User risk timeline and profile 编辑
The User risk timeline on a user’s profile enables you, as a Citrix Analytics administrator to gain deeper insights into a user’s risky behavior. By default, the user risk timeline is displayed for the last one month. You can also see the corresponding actions taken on their account for a selected time period. From the User risk timeline, you can delve deeper into a user’s profile to understand the following:
Also, you can view the risk score and risk indicator trends for the user and determine if the user is a high-risk user or not.
When you go to a user’s risk timeline, you can select either a risk indicator or an action that has been applied to their account. If you choose one of the above, the right pane displays the risk indicator section or the action section.
Risk timeline
The Risk Timeline displays the following information:
Risk indicators. Risk Indicators are user activities that are suspicious or can pose a security threat to your organization. The indicators are triggered when the user’s behavior deviates from their normal behavior. The risk indicators can be for the following data sources:
Citrix Content Collaboration
Citrix Gateway
Citrix Endpoint Management
Citrix Virtual Apps and Desktops or Citrix DaaS (formerly Citrix Virtual Apps and Desktops service)
Citrix Secure Private Access
When you select a risk indicator from the user’s timeline, the risk indicator information section is displayed in the right pane. You can view the reason for the risk indicator along with details of the event. They are broadly categorized into the following sections:
What happened. You can view a summary of the risk indicator here. For example, if you have selected the Excessive file sharing risk indicator. In the What happened section, you can view the number of share links sent to recipients and when the sharing event occurred.
Event details. You can view individual event entries in graphical and tabular format along with details of the event. Click Event Search to access the self-service search page and view the events corresponding to the user’s risk indicator. For more information, see Self-service search.
Additional contextual information. You can view data shared, if any, during an event’s occurrence in this section.
You can manually mark risk indicators as helpful or not helpful. For more information, see Provide feedback for User Risk indicators.
Learn more: Risk indicators
Actions. Actions help you respond to suspicious events and prevent future anomalous events from occurring. Actions that have been applied on a user’s profile are displayed on the risk timeline. These actions are either automatically applied to a user’s account through configured policies or you can apply a specific action manually.
Learn more: Policies and actions.
Privileged user events. Privileged user events are triggered every time there is a change in the Admin or Executive privilege status of a user. When a risk indicator is triggered for a user, you can co-relate it with the specified privilege status change event. If necessary, you can apply the appropriate action on the user profile. The Admin or Executive privilege events displayed on the user risk timeline are as follows:
Added to Executive group
Removed from Executive group
Privilege elevated to Admin
Admin privilege removed
Consider the user Adam Maxwell who was added to the Executive privileged group CitrixAnalytics. The Added to Executive group event is added to the user’s risk timeline. Now, Adam starts excessively deleting files and folders and triggers the machine learning algorithm that detected unusual behavior. The Excessive file or folder deletion risk indicator is added to the user’s risk timeline. You can compare the event and the risk indicator on the risk timeline. After the comparison, you can determine if the risk indicator was triggered as a consequence of the event. If so, you can apply appropriate actions on Adam’s profile. For more information on privileged users, see Privileged users.
When you select an event from the user’s timeline, the event information section is displayed in the right pane.
For an Executive, the right pane displays information such as User status, Date and time, and Active Directory group.
For an Admin privilege event, the right pane displays information such as User status, Date and time, and In product.
Risk summary
View the risk factors associated with the user that contributed to their risk score. For more information about the risk factors, see Citrix user risk indicators.
Click Risk Summary to view the following information:
Total indicator occurrences: Indicates the total number of risk indicators triggered by the user in the last two weeks. These triggered risk indicators determine the user’s risk score.
Risk score: Indicates the risk score of the user based on their risky behavior. The risk score determines the level of risk a user poses to an organization for a specific time period. The risk score value is dynamic and varies based on user behavior analytics. Based on the risk score, a user can fall under one of the categories: high risk user, medium risk user, low risk user, and user with zero risk score. For more information about the user categories, see Users dashboard.
Risk factors: Indicates one or more combinations of the risk factors associated with the user activities that contributed the risk score.
Risk breakdown: Indicates the number of the risk indicators triggered by the user for each risk factor. Expand the row to view the details.
On the user timeline, click Filter and select the risk factors, the applied actions, or the privileged user status associated with the user and view the corresponding events.
User profile
The User Profile displays the following information:
Note
The Authentication and Domains data are currently not available on the User Info profile.
Application
Number of applications accessed by the user during this time period. Citrix Analytics collects this data from Citrix Virtual Apps and Desktops or Citrix DaaS (formerly Citrix Virtual Apps and Desktops service). Click a user name, then navigate to User Info to view the name and number of applications used by the user. The Trend View link at the top right corner provides a graphical representation about the user’s application history for a specific time period.
Data Usage
Volume of data consumed by the user might include data uploaded or downloaded, files uploaded or downloaded, and files shared or deleted. Citrix Analytics collects this data from Citrix Content Collaboration. Click a user name, then navigate to User Info to view the details of data usage for the user. The Trend View link provides a graphical representation about the data usage history of a user for a specific time period.
Devices
Number of devices used by the user to access the data sources. Citrix Analytics collects this data from Citrix Endpoint Management and Citrix Virtual Apps and Desktops or Citrix DaaS. Click a user name, then navigate to User Info to view the name and number of devices used by the user. The Trend View link at the top right corner provides a graphical representation about the user’s device history for a specific time period.
Locations
The places from which the user has logged on to the data sources. Citrix Analytics collects the data from Citrix Content Collaboration, Citrix Gateway, and Citrix Virtual Apps and Desktops or Citrix DaaS. Click a user name, then navigate to User Info to view the locations from where the user has accessed data and the number of logons from those locations. The Map View link at the top right corner provides the user’s logon location history for a specific time period.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论