Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

UEBA (User and Entity Behavior Analytics)

UEBA detects insider threats and compromised accounts by baselining normal behavior and alerting on statistical anomalies across users and systems.

Table of Contents (5 sections)

Summary: Security analysis technology that establishes behavioral baselines for users and systems and detects statistically significant deviations. UEBA identifies insider threats and compromised accounts even when no known IoCs are available.

UEBA (User and Entity Behavior Analytics) learns the normal behavior of each user and each system—and raises an alarm when behavior deviates significantly. Instead of searching for known attack patterns (IoCs), UEBA detects anomalous behavior regardless of the attack vector.

The UEBA Principle

Normal behavior of user "max.müller":

  • Login: 8:30–9:00 AM, from Berlin, Windows laptop
  • File access: ~200 documents/day, "Projects/Client-A" folder
  • Email: ~50 incoming/outgoing, no attachments > 10 MB
  • VPN: never outside business hours

Anomaly Detection:

EventRisk Score
Login at 3:17 AM from Thailand+40
5,000 documents in 2 hours+60
2 GB ZIP file to USB+50
847 MB email sent to gmail.com+70

Combined Risk Score: 220 → critical alert

Use Cases

Insider Threat Detection

Scenario: Employee resigns and exfiltrates data

Without UEBA:

  • Download of 50,000 files to USB not detected
  • No known IoC, no malware

With UEBA:

  • Baseline: 150 file accesses/day
  • Anomaly: 50,000 accesses in 3 hours
  • Risk Score critical → Alert → Analyst investigates

Compromised Account

Scenario: Credential stuffing successful – account taken over

Without UEBA:

  • Login with real password → no firewall alert
  • Standard SIEM has no alert trigger

With UEBA:

  • Login from unknown country → +30
  • Login at unusual time → +25
  • Access to folder never visited before → +40
  • Total: "Account Takeover Risk" alert

Privilege Escalation Detection

Scenario: Attacker escalates from normal to admin account

Patterns detected by UEBA:

  • Account accesses domain controller for the first time
  • Unusual admin tool usage (PsExec, Mimikatz)
  • New service installed on server at an unusual time

UEBA Technology

UEBA uses machine learning:

MethodDescription
Statistical AnalysisDeviations from personal average
Peer Group AnalysisComparison with similar users (e.g., all accountants)
Time Series AnalysisTime-based patterns (time of day, day of the week)
Entity GraphsRelationships between users and assets

Data Sources:

SourceData
AD/Entra IDLogin events, group changes
EDRProcess launches, file operations
DLPFile transfers, email attachments
NetworkConnections, bandwidth
CloudAzure/AWS API calls, configuration changes

UEBA vs. SIEM

SIEMUEBA
BasisKnown rules/signaturesBehavioral baselines
Unknown attacksNot detectedDetected (anomaly)
False positivesCan be highLower (context-aware)
Insider threatsLimitedStrength of UEBA
ComplexityMediumHigh (ML models)

SIEM and UEBA are complementary—most modern SIEM platforms (Microsoft Sentinel, Splunk, Elastic) integrate UEBA capabilities.

Market Overview

  • Microsoft Sentinel - Integrated UEBA (Entity Behavior Analytics)
  • Splunk UBA - Standalone UEBA solution
  • Exabeam - Specializes in UEBA + SIEM
  • Securonix – Cloud-native UEBA
  • IBM QRadar UBA – Enterprise focus
  • Varonis – Focus on file access and cloud data

For SMBs, Microsoft Sentinel with Entity Behavior Analytics enabled is recommended – already included in M365 E5.

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
This article was last edited on 03/29/2026. Responsible: Chris Wojzechowski, Geschäftsführender Gesellschafter at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"