User risk timeline and profile 编辑

The User risk timeline on a user’s profile enables you, as a Citrix Analytics administrator to gain deeper insights into a user’s risky behavior. By default, the user risk timeline is displayed for the last one month. You can also see the corresponding actions taken on their account for a selected time period. From the User risk timeline, you can delve deeper into a user’s profile to understand the following:

Also, you can view the risk score and risk indicator trends for the user and determine if the user is a high-risk user or not.

When you go to a user’s risk timeline, you can select either a risk indicator or an action that has been applied to their account. If you choose one of the above, the right pane displays the risk indicator section or the action section.

Risk timeline

Risk timeline

The Risk Timeline displays the following information:

  • Risk indicators. Risk Indicators are user activities that are suspicious or can pose a security threat to your organization. The indicators are triggered when the user’s behavior deviates from their normal behavior. The risk indicators can be for the following data sources:

    • Citrix Content Collaboration

    • Citrix Gateway

    • Citrix Endpoint Management

    • Citrix Virtual Apps and Desktops or Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)

    • Citrix Secure Private Access

    When you select a risk indicator from the user’s timeline, the risk indicator information section is displayed in the right pane. You can view the reason for the risk indicator along with details of the event. They are broadly categorized into the following sections:

    Risk timeline info section

    • What happened. You can view a summary of the risk indicator here. For example, if you have selected the Excessive file sharing risk indicator. In the What happened section, you can view the number of share links sent to recipients and when the sharing event occurred.

    • Event details. You can view individual event entries in graphical and tabular format along with details of the event. Click Event Search to access the self-service search page and view the events corresponding to the user’s risk indicator. For more information, see Self-service search.

    • Additional contextual information. You can view data shared, if any, during an event’s occurrence in this section.

    You can manually mark risk indicators as helpful or not helpful. For more information, see Provide feedback for User Risk indicators.

    Learn more: Risk indicators

  • Actions. Actions help you respond to suspicious events and prevent future anomalous events from occurring. Actions that have been applied on a user’s profile are displayed on the risk timeline. These actions are either automatically applied to a user’s account through configured policies or you can apply a specific action manually.

    Learn more: Policies and actions.

    Risk timeline actions

  • Privileged user events. Privileged user events are triggered every time there is a change in the Admin or Executive privilege status of a user. When a risk indicator is triggered for a user, you can co-relate it with the specified privilege status change event. If necessary, you can apply the appropriate action on the user profile. The Admin or Executive privilege events displayed on the user risk timeline are as follows:

    • Added to Executive group

    • Removed from Executive group

    • Privilege elevated to Admin

    • Admin privilege removed

    Consider the user Adam Maxwell who was added to the Executive privileged group CitrixAnalytics. The Added to Executive group event is added to the user’s risk timeline. Now, Adam starts excessively deleting files and folders and triggers the machine learning algorithm that detected unusual behavior. The Excessive file or folder deletion risk indicator is added to the user’s risk timeline. You can compare the event and the risk indicator on the risk timeline. After the comparison, you can determine if the risk indicator was triggered as a consequence of the event. If so, you can apply appropriate actions on Adam’s profile. For more information on privileged users, see Privileged users.

When you select an event from the user’s timeline, the event information section is displayed in the right pane.

For an Executive, the right pane displays information such as User status, Date and time, and Active Directory group.

Privileged users

For an Admin privilege event, the right pane displays information such as User status, Date and time, and In product.

Risk summary

View the risk factors associated with the user that contributed to their risk score. For more information about the risk factors, see Citrix user risk indicators.

Risk summary

Click Risk Summary to view the following information:

  • Total indicator occurrences: Indicates the total number of risk indicators triggered by the user in the last two weeks. These triggered risk indicators determine the user’s risk score.

  • Risk score: Indicates the risk score of the user based on their risky behavior. The risk score determines the level of risk a user poses to an organization for a specific time period. The risk score value is dynamic and varies based on user behavior analytics. Based on the risk score, a user can fall under one of the categories: high risk user, medium risk user, low risk user, and user with zero risk score. For more information about the user categories, see Users dashboard.

  • Risk factors: Indicates one or more combinations of the risk factors associated with the user activities that contributed the risk score.

  • Risk breakdown: Indicates the number of the risk indicators triggered by the user for each risk factor. Expand the row to view the details.

    Risk factors

On the user timeline, click Filter and select the risk factors, the applied actions, or the privileged user status associated with the user and view the corresponding events.

Timeline filters

User profile

The User Profile displays the following information:

Advanced user profile

Note

The Authentication and Domains data are currently not available on the User Info profile.

Application

Number of applications accessed by the user during this time period. Citrix Analytics collects this data from Citrix Virtual Apps and Desktops or Citrix DaaS (formerly Citrix Virtual Apps and Desktops service). Click a user name, then navigate to User Info to view the name and number of applications used by the user. The Trend View link at the top right corner provides a graphical representation about the user’s application history for a specific time period.

User info data usage

Data Usage

Volume of data consumed by the user might include data uploaded or downloaded, files uploaded or downloaded, and files shared or deleted. Citrix Analytics collects this data from Citrix Content Collaboration. Click a user name, then navigate to User Info to view the details of data usage for the user. The Trend View link provides a graphical representation about the data usage history of a user for a specific time period.

User info data usage

Devices

Number of devices used by the user to access the data sources. Citrix Analytics collects this data from Citrix Endpoint Management and Citrix Virtual Apps and Desktops or Citrix DaaS. Click a user name, then navigate to User Info to view the name and number of devices used by the user. The Trend View link at the top right corner provides a graphical representation about the user’s device history for a specific time period.

User info devices

Locations

The places from which the user has logged on to the data sources. Citrix Analytics collects the data from Citrix Content Collaboration, Citrix Gateway, and Citrix Virtual Apps and Desktops or Citrix DaaS. Click a user name, then navigate to User Info to view the locations from where the user has accessed data and the number of logons from those locations. The Map View link at the top right corner provides the user’s logon location history for a specific time period.

User info locations

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据

词条统计

浏览:28 次

字数:11903

最后编辑:7年前

编辑次数:0 次

    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文