You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-product-statistical-anomalies.md
+37-28Lines changed: 37 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,22 +30,18 @@ Statistical anomalies can detect outliers in an identity's behavior if recent ac
30
30
-**Alert Name**: Lists the name of the alert.
31
31
-**Anomaly Alert Rule**: Displays the name of the rule select when creating the alert.
32
32
-**# of Occurrences**: Displays how many times the alert trigger has occurred.
33
-
-**Task**: Displays how many tasks are affected by the alert.
34
-
-**Resources**: Displays how many resources are affected by the alert.
35
-
-**Identity**: Displays how many identities are affected by the alert.
36
33
-**Authorization System**: Displays which authorization systems the alert applies to.
37
-
-**Date/Time**: Lists the date and time of the alert.
38
-
-**Date/Time (UTC)**: Lists the date and time of the alert in Coordinated Universal Time (UTC).
39
-
-**Activity** section displays details about the **Identity Name**, **Resource Name**, **Task Name**, **Date**, and **IP Address**.
40
-
-**View Trigger**: Displays the current trigger settings and applicable authorization system details.
41
-
42
-
1. To filter the alerts, select the appropriate alert name or choose **All** from the **Alert Name** dropdown menu.
43
-
1. From the **Date** dropdown menu, select **Last 24 Hours**, **Last 2 Days**, **Last Week**, or **Custom Range**, and select **Apply**.
44
-
45
-
- If you select **Custom Range**, also enter **From** and **To** duration settings.
46
-
1. To view details that match the alert criteria, select the ellipses (...).
47
-
48
-
For example, **Authorization System Type**, **Authorization Systems**, **Resources**, **Tasks**, and **Identities**.
34
+
-**Date/Time**: Lists the day of the outlier occurring.
35
+
-**Date/Time (UTC)**: Lists the day of the outlier occurring in Coordinated Universal Time (UTC).
36
+
37
+
38
+
1. To filter the alerts based on name, select the appropriate alert name or choose **All** from the **Alert Name** dropdown menu, and select **Apply**.
39
+
1. To filter the alerts based on alert time, select **Last 24 Hours**, **Last 2 Days**, **Last Week**, or **Custom Range** from the **Date** dropdown menu, and select **Apply**.
40
+
1. If you select the ellipses (**...**) and select:
41
+
-**Details**, this brings you to an Alert Summary view with **Authorization System**, **Statistical Model** and **Observance Period** displayed along with a table with a row per identity triggering this alert. From here you can click:
42
+
-**Details**: Displays graph(s) highlighting the anomaly with context, and up to the top 3 actions performed on the day of the anomaly
43
+
-**View Trigger**: Displays the current trigger settings and applicable authorization system details
44
+
-**View Trigger**: Displays the current trigger settings and applicable authorization system details
49
45
50
46
## Create a statistical anomaly trigger
51
47
@@ -55,18 +51,18 @@ Statistical anomalies can detect outliers in an identity's behavior if recent ac
55
51
1. Select the **Authorization system**, Amazon Web Services (**AWS**), Microsoft **Azure**, or Google Cloud Platform (**GCP**).
56
52
1. Select one of the following conditions:
57
53
58
-
-**Identity Performed High Number of Tasks**: The identity performs at a higher volume than usual. The typical performance is 25 tasks per day and they're now performing 100 tasks per day.
59
-
-**Identity Performed Low Number of Tasks**: The identity performs lower than their daily average. The typical performance is 100 tasks per day and they're now performing 25 tasks per day.
60
-
-**Identity Performed Tasks with Multiple Unusual Patterns**: The identity does many unusual tasks and at different times. This means that identities can execute actions outside their normally logged hours or performance hours, and at a higher than usual volume of tasks than normal.
54
+
-**Identity Performed High Number of Tasks**: The identity performs higher than their usual volume of tasks. For example, an identity typically performs 25 tasks per day, and now it is performing 100 tasks per day.
55
+
-**Identity Performed Low Number of Tasks**: The identity performs lower than their usual volume of tasks. For example, an identity typically performs 100 tasks per day, and now it is performing 25 tasks per day.
61
56
-**Identity Performed Tasks with Unusual Results**: The identity performing an action gets a different result than usual, such as most tasks end in a successful result and are now ending in a failed result or vice versa.
62
-
-**Identity Performed Tasks with Unusual Timing**: The identity does tasks outside of their normal logged in time or performance hours determined by the UTC actions hours grouped as follows:
57
+
-**Identity Performed Tasks with Unusual Timing**: The identity does tasks at unusual times as established by their baseline in the observance period. Times are grouped by the following UTC 4 hour windows.
