197 days
average time to identify a breach without UEBA -- UEBA-equipped organizations reduce this by 40% (IBM Cost of a Data Breach 2025)
73%
of insider threat incidents involve employees acting within normal access rights -- invisible to rule-based detection
Baseline period
of 30-90 days required for UEBA models to establish reliable behavioral baselines before generating actionable alerts

User and Entity Behavior Analytics (UEBA) detects threats by modeling what 'normal' looks like for each user, device, and service account -- and alerting when behavior deviates significantly from that baseline. This fills the gap that signature-based SIEM rules cannot: a compromised account performing actions the legitimate user would never take, an employee slowly exfiltrating data over months, or a service account suddenly accessing hundreds of servers. This guide covers UEBA architecture, the detection use cases it addresses, data source requirements, vendor options, and the operational work required to get value from a UEBA deployment.

How UEBA Works: Behavioral Baselines and Risk Scoring

UEBA systems build statistical models of normal behavior for every entity they observe -- users, devices, applications, and service accounts. Deviations from these baselines generate risk scores rather than binary alerts.

Core UEBA concepts:

Peer group analysis: Compares a user's behavior to that of their peer group (same department, role, or title). An accountant downloading 10GB of data is anomalous regardless of absolute thresholds -- but it is especially anomalous if no other accountant has ever downloaded more than 500MB.

Time-based baselines: Models what is normal for a specific user at a specific time. A user logging in at 2am is only anomalous if that user never logs in at 2am -- but for a SOC analyst with night shifts, 2am logins are expected.

Entity stitching: Links events across data sources using common identifiers (username, IP, hostname) to build a unified timeline of what an entity did across all systems. This is how UEBA connects a VPN login, a file server access, and a cloud storage upload into a coherent story.

Risk score accumulation: Individual anomalies may be low-risk in isolation but combine to form a high-risk session. A user logging in from a new IP (+10 risk), accessing a file share they never access (+15 risk), and uploading to a personal cloud storage service (+30 risk) accumulates to a 55-point risk score that triggers an alert -- even though no single event would have triggered a rule.

Model types used in UEBA:

Model TypeWhat It DetectsExample
Statistical baselineDeviation from individual normalUser accessed 10x more files than their 90-day average
Peer comparisonDeviation from role-group normalUser accessed systems no peer has touched
Time-series anomalyUnusual timingAccess at 3am for a user with no night-shift history
Sequence analysisUnusual activity sequencesLogin > Enumerate AD > Access sensitive share > Upload to cloud
Supervised MLKnown attack patternsLateral movement sequences matching training data

Core UEBA Use Cases

UEBA is not a general-purpose detection tool -- it excels at specific threat scenarios that rule-based detection struggles with.

Use case 1: Compromised account detection

An attacker with valid credentials behaves differently than the legitimate user -- they access different systems, at different times, from different locations, and with different data access patterns.

Detection signals:

  • Login from new geographic location or ASN
  • Access to systems or file shares not previously accessed
  • Lateral movement pattern (successive logins to multiple servers within a session)
  • Credential access (accessing password files, credential stores)
  • Large data access or download compared to historical baseline

Use case 2: Insider threat -- data exfiltration

A malicious insider often acts within their legitimate access rights, making rule-based detection ineffective. UEBA detects the behavioral pattern even when individual actions are permitted.

Detection signals:

  • Unusual volume of file access or download compared to peer group
  • Access to data outside the user's normal work scope
  • Data transfer to personal cloud storage (Dropbox, Google Drive, WeTransfer)
  • USB device activity combined with high file access volume
  • Printing high volumes of sensitive documents
  • Activity outside normal working hours for this user

Use case 3: Privileged account abuse

Service accounts and admin accounts have broad access -- UEBA establishes what each privileged account normally does and alerts on deviations.

Detection signals:

  • Service account performing interactive logon (service accounts should never log in interactively)
  • Admin account accessing sensitive data repositories not in their normal scope
  • Privileged account active during non-business hours without change ticket correlation
  • Bulk permission changes or account creation

Use case 4: Account takeover via credential stuffing

Successful credential stuffing produces a pattern: rapid logins from unusual IPs, failed logins preceding a successful one, access to account settings shortly after login.

Detection signals:

  • Multiple failed authentications followed by success
  • Successful login from IP associated with known VPN/proxy/Tor
  • Immediate access to high-value resources after first successful login
  • Password change shortly after login from new location

Use case 5: Lateral movement

Even when lateral movement uses legitimate credentials, the pattern is anomalous -- a single account accessing dozens of systems in sequence is not normal user behavior.

Detection signals:

  • Sequential logins to multiple distinct hosts within a short time window
  • Access to administrative shares (C$, ADMIN$, IPC$) across multiple hosts
  • WMI or PSExec usage patterns across multiple endpoints
  • Kerberoasting (high volume of service ticket requests in a short window)
Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Data Source Requirements

UEBA is only as good as the data fed into it. Missing data sources create blind spots that attackers can exploit.

