and configured the UBA
Settings. If the Machine Learning app is installed, the Clear UBA Data button also resets the ML app.
• Click Reset ML Setting if the Machine Learning app is installed and you want to reset all of your Machine
Learning settings and disable all of the analytics that are enabled.
Service requests
Service requests are also known as Problem Management Records (PMRs).
Several methods exist to submit diagnostic information to IBM Software Technical Support. To open a
service request, or to exchange information with technical support, view the IBM Software Support
Exchanging information with Technical Support page (http://www.ibm.com/software/support/
Procedure
If the ML App Status in the Machine Learning Settings page shows Error, complete the procedure to
uninstall the failed app.
270 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
Note: You must have a valid authentication token. You can see the list of configured authentication
tokens in the Authorized Services section in the Admin settings of the QRadar Console.
1. Using SSH, log in to the QRadar Console.
2. Run the following command:
Example output:
id | name | status
-----+---------------------------------+---------
1356 | User Analytics | RUNNING
1358 | Machine Learning Analytics | ERROR
1357 | dataimport.ldap.applicationname | RUNNING
3. Locate and record the id value for Machine Learning Analytics from the output of the command.
4. Using a valid authentication token in the place of <valid token> and the recorded id value in place of
<id>, run the following command to uninstall the failed Machine Learning app: # curl -X DELETE -
k -H 'SEC:<valid token>' https://127.0.0.1/api/gui_app_framework/
applications/<id>
For example:
zip -qr uba_logs.zip /store/docker/volumes/qapp-1001/log*
272 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
For example:
zip -qr ml_logs.zip /store/docker/volumes/qapp-1003/log*
User import
Use the APIs to add directory server or reference table imports to the UBA User Import feature.
Entry point
https://<<Qradar ip>>/console/plugins/<UBA app id>/app_proxy/user_import
Endpoints
278 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
console machine and issuing the following: psql -U qradar -c "select id from
installed_application where name = 'User Analytics';"
Note: You will use the application id when creating the URL used in the cURL commands.
2. Use the Imports API to create the new import
3. Enter the following command: curl -X POST -H "Content-Type: application/json" -H
"SEC: <AUTHORIZED_SERVICE_TOKEN>" -d '{"pollingInterval": 24,"configName":
"<CONFIG_NAME>", "retrievalLimit": 500000, "dataSource":"LDAP",
"configLdap": {"filter": "(objectClass=person)", "ssl": false,"host":
"<SERVER_IP_OR_HOSTNAME>", "password": "", "username": "", "paged":
true,"baseDN": "<BASE_DN>", "ca": {"expiryTime": "", "filename":""}, "port":
389}}' https://<QRADAR_IP_ADDRESS>/console/plugins/<APP_ID>/app_proxy/
user_import/imports
For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual
Property Department in your country or send inquiries, in writing, to:
Such information may be available, subject to appropriate terms and conditions, including in some cases,
payment of a fee.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or
trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Java™ and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or
its affiliates.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Applicability
These terms and conditions are in addition to any terms of use for the IBM website.
Personal use
You may reproduce these publications for your personal, noncommercial use provided that all proprietary
notices are preserved. You may not distribute, display or make derivative work of these publications, or
any portion thereof, without the express consent of IBM.
Commercial use
You may reproduce, distribute and display these publications solely within your enterprise provided that
all proprietary notices are preserved. You may not make derivative works of these publications, or
282 Notices
reproduce, distribute or display these publications or any portion thereof outside your enterprise, without
the express consent of IBM.
Rights
Except as expressly granted in this permission, no other permissions, licenses or rights are granted, either
express or implied, to the publications or any information, data, software or other intellectual property
contained therein.
IBM reserves the right to withdraw the permissions granted herein whenever, in its discretion, the use of
the publications is detrimental to its interest or, as determined by IBM, the above instructions are not
being properly followed.
You may not download, export or re-export this information except in full compliance with all applicable
laws and regulations, including all United States export laws and regulations.
IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE PUBLICATIONS. THE PUBLICATIONS ARE
PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, NON-
INFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE.
Notices 283
284 IBM QRadar User Behavior Analytics (UBA) app: UBA app User Guide
IBM®