You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/entity-behaviors-layer.md
+64-30Lines changed: 64 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,18 +27,22 @@ This article explains how the UEBA behaviors layer works, how to enable the beha
27
27
28
28
## How the UEBA behaviors layer works
29
29
30
-
Behaviors are part of Microsoft Sentinel’s [User and Entity Behavior Analytics (UEBA)](../sentinel/identify-threats-with-entity-behavior-analytics.md) capabilities, providing normalized, contextualized activity summaries that complement anomaly detection and enrich investigations. This table shows how behaviors differ from anomalies and alerts:
30
+
Behaviors are part of Microsoft Sentinel’s [User and Entity Behavior Analytics (UEBA)](../sentinel/identify-threats-with-entity-behavior-analytics.md) capabilities, providing normalized, contextualized activity summaries that complement anomaly detection and enrich investigations.
31
31
32
+
### Compare behaviors, anomalies, and alerts
33
+
This table shows how behaviors differ from anomalies and alerts:
32
34
33
35
|**Capability**|**What it represents**|**Purpose**|
|**Anomalies**| Patterns that deviate from established baselines | Highlight unusual or suspicious activity |
36
38
|**Alerts**| Signal a potential security issue requiring attention | Trigger incident response workflows |
37
39
|**Behaviors**| Neutral, structured summaries of activity - normal or abnormal- based on time windows or triggers, enriched with MITRE ATT&CK mappings and entity roles | Provide context and clarity for investigations, hunting, and detection |
38
40
41
+
### Behavior types and records
42
+
39
43
When you [enable the UEBA behaviors layer](#enable-the-ueba-behaviors-layer), Microsoft Sentinel processes supported security logs you collect into your Sentinel workspace in near real-time and summarizes two types of behavioral patterns:
|**Aggregated behaviors**| Detect volume-based patterns by collecting related events over time windows | <ul><li>User accessed 50+ resources in 1 hour</li><li>Login attempts from 10+ different IP addresses</li></ul> | Convert high-volume logs into actionable security insights. This behavior type excels at identifying unusual activity levels. |
44
48
|**Sequenced behaviors**| Identify multi-step patterns or complex attack chains that aren't obvious when you look at individual events | Access key created > used from new IP > privileged API calls | Detect sophisticated attack sequences and multi-stage threats. |
@@ -52,12 +56,24 @@ Each behavior record includes:
52
56
-**MITRE ATT&CK mapping**: Every behavior is tagged with relevant MITRE tactics and techniques, providing industry-standard context at a glance. You don't just see *what* happened, but also *how it fits* in an attack framework or timeline.
53
57
-**Entity relationship mapping**: Each behavior identifies involved entities (users, hosts, IP addresses) and their roles (actor, target, or other).
54
58
55
-
The UEBA behaviors layer stores behavior records in two dedicated tables, integrating seamlessly with your existing workflows for detection rules, investigations, and incident analysis. It processes all types of security activity - not just suspicious events - and provides comprehensive visibility into both normal and anomalous behavior patterns. For information about using behaviors tables, see [Best practices and troubleshooting tips for querying behaviors](#best-practices-and-troubleshooting-tips-for-querying-behaviors).
59
+
### The behaviors abstraction layer
60
+
61
+
This diagram illustrates how the UEBA behaviors layer transforms raw logs into structured behavior records that enhance security operations:
62
+
63
+
:::image type="content" source="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" alt-text="Diagram that shows how the UEBA behaviors layer transforms raw logs into structured behavior records that enhance security operations." lightbox="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" :::
64
+
65
+
### Behavior storage and tables
66
+
67
+
The UEBA behaviors layer stores behavior records in two types of tables:
68
+
69
+
- A *behavior information* table, which contains the behavior title, description, MITRE mappings, categories, and links to raw logs, and
70
+
- A *behavior‑related entities* table, which lists all entities involved in the behavior and their roles.
71
+
72
+
These tables integrate seamlessly with your existing workflows for detection rules, investigations, and incident analysis. They process all types of security activity—not just suspicious events—and provide comprehensive visibility into both normal and anomalous behavior patterns.
