Skip to content

Commit 3490ca3

Browse files
authored
Merge pull request #189427 from Yvonne-deQ/patch-5
Update cloudknox-product-statistical-anomalies.md
2 parents 769bcdb + 1b00ca3 commit 3490ca3

File tree

1 file changed

+37
-28
lines changed

1 file changed

+37
-28
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-product-statistical-anomalies.md

Lines changed: 37 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -30,22 +30,18 @@ Statistical anomalies can detect outliers in an identity's behavior if recent ac
3030
- **Alert Name**: Lists the name of the alert.
3131
- **Anomaly Alert Rule**: Displays the name of the rule select when creating the alert.
3232
- **# of Occurrences**: Displays how many times the alert trigger has occurred.
33-
- **Task**: Displays how many tasks are affected by the alert.
34-
- **Resources**: Displays how many resources are affected by the alert.
35-
- **Identity**: Displays how many identities are affected by the alert.
3633
- **Authorization System**: Displays which authorization systems the alert applies to.
37-
- **Date/Time**: Lists the date and time of the alert.
38-
- **Date/Time (UTC)**: Lists the date and time of the alert in Coordinated Universal Time (UTC).
39-
- **Activity** section displays details about the **Identity Name**, **Resource Name**, **Task Name**, **Date**, and **IP Address**.
40-
- **View Trigger**: Displays the current trigger settings and applicable authorization system details.
41-
42-
1. To filter the alerts, select the appropriate alert name or choose **All** from the **Alert Name** dropdown menu.
43-
1. From the **Date** dropdown menu, select **Last 24 Hours**, **Last 2 Days**, **Last Week**, or **Custom Range**, and select **Apply**.
44-
45-
- If you select **Custom Range**, also enter **From** and **To** duration settings.
46-
1. To view details that match the alert criteria, select the ellipses (...).
47-
48-
For example, **Authorization System Type**, **Authorization Systems**, **Resources**, **Tasks**, and **Identities**.
34+
- **Date/Time**: Lists the day of the outlier occurring.
35+
- **Date/Time (UTC)**: Lists the day of the outlier occurring in Coordinated Universal Time (UTC).
36+
37+
38+
1. To filter the alerts based on name, select the appropriate alert name or choose **All** from the **Alert Name** dropdown menu, and select **Apply**.
39+
1. To filter the alerts based on alert time, select **Last 24 Hours**, **Last 2 Days**, **Last Week**, or **Custom Range** from the **Date** dropdown menu, and select **Apply**.
40+
1. If you select the ellipses (**...**) and select:
41+
- **Details**, this brings you to an Alert Summary view with **Authorization System**, **Statistical Model** and **Observance Period** displayed along with a table with a row per identity triggering this alert. From here you can click:
42+
- **Details**: Displays graph(s) highlighting the anomaly with context, and up to the top 3 actions performed on the day of the anomaly
43+
- **View Trigger**: Displays the current trigger settings and applicable authorization system details
44+
- **View Trigger**: Displays the current trigger settings and applicable authorization system details
4945

5046
## Create a statistical anomaly trigger
5147

@@ -55,18 +51,18 @@ Statistical anomalies can detect outliers in an identity's behavior if recent ac
5551
1. Select the **Authorization system**, Amazon Web Services (**AWS**), Microsoft **Azure**, or Google Cloud Platform (**GCP**).
5652
1. Select one of the following conditions:
5753