Tier 1 (required -- UEBA is ineffective without these):

Data SourceEventsWhy Essential
Active Directory / Identity ProviderLogon (4624/4625/4648), Kerberos events (4768/4769/4771), group changes (4728/4732/4756)Authentication is the core data for user behavior
VPN / remote accessConnection events with user, IP, durationDetects unusual access locations and times
Endpoint (EDR or Windows Security logs)Process creation, network connections, file accessRequired for lateral movement and malware detection
Email gatewaySend/receive volume, external email with attachmentsRequired for phishing and exfiltration detection

Tier 2 (high value -- significantly improves detection):

Data SourceEventsValue
DLP (Data Loss Prevention)Policy violations, file transfersDirect exfiltration signal
Cloud app access (CASB / SSPM)SaaS logins, file sharing, downloadsCritical for cloud-era environments
Privileged access management (PAM)Privileged session recordings, checkout eventsPrivileged account abuse detection
Badge / physical accessDoor entry/exit eventsCorrelates digital and physical presence
HR systemTermination dates, role changes, leave recordsContext for insider threat (departing employee behavior)

Tier 3 (useful for specific use cases):

Data SourceUse Case
DNS logsC2 beaconing, data exfiltration via DNS
Proxy / web gatewayUnusual web destinations, cloud storage uploads
Financial system accessFraud detection for finance team
Code repository (GitHub, GitLab)Source code exfiltration by departing developer

Data quality requirements:

UEBA requires consistent timestamps (UTC synchronized), stable user identifiers (UPN or SAMAccountName, not display name), and reliable entity mapping (same user appearing as jsmith, john.smith, and J.Smith breaks entity stitching). Invest in data normalization before deploying UEBA -- garbage in produces false positives and missed detections.

UEBA Vendor Landscape

UEBA is available as a standalone product, as a SIEM add-on, or natively in cloud security platforms.

Standalone UEBA platforms:

VendorKey StrengthIdeal For
ExabeamStrong entity timeline visualization, pre-built content for 50+ use casesOrganizations that want purpose-built UEBA separate from SIEM
SecuronixDeep insider threat use cases, cloud-native architectureFinancial services, healthcare with regulatory insider threat requirements
VaronisData-centric UEBA -- focuses on file access patterns and data store protectionOrganizations with sensitive file server or SharePoint data
ObserveIT (Proofpoint ITDR)Session recording + behavioral analyticsOrganizations that need full session recording for privileged users

SIEM-integrated UEBA:

PlatformUEBA CapabilityNotes
Microsoft SentinelUEBA blade with Azure AD + endpoint data; entity pages with risk scoresStrong for Microsoft-centric environments; requires enabling the UEBA feature
Splunk UBA (UEBA for Enterprise Security)Machine learning on Splunk-ingested dataRequires Splunk ES license + UBA add-on; expensive but deep integration
IBM QRadar UBAUser behavior analytics built into QRadarUseful if already on QRadar; less capable than dedicated platforms
Elastic SIEM (ML Jobs)Pre-built ML jobs for anomaly detectionOpen-source option; requires ML node license; more manual to configure

Cloud-native UEBA:

Microsoft Entra ID Protection provides UEBA-style risk scoring for Azure AD identities, including:

  • Risk detections: leaked credentials, anonymous IP, atypical travel, malicious IP
  • Risk-based Conditional Access: step-up MFA or block access when user risk is elevated
  • Available at no additional cost with Entra ID P2 / Microsoft 365 E5

This is the fastest path to baseline UEBA for Microsoft-centric organizations -- enable Entra ID Protection and configure risk-based Conditional Access policies immediately.

Implementing and Tuning UEBA

The most common UEBA failure mode is not technical -- it is operational. Organizations deploy UEBA, get overwhelmed by alerts, and stop acting on them.

Phased implementation:

Phase 1 (Day 0-30): Data onboarding and baseline collection

  • Connect Tier 1 data sources and verify data quality
  • Let models build baselines -- do not alert yet
  • Identify entity mapping gaps (same user with multiple identities)
  • Validate that key entities (executives, privileged accounts, departing employees) are being tracked

Phase 2 (Day 30-60): Tuned alerting for 2-3 use cases

  • Enable alerts for the 2-3 highest-priority use cases only (start with compromised account + insider exfiltration)
  • Set alert thresholds high enough to generate 5-10 alerts per day maximum
  • Investigate every alert for the first 30 days to build an understanding of false positive patterns

Phase 3 (Day 60+): Expand use cases and integrate with SOAR

  • Add use cases incrementally as false positive rates stabilize
  • Integrate UEBA risk scores into SIEM correlation rules
  • Automate low-risk responses (account lock, step-up MFA) via SOAR
  • Connect HR data for departing employee workflow

Tuning high false positive scenarios:

False Positive PatternTuning Approach
IT admin looks like attacker (accesses many systems)Create peer group for IT admins; baseline their normal scope
Remote worker with VPN from home = "new location"Whitelist residential IP ranges for known remote workers
Developer accesses many servers via automationIdentify service accounts used by automation; exclude from user behavior models
Finance user accesses sensitive data at month-endModel time-of-month patterns; reduce weight for cyclical peaks

Key metric: Mean Time to Investigate (MTTI)

Track how long analysts spend investigating each UEBA alert. Target: 15-20 minutes per alert. If investigations consistently take 45+ minutes, the alert is providing insufficient context -- enrich alerts with entity timeline, peer comparison data, and historical risk score.

