- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
Compromised Credentials Use Case
Learn about the Compromised Credentials use case and what Exabeam functionalities protect against it.
The Compromised Credentials use case describes when an attacker disguises as a valid user with legitimate access and uses stolen credentials to access your system.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Compromised Credentials use case is categorized under the Compromised Insiders use case category. It contains specific scenarios, including:
In Case Manager, use the out-of-the-box Compromised Credentials incident type to standardize incident fields, phases, and tasks for compromised credentials incidents.
View more information about compromised credentials and tips on configuring the use case on the Exabeam Community.