Skip to main content

Use CasesGet Started with Threat Detection, Investigation, and Response (TDIR) Use Case Categories

Compromised Credentials Use Case

Learn about the Compromised Credentials use case and what Exabeam functionalities protect against it.

The Compromised Credentials use case describes when an attacker disguises as a valid user with legitimate access and uses stolen credentials to access your system.

In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Compromised Credentials use case is categorized under the Compromised Insiders use case category. It contains specific scenarios, including:

In Case Manager, use the out-of-the-box Compromised Credentials incident type to standardize incident fields, phases, and tasks for compromised credentials incidents.

View more information about compromised credentials and tips on configuring the use case on the Exabeam Community.