58-
- **Identity Performed High Number of Tasks**: The identity performs at a higher volume than usual. The typical performance is 25 tasks per day and they're now performing 100 tasks per day.
59-
- **Identity Performed Low Number of Tasks**: The identity performs lower than their daily average. The typical performance is 100 tasks per day and they're now performing 25 tasks per day.
60-
- **Identity Performed Tasks with Multiple Unusual Patterns**: The identity does many unusual tasks and at different times. This means that identities can execute actions outside their normally logged hours or performance hours, and at a higher than usual volume of tasks than normal.
54+
- **Identity Performed High Number of Tasks**: The identity performs higher than their usual volume of tasks. For example, an identity typically performs 25 tasks per day, and now it is performing 100 tasks per day.
55+
- **Identity Performed Low Number of Tasks**: The identity performs lower than their usual volume of tasks. For example, an identity typically performs 100 tasks per day, and now it is performing 25 tasks per day.
6156
- **Identity Performed Tasks with Unusual Results**: The identity performing an action gets a different result than usual, such as most tasks end in a successful result and are now ending in a failed result or vice versa.
62-
- **Identity Performed Tasks with Unusual Timing**: The identity does tasks outside of their normal logged in time or performance hours determined by the UTC actions hours grouped as follows:
57+
- **Identity Performed Tasks with Unusual Timing**: The identity does tasks at unusual times as established by their baseline in the observance period. Times are grouped by the following UTC 4 hour windows.
6358
- 12AM-4AM UTC
6459
- 4AM-8AM UTC
6560
- 8AM-12PM UTC
6661
- 12PM-4PM UTC
6762
- 4PM-8PM UTC
6863
- 8PM-12AM UTC
69-
- **Identity Performed Tasks with Unusual Types**: The identity does unusual types of tasks from their normal tasking, for example, read, write, or delete tasks they wouldn't ordinarily perform.
64+
- **Identity Performed Tasks with Unusual Types**: The identity performs unusual types of tasks as established by their baseline in the observance period. For example, an identity performs read, write, or delete tasks they wouldn't ordinarily perform.
65+
- **Identity Performed Tasks with Multiple Unusual Patterns**: The identity has several unusual patterns in the tasks performed by the identity as established by their baseline in the observance period.
7066
1. Select **Next**.
7167

7268
1. On the **Authorization systems** tab, select the appropriate systems, or, to select all systems, select **All**.
@@ -93,16 +89,29 @@ Statistical anomalies can detect outliers in an identity's behavior if recent ac
9389
- **Created by**: Displays the email address of the user who created the alert.
9490
- **Last modified by**: Displays the email address of the user who last modified the alert.
9591
- **Last modified on**: Displays the date and time the trigger was last modified.
96-
- **Subscription**: Toggle the button to **On** or **Off**.
92+
- **Subscription**: Subscribes you to receive alert emails. Toggle the button to **On** or **Off**.
9793

9894
1. To filter by **Activated** or **Deactivated**, in the **Status** section, select **All**, **Activated**, or **Deactivated**, and then select **Apply**.
9995

100-
1. To view other options available to you, select the ellipses (**...**), and then make a selection from the available options:
101-
102-
- **Details**: Displays **Authorization System Type**, **Authorization Systems**, **Resources**, **Tasks**, and **Identities** that matched the alert criteria.
103-
- To view the specific matches, select **Resources**, **Tasks**, or **Identities**.
104-
- The **Activity** section displays details about the **Identity Name**, **Resource Name**, **Task Name**, **Date**, and **IP Address**.
105-
- **View Trigger**: Displays the current trigger settings and applicable authorization system details.
96+
1. To view other options available to you, select the ellipses (**...**), and then select from the available options:
97+
98+
If the **Subscription** is **On**, the following options are available:
99+
- **Edit**: Enables you to modify alert parameters
100+
101+
> [!NOTE]
102+
> Only the user who created the alert can perform the following actions: edit the trigger screen, rename an alert, deactivate an alert, and delete an alert. Changes made by other users aren't saved.
103+
- **Duplicate**: Create a duplicate copy of the selected alert trigger.
104+
- **Rename**: Enter the new name of the query, and then select **Save.**
105+
- **Deactivate**: The alert will still be listed, but will no longer send emails to subscribed users.
106+
- **Activate**: Activate the alert trigger and start sending emails to subscribed users.
107+
- **Notification settings**: View the **Email** of users who are subscribed to the alert trigger.
108+
- **Delete**: Delete the alert.
109+
110+
If the **Subscription** is **Off**, the following options are available:
111+
- **View**: View details of the alert trigger.
112+
- **Notification settings**: View the **Email** of users who are subscribed to the alert trigger.
113+
- **Duplicate**: Create a duplicate copy of the selected alert trigger.
114+
106115

107116
1. Select **Apply**.
108117

@@ -113,4 +122,4 @@ Statistical anomalies can detect outliers in an identity's behavior if recent ac
113122
- For an overview on activity triggers, see [View information about activity triggers](cloudknox-ui-triggers.md).
114123
- For information on activity alerts and alert triggers, see [Create and view activity alerts and alert triggers](cloudknox-howto-create-alert-trigger.md).
115124
- For information on rule-based anomalies and anomaly triggers, see [Create and view rule-based anomalies and anomaly triggers](cloudknox-product-rule-based-anomalies.md).
116-
- For information on permission analytics triggers, see [Create and view permission analytics triggers](cloudknox-product-permission-analytics.md).
125+
- For information on permission analytics triggers, see [Create and view permission analytics triggers](cloudknox-product-permission-analytics.md).

0 commit comments

Comments
 (0)