You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/entity-behaviors-layer.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)
2
+
title: Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel
3
3
description: The Microsoft Sentinel UEBA behaviors layer translates security telemetry into normalized behavioral patterns for investigation, hunting, and detection engineering.
4
4
author: guywi-ms
5
5
ms.author: guywild
@@ -10,7 +10,7 @@ ms.service: microsoft-sentinel
10
10
#Customer intent: As a security analyst, I want to use the UEBA behaviors layer to translate raw security telemetry into human-readable patterns with MITRE ATT&CK context for faster threat detection and investigation.
11
11
---
12
12
13
-
# Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)
13
+
# Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel
14
14
15
15
The User and Entity Behavior Analytics (UEBA) behavior layer in Microsoft Sentinel aggregates and summarizes high-volume raw logs into clear, plain-language patterns of security actions, explaining “who did what to whom” in a structured way.
16
16
@@ -189,7 +189,7 @@ Behaviors simplify rule logic by providing normalized, high‑quality signals wi
189
189
The list of supported data sources and vendors or services that send logs to these data sources is evolving.
190
190
The UEBA behaviors layer automatically aggregates insights for all supported vendors based on the logs you collect.
191
191
192
-
During public preview, the UEBA behaviors layer focuses on these non-Microsoft data sources that traditionally lack easy behavioral context in Microsoft Sentinel:
192
+
The UEBA behaviors layer currently focuses on these non-Microsoft data sources that traditionally lack easy behavioral context in Microsoft Sentinel:
193
193
194
194
| Data source | Supported vendors, services, and logs | Connector | Supported behaviors |
@@ -241,13 +241,13 @@ To enable the UEBA behaviors layer in your workspace:
241
241
1. Select **Connect**.
242
242
243
243
> [!IMPORTANT]
244
-
> During public preview, you can only enable behaviors in a single workspace in your tenant.
244
+
> You can currently enable behaviors in a single workspace in your tenant.
245
245
246
246
## Pricing model
247
247
248
248
Using the UEBA behaviors layer results in the following costs:
249
249
250
-
- **No extra license cost:** Behaviors are included as part of Microsoft Sentinel (currently in preview). You don’t need a separate SKU, UEBA add‑on, or additional licensing. If your workspace is connected to Sentinel and onboarded to the Defender portal, you can use behaviors at no extra feature cost.
250
+
- **No extra license cost:** Behaviors are included as part of Microsoft Sentinel. You don’t need a separate SKU, UEBA add‑on, or additional licensing. If your workspace is connected to Sentinel and onboarded to the Defender portal, you can use behaviors at no extra feature cost.
251
251
252
252
- **Log data ingestion charges:** Behavior records are stored in the `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables in your Sentinel workspace. Each behavior contributes to your workspace’s data ingestion volume and is billed at your existing Log Analytics/Sentinel ingestion rate. Behaviors are additive - they don’t replace your existing raw logs.
253
253
@@ -323,9 +323,9 @@ For more information about Kusto Query Language (KQL), see [Kusto query language
323
323
-**I see fewer behaviors than expected**: Our coverage of supported behavior types is partial and growing. For more information, see [Supported data sources and behaviors](#supported-data-sources-and-behaviors). The UEBA behaviors layer might also not be able to detect a behavior pattern if there are very few instances of a specific behavior type.
324
324
-**Behavior counts**: A single behavior might represent tens or hundreds of raw events - this is designed to reduce noise.
325
325
326
-
## Limitations in public preview
326
+
## Limitations
327
327
328
-
These limitations apply during the public preview of the UEBA behaviors layer:
328
+
These limitations currently apply to the UEBA behaviors layer:
329
329
330
330
- You can enable behaviors on a single Sentinel workspace per tenant.
331
331
- The UEBA behaviors layer generates behaviors for a limited set of [supported data sources and vendors or services](#supported-data-sources-and-behaviors).
Copy file name to clipboardExpand all lines: articles/sentinel/identify-threats-with-entity-behavior-analytics.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,11 +72,11 @@ This table provides an overview of the data in each of the UEBA tables:
72
72
|[BehaviorAnalytics](/azure/azure-monitor/reference/tables/behavioranalytics)| Enriched behavioral data with geolocation and threat intelligence | Contains deviations from baseline with prioritization scores. Data depends on enabled connectors (Entra ID, AWS, GCP, Okta, and so on). |
73
73
|[UserPeerAnalytics](/azure/azure-monitor/reference/tables/userpeeranalytics)| Dynamically calculated peer groups for behavioral baselines | Ranks top 20 peers based on security group membership, mailing lists, and other associations. Uses TF-IDF (term frequency–inverse document frequency) algorithm (smaller groups carry higher weight). |
74
74
|[Anomalies](/azure/azure-monitor/reference/tables/anomalies)| Events identified as anomalous | Supports detection and investigation workflows. |
75
-
|[SentinelBehaviorInfo](/azure/azure-monitor/reference/tables/sentinelbehaviorinfo)(Preview) | Summary of behaviors identified in raw logs | Translates raw security logs into structured "who did what to whom" summaries with natural language explanations and MITRE ATT&CK mappings. |
76
-
|[SentinelBehaviorEntities](/azure/azure-monitor/reference/tables/sentinelbehaviorentities)(Preview) | Profiles of entities involved in identified behaviors | Information about entities - such as files, processes, devices, and users - involved in detected behaviors. |
75
+
|[SentinelBehaviorInfo](/azure/azure-monitor/reference/tables/sentinelbehaviorinfo)| Summary of behaviors identified in raw logs | Translates raw security logs into structured "who did what to whom" summaries with natural language explanations and MITRE ATT&CK mappings. |
76
+
|[SentinelBehaviorEntities](/azure/azure-monitor/reference/tables/sentinelbehaviorentities)| Profiles of entities involved in identified behaviors | Information about entities - such as files, processes, devices, and users - involved in detected behaviors. |
77
77
78
78
> [!NOTE]
79
-
> The [UEBA behaviors layer](#aggregate-behavior-insights-with-the-ueba-behaviors-layer-preview) is a separate capability that you enable independently from UEBA. The `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables are only created in your workspace if you enable the behaviors layer.
