Typical Workflow for Managing Behavioral Anomalies and Threats

With Oracle CASB Cloud Service, you can find and analyze users at risk, suspicious activity patterns, and activity from suspicious IP addresses.

Task Description Additional Information
Understand the Dashboard. You can learn about how the Summary tab in the Oracle CASB Cloud Service Dashboard provides high-level summaries of users at risk. Dashboard View of User Risks and Threats
Analyze high-risk users. You can use Oracle CASB Cloud Service to find and analyze users at risk, and process users with high-risk scores. Finding and Analyzing Users at Risk
Understand risk types. You can learn about high-level information associated with risk factors for users in each application type. User Risk Factors
View suspicious activity threats. You can use Oracle CASB Cloud Service to view suspicious activity. Viewing Suspicious Activity Threats
Monitor suspicious IP Addresses. You can monitor for suspicious IP addresses in Oracle CASB Cloud Service. Monitoring Suspicious IP Addresses
Monitor application-specific threats. In addition to global threats that apply to all application types, you can monitor threats that are specific to each application type. Detecting Application-Specific Threats