Leverage searches that allow you to detect and investigate unusual activities that might correlate to insider threat specially in terms of information sabotage.
- Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud, Splunk Behavioral Analytics
- Datamodel: Endpoint, Endpoint_Processes
- Last Updated: 2021-11-17
- Author: Teoderick Contreras, Splunk
- ID: b71ba595-ef80-4e39-8b66-887578a7a71b
Information sabotage is the type of crime many people associate with insider threat. Where the current or former employees, contractors, or business partners intentionally exceeded or misused an authorized level of access to networks, systems, or data with the intention of harming a specific individual, the organization, or the organization’s data, systems, and/or daily business operations.
|High Frequency Copy Of Files In Network Share||Transfer Data to Cloud Account||Anomaly|
|Sdelete Application Execution||Data Destruction, File Deletion, Indicator Removal on Host||Anomaly|
source | version: 1