73
+
74
+
For information about using behaviors tables, see [Best practices and troubleshooting tips for querying behaviors](#best-practices-and-troubleshooting-tips-for-querying-behaviors).
56
75
57
-
This diagram illustrates how the UEBA behaviors layer transform raw logs into structured behavior records that enhance security operations:
58
76
59
-
:::image type="content" source="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" alt-text="Diagram that shows how the UEBA behaviors layer transform raw logs into structured behavior records that enhance security operations." lightbox="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" :::
60
-
61
77
> [!IMPORTANT]
62
78
> Generative AI powers the UEBA Behaviors layer to create and scale the insights it provides. Microsoft designed the Behaviors feature based on **privacy and responsible AI principles** to ensure transparency and explainability. Behaviors don't introduce new compliance risks or opaque "black box" analytics into your SOC. For details about how AI is applied in this feature and Microsoft’s approach to responsible AI, see [Responsible AI FAQ for the Microsoft UEBA behaviors layer](https://aka.ms/miscrosoftsentinelbehaviors).
63
79
@@ -168,29 +184,32 @@ Behaviors simplify rule logic by providing normalized, high‑quality signals wi
168
184
169
185
Behaviors also serve as reliable triggers for automation. Instead of creating alerts for non-risky activities, use behaviors to trigger automation - for example, to send an email or initiate verification.
170
186
171
-
## Supported data sources
187
+
## Supported data sources and behaviors
172
188
173
189
The list of supported data sources and vendors or services that send logs to these data sources is evolving.
174
190
The UEBA behaviors layer automatically aggregates insights for all supported vendors based on the logs you collect.
175
191
176
192
During public preview, the UEBA behaviors layer focuses on these non-Microsoft data sources that traditionally lack easy behavioral context in Microsoft Sentinel:
177
193
178
-
| Data source | Supported vendors, services, and logs | Connector |
<sup>1</sup> `CommonSecurityLog` can contain logs from many vendors. The UEBA behaviors layer only generates behaviors for **supported vendors and log types**. If the table receives logs from an unsupported vendor, you won't see any behaviors even though the data source is connected.
183
202
184
203
> [!IMPORTANT]
185
-
> These sources are separate from other UEBA capabilities and need to be enabled specifically. If you enabled AWSCloudTrail for UEBA behaviorAnalytics and Anomalies, you still need to enable it for behaviors.
204
+
> You must enable these sources separately from other UEBA capabilities. For example, if you enabled AWSCloudTrail for UEBA analytics and anomalies, you still need to enable it separately for behaviors.
186
205
187
206
188
207
## Prerequisites
189
208
190
209
To use the UEBA behaviors layer, you need:
191
210
192
211
- A Microsoft Sentinel workspace that's onboarded to the Defender portal.
193
-
- Ingest one or more of the [supported data sources](#supported-data-sources) into the Analytics tier. For more information about data tiers, see [Manage data tiers and retention in Microsoft Sentinel](../sentinel/manage-data-overview.md#how-data-tiers-and-retention-work).
212
+
- Ingest one or more of the [supported data sources](#supported-data-sources-and-behaviors) into the Analytics tier. For more information about data tiers, see [Manage data tiers and retention in Microsoft Sentinel](../sentinel/manage-data-overview.md#how-data-tiers-and-retention-work).
194
213
195
214
## Permissions required
196
215
@@ -205,6 +224,8 @@ For more information about unified RBAC in the Defender portal, see [Microsoft D
205
224
206
225
## Enable the UEBA behaviors layer
207
226
227
+
To start aggregating UEBA behaviors, **make sure to connect at least one supported data source**. The UEBA behaviors layer only aggregates behaviors when supported data sources are connected and actively sending logs to the Analytics tier.
228
+
208
229
To enable the UEBA behaviors layer in your workspace:
209
230
210
231
1. In the Defender portal, select **System > Settings > Microsoft Sentinel > SIEM workspaces**.
@@ -232,16 +253,25 @@ Using the UEBA behaviors layer results in the following costs:
232
253
233
254
## Best practices and troubleshooting tips for querying behaviors
234
255
235
-
This section provides best practices and troubleshooting tips for querying behaviors in the Defender portal and in your Sentinel workspace. For more practical examples of using behaviors, see [Use cases and examples](#use-cases-and-examples).
