Overview
Immutable’s Activity Intelligence combines alert rules, geolocation enrichment, and session tracking to detect suspicious behavior in real time.Suspicious Login Detection
Combinenew_country and off_hours alert rules to detect potential account compromise:
New Country Alert
Triggers when a user logs in from a country they have never been seen in before. Example scenario: A user who normally logs in fromUS suddenly appears from RU. The alert fires immediately and notifies your security team.
Off-Hours Alert
Triggers when actions occur outside configured business hours. Example scenario: Auser.login event at 3:00 AM local time from an admin account.
Combined Detection
When both alerts fire for the same event, the confidence that the account is compromised is much higher. Configure your webhook handler to escalate events that trigger multiple rules:Volume Spike Detection
Theingestion_spike rule detects unusual event volume relative to your workspace’s normal baseline. This can indicate:
- A compromised API key generating large volumes of events
- A misconfigured integration sending duplicate events
- A denial-of-service attempt flooding your audit log
Brute Force Detection
Therepeated_action rule detects when the same action is performed repeatedly by the same actor. Configure it to watch for:
user.login— Detect brute-force login attemptsapi_key.used— Detect API key abusepassword.reset— Detect account takeover attempts
Mass Deletion Detection
Thehigh_volume_destructive rule triggers when many destructive actions (*.deleted, *.removed) occur in a short window. This protects against:
- Disgruntled employees deleting data
- Compromised admin accounts performing bulk operations
- Application bugs causing cascading deletes
Querying Alerts Programmatically
Build a security dashboard by querying triggered alerts:Alert Delivery Channels
All alerts support two delivery channels:| Channel | Description |
|---|---|
| Sent to workspace members with admin or owner roles | |
| Webhook | POSTed to your endpoint with HMAC-SHA256 signature |