Chat now with support
Chat with Support

Change Auditor Threat Detection 7.0.1 - Deployment Guide

Creating a Threat Detection configuration

A Threat Detection configuration must be created before you can view activity, receive alerts, and analyze anomalies on the dashboard.

The status of the Threat Detection configuration is displayed on the configuration page. The configuration is either:

1
From Change Auditor select Administration Tasks | Configuration | Threat Detection.
4
Select Apply Changes.

Reviewing configuration status

1
Select Administration Tasks | Configuration | Threat Detection.
2
Click Refresh to update the Threat Detection configuration from Change Auditor.

Removing a configuration

In the current version of Change Auditor, deleting the configuration only removes configuration information from Change Auditor. It does not remove data or configuration on the Threat Detection server.

If you are removing the configuration as a part of a clean up process, you can delete the Threat Detection server after removing configuration.

If you are removing the configuration and plan to start over with the same Threat Detection server, you can either revert to a snapshot of the server taken right after it was deployed or replace the existing Threat Detection server with a new server.

1
Select Administration Tasks | Configuration | Threat Detection.
2
Click Remove Configuration.

Historical events and your baseline calculations

Before the Threat Detection server can generate alerts, it needs to establish user behavior baseline. The baseline is built by processing 30 days of historical or real time events. Refer to the Change Auditor Threat Detection User Guide for information about baseline modeling.

When you create the Threat Detection configuration, you can specify how many days of historical events should be sent to the Threat Detection server to create the baseline.

Real-time events (0 days)

Historical events (more than 0 days)

Use the following as guidance on the number of days to specify when you create your Threat Detection configuration:

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating