SlideShare a Scribd company logo
USE CASE




  Privileged User Monitoring

     When it comes to protecting a network from insider threats,
     organizations need the ability to keep a watchful eye on its
     privileged users. This includes business users with direct access
     to confidential data systems, as well as administrators with the
     ability to create and modify permissions, privileges and access to
     any device.
     The challenge is finding a way to keep an eye on all systems
     within a large, heterogeneous environment and quickly identify
     improper or malicious behavior when, in most cases, the people
     responsible for the behavior in question are the ones with access
     to the log files that record all user activity.




        LogRhythm provides unprecedented auditing and insight into privileged user activity, across the enterprise.

       Watching the Watchers                           Securing the Bread Crumbs                    Finding the Needle

       Challenge
       “Administrator” privileges usually              Most privileged users behave in a            Recording log data related to
       include the ability to modify or even           responsible and ethical manner. But,         privileged user activity is a start.
       remove activity log data. While most            the high-level access tied to their          However, gaining meaningful and
       administrators use their access privileges      user permissions means that a single         timely insight into inappropriate and/
       responsibly, it is imperative to establish      privileged user with malicious intent        or concerning behavior with intelligent
       an independent and automated means of           can cause enormous damage to an              and automated correlation, alerting
       capturing and storing log data associated       organization. Because they have the          and reporting is like trying to find a
       with administrator activity and alerting on     means to modify data of recorded activity,   needle in a haystack.
       concerning behavior.                            tracking the culprit can be difficult.

       Solution
       LogRhythm’s real-time, automated,               Immediate collection by LogRhythm            LogRhythm provides Intelligent IT
       centralized and secure collection of log        with cryptographic hashing provides          Search™ capabilities for rapid
       data provides independent access to             a digital chain-of-custody that              user-level investigations, displays
       privileged user activity logs without relying   eliminates the ability for privileged        aggregate and trending visualization
       on the privileged user for collection.          users to tamper with activity records        to identify behavior based patterns,
                                                       and conceal nefarious activity.              and delivers automated alerting on
                                                                                                    specific privileged user activity.

       Benefit
       Using the alarming tool, LogRhythm              LogRhythm’s SecondLook™ archive              LogRhythm users can quickly use the
       users can set up alerts to send out             restoration wizard allows administrators     investigate tool on all activity performed
       notifications any time a privileged user        to immediately query against any             by a newly created user, using a
       account is added or modified, including         archived data, which is automatically        combination of detailed forensic views
       information about who created the               validated to maintain the digital            and interactive graphical analyses.
       account.                                        chain-of-custody.                            A simple, wizard-based GUI makes
                                                                                                    investigations quick-to-run and easy
                                                                                                    to save for future use.




© 2010 LogRhythm Inc. | www.logrhythm.com                                                            PrivilegedUserMonitoringUseCase_1004

More Related Content

PDF
LogRhythm E Phi Use Case
PDF
Visitor management system
PPTX
Symantec Enterprise Mobility Enhancements
PPTX
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
PDF
Brochure Imperva Securesphere Vormetric Encryption
PDF
Veritas-Information-Governance-Solution-Brochure-EN
PDF
Lessons in privacy engineering from a nation scale identity system - connect id
PDF
SharePoint Security Playbook [eBook]
LogRhythm E Phi Use Case
Visitor management system
Symantec Enterprise Mobility Enhancements
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
Brochure Imperva Securesphere Vormetric Encryption
Veritas-Information-Governance-Solution-Brochure-EN
Lessons in privacy engineering from a nation scale identity system - connect id
SharePoint Security Playbook [eBook]

Similar to LogRhythm Privileged Use Monitoring Use Case (20)

PDF
Stop the Evil, Protect the Endpoint
PDF
LogRhythm Alerting on the Absence of an Event Use Case UK
PDF
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
PDF
Solvit identity is the new perimeter
PDF
LogRhythm Visualization Use Case
PDF
Accountability in Distributed Environment For Data Sharing in the Cloud
PPTX
Strengthening Security through Session Monitoring in Privileged Access Manage...
PPTX
Enhancing Security with Session Monitoring in Privileged Access Management
PDF
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PPTX
It securepro 10 nov 2010
PDF
Privileged Access Manager Product Q&A
PDF
20 Trip-Wire-.pdf
PDF
20 Trip-Wire-.pdf
PDF
The Essentials | Privileged Access Management
PPTX
CIS Critical Security Controls Foundations of Cybersecurity.pptx
PDF
Security Breaches from Compromised User Logins
PDF
UserLock 9 Technical Presentation
DOC
Log Analysis Across System Boundaries for Security, Compliance, and Operations
DOC
Log Analysis Across System Boundaries for Security, Compliance, and Operations
PDF
CSI-503 - 10. Security & Protection (Operating System)
Stop the Evil, Protect the Endpoint
LogRhythm Alerting on the Absence of an Event Use Case UK
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
Solvit identity is the new perimeter
LogRhythm Visualization Use Case
Accountability in Distributed Environment For Data Sharing in the Cloud
Strengthening Security through Session Monitoring in Privileged Access Manage...
Enhancing Security with Session Monitoring in Privileged Access Management
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
It securepro 10 nov 2010
Privileged Access Manager Product Q&A
20 Trip-Wire-.pdf
20 Trip-Wire-.pdf
The Essentials | Privileged Access Management
CIS Critical Security Controls Foundations of Cybersecurity.pptx
Security Breaches from Compromised User Logins
UserLock 9 Technical Presentation
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
CSI-503 - 10. Security & Protection (Operating System)
Ad

