Trace Id is missing
Skip to main content
Microsoft Security
A orange, white and green logo with arrow

What is user and entity behavior analytics (UEBA)?

Learn how UEBA uses machine learning and behavioral analytics to detect threats and cyberattacks.

UEBA in cybersecurity

User entity and behavior analytics (UEBA) is an advanced cybersecurity approach that uses machine learning and behavioral analytics to detect compromised entities such as firewalls, servers, and databases, as well as malicious insiders and cyberattacks, including distributed denial-of-service (DDoS) attacks, phishing attempts, malware, and ransomware.

UEBA works by analyzing logs and alerts from connected data sources to build a baseline of behavioral profiles for all of an organization’s users and entities across time. UEBA relies on machine learning capabilities, combined with other techniques, to automatically detect compromised assets.

Not only can UEBA detect potential breaches, but it can also determine the sensitivity of any particular asset, as well as the potential severity of its breach.

Key takeaways

  • UEBA helps uncover suspicious activity of users and non-human entities like servers, devices, and networks.
  • By collecting data and defining a baseline of typical behavior, UEBA can identify abnormal activity and generate alerts.
  • Organizations use UEBA to enhance threat intelligence, accelerate incident detection and response, adapt to evolving cyberthreats, mitigate risks, and comply with regulations.
  • If not implemented well, UEBA can introduce challenges like privacy concerns and false positives and negatives.
  • Advances in UEBA will include the use of AI to improve accuracy, further integration with threat protection solutions, and proactive cyberthreat protection.
  • Organizations can begin taking advantage of UEBA with a unified security operations solution that helps protect, detect, and respond to cyberthreats.

Key components of UEBA

At its core, UEBA consists of two key components: user behavior analytics (UBA) and entity behavior analytics (EBA).

UBA helps organizations see and stop potential security risks by understanding user behavior. This is accomplished by monitoring and analyzing patterns across user activity to form a baseline model for typical behavior. The model determines the probability of a specific user performing a specific activity based on this behavioral learning pattern.

Like UBA, EBA can also help organizations identify potential cyberthreats—on the network side. EBA monitors and analyzes activity between non-human entities such as servers, applications, databases, and the Internet of Things (IoT). This helps identify suspicious behaviors that could indicate a breach, such as unauthorized data access or abnormal data transfer patterns.

Together, UBA and EBA form a solution that compares a variety of different artifacts, including geographical locations, devices, environments, time, frequency, and peer or organization-wide behavior.

How does UEBA work?

Data collection

UEBA collects user and entity data from all connected data sources across the organization's network. User data may include sign-in activity, location, and data access patterns, while entity data may include logs from network devices, servers, endpoints, applications, and other additional services.

Modeling and baselining

UEBA analyzes the collected data and uses it to define baselines, or typical behavior profiles, for every user and entity. The baselines are then used to create dynamic behavioral models that continuously learn and adapt over time based on the incoming data.

Anomaly detection

Using baselines as a guide for typical behavior, UEBA continues to monitor user and entity activity in real time to help an organization determine if an asset has been compromised. The system detects anomalous activities that deviate from typical baseline behavior, such as the initiation of an abnormally high-volume data transfer, which triggers an alert. While anomalies on their own do not necessarily indicate malicious or even suspicious behavior, they can be used to improve detections, investigations, and threat hunting.

Alerting and investigation

Alerts featuring insight into user behavior, the type of anomaly, and the potential risk level are sent to a security operations center (SOC) team. The SOC team receives the information and determines whether they should further the investigation based on behavior, context, and risk priority.

Collaboration with other security tools

By using UEBA alongside a broader set of cyberthreat solutions, organizations form a unified security platform and enjoy a stronger security posture overall. UEBA also works with managed detection and response (MDR) tools and privileged access management (PAM) solutions for monitoring; security information and event management (SIEM); and incident response tools for action and response.

