Anomaly detection policy
This article provides reference details about policies, providing explanations for each policy type and the fields that can be configured for each policy.
After your organization is protected by Cloud App Security, all cloud activity is scored according to various pre-defined risk factors. Cloud App Security looks at every user session on your cloud and then takes into consideration the risk factors you set here to alert you when something happens that is different from either the baseline of your organization or from the user's regular activity. The anomaly detection policy page allows you to configure and customize which risk factor families are considered in the risk scoring process. The policies can be enforced differently for different users, locations, and organizational sectors. For example, you can create a policy that alerts you when members of your IT team are active from outside your offices.
Cloud App Security has an initial learning period of seven days during which it does not flag any new users, activity, devices, or locations as anomalous. After that, each session is compared to the activity, when users were active, IP addresses, devices, etc. detected over the past month and the risk score of these activities. Use the sensitivity slider in the policy to set the minimum risk score from which alerts are triggered. It is recommended that when you create an anomaly policy, use the default sensitivity threshold for a week, before you change it in accordance with the number of alerts you received, Cloud App Security sends you more or fewer alerts for various risk scores when you change the sensitivity.
To configure an anomaly detection policy:
In the console, click on Control followed by Policies.
Click Create policy and select Anomaly detection policy.
Fill in the policy's name and description, and continue to the Activity filters field where you can choose the activity for which you wish to apply the policy.
Give your policy a name and description, if you want you can base it on a template, for more information on policy templates, see Control cloud apps with policies.
To apply the policy to all activities in your cloud environment, select All monitored activity. To limit the policy to specific types of activities, choose Selected activity. Click on Add filters and set the appropriate parameters by which to filter the activity. For example, to enforce the policy only on activity performed by Salesforce admins, choose this user tag.
Underneath this field set the Risk factors. You can choose which risk families you want to consider while calculating the risk score. On the right of the row, you can use the On/Off button to enable and disable the various risks. Additionally, for greater granularity, you can choose the activity on which to enable each particular risk family.
Risk factors are as follows:
Login failures: Are users attempting to log in and failing multiple times over a short period?
Admin activity: Are admins using their privileged accounts to log in from unusual locations or at strange hours?
Inactive accounts: Is there suddenly activity on an account that hasn't been in use for some time?
Location: Is there activity in an unusual, suspicious, or new location?
Impossible travel: Is a user logging in from Denver and 10 minutes later logging in from Paris?
Device and user agent: Is there activity from an unrecognized or unmanaged device?
Activity rate: Is there suddenly a lot of activity on a particular app? Are there large downloads or deletes, or mass number of files shared or a lot of unexpected admin activity?
You can use these parameters to define complex scenarios, for example, to exclude your office's IP range from the considered risk factors for anomaly detection, create a specific "office IP" tag and filter the range out of the considered parameters. To then exclude the range that you created from the admin activity anomaly detection:
Within Risk type, find Admin activity.
Change Apply to to Selected Activity.
Under Activity filters, set Apply to to Selected activity and under Activities matching all of the following, choose Administrative activity is True.
Click on the + icon and select IP tag does not equal and select the Office IP tag.
Under Sensitivity, select how often you want to receive alerts.
The sensitivity value determines how many weekly alerts are triggered on average for every 1,000 users.
Anomaly detection policy reference
An anomaly detection policy enables you to set up and configure continuous monitoring of user activity for behavioral anomalies. Anomalies are detected by scanning user activity. The risk is evaluated by looking at over 30 different risk indicators, grouped into 6 risk factors. Based on the policy results, security alerts are triggered.
Each policy is composed of the following parts:
Activity filters – Enable you to selectively scan only filtered user activity for anomalies.
Risk factors – Enable you to choose which risk factors to include when evaluating risk.
Sensitivity – Enable you to set how many alerts the policy should trigger.
For a list of Activity filters, see enter link description here.
Below is a list of the risk factors that are considered when evaluating the risk of user activity. Each risk factor can be toggled on or off. For each risk factor there are two options under the Apply to field, which determine whether to include it when evaluating the risk of user activity:
All monitored activity – include it for all user activity that passes the policy activity filter.
Selected activity – include it for user activity that passes both the policy activity filters and the activity filters that appear under this risk factor. When this option is selected an activity filter selector appears under the risk factor, which works exactly the same as the policy activity filter.
Each risk factor, when included in the risk evaluation, has its own triggers that cause an increase in the evaluated risk of user activity:
Login failures – a high number of login failures or activity comprised entirely of login failures.
Admin activity - administrative activity performed by an unexpected user, or performed from an IP, ISP, or location that are new, or not used by any other user in the organization.
Inactive accounts - activity performed by a user that was not active for a long time.
Location - activity performed from an IP, ISP, or location that were either never used by any other user, never used by this particular user, never used at all, or used only for login failures in the past.
Impossible travel - activity from remote locations within a short time.
Device and user agent - activity performed by a user using a user agent or device that was either never used by any other user, never used by this particular user, or never used at all.
Activity rate - repeated activities performed by a user within a short period.
There are two ways to control the number of alerts triggered by the policy:
Sensitivity slider – choose how many alerts to trigger per 1,000 users per week. The alerts are triggered of the activities with the highest risk.
Daily alert limit – restrict the number of alerts raised on a single day.
Daily activities to protect your cloud environment
For technical support, visit the Cloud App Security assisted support page.
Premier customers can also choose Cloud App Security directly from the Premier Portal.