This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Discussions
Announcement Banner

Scheduled Maintenance for the Case Portal during May 20-22

View Details
  • NetWitness Community
  • Discussions
  • Re: How UEBA, SOAR, Threat Connect and ESA work together!
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page

How UEBA, SOAR, Threat Connect and ESA work together!

MdMahimBinFiroj
MdMahimBinFiroj Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2020-10-09 01:37 PM

Some point I need to know, we need to create rules on ESA, and based on that alert will be generated. But how UEBA will help ESA? I mean do we need to see UEBA for anomaly behavior/deviations then write rules on SIEM again for fine-tuning the rules or else UEBA will generate alert separately that we also need to look for..!!! Another thing is, how UEBA, SOAR, Threat intel will work together to triage alert, removing false positive, can you please explain? I am giving you the scenario for example. Say some brute force attempt, password cracking, and DDOS attempt is done in our network. Whatever the malicious activity is done, our SIEM receive the logs. Now how ESA rules, UEBA, SOAR and Threat intel will work together with those logs and give us the best result as alert on the screen !! please explain me. I want to know step by step process. Thanks in advance and sorry for the long question.

  • Community Thread
  • Discussion
  • Forum Thread
  • NetWitness
  • NW
  • NWP
  • RSA NetWitness
  • RSA NetWitness Platform
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
4 REPLIES 4

PrashantMishra
PrashantMishra Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2020-10-15 07:48 AM

Dear Md. Mahim Bin Firoj,

Both UEBA and ESA are alert sources for NW's Incident management. ESA uses a rule driven approach where as UEBA uses unsupervised machine learning to detect threats. You can do any customization in how various ML models detect threat. With ESA you can use rules to detect specific patterns. You cant put your own machine learning models unless you involve  RSA PS as its code driven work. Using both in your infra helps you get best of both worlds. Both can consume network, log and endpoint data for their own detection logics. Hope that makes sense now. To improve alert fidelity, organizations also uses threat intelligence and to automate response, they use SOAR. TC provides both capabilities in a single product. Once you have TC in your infra you can:

  1. Improve threat intelligence quality by aggregating multiple sources of TI in your organization and using TC as single source of truth.
  2. Investigate any indicator that was detected as part of alert to investigate further using TC's workbench that uses community analytics and other functions to help you decide if this particular indicator is really a threat or not.
  3. Use the case management on TC not Netwitness Respond to manage all your alerts
  4. Automate response using TC's playbooks

Hope this helps

Thanks

Prashant

2 Likes
Share
Reply

MdMahimBinFiroj
MdMahimBinFiroj Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2020-10-17 03:06 AM

Thank you dear Prashant Mishra‌ for the reply. I am clear now. One more thing, where do we need to integrate threat intel? With UEBA or with Log collector?

0 Likes
Share
Reply

PrashantMishra
PrashantMishra Beginner
Beginner
In response to MdMahimBinFiroj
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2020-10-20 09:03 AM

You will push the intelligence into log collectors. UEBA doesnt consumer TI. 

2 Likes
Share
Reply

MdMahimBinFiroj
MdMahimBinFiroj Beginner
Beginner
In response to PrashantMishra
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

‎2020-10-29 07:05 AM

thank you dear and sorry for the late response...ok that means, UEBA analysis the logs from the SIEM and compare it with threat intelligence. correct me if i am wrong.

0 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.