Benefits of UEBA

Threat detection and intelligence

Threat hunters use threat intelligence to help determine whether their queries have uncovered suspicious behavior. When the behavior is suspicious, the anomalies point toward potential paths for further investigation. By analyzing patterns among both users and entities, UEBA can detect a much wider range of cyberattacks sooner, including early cyberthreats, insider cyberthreats, DDoS attacks, and brute-force attacks, before they escalate into a potential incident or breach.

Adaptability

UEBA models are driven by machine learning algorithms that continuously learn from evolving user and entity behavior patterns using data analysis. By adapting to security needs in real time, security solutions can stay effective in the face of a changing security landscape featuring sophisticated cyberthreats.

Faster incident responses

Security analysts use anomalies to help confirm a breach, assess its impact, and provide timely and actionable insights into potential security incidents, which SOC teams can use to further investigate cases. This, in turn, results in faster, more efficient incident resolution, which minimizes the overall impact of cyberthreats on an entire organization.

Risk mitigation

In the era of hybrid or remote work, today's organizations face cyberthreats that are always evolving—which is why their methods must evolve too. To detect new and existing cyberthreats more effectively, security analysts look for anomalies. While a single anomaly doesn’t necessarily indicate malicious behavior, the presence of multiple anomalies across the kill chain can indicate greater risk. Security analysts can enhance detections even further by adding alerts for identified unusual behavior. By adopting UEBA and expanding the scope of their security to encompass devices outside of the traditional office setting, organizations can proactively improve login security, mitigate cyberthreats, and ensure a more resilient and secure environment overall.

Compliance assurance

In regulated industries such as financial services and healthcare, data protection and privacy regulations come with standards that every company must comply with. UEBA’s continuous monitoring and reporting capabilities help organizations keep track of these regulatory compliance requirements.

Challenges and considerations of UEBA

While UEBA provides organizations with invaluable insights, it also comes with its own unique set of challenges to consider. Here are some common issues to address when implementing UEBA:
  • False positives and negatives
    On occasion, UEBA systems can erroneously categorize normal behaviors as suspicious and generate a false positive. UEBA might also miss out on actual security cyberthreats, which can generate a false negative. For more accurate cyberthreat detection, organizations need to investigate alerts with care.

  • Inconsistent naming across entities
    A resource provider may create an alert that insufficiently identifies an entity, such as a username without the domain name context. When this happens, the user entity can't be merged with other instances of the same account and is then identified as a separate entity. To minimize this risk, it’s crucial to identify entities using a standardized form, and to synchronize entities with their identity provider to create a single directory.

  • Privacy concerns
    Fortifying security operations should not come at the expense of individual privacy rights. Continuous monitoring of user and entity behavior raises questions related to ethics and privacy, which is why it’s essential to use security tools—especially AI-enhanced security tools—responsibly.

  • Rapidly evolving cyberthreats 
    While UEBA systems are designed to adapt to changing cyberthreat landscapes, they may still face challenges in keeping pace with rapidly evolving cyberthreats. As cyberattack techniques and patterns change, it’s crucial to continue to tune UEBA technology to address the organization’s needs.

How UEBA differs from NTA

Network traffic analysis (NTA) is a cybersecurity approach that shares many similarities with UEBA in practice but differs in terms of focus, application, and scale. When forming a comprehensive cybersecurity solution, the two approaches work well together:

UEBA vs NTA

UEBA:
  • Focuses on understanding and monitoring the behaviors of users and entities within a network through machine learning and AI.
  • Gathers data from user and entity sources, which may include sign-in activity, access logs, and event data, as well as interactions between entities.
  • Uses models or baselines to identify insider threats, compromised accounts, and unusual behaviors that could lead to a potential incident.
NTA:
  • Focuses on understanding and monitoring the flow of data within a network by examining data packets and identifying patterns that could indicate a potential threat.
  • Gathers data from network traffic, which may include network logs, protocols, IP addresses, and traffic patterns.
  • Uses traffic patterns to identify network-based threats such as DDoS attacks, malware, and data theft and exfiltration.
  • Works nicely with other network security tools and technologies, as well as UEBA.

