- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
PrevNext
Abnormal Authentication and Access Scenario
Learn about the Compromised Credentials Abnormal Authentication and Access scenario.
The Abnormal Authentication and Access scenario describes when an attacker compromises credentials and authenticates abnormally, like at an abnormal time or from an abnormal location, or does something outside typical usage or behavior patterns.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Abnormal Authentication and Access scenario falls under the Compromised Credentials use case.