More from jordagro (19)

PDF
LogRhythm Zero Day Exploits Use Case
PDF
LogRhythm Time-to-Value Use Case
PDF
LogRhythm Rapid Forensics Use Case
PDF
LogRhythm Operations Use Case
PDF
LogRhythm Geolocation Use Case
PDF
What's New Logrhythm 5.1 Data Sheet
PDF
LogRhythm Web Rhythm Data Sheet
PDF
LogRhythm Siem 2.0 Flyer
PDF
LogRhythm Professional Services Overview Data Sheet
PDF
LogRhythm PowerTech Interact Data Sheet
PDF
LogRhythm Advanced Intelligence Engine Data Sheet
PDF
LogRhythm Visualize This Data Sheet
PDF
LogRhythm Training Syllabus Data Sheet
PDF
LogRhythm Overview Data Sheet
PDF
LogRhythm FIPS Data Sheet
PDF
LogRhythm High Availability Solutions Data Sheet
PDF
File Integrity Monitoring Data Sheet
PDF
LogRhythm Appliance Data Sheet
PDF
LogRhythm Advanced Agent Data Sheet
LogRhythm Zero Day Exploits Use Case
LogRhythm Time-to-Value Use Case
LogRhythm Rapid Forensics Use Case
LogRhythm Operations Use Case
LogRhythm Geolocation Use Case
What's New Logrhythm 5.1 Data Sheet
LogRhythm Web Rhythm Data Sheet
LogRhythm Siem 2.0 Flyer
LogRhythm Professional Services Overview Data Sheet
LogRhythm PowerTech Interact Data Sheet
LogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Visualize This Data Sheet
LogRhythm Training Syllabus Data Sheet
LogRhythm Overview Data Sheet
LogRhythm FIPS Data Sheet
LogRhythm High Availability Solutions Data Sheet
File Integrity Monitoring Data Sheet
LogRhythm Appliance Data Sheet
LogRhythm Advanced Agent Data Sheet
Ad

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...

LogRhythm Privileged Use Monitoring Use Case

  • 1. USE CASE Privileged User Monitoring When it comes to protecting a network from insider threats, organizations need the ability to keep a watchful eye on its privileged users. This includes business users with direct access to confidential data systems, as well as administrators with the ability to create and modify permissions, privileges and access to any device. The challenge is finding a way to keep an eye on all systems within a large, heterogeneous environment and quickly identify improper or malicious behavior when, in most cases, the people responsible for the behavior in question are the ones with access to the log files that record all user activity. LogRhythm provides unprecedented auditing and insight into privileged user activity, across the enterprise. Watching the Watchers Securing the Bread Crumbs Finding the Needle Challenge “Administrator” privileges usually Most privileged users behave in a Recording log data related to include the ability to modify or even responsible and ethical manner. But, privileged user activity is a start. remove activity log data. While most the high-level access tied to their However, gaining meaningful and administrators use their access privileges user permissions means that a single timely insight into inappropriate and/ responsibly, it is imperative to establish privileged user with malicious intent or concerning behavior with intelligent an independent and automated means of can cause enormous damage to an and automated correlation, alerting capturing and storing log data associated organization. Because they have the and reporting is like trying to find a with administrator activity and alerting on means to modify data of recorded activity, needle in a haystack. concerning behavior. tracking the culprit can be difficult. Solution LogRhythm’s real-time, automated, Immediate collection by LogRhythm LogRhythm provides Intelligent IT centralized and secure collection of log with cryptographic hashing provides Search™ capabilities for rapid data provides independent access to a digital chain-of-custody that user-level investigations, displays privileged user activity logs without relying eliminates the ability for privileged aggregate and trending visualization on the privileged user for collection. users to tamper with activity records to identify behavior based patterns, and conceal nefarious activity. and delivers automated alerting on specific privileged user activity. Benefit Using the alarming tool, LogRhythm LogRhythm’s SecondLook™ archive LogRhythm users can quickly use the users can set up alerts to send out restoration wizard allows administrators investigate tool on all activity performed notifications any time a privileged user to immediately query against any by a newly created user, using a account is added or modified, including archived data, which is automatically combination of detailed forensic views information about who created the validated to maintain the digital and interactive graphical analyses. account. chain-of-custody. A simple, wizard-based GUI makes investigations quick-to-run and easy to save for future use. © 2010 LogRhythm Inc. | www.logrhythm.com PrivilegedUserMonitoringUseCase_1004