Insider threats pose a growing risk to organizations. Whether insiders take malicious actions, exhibit negligent behavior, or make accidental errors, they have the potential to cause significant harm to an organization’s assets, sensitive data, and reputation.
Insiders can pose a variety of risks, from stealing confidential data and intellectual property to disrupting systems. Understanding user behavior patterns, correlating activity across multiple data sources, and detecting behavioral anomalies early are critical to identifying both malicious insiders and negligent users before they cause significant harm.
CrowdStrike Falcon® Data Protection and CrowdStrike Falcon® Next-Gen Identity Security, combined with CrowdStrike Falcon® Next-Gen SIEM, enable customers to quickly detect and respond to insider threats. Through the new Insider Threat Analytics and User Activity Investigation dashboards, both in Falcon Next-Gen SIEM, organizations can leverage user behavior analytics, data access patterns, risk indicator scoring, and policy violation alerts to identify and investigate insider risks.
In this blog, we detail the dashboard features that can detect insider threats and how customers can leverage this tool for proactive defense. We also share example attack scenarios to show how CrowdStrike Falcon detects insider threat techniques and outline how these dashboards support a complete insider threat program.
Building an Insider Threat Detection Program with CrowdStrike Falcon
Effective insider threat detection requires a robust strategy that combines behavioral analytics, multi-source correlation, policy enforcement, and streamlined investigation workflows. The CrowdStrike Falcon - Insider Threat Analytics and CrowdStrike Falcon Data Protection - User Activity Investigation dashboards implement the following capabilities to support a complete insider threat program:
1. Multi-Layer Detection Architecture
The dashboards correlate telemetry across multiple security layers to detect insider threat indicators at every stage of an attack:
- Identity Protection Layer: Monitor authentication anomalies, privilege escalations, and indicators of credential compromise through identity risk scores.
- Data Protection Layer: Track data egress patterns including large transfers, unusual destinations, off-hours activity, and policy violations through Falcon Data Protection detections and DataEgress events.
- Endpoint Layer: Detect data movement from non-standard endpoints including servers, domain controllers, and cloud instances through the Unusual Endpoints hunting section.
- HR Context Layer: Enhance monitoring for new and departing employees.
- Cross-Layer Event Correlation: Link activities across all layers to detect insider attacks in their early stages:
- Combine Falcon Data Protection detections and data egress events with source user identity risk score and HR employment status.
- Identify risk indicators based on behaviors and activity logs from the above sources, with thresholds and scoring that can be customized to organization policies and baselines.
2. Advanced Behavioral Analytics and Hunting Leads
The dashboards establish baselines for user behavior and monitor deviations to identify insider threats.
- Statistical Baseline Establishment: Create behavioral baselines using configurable historical periods (7-30+ days).
- First-Seen Analysis: Detect new “source user - data egress destination” combinations and device usage patterns to identify insiders engaging in novel activities that deviate from established patterns, which can indicate policy violations or unauthorized activity. The dashboards surface:
- New Destinations: Compare first-time web upload destinations to individual user baselines.
- USB Device Monitoring: Track new removable storage device usage with baseline comparison.
- Destination Account Analysis: Extract and monitor destination account domains to identify suspicious ones.
- Rare Event Detection: Identify statistically anomalous destinations and activities based on organizational frequency patterns.
- Temporal Anomaly Detection: Identify suspicious activity during off-hours, including weekends.
- Unusual Endpoint for Data Egress: Monitor data egress from non-desktop systems (servers, domain controllers, cloud instances).
3. Risk-Based Prioritization
A risk-based prioritization framework enables the organization to prioritize responses based on the severity and likelihood of a threat. The dashboards accelerate investigation workflows through automated risk scoring and user ranking:
- Dynamic Risk Scoring: Combine identity, behavioral, HR status, and data egress indicators to calculate per-user risk scores.
- High-Risk User Identification: Surface users with elevated risk scores for immediate investigation.
- Configurable Thresholds: Adjust minimum indicator counts and select which indicators to include based on organizational priorities.
4. Policy and Compliance Framework
Data protection policies ensure adherence to regulations and security best practices. The dashboards provide visibility into policy effectiveness and coverage:
- Falcon Data Protection Policy Enforcement Visibility: Track Falcon Data Protection policy actions (Monitored, Blocked, Allowed, Simulated) across all egress channels.
- Coverage Assessment: Monitor protected vs. unprotected data egress to identify policy gaps.
