Skip to content

Commit 66387af

Browse files
committed
Update entity-behaviors-layer.md
1 parent f11bb22 commit 66387af

1 file changed

Lines changed: 7 additions & 6 deletions

File tree

articles/sentinel/entity-behaviors-layer.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ This article explains how the UEBA behaviors layer works, how to enable the beha
2929

3030
Behaviors are part of Microsoft Sentinel’s [User and Entity Behavior Analytics (UEBA)](../sentinel/identify-threats-with-entity-behavior-analytics.md) capabilities, providing normalized, contextualized activity summaries that complement anomaly detection and enrich investigations.
3131

32-
### Differences between behaviors, anomalies, and alerts
32+
### Compare behaviors, anomalies, and alerts
3333
This table shows how behaviors differ from anomalies and alerts:
3434

3535
| **Capability** | **What it represents** | **Purpose** |
@@ -56,6 +56,12 @@ Each behavior record includes:
5656
- **MITRE ATT&CK mapping**: Every behavior is tagged with relevant MITRE tactics and techniques, providing industry-standard context at a glance. You don't just see *what* happened, but also *how it fits* in an attack framework or timeline.
5757
- **Entity relationship mapping**: Each behavior identifies involved entities (users, hosts, IP addresses) and their roles (actor, target, or other).
5858

59+
### The behaviors abstraction layer
60+
61+
This diagram illustrates how the UEBA behaviors layer transforms raw logs into structured behavior records that enhance security operations:
62+
63+
:::image type="content" source="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" alt-text="Diagram that shows how the UEBA behaviors layer transforms raw logs into structured behavior records that enhance security operations." lightbox="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" :::
64+
5965
### Behavior storage and tables
6066

6167
The UEBA behaviors layer stores behavior records in two types of tables:
@@ -67,12 +73,7 @@ These tables integrate seamlessly with your existing workflows for detection rul
6773

6874
For information about using behaviors tables, see [Best practices and troubleshooting tips for querying behaviors](#best-practices-and-troubleshooting-tips-for-querying-behaviors).
6975

70-
### Data flow diagram
71-
72-
This diagram illustrates how the UEBA behaviors layer transform raw logs into structured behavior records that enhance security operations:
7376

74-
:::image type="content" source="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" alt-text="Diagram that shows how the UEBA behaviors layer transform raw logs into structured behavior records that enhance security operations." lightbox="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" :::
75-
7677
> [!IMPORTANT]
7778
> Generative AI powers the UEBA Behaviors layer to create and scale the insights it provides. Microsoft designed the Behaviors feature based on **privacy and responsible AI principles** to ensure transparency and explainability. Behaviors don't introduce new compliance risks or opaque "black box" analytics into your SOC. For details about how AI is applied in this feature and Microsoft’s approach to responsible AI, see [Responsible AI FAQ for the Microsoft UEBA behaviors layer](https://aka.ms/miscrosoftsentinelbehaviors).
7879

0 commit comments

Comments
 (0)