Use CasesConfigure Threat Detection, Investigation, and Response (TDIR) Use Case Packages

Configure Malicious Insiders Use Cases

Quickly get started with implementing Malicious Insiders use cases in your Exabeam environment.

Review everything you need to configure so you can investigate eight Malicious Insiders use cases:

  • Configure the Data Leak Use Case DOCUMENTATION COMING SOON

  • Configure the Privilege Access Abuse Use Case DOCUMENTATION COMING SOON

  • Configure the Data Access Abuse Use Case DOCUMENTATION COMING SOON

  • Configure the Audit Tampering Use Case DOCUMENTATION COMING SOON

  • Configure the Destruction of Data Use Case DOCUMENTATION COMING SOON

  • Configure the Physical Security Use Case DOCUMENTATION COMING SOON

  • Configure the Workforce Protection Use Case DOCUMENTATION COMING SOON

  • Configure the Abnormal Authentication and Access Use Case DOCUMENTATION COMING SOON