SlideShare a Scribd company logo
1 of 1
Download to read offline
USE CASE




  Privileged User Monitoring

     When it comes to protecting a network from insider threats,
     organizations need the ability to keep a watchful eye on its
     privileged users. This includes business users with direct access
     to confidential data systems, as well as administrators with the
     ability to create and modify permissions, privileges and access to
     any device.
     The challenge is finding a way to keep an eye on all systems
     within a large, heterogeneous environment and quickly identify
     improper or malicious behavior when, in most cases, the people
     responsible for the behavior in question are the ones with access
     to the log files that record all user activity.




        LogRhythm provides unprecedented auditing and insight into privileged user activity, across the enterprise.

       Watching the Watchers                           Securing the Bread Crumbs                    Finding the Needle

       Challenge
       “Administrator” privileges usually              Most privileged users behave in a            Recording log data related to
       include the ability to modify or even           responsible and ethical manner. But,         privileged user activity is a start.
       remove activity log data. While most            the high-level access tied to their          However, gaining meaningful and
       administrators use their access privileges      user permissions means that a single         timely insight into inappropriate and/
       responsibly, it is imperative to establish      privileged user with malicious intent        or concerning behavior with intelligent
       an independent and automated means of           can cause enormous damage to an              and automated correlation, alerting
       capturing and storing log data associated       organization. Because they have the          and reporting is like trying to find a
       with administrator activity and alerting on     means to modify data of recorded activity,   needle in a haystack.
       concerning behavior.                            tracking the culprit can be difficult.

       Solution
       LogRhythm’s real-time, automated,               Immediate collection by LogRhythm            LogRhythm provides Intelligent IT
       centralized and secure collection of log        with cryptographic hashing provides          Search™ capabilities for rapid
       data provides independent access to             a digital chain-of-custody that              user-level investigations, displays
       privileged user activity logs without relying   eliminates the ability for privileged        aggregate and trending visualization
       on the privileged user for collection.          users to tamper with activity records        to identify behavior based patterns,
                                                       and conceal nefarious activity.              and delivers automated alerting on
                                                                                                    specific privileged user activity.

       Benefit
       Using the alarming tool, LogRhythm              LogRhythm’s SecondLook™ archive              LogRhythm users can quickly use the
       users can set up alerts to send out             restoration wizard allows administrators     investigate tool on all activity performed
       notifications any time a privileged user        to immediately query against any             by a newly created user, using a
       account is added or modified, including         archived data, which is automatically        combination of detailed forensic views
       information about who created the               validated to maintain the digital            and interactive graphical analyses.
       account.                                        chain-of-custody.                            A simple, wizard-based GUI makes
                                                                                                    investigations quick-to-run and easy
                                                                                                    to save for future use.




© 2010 LogRhythm Inc. | www.logrhythm.com                                                            PrivilegedUserMonitoringUseCase_1004

More Related Content

Similar to LogRhythm Privileged Use Monitoring Use Case

Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointBeyondTrust
 
LogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UKLogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UKjordagro
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloudNag Nani
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
LogRhythm Visualization Use Case
LogRhythm Visualization Use CaseLogRhythm Visualization Use Case
LogRhythm Visualization Use Casejordagro
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudEditor IJCATR
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...Ryan Gallavin
 
It securepro 10 nov 2010
It securepro   10 nov 2010It securepro   10 nov 2010
It securepro 10 nov 2010Agora Group
 
20 Trip-Wire-.pdf
20 Trip-Wire-.pdf20 Trip-Wire-.pdf
20 Trip-Wire-.pdfG Srinu
 
20 Trip-Wire-.pdf
20 Trip-Wire-.pdf20 Trip-Wire-.pdf
20 Trip-Wire-.pdfG Srinu
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementRyan Gallavin
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsIS Decisions
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical PresentationIS Decisions
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) ghayour abbas
 
Priviledged Identity Management
Priviledged Identity ManagementPriviledged Identity Management
Priviledged Identity Managementrver21
 
Priviledged identity management
Priviledged identity managementPriviledged identity management
Priviledged identity managementrver21
 
Priviledged Identity Management
Priviledged Identity ManagementPriviledged Identity Management
Priviledged Identity Managementrver21
 

