Exabeam Supported Use Cases Compromised Insiders Malicious Insiders External Threats Account ManipulationCompromised CredentialsData ExfiltrationEvasionLateral MovementPrivilege EscalationPrivileged Activity Abnormal Authentication & AccessAudit TamperingData AccessData LeakDestruction of DataPhysical SecurityPrivilege AbuseWorkforce Protection Brute Force AttackCryptominingMalwarePhishingRansomware