79
+
> The [UEBA behaviors layer](#aggregate-behavior-insights-with-the-ueba-behaviors-layer) is a separate capability that you enable independently from UEBA. The `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables are only created in your workspace if you enable the behaviors layer.
80
80
81
81
This screenshot shows an example of data in the `UserPeerAnalytics` table with the eight highest-ranked peers for the user Kendall Collins. Sentinel uses the TF-IDF algorithm to normalize weights when calculating peer ranks. Smaller groups carry higher weight.
82
82
@@ -123,15 +123,15 @@ The Defender portal home page includes a UEBA widget where analysts immediately
123
123
124
124
### UEBA insights in user investigations
125
125
126
-
Analysts can quickly assess user risk using UEBA context displayed in side panels and the **Overview** tab on all user pages. When unusual behavior is detected, the portal automatically tags users with **UEBA anomalies** helping prioritize investigations based on recent activity. For more information, see [User entity page in Microsoft Defender](https://aka.ms/ueba-entity-details).
126
+
Analysts can quickly assess user risk using UEBA context displayed in side panels and the **Overview** tab on all user pages in the Defender portal. When unusual behavior is detected, the portal automatically tags users with **UEBA anomalies** helping prioritize investigations based on recent activity. For more information, see [User entity page in Microsoft Defender](https://aka.ms/ueba-entity-details).
127
127
128
128
Each user page includes a **Top UEBA anomalies** section, showing the top three anomalies from the past 30 days, along with direct links to pre-built anomaly queries and the Sentinel events timeline for deeper analysis.
129
129
130
130
:::image type="content" source="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-user-investigations.png" alt-text="Screenshot that shows the overview tab of the User page for a user with UEBA anomalies in the past 30 days." lightbox="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-user-investigations.png":::
131
131
132
132
### Built-in user anomaly queries in incident investigations
133
133
134
-
During incident investigations, analysts can launch built-in queries directly from incident graphs to retrieve all user anomalies related to the case.
134
+
During incident investigations, analysts can launch built-in queries directly from incident graphs in the Defender portal to retrieve all user anomalies related to the case.
135
135
136
136
:::image type="content" source="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-incident-investigations.png" alt-text="Screenshot that shows an incident graph, highlighting the Go hunt All user anomalies option, which allows analysts to quickly find all anomalies related to the user." lightbox="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-incident-investigations.png":::
137
137
@@ -149,7 +149,7 @@ For more information, see:
149
149
-[UEBA data sources](ueba-reference.md#ueba-data-sources).
150
150
-[Anomalies detected by the Microsoft Sentinel machine learning engine](anomalies-reference.md).
151
151
152
-
## Aggregate behavior insights with the UEBA behaviors layer (Preview)
152
+
## Aggregate behavior insights with the UEBA behaviors layer
153
153
154
154
While UEBA builds baseline profiles to detect anomalous activity, the new UEBA behaviors layer aggregates related events from high-volume raw security logs into clear, structured, meaningful behaviors that explain "who did what to whom" at a glance.
155
155
@@ -160,7 +160,7 @@ The behaviors layer enriches raw logs with:
160
160
161
161
By converting fragmented logs into coherent behavior objects, the behaviors layer accelerates threat hunting, simplifies detection authoring, and provides richer context for UEBA anomaly detection. Together, these capabilities help analysts quickly understand not just *that* something anomalous happened, but *what* happened and *why* it matters.
162
162
163
-
For more information, see [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)](entity-behaviors-layer.md).
163
+
For more information, see [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel](entity-behaviors-layer.md).
Copy file name to clipboardExpand all lines: articles/sentinel/whats-new.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,20 @@ The listed features were released in the last six months. For information about
20
20
21
21
## February 2026
22
22
23
+
### UEBA behaviors layer is now generally available
24
+
25
+
The UEBA behaviors layer in Microsoft Sentinel is now generally available, summarizing clear, human‑readable behavioral insights from high-volume, raw security logs. The behaviors layer aggregates and sequences related events into normalized behaviors, helping analysts more quickly understand who did what to whom without manually correlating raw logs. For more information, see [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel](../sentinel/entity-behaviors-layer.md).
26
+
27
+
To help SOC teams get value from behaviors from day one, the Behaviors Workbook includes guided views and pre‑built, customizable analytics that turn rich behavioral data into actionable insights across three core SOC workflows:
28
+
29
+
-**Overview**: High‑level metrics and trends that give SOC managers and leadership quick situational awareness
30
+
-**Investigation**: Deep‑dive, entity‑centric timelines that help analysts accelerate incident response
31
+
-**Hunting**: Proactive threat discovery for threat hunters using anomaly detection and attack‑chain analysis
32
+
33
+
For more information about the workbook, see the [Microsoft Sentinel Behaviors Workbook blog post](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/introducing-the-microsoft-sentinel-ueba-behaviors-workbook/4448398).
34
+
35
+
###
36
+
23
37
[Generate playbooks using AI in Microsoft Sentinel](./automation/generate-playbook.md) (preview): The SOAR playbook generator creates python based automation workflows coauthored through a conversational experience with Cline, an AI coding agent. For more information, see [the Playbook Generation blog post](https://aka.ms/PlaybookGenBlog).
0 commit comments