How UEBA differs from SIEM

UEBA and security information and event management (SIEM) are complementary technologies that work together to enhance an organization's overall security posture. Both play crucial roles in forming a robust monitoring and response framework, but they differ in terms of focus and the range of sources. Let’s compare the two:

UEBA vs SIEM

UEBA:
  • Focuses on monitoring and analyzing the behaviors of users and entities within a network, looking for anomalies in behavior patterns that could indicate a potential security risk.
  • Gathers data from a broad range of user and entity sources, including users, network devices, apps, and firewalls, for more accurate, context-based threat intelligence.
  • Uses ML and advanced analytics to provide actionable insights related to user and entity behaviors, helping security teams respond to insider threats more efficiently.
SIEM
  • Focuses on collecting, aggregating, and analyzing large volumes of data, including the behaviors of users and entities, to provide a complete overview of an organization's security posture.
  • Gathers data from a broad range of user and entity sources, including users, network devices, apps, and firewalls, for an end-to-end view of the estate.
  • Uses machine learning and advanced analytics to provide actionable insights related to user and entity behaviors, helping security teams respond to insider threats more efficiently.
  • Provides a comprehensive view of the overall security landscape, focusing on log management, event correlation, and incident monitoring and response.

UEBA solutions for your business

As cybersecurity threats continue to evolve at a rapid pace, UEBA solutions are becoming more crucial to an organization's defense strategy than ever before. The key to better protecting your enterprise from future cyberthreats is to stay educated, proactive, and aware.

If you’re interested in fortifying your organization’s cybersecurity stance with next-generation UEBA capabilities, you’ll want to explore the latest options. A unified security operations solution brings together the capabilities of SIEM and UEBA to help your organization see and stop sophisticated cyberthreats in real time, all from one platform. Move faster with unified security and visibility across your clouds, platforms, and endpoint services. Get a complete overview of your security posture by aggregating security data from your entire tech stack—and use AI to uncover potential cyberthreats.
RESOURCES

Learn more about Microsoft Security

A person in a white suit working on laptop
Solution

AI-powered, unified SecOps

Outpace threats with XDR and SIEM—all in one platform.
A person and another person looking at each other
Product

Microsoft Sentinel

Stop cyberattacks with an AI-powered, cloud based SIEM that detects anomalies and threats with user and entity behavior analytics.
A person and another person sitting at a table with laptops
Product

Microsoft Copilot for Security

Empower security teams to detect hidden patterns and respond to incidents faster with generative AI.

Frequently asked questions

  • UEBA is a cybersecurity approach that finds and stops potential security threats across user and entity activity with the help of machine learning algorithms and AI.
  • When a UEBA tool detects anomalous behavior that deviates from baseline behavior, this triggers an alert that is sent to the security team. Unusual sign-in activity from an unknown device, for instance, may trigger an alert.
  • UEBA tools assist in analyzing patterns across user and entity sources to proactively uncover unusual behavior, malicious activities, or insider threats across the organization.
  • UBA offers insight into potential security risks by monitoring and analyzing user activity. UEBA takes this one step further by monitoring and analyzing non-human entities, like servers, apps, and devices, in addition to user behavior.
  • EDR solutions monitor and respond to security incidents at the individual endpoint level. UEBA monitors and responds to the behaviors of users and entities across the entire network, which also includes endpoints.
  • UEBA focuses on analyzing and understanding user and entity behavior to detect potential security threats. Security orchestration, automation, and response (SOAR) is used to streamline security workflow processes through orchestration and automation. While they differ in focus and functionality, SOAR and UEBA complement one another within the context of a comprehensive cybersecurity strategy.

Follow Microsoft Security