Investigate threats as a security analyst
As an analyst in a Security Operations Center (SOC), use Splunk User Behavior Analytics (UBA) to review and investigate the threats in your environment.
- Review current threats in your environment on Threat Review. See, Review current threats.
 - Understand the specific actors in a threat by reviewing the Threat Details.
 - Review the anomalies that contributed to the threat in the Anomaly Details.
 - Learn more about the users involved in the threat on the User Information page. See, View user information
 - Review users with threats on User Review. See, Review current user activity.