63
58
- 12AM-4AM UTC
64
59
- 4AM-8AM UTC
65
60
- 8AM-12PM UTC
66
61
- 12PM-4PM UTC
67
62
- 4PM-8PM UTC
68
63
- 8PM-12AM UTC
69
-
-**Identity Performed Tasks with Unusual Types**: The identity does unusual types of tasks from their normal tasking, for example, read, write, or delete tasks they wouldn't ordinarily perform.
64
+
-**Identity Performed Tasks with Unusual Types**: The identity performs unusual types of tasks as established by their baseline in the observance period. For example, an identity performs read, write, or delete tasks they wouldn't ordinarily perform.
65
+
-**Identity Performed Tasks with Multiple Unusual Patterns**: The identity has several unusual patterns in the tasks performed by the identity as established by their baseline in the observance period.
70
66
1. Select **Next**.
71
67
72
68
1. On the **Authorization systems** tab, select the appropriate systems, or, to select all systems, select **All**.
@@ -93,16 +89,29 @@ Statistical anomalies can detect outliers in an identity's behavior if recent ac
93
89
-**Created by**: Displays the email address of the user who created the alert.
94
90
-**Last modified by**: Displays the email address of the user who last modified the alert.
95
91
-**Last modified on**: Displays the date and time the trigger was last modified.
96
-
-**Subscription**: Toggle the button to **On** or **Off**.
92
+
-**Subscription**: Subscribes you to receive alert emails. Toggle the button to **On** or **Off**.
97
93
98
94
1. To filter by **Activated** or **Deactivated**, in the **Status** section, select **All**, **Activated**, or **Deactivated**, and then select **Apply**.
99
95
100
-
1. To view other options available to you, select the ellipses (**...**), and then make a selection from the available options:
101
-
102
-
-**Details**: Displays **Authorization System Type**, **Authorization Systems**, **Resources**, **Tasks**, and **Identities** that matched the alert criteria.
103
-
- To view the specific matches, select **Resources**, **Tasks**, or **Identities**.
104
-
- The **Activity** section displays details about the **Identity Name**, **Resource Name**, **Task Name**, **Date**, and **IP Address**.
105
-
-**View Trigger**: Displays the current trigger settings and applicable authorization system details.
96
+
1. To view other options available to you, select the ellipses (**...**), and then select from the available options:
97
+
98
+
If the **Subscription** is **On**, the following options are available:
99
+
-**Edit**: Enables you to modify alert parameters
100
+
101
+
> [!NOTE]
102
+
> Only the user who created the alert can perform the following actions: edit the trigger screen, rename an alert, deactivate an alert, and delete an alert. Changes made by other users aren't saved.
103
+
-**Duplicate**: Create a duplicate copy of the selected alert trigger.
104
+
-**Rename**: Enter the new name of the query, and then select **Save.**
105
+
-**Deactivate**: The alert will still be listed, but will no longer send emails to subscribed users.
106
+
-**Activate**: Activate the alert trigger and start sending emails to subscribed users.
107
+
-**Notification settings**: View the **Email** of users who are subscribed to the alert trigger.
108
+
-**Delete**: Delete the alert.
109
+
110
+
If the **Subscription** is **Off**, the following options are available:
111
+
-**View**: View details of the alert trigger.
112
+
-**Notification settings**: View the **Email** of users who are subscribed to the alert trigger.
113
+
-**Duplicate**: Create a duplicate copy of the selected alert trigger.
114
+
106
115
107
116
1. Select **Apply**.
108
117
@@ -113,4 +122,4 @@ Statistical anomalies can detect outliers in an identity's behavior if recent ac
113
122
- For an overview on activity triggers, see [View information about activity triggers](cloudknox-ui-triggers.md).
114
123
- For information on activity alerts and alert triggers, see [Create and view activity alerts and alert triggers](cloudknox-howto-create-alert-trigger.md).
115
124
- For information on rule-based anomalies and anomaly triggers, see [Create and view rule-based anomalies and anomaly triggers](cloudknox-product-rule-based-anomalies.md).
116
-
- For information on permission analytics triggers, see [Create and view permission analytics triggers](cloudknox-product-permission-analytics.md).
125
+
- For information on permission analytics triggers, see [Create and view permission analytics triggers](cloudknox-product-permission-analytics.md).
0 commit comments