{"id":54060,"date":"2025-08-07T07:37:37","date_gmt":"2025-08-07T11:37:37","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=54060"},"modified":"2025-08-07T07:50:05","modified_gmt":"2025-08-07T11:50:05","slug":"ueba-rules-in-kaspersky-siem","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ueba-rules-in-kaspersky-siem\/54060\/","title":{"rendered":"UEBA rules in a SIEM system"},"content":{"rendered":"<p>Today\u2019s cyberattackers are masters of disguise \u2014 working hard to make their malicious activities look like normal processes. They use legitimate tools, communicate with command-and-control servers through public services, and mask the launch of malicious code as regular user actions. This kind of activity is almost invisible to traditional security solutions; however, certain anomalies can be uncovered by analyzing the behavior of specific users, service accounts, or other entities. This is the core concept behind a threat detection method called UEBA, short for \u201cuser and entity behavior analytics\u201d. And this is exactly what we\u2019ve implemented in the latest version of our SIEM system \u2014 Kaspersky Unified Monitoring and Analysis Platform.<\/p>\n<h2>How UEBA works within an SIEM system<\/h2>\n<p>By <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ueba\/\" target=\"_blank\" rel=\"noopener\">definition<\/a>, UEBA is a cybersecurity technology that identifies threats by analyzing the behavior of users, devices, applications, and other objects in an information system. While in principle this technology can be used with any security solution, we believe it\u2019s most effective when integrated in an SIEM platform. By using machine learning to establish a normal baseline for a user or object\u2019s behavior (whether it\u2019s a computer, service, or another entity), an SIEM system equipped with UEBA detection rules can analyze deviations from typical behavior. This allows for the timely detection of APTs, targeted attacks, and insider threats.<\/p>\n<p>This is why we\u2019ve equipped our SIEM system with an UEBA rule package \u2014 designed specifically to detect anomalies in authentication processes, network activity, and the execution of processes on Windows-based workstations and servers. This makes our system smarter at finding novel attacks that are difficult to spot with regular correlation rules, signatures, or indicators of compromise. Every rule in the UEBA package is based on profiling the behavior of users and objects. The rules fall into two main categories:<\/p>\n<ul>\n<li>Statistical rules, which use the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Interquartile_range\" target=\"_blank\" rel=\"nofollow noopener\">interquartile range<\/a> to identify anomalies based on current behavior data.<\/li>\n<li>Rules that detect deviations from normal behavior, which is determined by analyzing an account or object\u2019s past activity.<\/li>\n<\/ul>\n<p>When a deviation from a historical norm or statistical expectation is found, the system generates an alert and increases the risk score of the relevant object (user or host). (Read <a href=\"https:\/\/www.kaspersky.com\/blog\/ai-technology-in-kaspersky-siem\/53238\/\" target=\"_blank\" rel=\"noopener nofollow\">this article<\/a> to learn more about how our SIEM solution uses AI for risk scoring.)<\/p>\n<h2>Structure of the UEBA rule package<\/h2>\n<p>For this rule package, we focused on the areas where UEBA technology works best \u2014 such as account protection, network activity monitoring, and secure authentication. Our UEBA rule package currently features the following sections:<\/p>\n<h3>Authentication and permission control<\/h3>\n<p>These rules detect unusual login methods, sudden spikes in authentication errors, accounts being added to local groups on different computers, and authentication attempts outside normal business hours. Each of these deviations is flagged, and increases the user\u2019s risk score.<\/p>\n<h3>DNS profiling<\/h3>\n<p>Dedicated to analysis of DNS queries made by computers on the corporate network. The rules in this section collect historical data to identify anomalies like queries for unknown record types, excessively long domain names, unusual zones, or atypical query frequencies. It also monitors the volume of data returned via DNS. Any such deviations are considered potential threats, and thus increase the host\u2019s risk score.<\/p>\n<h3>Network activity profiling<\/h3>\n<p>Tracking connections between computers both within the network and to external resources. These rules flag first-time connections to new ports, contacts with previously unknown hosts, unusual volumes of outgoing traffic, and access to management services. All actions that deviate from normal behavior generate alerts and raise the risk score.<\/p>\n<h3>Process profiling<\/h3>\n<p>This section monitors programs launched from Windows system folders. If a new executable runs for the first time from the System32 or SysWOW64 directories on a specific computer, it\u2019s flagged as an anomaly. This raises the risk score for the user who initiated the process.<\/p>\n<h3>PowerShell profiling<\/h3>\n<p>This section tracks the source of PowerShell script executions. If a script runs for the first time from a non-standard directory \u2014 one that isn\u2019t Program Files, Windows, or another common location \u2014 the action is marked as suspicious and increases the user\u2019s risk score.<\/p>\n<h3>VPN monitoring<\/h3>\n<p>This flags a variety of events as risky \u2014 including logins from countries not previously associated with the user\u2019s profile, geographically impossible travel, unusual traffic volumes over a VPN, VPN client changes, and multiple failed login attempts. Each of these events results in a higher risk score for the user\u2019s account.<\/p>\n<p>Using these UEBA rules helps us detect sophisticated attacks and reduce false positives by analyzing behavioral context. This significantly improves the accuracy of our analysis and lowers the workload of security analysts. Using UEBA and AI to assign a risk score to an object speeds up and improves each analyst\u2019s response time by allowing them to prioritize incidents more accurately. Combined with the automatic creation of typical behavioral baselines, this significantly boosts the overall efficiency of security teams. It frees them from routine tasks, and provides richer, more accurate behavioral context for threat detection and response.<\/p>\n<p>We\u2019re constantly improving the usability of our SIEM system. Stay tuned for updates to the Kaspersky Unified Monitoring and Analysis Platform on its <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/unified-monitoring-and-analysis-platform?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\" rel=\"noopener nofollow\">official product page<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"51264\">\n","protected":false},"excerpt":{"rendered":"<p>Using anomalies in the behavior of users, devices, applications, and other entities to detect cyberthreats.<\/p>\n","protected":false},"author":2757,"featured_media":54061,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052],"tags":[1140,2464,4672],"class_list":{"0":"post-54060","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-ai","11":"tag-siem","12":"tag-ueba"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ueba-rules-in-kaspersky-siem\/54060\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ueba-rules-in-kaspersky-siem\/29363\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ueba-rules-in-kaspersky-siem\/24478\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ueba-rules-in-kaspersky-siem\/12724\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ueba-rules-in-kaspersky-siem\/29314\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ueba-rules-in-kaspersky-siem\/28426\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ueba-rules-in-kaspersky-siem\/31304\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ueba-rules-in-kaspersky-siem\/29992\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ueba-rules-in-kaspersky-siem\/40250\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ueba-rules-in-kaspersky-siem\/13685\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ueba-rules-in-kaspersky-siem\/23087\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ueba-rules-in-kaspersky-siem\/24129\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ueba-rules-in-kaspersky-siem\/32571\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ueba-rules-in-kaspersky-siem\/29542\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ueba-rules-in-kaspersky-siem\/35230\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ueba-rules-in-kaspersky-siem\/34877\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/siem\/","name":"SIEM"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2757"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=54060"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54060\/revisions"}],"predecessor-version":[{"id":54063,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54060\/revisions\/54063"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/54061"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=54060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=54060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=54060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}