The bottom line

UEBA closes the detection gap that rule-based SIEM cannot address: slow account compromise, insider data theft within legitimate access boundaries, and lateral movement using valid credentials. The organizations that get value from UEBA invest first in data quality and normalization, start with 2-3 well-tuned use cases rather than enabling everything at once, and integrate UEBA risk scores into their SOAR workflows to automate first-response actions. Without this operational discipline, UEBA becomes another alert source that gets tuned out. With it, UEBA is one of the most effective detections for advanced threat actors.

Frequently asked questions

What is the difference between UEBA and a SIEM?

A SIEM (Security Information and Event Management) collects and correlates logs, primarily using rules to generate alerts when specific conditions are met. UEBA (User and Entity Behavior Analytics) builds statistical models of normal behavior and alerts on deviations from those baselines. The key difference: SIEM rules require knowing what you are looking for in advance; UEBA detects unknown threats by recognizing that something is anomalous even if no rule matches it. In practice, most organizations deploy UEBA as an add-on to or integration with their SIEM, feeding UEBA risk scores back into SIEM correlation rules. They are complementary, not competing technologies.

How long does it take UEBA to establish baselines?

Most UEBA platforms require 30-90 days of data ingestion to build statistically reliable behavioral baselines. During this period, anomaly detection is less accurate -- the models do not yet know what 'normal' looks like for each entity. Plan for: 30 days minimum for basic user behavior patterns, 60 days for reliable peer group comparisons, 90 days for time-of-day and day-of-week seasonal patterns. Do not enable production alerting until baselines are established. Some platforms offer pre-built industry models as a starting point that accelerate baseline formation, but these should be treated as seeds, not replacements for organization-specific learning.

Can UEBA detect insider threats before data leaves the organization?

Yes -- this is one of UEBA's strongest use cases. UEBA can detect the behavioral precursors to data exfiltration: unusual file access volume, access to data outside normal work scope, activity outside normal working hours, and searches for sensitive content. The critical requirement is integrating file access logs (from DLP, file servers, SharePoint, OneDrive) and HR data (termination dates -- departing employees are the highest insider threat risk). With these data sources, UEBA can flag anomalous behavior days to weeks before data actually leaves, giving time to investigate and intervene before exfiltration occurs.

Is Microsoft Sentinel's UEBA feature sufficient or do we need a dedicated UEBA platform?

Microsoft Sentinel's UEBA (entity behavior analytics) provides solid baseline functionality -- entity risk scores, user and device timelines, anomaly detection for Azure AD sign-ins, and integration with Microsoft Defender signals. It is a good starting point for Microsoft-centric organizations and is included in the Sentinel pricing. Dedicated UEBA platforms like Exabeam or Securonix provide broader data source coverage (non-Microsoft environments), deeper pre-built use case libraries, more sophisticated insider threat models, and better visualization for analyst investigations. Choose Sentinel UEBA if you are primarily Microsoft-centric and want to avoid additional vendor spend; choose a dedicated platform if you have complex multi-vendor environments or specific regulatory insider threat requirements.

What is entity stitching in UEBA and why does it matter?

Entity stitching is the process of linking different identifiers for the same entity across data sources -- for example, recognizing that 'jsmith', 'john.smith@corp.com', 'CORP\\jsmith', and the IP address 10.0.1.45 all refer to the same person in different log sources. Without entity stitching, UEBA sees fragmented behavior and cannot build a coherent behavioral model. Entity stitching requires a reliable identity store (Active Directory) as the source of truth and consistent logging of user identifiers in each data source. Poorly stitched entities are the most common cause of UEBA false negatives -- the anomalous behavior is in the logs, but it is attributed to different entity identities and never scores high enough to trigger an alert.

How do we measure UEBA ROI for leadership reporting?

Key metrics for UEBA ROI reporting: (1) Mean Time to Detect (MTTD) for insider threat and compromised account scenarios -- compare pre- and post-UEBA detection times using tabletop exercises with known scenarios; (2) True positive rate -- percentage of UEBA alerts that result in confirmed security incidents; (3) Cases investigated that would not have been detected by rules -- track alerts that did not match any SIEM rule; (4) Time to investigate per alert (target 15-20 minutes vs. 60+ minutes for manual log analysis); (5) Insider threat cases closed -- if your program has an insider threat function, track cases originated by UEBA. Frame ROI in terms of breach cost avoidance using IBM or Ponemon data for your industry's average cost per incident.

Sources & references

  1. Gartner Market Guide for UEBA
  2. Microsoft Sentinel UEBA Documentation
  3. CISA Insider Threat Mitigation Guide
  4. NIST SP 800-207: Zero Trust Architecture (entity context)

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.