Generation of the Threat Behavior Graph in the Security Center

Overview

This article explains how the Threat Behavior Graph in the Auth0 Security Center is generated.

Applies To

  • Security Center
  • Theat Behavior Graph

Solution

The Threat Behavior graph is calculated from events in the tenant logs. The feature aggregates events counted toward threat classification and compares it against the proportion of events that are not considered to be malicious.

This page details which log_types are considered for each metric. For more details, see the Security Center Metrics.