256
+
This section explains how to query behaviors from both the Defender portal and your Sentinel workspace. While the schemas are identical, the data scope differs:
236
257
237
-
For more information about Kusto Query Language (KQL), see [Kusto query language overview](/kusto/query/?view=microsoft-sentinel).
258
+
- In the Defender portal, the behavior tables include UEBA behaviors ***and*** behaviors from connected Defender services, such as Microsoft Defender for Cloud Apps and Microsoft Defender for Cloud.
259
+
- In the Sentinel workspace, the behavior tables include ***only*** UEBA behaviors generated from logs ingested into that specific workspace.
260
+
261
+
This table shows which behavior tables to use in each environment:
262
+
263
+
| **Environment** | **Tables to use** | **Use cases** |
- **Access behavior data in the Defender portal by querying BehaviorInfo and BehaviorEntities**
268
+
For more practical examples of using behaviors, see [Use cases and examples](#use-cases-and-examples).
269
+
270
+
For more information about Kusto Query Language (KQL), see [Kusto query language overview](/kusto/query/?view=microsoft-sentinel).
240
271
241
-
- The `BehaviorInfo` table contains one record for each behavior instance to explain “what happened”. For more information about the table schemas, see [BehaviorInfo (Preview)](/defender-xdr/advanced-hunting-behaviorinfo-table).
242
-
- The `BehaviorEntities` table lists the entities involved in each behavior. For more information about the table schema, [BehaviorEntities (Preview)](/defender-xdr/advanced-hunting-behaviorentities-table).
272
+
- **Filter for UEBA behaviors in the Defender portal**
243
273
244
-
- **Unified view**: The `BehaviorInfo` and `BehaviorEntities` tables include all UEBA behaviors and might also include behaviors from Microsoft Defender for Cloud Apps and Microsoft Defender for Cloud, if you're collecting behaviors from these services.
274
+
The `BehaviorInfo` and `BehaviorEntities` tables include all UEBA behaviors and might also include behaviors from Microsoft Defender services.
245
275
246
276
To filter for behaviors from the Microsoft Sentinel UEBA behaviors layer, use the `ServiceSource` column. For example:
247
277
@@ -253,15 +283,19 @@ For more information about Kusto Query Language (KQL), see [Kusto query language
253
283
:::image type="content" source="media/entity-behaviors-layer/query-behaviors-filter-microsoft-sentinel.png" alt-text="Screenshot of BehaviorInfo table filtered by ServiceSource column to the Microsoft Sentinel value." lightbox="media/entity-behaviors-layer/query-behaviors-filter-microsoft-sentinel.png":::
254
284
255
285
256
-
- **Drill down from behaviors to raw logs**: Use the `AdditionalFields` column in `BehaviorInfo`, which contains references to the original event IDs in the `SupportingEvidence` field.
286
+
- **Drill down from behaviors to raw logs**
257
287
258
-
:::image type="content" source="media/entity-behaviors-layer/query-behaviors-drill-down-raw-logs.png" alt-text="Screenshot of BehaviorInfo table showing AdditionalFields column with references to event IDs and SupportingEvidence field for raw log queries." lightbox="media/entity-behaviors-layer/query-behaviors-drill-down-raw-logs.png":::
288
+
Use the `AdditionalFields` column in `BehaviorInfo`, which contains references to the original event IDs in the `SupportingEvidence` field.
289
+
290
+
:::image type="content" source="media/entity-behaviors-layer/query-behaviors-drill-down-raw-logs.png" alt-text="Screenshot of BehaviorInfo table showing AdditionalFields column with references to event IDs and SupportingEvidence field for raw log queries." lightbox="media/entity-behaviors-layer/query-behaviors-drill-down-raw-logs.png":::
259
291
260
292
Run a query on the `SupportingEvidence` field value to find the raw logs that contributed to a behavior.
261
293
262
294
:::image type="content" source="media/entity-behaviors-layer/query-behaviors-supporting-evidence.png" alt-text="Screenshot showing a query on the SupportingEvidence field value and the query results that show the raw logs that contributed to a behavior." lightbox="media/entity-behaviors-layer/query-behaviors-supporting-evidence.png":::
263
295
264
-
- **Join BehaviorInfo and BehaviorEntities**: Use the `BehaviorId` field to join `BehaviorInfo` with `BehaviorEntities`.
