UEBA View

The UEBA view monitors AI alerts obtained from FortiInsight. To configure what data appears in the UEBA view, see UEBA Settings. The UEBA view is divided into these layers:

The Actions drop-down list displays the operations you can perform on selected incidents. For descriptions of the operations, see Acting on Incidents.

Incidents in the UEBA View can be filtered by activity status or time range. See Filtering in the UEBA View.

Incident Trend Chart

The Incident Trend Chart displays frequency of incidents over time. You can click the bars in the chart to filter both the chart and the attribute list. The attribute lists will update based on the time and severity category of the bar.

Attribute List

The Attribute List table provides the following information about the AI alerts received from FortiInsight:

Attribute Description
Incident The name of the incident that was detected. The incident name is defined in Setting Tags.
Host The host name or IP address where the alert originated.
Application The name of the application that is the source of the incident.
User

The Windows Agent user. This user is specified in Setting UEBA Higher Risk Entities.

Tag The tag used to categorize the alert. The tag is defined in Setting Tags.
Activity The description of the activity which raised the alert.

Related Incidents

The Related Incidents table provides additional information on the incidents selected in the Attribute List table.

Attribute Description
Severity Category The severity of the incident: HIGH, MEDIUM, or LOW. You can change the severity value in the Actions drop-down list.
Last Occurred The date and time when the incident was last detected.
Incident The name of the incident.
Tag The tag used to categorize the alert.

Host Name

The host name or IP address of the host where the alert originated.
User The Windows Agent user.
Application The name of the application that is the source of the incident.
Resource A resource name, typically a file path.
Activity The description of the activity which raised the alert.

Triggering Events

The Triggering Events layer is typically hidden. Click an incident in the Related Incidents table to display its triggering events.

These display options are available above the table:

  • Subpattern: FIN - Indicates that only FIN events are displayed.
  • Wrap Raw Events - Select to display the full log event in the table.
  • Show Event Type - Select to display the event type only.
  • Show Raw Event Only - Select to display the full log event only.

The following table describes incidents in the Triggering Events table.

Attribute Description
Event Receive Time The date and time when the event was received.

Host Name

The IP address or host name that was the source of the event.
Domain The Windows domain that was the source of the event.
User The Windows Agent user.

Tag Name

The tag used to categorize the alert.

Process Name

The name of the process producing the event.

Activity Name

The description of the activity which raised the alert.

Resource Name

A resource name, typically a file path.

Filtering in the UEBA View

Use the Status button in the upper right corner of the UEBA View to filter the display for active or cleared incidents, or both. Use the Time Range button to filter the display for incidents within a specific time range:

  • Status - Use the drop-down list to display Active incidents, Cleared incidents, or both.
  • Time Range - Filter the incidents according to a time range:
    • If you click Relative, adjust the time value in the Last field.
    • If you click Absolute enter a time range.