Try in Splunk Security Cloud


Leverage searches that allow you to detect and investigate unusual activities that might correlate to insider threat specially in terms of information sabotage.

  • Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud, Splunk Behavioral Analytics
  • Datamodel: Endpoint
  • Last Updated: 2021-11-17
  • Author: Teoderick Contreras, Splunk
  • ID: b71ba595-ef80-4e39-8b66-887578a7a71b


Information sabotage is the type of crime many people associate with insider threat. Where the current or former employees, contractors, or business partners intentionally exceeded or misused an authorized level of access to networks, systems, or data with the intention of harming a specific individual, the organization, or the organization’s data, systems, and/or daily business operations.


Name Technique Type
High Frequency Copy Of Files In Network Share Transfer Data to Cloud Account Anomaly


source | version: 1