- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
PrevNext
Abnormal Application Access Scenario
Learn about the Compromised Credentials Abnormal Application Access scenario.
The Abnormal Application Access scenario describes when an attacker compromises valid credentials and accesses an application. You can often identify this scenario when someone's application access and interaction patterns change.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Abnormal Application Access scenario falls under the Compromised Credentials use case.