296
+
- **Join BehaviorInfo and BehaviorEntities**
297
+
298
+
Use the `BehaviorId` field to join `BehaviorInfo` with `BehaviorEntities`.
265
299
266
300
For example:
267
301
@@ -274,27 +308,27 @@ For more information about Kusto Query Language (KQL), see [Kusto query language
274
308
275
309
This gives you each behavior and each entity involved in it. The `AccountUpn` or identifying information for the entity is in `BehaviorEntities`, whereas `BehaviorInfo` might refer to “User” or “Host” in the text.
276
310
277
-
-**Where is behavior data stored in my Sentinel workspace?**:
278
-
- In your Sentinel workspace, behavior data is stored in the `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables. For more information about the table schemas, see [SentinelBehaviorInfo](/azure/azure-monitor/reference/tables/sentinelbehaviorinfo) and [SentinelBehaviorEntities](/azure/azure-monitor/reference/tables/sentinelbehaviorentities).
279
-
- To monitor data usage, look for the table names `SentinelBehaviorInfo` and `SentinelBehaviorEntities` in the `Usage` table.
311
+
-**Monitor behavior data ingestion**
312
+
313
+
To monitor behavior data ingestion, query the `Usage` table for entries related to `SentinelBehaviorInfo` and `SentinelBehaviorEntities`.
314
+
315
+
-**Create automation, workbooks, and detection rules based on behaviors**
280
316
281
-
-**Create automation, workbooks, and detection rules based on behaviors**:
282
317
- Use the `BehaviorInfo` table as a data source for detection rules or automation playbooks in the Defender portal. For example, create a scheduled query rule that triggers when a specific behavior appears.
283
318
- For [Azure Monitor workbooks](../sentinel/monitor-your-data.md) and any artifacts built directly on your Sentinel workspace, make sure to query the `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables in your Sentinel workspace.
284
319
285
-
286
320
### Troubleshooting
287
321
288
322
-**If behaviors aren't being generated**: Ensure supported data sources are actively sending logs to the Analytics tier, confirm the data source toggle is on, and wait 15–30 minutes after enabling.
289
-
-**I see fewer behaviors than expected**: Our coverage of supported behavior types is partial and growing. The UEBA behaviors layer might also not be able to detect a behavior pattern if there are very few instances of a specific behavior type.
323
+
-**I see fewer behaviors than expected**: Our coverage of supported behavior types is partial and growing. For more information, see [Supported data sources and behaviors](#supported-data-sources-and-behaviors). The UEBA behaviors layer might also not be able to detect a behavior pattern if there are very few instances of a specific behavior type.
290
324
-**Behavior counts**: A single behavior might represent tens or hundreds of raw events - this is designed to reduce noise.
291
325
292
326
## Limitations in public preview
293
327
294
328
These limitations apply during the public preview of the UEBA behaviors layer:
295
329
296
330
- You can enable behaviors on a single Sentinel workspace per tenant.
297
-
- The UEBA behaviors layer generates behaviors for a limited set of [supported data sources and vendors or services](#supported-data-sources).
331
+
- The UEBA behaviors layer generates behaviors for a limited set of [supported data sources and vendors or services](#supported-data-sources-and-behaviors).
298
332
- The UEBA behaviors layer doesn't currently capture every possible action or attack technique, even for supported sources. Some events might not produce corresponding behaviors. Don't assume that the absence of a behavior means no activity occurred. Always review raw logs if you suspect something might be missing.
299
333
- Behaviors aim to reduce noise by aggregating and sequencing events, but you might still see too many behavior records. We welcome your feedback on specific behavior types to help improve coverage and relevance.
300
334
- Behaviors aren't alerts or anomalies. They're neutral observations, not classified as malicious or benign. The presence of a behavior means “this happened,” not “this is a threat.” Anomaly detection remains separate in UEBA. Use judgment or combine behaviors with UEBA anomaly data to identify noteworthy patterns.
0 commit comments