Similar to LogRhythm Privileged Use Monitoring Use Case (20)

Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
LogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UKLogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Alerting on the Absence of an Event Use Case UK
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
LogRhythm Visualization Use Case
LogRhythm Visualization Use CaseLogRhythm Visualization Use Case
LogRhythm Visualization Use Case
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
 
It securepro 10 nov 2010
It securepro   10 nov 2010It securepro   10 nov 2010
It securepro 10 nov 2010
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
20 Trip-Wire-.pdf
20 Trip-Wire-.pdf20 Trip-Wire-.pdf
20 Trip-Wire-.pdf
 
20 Trip-Wire-.pdf
20 Trip-Wire-.pdf20 Trip-Wire-.pdf
20 Trip-Wire-.pdf
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Priviledged Identity Management
Priviledged Identity ManagementPriviledged Identity Management
Priviledged Identity Management
 
Priviledged identity management
Priviledged identity managementPriviledged identity management
Priviledged identity management
 
Priviledged Identity Management
Priviledged Identity ManagementPriviledged Identity Management
Priviledged Identity Management
 

More from jordagro

LogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use CaseLogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use Casejordagro
 
LogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use CaseLogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use Casejordagro
 
LogRhythm Rapid Forensics Use Case
LogRhythm Rapid Forensics Use CaseLogRhythm Rapid Forensics Use Case
LogRhythm Rapid Forensics Use Casejordagro
 
LogRhythm Operations Use Case
LogRhythm Operations Use CaseLogRhythm Operations Use Case
LogRhythm Operations Use Casejordagro
 
LogRhythm Geolocation Use Case
LogRhythm Geolocation Use CaseLogRhythm Geolocation Use Case
LogRhythm Geolocation Use Casejordagro
 
What's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data SheetWhat's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data Sheetjordagro
 
LogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data SheetLogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data Sheetjordagro
 
LogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 FlyerLogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 Flyerjordagro
 
LogRhythm Professional Services Overview Data Sheet
LogRhythm Professional Services Overview Data SheetLogRhythm Professional Services Overview Data Sheet
LogRhythm Professional Services Overview Data Sheetjordagro
 
LogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data SheetLogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data Sheetjordagro
 
LogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Advanced Intelligence Engine Data SheetLogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Advanced Intelligence Engine Data Sheetjordagro
 
LogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data SheetLogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data Sheetjordagro
 
LogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data SheetLogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data Sheetjordagro
 
LogRhythm Overview Data Sheet
LogRhythm Overview Data SheetLogRhythm Overview Data Sheet
LogRhythm Overview Data Sheetjordagro
 
LogRhythm FIPS Data Sheet
LogRhythm  FIPS Data SheetLogRhythm  FIPS Data Sheet
LogRhythm FIPS Data Sheetjordagro
 
LogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data SheetLogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data Sheetjordagro
 
File Integrity Monitoring Data Sheet
File Integrity Monitoring Data SheetFile Integrity Monitoring Data Sheet
File Integrity Monitoring Data Sheetjordagro
 
LogRhythm Appliance Data Sheet
LogRhythm Appliance Data SheetLogRhythm Appliance Data Sheet
LogRhythm Appliance Data Sheetjordagro
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheetjordagro
 

More from jordagro (19)

LogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use CaseLogRhythm Zero Day Exploits Use Case
LogRhythm Zero Day Exploits Use Case
 
LogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use CaseLogRhythm Time-to-Value Use Case
LogRhythm Time-to-Value Use Case
 
LogRhythm Rapid Forensics Use Case
LogRhythm Rapid Forensics Use CaseLogRhythm Rapid Forensics Use Case
LogRhythm Rapid Forensics Use Case
 
LogRhythm Operations Use Case
LogRhythm Operations Use CaseLogRhythm Operations Use Case
LogRhythm Operations Use Case
 
LogRhythm Geolocation Use Case
LogRhythm Geolocation Use CaseLogRhythm Geolocation Use Case
LogRhythm Geolocation Use Case
 
What's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data SheetWhat's New Logrhythm 5.1 Data Sheet
What's New Logrhythm 5.1 Data Sheet
 
LogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data SheetLogRhythm Web Rhythm Data Sheet
LogRhythm Web Rhythm Data Sheet
 
LogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 FlyerLogRhythm Siem 2.0 Flyer
LogRhythm Siem 2.0 Flyer
 
LogRhythm Professional Services Overview Data Sheet
LogRhythm Professional Services Overview Data SheetLogRhythm Professional Services Overview Data Sheet
LogRhythm Professional Services Overview Data Sheet
 
LogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data SheetLogRhythm PowerTech Interact Data Sheet
LogRhythm PowerTech Interact Data Sheet
 
LogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Advanced Intelligence Engine Data SheetLogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Advanced Intelligence Engine Data Sheet
 
LogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data SheetLogRhythm Visualize This Data Sheet
LogRhythm Visualize This Data Sheet
 
LogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data SheetLogRhythm Training Syllabus Data Sheet
LogRhythm Training Syllabus Data Sheet
 
LogRhythm Overview Data Sheet
LogRhythm Overview Data SheetLogRhythm Overview Data Sheet
LogRhythm Overview Data Sheet
 
LogRhythm FIPS Data Sheet
LogRhythm  FIPS Data SheetLogRhythm  FIPS Data Sheet
LogRhythm FIPS Data Sheet
 
LogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data SheetLogRhythm High Availability Solutions Data Sheet
LogRhythm High Availability Solutions Data Sheet
 
File Integrity Monitoring Data Sheet
File Integrity Monitoring Data SheetFile Integrity Monitoring Data Sheet
File Integrity Monitoring Data Sheet
 
LogRhythm Appliance Data Sheet
LogRhythm Appliance Data SheetLogRhythm Appliance Data Sheet
LogRhythm Appliance Data Sheet
 
LogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data SheetLogRhythm Advanced Agent Data Sheet
LogRhythm Advanced Agent Data Sheet
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

LogRhythm Privileged Use Monitoring Use Case

  • 1. USE CASE Privileged User Monitoring When it comes to protecting a network from insider threats, organizations need the ability to keep a watchful eye on its privileged users. This includes business users with direct access to confidential data systems, as well as administrators with the ability to create and modify permissions, privileges and access to any device. The challenge is finding a way to keep an eye on all systems within a large, heterogeneous environment and quickly identify improper or malicious behavior when, in most cases, the people responsible for the behavior in question are the ones with access to the log files that record all user activity. LogRhythm provides unprecedented auditing and insight into privileged user activity, across the enterprise. Watching the Watchers Securing the Bread Crumbs Finding the Needle Challenge “Administrator” privileges usually Most privileged users behave in a Recording log data related to include the ability to modify or even responsible and ethical manner. But, privileged user activity is a start. remove activity log data. While most the high-level access tied to their However, gaining meaningful and administrators use their access privileges user permissions means that a single timely insight into inappropriate and/ responsibly, it is imperative to establish privileged user with malicious intent or concerning behavior with intelligent an independent and automated means of can cause enormous damage to an and automated correlation, alerting capturing and storing log data associated organization. Because they have the and reporting is like trying to find a with administrator activity and alerting on means to modify data of recorded activity, needle in a haystack. concerning behavior. tracking the culprit can be difficult. Solution LogRhythm’s real-time, automated, Immediate collection by LogRhythm LogRhythm provides Intelligent IT centralized and secure collection of log with cryptographic hashing provides Search™ capabilities for rapid data provides independent access to a digital chain-of-custody that user-level investigations, displays privileged user activity logs without relying eliminates the ability for privileged aggregate and trending visualization on the privileged user for collection. users to tamper with activity records to identify behavior based patterns, and conceal nefarious activity. and delivers automated alerting on specific privileged user activity. Benefit Using the alarming tool, LogRhythm LogRhythm’s SecondLook™ archive LogRhythm users can quickly use the users can set up alerts to send out restoration wizard allows administrators investigate tool on all activity performed notifications any time a privileged user to immediately query against any by a newly created user, using a account is added or modified, including archived data, which is automatically combination of detailed forensic views information about who created the validated to maintain the digital and interactive graphical analyses. account. chain-of-custody. A simple, wizard-based GUI makes investigations quick-to-run and easy to save for future use. © 2010 LogRhythm Inc. | www.logrhythm.com PrivilegedUserMonitoringUseCase_1004