Access activity

The Access Activity model tracks a user’s activity in the Access high-level category and creates a learned behavioral model for each hour of the day.

Enable the Access Activity machine learning model to display the user’s activity in the Access high-level category on the User Details page. If the user’s Access activity deviates from the learned behavior, it is deemed suspicious and a Sense Event is generated to increase the user’s risk score.

Event name

UBA : Abnormal increase in Access activity



Required configuration

System is monitoring events that have QRadar® high-level category of Access.

Log source types

Akamai KONA, Amazon AWS CloudTrail, Apache HTTP Server, Application Security DbProtect, Arbor Networks Pravail, Arpeggio SIFT-IT, Array Networks SSL VPN Access Gateways, Aruba Mobility Controller, Avaya VPN Gateway, Barracuda Spam & Virus Firewall, Barracuda Web Application Firewall, Barracuda Web Filter, BeyondTrust PowerBroker, Bit9 Security Platform, Blue Coat Web Security Service, Bridgewater Systems AAA Service Controller, Brocade FabricOS, CA ACF2, CA SiteMinder, CA Top Secret, CRE System, Carbon Black Protection, Centrify Identity Platform, Check Point, Cilasoft QJRN/400®, Cisco ACS, Cisco Adaptive Security Appliance (ASA), Cisco CSA, Cisco Call Manager, Cisco CatOS for Catalyst Switches, Cisco Cloud Web Security, Cisco FireSIGHT Management Center, Cisco Firewall Services Module (FWSM), Cisco IOS, Cisco Identity Services Engine, Cisco Intrusion Prevention System (IPS), Cisco IronPort, Cisco Nexus, Cisco PIX Firewall, Cisco VPN 3000 Series Concentrator, Cisco Wireless Services Module (WiSM), Citrix Access Gateway, Citrix NetScaler, CloudPassage Halo, Configurable Firewall Filter, CorreLog Agent for IBM® zOS, Custom Rule Engine, DCN DCS/DCRS Series, EMC VMWare, Epic SIEM, Event CRE Injected, Extreme Dragon Network IPS, Extreme HiPath, Extreme Matrix K/N/S Series Switch, Extreme NAC, Extreme Stackable and Standalone Switches, Extreme XSR Security Routers, F5 Networks BIG-IP AFM, F5 Networks BIG-IP ASM, F5 Networks BIG-IP LTM, F5 Networks FirePass, Fidelis XPS, Flow Classification Engine, Forcepoint Sidewinder, Forcepoint V Series, Fortinet FortiGate Security Gateway, Foundry Fastiron, H3C Comware Platform, HP Network Automation, HP ProCurve, HP Tandem, Honeycomb Lexicon File Integrity Monitor, Huawei S Series Switch, HyTrust CloudControl, IBM AIX® Server, IBM Bluemix® Platform, IBM DB2®, IBM DataPower®, IBM Fiberlink® MaaS360®, IBM Guardium®, IBM IMS, IBM Informix® Audit, IBM Lotus® Domino®, IBM Proventia Network Intrusion Prevention System (IPS), IBM QRadar Network Security XGS, IBM Resource Access Control Facility (RACF®), IBM Security Access Manager for Enterprise Single Sign-On, IBM Security Access Manager for Mobile, IBM Security Identity Manager, IBM Security Network IPS (GX), IBM Tivoli® Access Manager for e-business, IBM WebSphere® Application Server, IBM i, IBM z/OS®, IBM zSecure Alert, ISC BIND, Illumio Adaptive Security Platform, Imperva Incapsula, Imperva SecureSphere, Infoblox NIOS, Itron Smart Meter, Juniper DX Application Acceleration Platform, Juniper Junos OS Platform, Juniper MX Series Ethernet Services Router, Juniper Networks Firewall and VPN, Juniper Networks Intrusion Detection and Prevention (IDP), Juniper Networks Network and Security Manager, Juniper WirelessLAN, Juniper vGW, Kaspersky Security Center, Kisco Information Systems SafeNet/i, Lieberman Random Password Manager, Linux® OS, Linux iptables Firewall, Mac OS X, McAfee Application/Change Control, McAfee Network Security Platform, McAfee ePolicy Orchestrator, Microsoft Azure, Microsoft Exchange Server, Microsoft Hyper-V, Microsoft IAS Server, Microsoft IIS, Microsoft ISA, Microsoft Office 365, Microsoft Operations Manager, Microsoft SQL Server, Microsoft Windows Security Event Log, Motorola SymbolAP, NCC Group DDos Secure, NGINX HTTP Server, Netskope Active, Nortel Contivity VPN Switch, Nortel Ethernet Routing Switch 2500/4500/5500, Nortel Ethernet Routing Switch 8300/8600, Nortel Multiprotocol Router, Nortel Secure Network Access Switch (SNAS), Nortel Secure Router, Nortel VPN Gateway, Novell eDirectory, OS Services Qidmap, OSSEC, Okta, Open LDAP Software, OpenBSD OS, Oracle Audit Vault, Oracle BEA WebLogic, Oracle RDBMS OS Audit Record, Palo Alto PA Series, ProFTPD Server, Proofpoint Enterprise Protection/Enterprise Privacy, Pulse Secure Pulse Connect Secure, RSA Authentication Manager, Radware AppWall, Radware DefensePro, Redback ASE, Riverbed SteelCentral NetProfiler Audit, SSH CryptoAuditor, STEALTHbits StealthINTERCEPT, Salesforce Security Auditing, Snort Open Source IDS, Solaris Operating System Authentication Messages, Solaris Operating System DHCP Logs, Solaris Operating System Sendmail Logs, SonicWALL SonicOS, Sophos Astaro Security Gateway, Sophos Enterprise Console, Squid Web Proxy, Starent Networks Home Agent (HA), Stonesoft Management Center, Sun ONE LDAP, Sybase ASE, Symantec Critical System Protection, Symantec Encryption Management Server, Symantec Endpoint Protection, Symantec Gateway Security (SGS) Appliance, Symantec System Center, TippingPoint Intrusion Prevention System (IPS), TippingPoint X Series Appliances, Top Layer IPS, Trend InterScan VirusWall, Trend Micro Deep Security, Universal DSM, Venustech Venusense Security Platform, Verdasys Digital Guardian, Vormetric Data Security, WatchGuard Fireware OS, Zscaler Nss, genua genugate, iT-CUBE agileSI