Skip to content

Commit 5f201f1

Browse files
committed
updates
1 parent bd0f4d9 commit 5f201f1

3 files changed

Lines changed: 28 additions & 14 deletions

File tree

articles/sentinel/entity-behaviors-layer.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)
2+
title: Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel
33
description: The Microsoft Sentinel UEBA behaviors layer translates security telemetry into normalized behavioral patterns for investigation, hunting, and detection engineering.
44
author: guywi-ms
55
ms.author: guywild
@@ -10,7 +10,7 @@ ms.service: microsoft-sentinel
1010
#Customer intent: As a security analyst, I want to use the UEBA behaviors layer to translate raw security telemetry into human-readable patterns with MITRE ATT&CK context for faster threat detection and investigation.
1111
---
1212

13-
# Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)
13+
# Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel
1414

1515
The User and Entity Behavior Analytics (UEBA) behavior layer in Microsoft Sentinel aggregates and summarizes high-volume raw logs into clear, plain-language patterns of security actions, explaining “who did what to whom” in a structured way.
1616

@@ -189,7 +189,7 @@ Behaviors simplify rule logic by providing normalized, high‑quality signals wi
189189
The list of supported data sources and vendors or services that send logs to these data sources is evolving.
190190
The UEBA behaviors layer automatically aggregates insights for all supported vendors based on the logs you collect.
191191
192-
During public preview, the UEBA behaviors layer focuses on these non-Microsoft data sources that traditionally lack easy behavioral context in Microsoft Sentinel:
192+
The UEBA behaviors layer currently focuses on these non-Microsoft data sources that traditionally lack easy behavioral context in Microsoft Sentinel:
193193
194194
| Data source | Supported vendors, services, and logs | Connector | Supported behaviors |
195195
|-------------|---------------------------|-------|----------------|
@@ -241,13 +241,13 @@ To enable the UEBA behaviors layer in your workspace:
241241
1. Select **Connect**.
242242
243243
> [!IMPORTANT]
244-
> During public preview, you can only enable behaviors in a single workspace in your tenant.
244+
> You can currently enable behaviors in a single workspace in your tenant.
245245
246246
## Pricing model
247247
248248
Using the UEBA behaviors layer results in the following costs:
249249
250-
- **No extra license cost:** Behaviors are included as part of Microsoft Sentinel (currently in preview). You don’t need a separate SKU, UEBA add‑on, or additional licensing. If your workspace is connected to Sentinel and onboarded to the Defender portal, you can use behaviors at no extra feature cost.
250+
- **No extra license cost:** Behaviors are included as part of Microsoft Sentinel. You don’t need a separate SKU, UEBA add‑on, or additional licensing. If your workspace is connected to Sentinel and onboarded to the Defender portal, you can use behaviors at no extra feature cost.
251251
252252
- **Log data ingestion charges:** Behavior records are stored in the `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables in your Sentinel workspace. Each behavior contributes to your workspace’s data ingestion volume and is billed at your existing Log Analytics/Sentinel ingestion rate. Behaviors are additive - they don’t replace your existing raw logs.
253253
@@ -323,9 +323,9 @@ For more information about Kusto Query Language (KQL), see [Kusto query language
323323
- **I see fewer behaviors than expected**: Our coverage of supported behavior types is partial and growing. For more information, see [Supported data sources and behaviors](#supported-data-sources-and-behaviors). The UEBA behaviors layer might also not be able to detect a behavior pattern if there are very few instances of a specific behavior type.
324324
- **Behavior counts**: A single behavior might represent tens or hundreds of raw events - this is designed to reduce noise.
325325

326-
## Limitations in public preview
326+
## Limitations
327327

328-
These limitations apply during the public preview of the UEBA behaviors layer:
328+
These limitations currently apply to the UEBA behaviors layer:
329329

330330
- You can enable behaviors on a single Sentinel workspace per tenant.
331331
- The UEBA behaviors layer generates behaviors for a limited set of [supported data sources and vendors or services](#supported-data-sources-and-behaviors).

articles/sentinel/identify-threats-with-entity-behavior-analytics.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,11 @@ This table provides an overview of the data in each of the UEBA tables:
7272
| [BehaviorAnalytics](/azure/azure-monitor/reference/tables/behavioranalytics) | Enriched behavioral data with geolocation and threat intelligence | Contains deviations from baseline with prioritization scores. Data depends on enabled connectors (Entra ID, AWS, GCP, Okta, and so on). |
7373
| [UserPeerAnalytics](/azure/azure-monitor/reference/tables/userpeeranalytics) | Dynamically calculated peer groups for behavioral baselines | Ranks top 20 peers based on security group membership, mailing lists, and other associations. Uses TF-IDF (term frequency–inverse document frequency) algorithm (smaller groups carry higher weight). |
7474
| [Anomalies](/azure/azure-monitor/reference/tables/anomalies) | Events identified as anomalous | Supports detection and investigation workflows. |
75-
| [SentinelBehaviorInfo](/azure/azure-monitor/reference/tables/sentinelbehaviorinfo) (Preview) | Summary of behaviors identified in raw logs | Translates raw security logs into structured "who did what to whom" summaries with natural language explanations and MITRE ATT&CK mappings. |
76-
| [SentinelBehaviorEntities](/azure/azure-monitor/reference/tables/sentinelbehaviorentities) (Preview) | Profiles of entities involved in identified behaviors | Information about entities - such as files, processes, devices, and users - involved in detected behaviors. |
75+
| [SentinelBehaviorInfo](/azure/azure-monitor/reference/tables/sentinelbehaviorinfo) | Summary of behaviors identified in raw logs | Translates raw security logs into structured "who did what to whom" summaries with natural language explanations and MITRE ATT&CK mappings. |
76+
| [SentinelBehaviorEntities](/azure/azure-monitor/reference/tables/sentinelbehaviorentities) | Profiles of entities involved in identified behaviors | Information about entities - such as files, processes, devices, and users - involved in detected behaviors. |
7777

7878
> [!NOTE]
79-
> The [UEBA behaviors layer](#aggregate-behavior-insights-with-the-ueba-behaviors-layer-preview) is a separate capability that you enable independently from UEBA. The `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables are only created in your workspace if you enable the behaviors layer.
79+
> The [UEBA behaviors layer](#aggregate-behavior-insights-with-the-ueba-behaviors-layer) is a separate capability that you enable independently from UEBA. The `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables are only created in your workspace if you enable the behaviors layer.
8080
8181
This screenshot shows an example of data in the `UserPeerAnalytics` table with the eight highest-ranked peers for the user Kendall Collins. Sentinel uses the TF-IDF algorithm to normalize weights when calculating peer ranks. Smaller groups carry higher weight.
8282

@@ -123,15 +123,15 @@ The Defender portal home page includes a UEBA widget where analysts immediately
123123

124124
### UEBA insights in user investigations
125125

126-
Analysts can quickly assess user risk using UEBA context displayed in side panels and the **Overview** tab on all user pages. When unusual behavior is detected, the portal automatically tags users with **UEBA anomalies** helping prioritize investigations based on recent activity. For more information, see [User entity page in Microsoft Defender](https://aka.ms/ueba-entity-details).
126+
Analysts can quickly assess user risk using UEBA context displayed in side panels and the **Overview** tab on all user pages in the Defender portal. When unusual behavior is detected, the portal automatically tags users with **UEBA anomalies** helping prioritize investigations based on recent activity. For more information, see [User entity page in Microsoft Defender](https://aka.ms/ueba-entity-details).
127127

128128
Each user page includes a **Top UEBA anomalies** section, showing the top three anomalies from the past 30 days, along with direct links to pre-built anomaly queries and the Sentinel events timeline for deeper analysis.
129129

130130
:::image type="content" source="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-user-investigations.png" alt-text="Screenshot that shows the overview tab of the User page for a user with UEBA anomalies in the past 30 days." lightbox="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-user-investigations.png":::
131131

132132
### Built-in user anomaly queries in incident investigations
133133

134-
During incident investigations, analysts can launch built-in queries directly from incident graphs to retrieve all user anomalies related to the case.
134+
During incident investigations, analysts can launch built-in queries directly from incident graphs in the Defender portal to retrieve all user anomalies related to the case.
135135

136136
:::image type="content" source="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-incident-investigations.png" alt-text="Screenshot that shows an incident graph, highlighting the Go hunt All user anomalies option, which allows analysts to quickly find all anomalies related to the user." lightbox="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-incident-investigations.png":::
137137

@@ -149,7 +149,7 @@ For more information, see:
149149
- [UEBA data sources](ueba-reference.md#ueba-data-sources).
150150
- [Anomalies detected by the Microsoft Sentinel machine learning engine](anomalies-reference.md).
151151

152-
## Aggregate behavior insights with the UEBA behaviors layer (Preview)
152+
## Aggregate behavior insights with the UEBA behaviors layer
153153

154154
While UEBA builds baseline profiles to detect anomalous activity, the new UEBA behaviors layer aggregates related events from high-volume raw security logs into clear, structured, meaningful behaviors that explain "who did what to whom" at a glance.
155155

@@ -160,7 +160,7 @@ The behaviors layer enriches raw logs with:
160160

161161
By converting fragmented logs into coherent behavior objects, the behaviors layer accelerates threat hunting, simplifies detection authoring, and provides richer context for UEBA anomaly detection. Together, these capabilities help analysts quickly understand not just *that* something anomalous happened, but *what* happened and *why* it matters.
162162

163-
For more information, see [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)](entity-behaviors-layer.md).
163+
For more information, see [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel](entity-behaviors-layer.md).
164164

165165
## Pricing model
166166

articles/sentinel/whats-new.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,20 @@ The listed features were released in the last six months. For information about
2020

2121
## February 2026
2222

23+
### UEBA behaviors layer is now generally available
24+
25+
The UEBA behaviors layer in Microsoft Sentinel is now generally available, summarizing clear, human‑readable behavioral insights from high-volume, raw security logs. The behaviors layer aggregates and sequences related events into normalized behaviors, helping analysts more quickly understand who did what to whom without manually correlating raw logs. For more information, see [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel](../sentinel/entity-behaviors-layer.md).
26+
27+
To help SOC teams get value from behaviors from day one, the Behaviors Workbook includes guided views and pre‑built, customizable analytics that turn rich behavioral data into actionable insights across three core SOC workflows:
28+
29+
- **Overview**: High‑level metrics and trends that give SOC managers and leadership quick situational awareness
30+
- **Investigation**: Deep‑dive, entity‑centric timelines that help analysts accelerate incident response
31+
- **Hunting**: Proactive threat discovery for threat hunters using anomaly detection and attack‑chain analysis
32+
33+
For more information about the workbook, see the [Microsoft Sentinel Behaviors Workbook blog post](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/introducing-the-microsoft-sentinel-ueba-behaviors-workbook/4448398).
34+
35+
###
36+
2337
[Generate playbooks using AI in Microsoft Sentinel](./automation/generate-playbook.md) (preview): The SOAR playbook generator creates python based automation workflows coauthored through a conversational experience with Cline, an AI coding agent. For more information, see [the Playbook Generation blog post](https://aka.ms/PlaybookGenBlog).
2438

2539
## January 2026

0 commit comments

Comments
 (0)