User behavior analytics (UBA) is a cybersecurity process that uses artificial intelligence and machine learning to build a baseline of normal activity for every user in a network. By continuously monitoring and analyzing historical data, UBA identifies subtle deviations, such as unusual login times or massive data transfers, that signal potential security breaches, insider threats, or compromised credentials.
Key Points
Threat Detection: Identifies malicious activity that traditional perimeter defenses often miss.
Behavioral Baselining: Uses machine learning to understand "normal" hours, locations, and access patterns.
Risk Scoring: Assigns dynamic values to users based on the severity of their behavioral anomalies.
Insider Risk: Detects data exfiltration or policy violations by authorized employees or contractors.
Adaptive Security: Powers advanced identity security by adjusting authentication requirements in real-time.
UBA shifts the security focus from "what is happening on the network" to "what are the users doing?" Traditional security tools rely on signatures or known rules to block attacks. However, if an attacker steals a valid set of credentials, they appear as a legitimate user. UBA solves this by considering the action's context.
If a marketing manager who typically works 9-to-5 in New York suddenly accesses sensitive financial databases at 3:00 AM from an IP address in a different country, UBA flags it as an anomaly.
By transforming raw data from logs, sensors, and cloud security tools into actionable insights, UBA provides a layer of protection that recognizes the "who" behind the "what." This allows security teams to intervene before an attacker can move laterally or escalate privileges.
UBA platforms do not operate in a vacuum; they ingest massive volumes of data from across the enterprise stack. The process generally follows four distinct stages:
To build an effective behavioral profile, a UBA system must ingest and correlate diverse datasets from across the digital estate. According to Unit 42’s 2026 Incident Response Report, identity weaknesses played a material role in 90% of all investigations, proving that visibility into how identities interact with data, networks, and applications is no longer optional.
| Source Category | Examples of Data Collected | Security Value |
|---|---|---|
| Authentication Logs | Success/failure, MFA status, location | Detects credential stuffing and account takeover. |
| File Activity | Access times, volume of data, and modifications | Identifies potential data exfiltration or ransomware. |
| Network Traffic | DNS queries, port usage, unusual protocols | Detects command-and-control (C2) communication. |
| Cloud Activity | API calls, resource creation, and permission changes | Flags account hijacking or cloud misconfigurations. |
By shifting focus from static signatures to a dynamic data-to-insight flow, UBA transforms raw telemetry from network segmentation points, cloud security providers, and endpoint sensors into a cohesive narrative of user intent.
This integrated approach allows security teams to detect sophisticated techniques, such as lateral movement and credential dumping, that traditional perimeter defenses frequently miss.
While often used interchangeably, Gartner introduced the term User and Entity Behavior Analytics (UEBA) to broaden the scope. Human users are not the only actors in a modern environment. Entities such as IoT devices, bots, service accounts, and applications also exhibit behaviors that can be modeled.
Unit 42 research frequently observes that attackers exploit "non-human" identities, such as misconfigured service accounts, to perform lateral movement without triggering traditional user-based alerts. Modern environments require a UEBA approach to ensure that a compromised bot or a rogue script is identified as quickly as a compromised human employee.
UBA is a primary tool for detecting threats that do not involve malware or known signatures.
Whether a malicious employee is attempting to steal intellectual property or a negligent contractor is violating policy, UBA monitors for "flight risk" behaviors. This includes accessing files outside of their job description or using unauthorized cloud storage.
Attackers often use stolen passwords to "live off the land." UBA identifies when a valid user account is used in a way the actual owner would never, such as running PowerShell scripts or accessing a database for the first time.
Once inside, attackers move from one system to another to find valuable data. UBA tracks these unusual hop-patterns, especially when a user moves from a low-sensitivity zone to a high-sensitivity zone without a clear business reason. This is a core tenet of the principle of least privilege.
One of the most powerful applications of UBA is in Adaptive Multi-Factor Authentication (MFA). Rather than requiring a second factor every time, which leads to "MFA fatigue", UBA offers a frictionless experience when the risk is low.
When a user logs in, the system calculates a real-time risk score based on:
| Risk Level | Context Example | Action Taken |
|---|---|---|
| Low | Known device, corporate office, 10:00 AM | Allow access (Standard MFA or Passwordless). |
| Medium | New device, home Wi-Fi, 9:00 PM | Step-up authentication required (Biometric or App Push). |
| High | Unknown IP, foreign country, 3:00 AM | Deny access and trigger SOC alert. |
UBA is a foundational component of a zero trust architecture. Because zero trust operates on the principle of "never trust, always verify," it requires continuous identity verification throughout a session, not just at initial login.
User behavior analytics provides this continuous verification. Even after a user is authenticated, UBA stays in the background, monitoring the session. If the user's behavior suddenly changes, for example, they begin performing unauthorized privilege escalation, UBA can signal the security stack to terminate the session or revoke access immediately.