Threat analysis
  • 3 minutes to read
  • Dark
    Light
  • PDF

Threat analysis

  • Dark
    Light
  • PDF

Article summary

This document provides information about the Threat analysis dashboard, which is divided into two sections that display charts for identifying and mitigating threats in the PAM environment.

  • Threats in access: analyzes the use of audited commands during sessions.
  • Threats in custodies: analyzes the risks associated with the protection of privileged credentials.

Prerequisites

  • Administrator or system auditor permission.

Path to access

  1. On senhasegura, in the navigation bar, hover over the Products menu and select User Behavior.
  2. In the side menu, select Dashboard > Threat analysis.

Date filter

Info

By default, the filter shows data of the last 15 days.

ItemTypeDescription
DateDropdown menu and date pickerSelects the query period. The options are:
- Today.
- Last 24 hours. This week: from Monday to Sunday of the current week.
- Last week: from Monday to Sunday of the previous week.
- This month: from the first to the last day of the current month.
- Last month: from the first to the last day of the previous month.
- This year: from the first to the last day of the current year.
- Last year: from the first to the last day of the previous year.
- Custom: date selectors to choose the period.
FilterButtonFilters information by the selected period.

Threats in accesses

This section displays charts and reports of accesses that present some type of threat and enables system administrators to monitor audited commands during sessions, facilitating the identification of suspicious and anomalous behaviors.

XY charts

ItemDescription
ScoreThe X-axis displays the days, and the Y-axis shows the risk score assigned to monitored sessions based on user behavior and the use of audited or atypical commands.
TotalsThe X-axis displays the days, and the Y-axis shows the total number of threats detected in audited sessions and their levels of criticality (Low, Medium, High), providing an overview of the number of suspicious events.

Reports

Greater risk

Displays the following data of the sessions with the highest risk:

ItemDescription
UserDisplays the name of the user who conducted the session.
DeviceDisplays the device from which the session was initiated.
CredentialDisplays the credential used to conduct the session.
DateDisplays the date and time the session was conducted.
RiskDisplays the risk level reached by the session which can range from 0 (zero) to 100 (hundred).
Access detailsOpens the Access details screen with additional information about the selected session.

Last with risk

Displays the following data of the most recent sessions with detected risks:

ItemDescription
UserDisplays the name of the user who conducted the session.
DeviceDisplays the device from which the session was initiated.
CredentialDisplays the credential used to conduct the session.
DateDisplays the date and time the session was conducted.
RiskDisplays the risk level reached by the session which can range from 0 (zero) to 100 (hundred).
Access detailsOpens the Access details screen with additional information about the selected session.

Threats in custodies

This section displays charts and reports of threats related to using and protecting credentials in custody, that is, storing and controlling privileged credentials in the PAM environment.

XY charts

ItemDescription
ScoreThe X-axis displays the days, and the Y-axis shows the overall risk score of monitored custodies per day, based on user behavior and access to these credentials.
TotalThe X-axis displays the days, and the Y-axis shows the total number of threats detected related to custodies and their levels of criticality (Low, Medium, High), providing an overview of the volume of risk events associated with protected credentials.

Reports

Greater risk

Displays data of the custodies with the highest risk level, including the following details about the most vulnerable or exposed credentials:

ItemDescription
UserDisplays the name of the user who viewed the credential.
DeviceDisplays the device associated with the viewed credential.
CredentialDisplays the credential used.
DateDisplays the date and time the credential was viewed.
RiskDisplays the risk level reached by the view which can range from 0 (zero) to 100 (hundred).
Access detailsOpens the View details screen with additional information about the selected credential view.

Last with risk

Displays the following data on the most recent threats related to custodies, highlighting the events that require immediate attention:

ItemDescription
UserDisplays the name of the user who viewed the credential.
DeviceDisplays the device associated with the viewed credential.
CredentialDisplays the credential used.
DateDisplays the date and time the credential was viewed.
RiskDisplays the risk level reached by the view which can range from 0 (zero) to 100 (hundred).
Access detailsOpens the View details screen with additional information about the selected credential view.

Was this article helpful?

What's Next