Abnormal admin activity
Abnormal admin activity tickets report instances of potential account breaches or unusual behavior patterns for your admin users.
Coro detects potential identity compromise for admin user accounts by analyzing data from all customers, specific customers, and specific users behind a ticket. Coro then creates normative behavior models from which anomalies can be detected. These models range from simple statistical anomaly models to more complex models that cross-correlate data from various sensors throughout the system, uncovering evidence of abnormal behavior.
The Full Details section for Abnormal Admin Activity tickets is similar to that of Suspected Identity Compromise tickets. Coro displays a log of admin activity, listing the time and location for each event. Suspected activities are indicated in red, while typical activities are in green.
Coro uses IP lookup providers to derive metadata about connecting IP addresses to help admin users identify patterns in suspicious activity. Select the dropdown next to an activity to view any identified details, such as service provider, proxy, organization name, or threat type (where one is identified).
In the example below, "Admin Login" activities are marked suspicious because they occurred from different IP addresses within a short time span:
note
Abnormal Admin Activity tickets are classified as suggested for review and are automatically closed after a review period of four weeks.