Investigate threats as a security analyst

As an analyst in a Security Operations Center (SOC), use Splunk User Behavior Analytics (UBA) to review and investigate the threats in your environment.

  1. Review current threats in your environment on Threat Review. See, Review current threats.
  2. Understand the specific actors in a threat by reviewing the Threat Details.
  3. Review the anomalies that contributed to the threat in the Anomaly Details.
  4. Learn more about the users involved in the threat on the User Information page. See, View user information
  5. Review users with threats on User Review. See, Review current user activity.