- Detection Analytics: Analyze detections by severity, type, content patterns, and sensitivity labels.
5. Investigation and Response Capabilities
When a potential insider threat is detected, the dashboards accelerate investigation through interactive workflows and cross-platform integration:
- Timeline Analysis: Reconstruct attack chains to understand the full scope of the threat via event timelines for selected users.
- User Context: Integrate identity risk scores, HR employment status, and user attributes to enrich investigations.
- Interactive Filtering: Enable filtering across multiple dimensions (severity, channel, policy, content type).
- Advanced Event Search: Get direct links for in-depth event investigation.
Introducing the Insider Threat Analytics Dashboard
Design, Capabilities, and Requirements
The “CrowdStrike Falcon - Insider Threat Analytics” dashboard features six specialized analytical sections designed to aid in risk assessment and investigation. Available to organizations with Falcon Data Protection and Falcon Next-Gen Identity Security, the dashboard combines automated risk indicator scoring with behavioral hunting capabilities to identify high-risk users and suspicious activity patterns requiring further investigation.
The dashboard implements a progressive investigation workflow that guides analysts from risk identification to behavioral hunting:
- Insider Risk Indicators surface high-risk users through automated scoring
- Falcon Data Protection Detection Analytics provide detection pattern analysis and user selection
- Hunting Leads sections (four sections) target specific behavioral anomalies: rare destinations, first-seen activities, unusual endpoints, and off-hours activity
This architecture enables filter-and-focus investigation: Analysts select high-risk users in top sections, applying them as global filters to narrow analysis across all remaining sections. Interactive widgets support both dashboard-internal refinement and cross-dashboard pivoting to the companion User Activity Investigation dashboard for in-depth analysis of data egress events. The design separates risk-based hunting (this dashboard) from detailed event investigation (companion dashboard), optimizing both workflow efficiency and system performance by distributing query load across two focused views.
The dashboard's risk scoring methodology synthesizes telemetry from critical sources including data movement (Falcon Data Protection), identity behavior (Falcon Next-Gen Identity Security), and employee lifecycle (Workday) to detect insider threats that single-source monitoring would miss. This correlation transforms isolated security signals into contextualized risk intelligence: Falcon Data Protection detections reveal what data moved and where, Falcon Next-Gen Identity Security provides behavioral risk context, and Workday identifies high-risk employment status. The result is multi-dimensional risk scoring where, for example, a user egressing confidential data to a rare destination while exhibiting high identity risk scores receives compounded risk points that elevate them above users triggering individual indicators. This enables analysts to prioritize investigations based on holistic threat profiles rather than individual alerts.
Risk scoring is enhanced through an integration with Workday HR data to identify departing employees. The Insider Risk - Workday Leavers application in CrowdStrike Falcon® Foundry automatically syncs employee termination data and enables two high-value risk indicators that substantially increase risk scores when departing employees exhibit suspicious data egress behaviors. While optional, this integration is strongly recommended as departing employees represent one of the highest-priority insider threat scenarios.
A supplementary requirement for maximizing this dashboard’s capabilities is ensuring Content Inspection is properly enabled across Falcon Data Protection policies. This helps ensure visibility into sensitive data movement across your environment. Content Inspection enables the dashboard to surface sensitivity labels and content patterns in Falcon Data Protection detections, powering a specific set of risk indicators that elevate risk scores when confidential data egress activities are detected. Also, by analyzing these patterns through the dashboard's Detection Analytics section, security teams can quantify which users are handling sensitive data and prioritize investigations based on the sensitivity context.
Next, we’ll take a closer look at individual sections of the Insider Threat Analytics dashboard.
Insider Risk Indicators
This section identifies and ranks users with the highest insider risk based on a set of predefined risk indicators that compound into a total risk score. The indicators combine Falcon Data Protection and Falcon Next-Gen Identity Security telemetry and Workday employment status to calculate total risk scores (1-100 points per user).
The risk scoring methodology combines 25 indicators including specific security events (Falcon Data Protection detections, sensitive data handling, rare destinations) and behavioral/contextual patterns (employment status, identity risk, data egress volume anomalies). Analysts can customize risk calculations through configurable parameters — selecting which indicators to include, filtering by employee status, and setting minimum indicator count thresholds — allowing security teams to tune risk scoring based on their environment and investigation priorities.
Note: All dashboard screenshots show a test instance.