sb-eu logo
Story image

ManageEngine adds user behaviour analytics to ADAudit Plus

16 Oct 2018

IT management company ManageEngine has announced the addition of user and entity behaviour analytics (UEBA) to ADAudit Plus, its integrated Active Directory (AD), Azure AD, Windows server, file server, and workstation auditing solution.

Available immediately, the latest version of ADAudit Plus helps IT security teams detect previously undiscoverable threats while also reducing the number of false positives.

Insider threats continue to challenge organisations of all sizes, and detecting them requires establishing a baseline of normal activities specific to each user over an extended period of time and reporting any deviations from the norm.

It is humanly impossible for IT security professionals to perform those detection tasks, which is why insider threats fly below the radar of solutions that don’t utilise UEBA.

With its user behaviour-based model, ADAudit Plus can detect potential insider threats and automatically notify concerned personnel.

False positives — alerts that indicate the presence of a threat that does not actually exist — are the leading cause for delayed breach detection.

According to a survey published by SANS Institute in June 2017, only half of the respondents detected breaches in less than 24 hours.

False positives can be reduced by setting thresholds specific to each user based on their level of activity rather than using a blanket threshold across the organisation, but this is another task that’s impossible for IT security professionals to manually perform.

Caught between setting lower organisation wide threshold values and triggering more false positives — or configuring higher threshold values and missing a breach — security teams often choose the former.

With its dynamic alert thresholds, ADAudit Plus reduces the number of false positives and buys ample time for security teams to focus on the real indicators of compromise.

ADAudit Plus applies machine learning to create a baseline of normal activities that are specific to each user and only notifies security personnel when there is a deviation from this norm.

For example, a user who consistently accesses a critical server outside of business hours wouldn’t trigger a false positive alert because that behaviour is typical for that user.

On the other hand, ADAudit Plus would instantly alert security teams when that same user accesses that server during a time they’ve never accessed it before, even though the access falls within business hours.

“Because of its superior threat detection capabilities, UEBA should be a part of any organisation’s security framework, which is why we’ve incorporated UEBA capabilities into our product,” says ManageEngine product manager Balasubramanian Palani.

Story image
Trend Micro integrates with AWS Gateway Load Balancer for improved security function
Cloud security firm Trend Micro has announced its hybrid cloud security integration with the newly launched AWS Gateway Load Balancer.More
Story image
Ivanti looks to a brighter future with MobileIron and Pulse Secure acquisitions
Ivanti has acquired MobileIron and Pulse Secure, with the intention of delivering intelligent and secure experiences across all devices in the ‘everywhere enterprise’. More
Story image
Cyber Security Cloud launches WafCharm on Microsoft Azure
Already available to more than one million Amazon AWS users around the world, this launch provides Azure users with AI operation of Web Application Firewall (WAF) rules, expanding WafCharms availability to 60% of the world's cloud users. More
Story image
Claroty and CrowdStrike form partnership to protect industrial control system environements
The integration will deliver visibility into industrial control system (ICS) networks and endpoints, with a one-stop-shop for information technology (IT) and OT asset information directly within The Claroty Platform.More
Story image
How a vantage point sees threats before they impact
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.More
Story image
Financial firms exposing data through mismanaged access controls - Varonis
Almost two-thirds of the analysed firms leave more than 1000 sensitive files open for every employee to access.More