A company wants to implement risk-based detection for privileged account activities.
Whatshould they configure first?
Correct Answer: A
Why Configure Asset & Identity Information for Privileged Accounts First?
Risk-based detection focuses on identifying and prioritizing threats based on the severity of their impact. For privileged accounts (admins, domain controllers, finance users), understanding who they are, what they access, and how they behave is critical.
#Key Steps for Risk-Based Detection in Splunk ES:1##Define Privileged Accounts & Groups - Identify high- risk users (Admin, HR, Finance, CISO).2##Assign Risk Scores - Apply higher scores to actions involving privileged users.3##Enable Identity & Asset Correlation - Link users to assets for better detection.
4##Monitor for Anomalies - Detect abnormal login patterns, excessive file access, or unusual privilege escalation.
#Example in Splunk ES:
A domain admin logs in from an unusual location # Trigger high-risk alert A finance director downloads sensitive payroll data at midnight # Escalate for investigation Why Not the Other Options?
#B. Correlation searches with low thresholds - May generate excessive false positives, overwhelming the SOC.#C. Event sampling for raw data - Doesn't provide context for risk-based detection.#D. Automated dashboards for all accounts - Useful for visibility, but not the first step for risk-based security.
References & Learning Resources
#Splunk ES Risk-Based Alerting (RBA): https://www.splunk.com/en_us/blog/security/risk-based-alerting.
html#Privileged Account Monitoring in Splunk: https://docs.splunk.com/Documentation/ES/latest/User
/RiskBasedAlerting#Implementing Privileged Access Security (PAM) with Splunk: https://splunkbase.splunk.
com