You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -4,7 +4,7 @@ description: Learn about the latest new features and announcement in Microsoft S
4
4
author: guywi-ms
5
5
ms.author: guywild
6
6
ms.topic: concept-article
7
-
ms.date: 01/28/2026
7
+
ms.date: 04/06/2026
8
8
#Customer intent: As a security team member, I want to stay updated on the latest features and enhancements in Microsoft Sentinel so that I can effectively manage and optimize my organization's security posture.
9
9
ms.custom:
10
10
- build-2025
@@ -18,6 +18,43 @@ The listed features were released in the last six months. For information about
-[Microsoft Sentinel data federation (Preview)](#microsoft-sentinel-data-federation-preview)
24
+
-[Transform data with filter and split features (Preview)](#transform-data-with-filter-and-split-features-preview)
25
+
-[Accelerate Microsoft Sentinel connector development with Visual Studio Code connector builder agent (Preview)](#accelerate-microsoft-sentinel-connector-development-with-visual-studio-code-connector-builder-agent-preview)
-[Entity analyzer is now generally available](#entity-analyzer-is-now-generally-available)
28
+
-[AI-powered SIEM migration tool is now generally available](#ai-powered-siem-migration-tool-is-now-generally-available)
29
+
30
+
### Microsoft Sentinel data federation (Preview)
31
+
Powered by Microsoft Fabric, Microsoft Sentinel data federation lets you analyze security data where it already lives, without copying or duplicating it. You can federate data from Microsoft Fabric, Azure Data Lake Storage, and Azure Databricks into Microsoft Sentinel data lake, then use familiar Microsoft Sentinel experiences like KQL, notebooks, and custom graphs across both federated and native data.
32
+
33
+
For more information, see [Data federation overview in Microsoft Sentinel data lake](datalake/data-federation-overview.md).
34
+
35
+
### Transform data with filter and split features (Preview)
36
+
Native filtering and splitting in the Microsoft Defender portal helps you reduce noise before ingestion, control costs, and intelligently route data between analytics and data lake tiers so you can optimize what gets analyzed versus retained. For more information, see [Transform data using filter and split in Microsoft Sentinel](transformation-filter-split.md).
37
+
38
+
### Accelerate Microsoft Sentinel connector development with Visual Studio Code connector builder agent (Preview)
39
+
An AI-powered, low-code agent in Visual Studio Code helps you build Microsoft Sentinel connectors in minutes, bringing in new data sources faster and unlocking security outcomes sooner. For more information, see [Get started with custom connectors using AI agent in Microsoft Sentinel](create-custom-connector-builder-agent.md).
40
+
41
+
### Build custom graphs (Preview)
42
+
Build tailored security graphs across the Sentinel data lake and third-party data to uncover attack paths, blast radius, and hidden relationships. These graphs also serve as a foundation for advanced investigations and AI agents. For more information, see [Custom Graph overview](datalake/custom-graphs-overview.md).
43
+
44
+
#### Graphs experience in the Microsoft Defender portal (Preview)
45
+
After creating your custom graphs, you can access them in the graphs section of the Defender portal under **Microsoft Sentinel**. From there, you can run Graph Query Language (GQL) queries, view the graph schema, visualize the graph, view graph results in tabular format, and interactively traverse the graph to the next hop with a simple click.
46
+
47
+
### Entity analyzer is now generally available
48
+
49
+
[Entity analyzer](datalake/sentinel-mcp-data-exploration-tool.md#entity-analyzer) in the Microsoft Sentinel Model Context Protocol (MCP) [data exploration tool collection](datalake/sentinel-mcp-data-exploration-tool.md) lets you get out-of-the-box, explainable entity risk assessments for URLs and identities using threat intelligence, prevalence, and organizational context.
50
+
51
+
> [!IMPORTANT]
52
+
> Starting April 1, 2026, you're charged for the Security Compute Units (SCUs) required when using the entity analyzer. For more information, see: [Understand Microsoft Sentinel MCP server pricing, limits, and availability](datalake/sentinel-mcp-billing.md#microsoft-sentinel-entity-analyzer-tool).
53
+
54
+
### AI-powered SIEM migration tool is now generally available
55
+
Accelerate migrations to Microsoft Sentinel from Splunk and QRadar using an AI-assisted SIEM migration experience designed to reduce manual effort and speed time-to-value. For more information, see [Migrate to Microsoft Sentinel with the SIEM migration experience](siem-migration.md).
56
+
57
+
21
58
## March 2026
22
59
23
60
-[Call to action: update older Microsoft Sentinel content as code (Sentinel repositories) API versions before June 15, 2026](#call-to-action-update-older-microsoft-sentinel-content-as-code-sentinel-repositories-api-versions-before-june-15-2026)
@@ -543,107 +580,6 @@ For more information, see:
543
580
-[Microsoft Sentinel solution for SAP applications - functions reference](sap/sap-solution-function-reference.md)
544
581
-[Troubleshooting your Microsoft Sentinel solution for SAP applications deployment](sap/sap-deploy-troubleshoot.md)
545
582
546
-
## January 2025
547
-
548
-
-[Optimize threat intelligence feeds with ingestion rules](#optimize-threat-intelligence-feeds-with-ingestion-rules)
549
-
-[Matching analytics rule now generally available (GA)](#matching-analytics-rule-now-generally-available-ga)
-[Unlock advanced hunting with new STIX objects by opting in to new threat intelligence tables](#unlock-advanced-hunting-with-new-stix-objects-by-opting-in-to-new-threat-intelligence-tables)
552
-
-[Threat intelligence upload API now supports more STIX objects](#threat-intelligence-upload-api-now-supports-more-stix-objects)
553
-
-[Microsoft Defender Threat Intelligence data connectors now generally available (GA)](#microsoft-defender-threat-intelligence-data-connectors-now-generally-available-ga)
554
-
-[Bicep file support for repositories (Preview)](#bicep-file-support-for-repositories-preview)
555
-
-[SOC optimization updates for unified coverage management](#soc-optimization-updates-for-unified-coverage-management)
556
-
-[View granular solution content in the Microsoft Sentinel content hub](#view-granular-solution-content-in-the-microsoft-sentinel-content-hub)
557
-
558
-
### Optimize threat intelligence feeds with ingestion rules
559
-
560
-
Optimize threat intelligence feeds by filtering and enhancing objects before they're delivered to your workspace. Ingestion rules update threat intel object attributes, or filter objects out all together. Check out the blog announcement [here](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/introducing-threat-intelligence-ingestion-rules/4379019)!
561
-
562
-
For more information, see [Understand threat intelligence ingestion rules](understand-threat-intelligence.md#configure-ingestion-rules).
563
-
564
-
### Matching analytics rule now generally available (GA)
565
-
566
-
Microsoft provides access to its premium threat intelligence through the Defender Threat Intelligence analytics rule which is now generally available (GA). For more information on how to take advantage of this rule, which generates high-fidelity alerts and incidents, see [Use matching analytics to detect threats](use-matching-analytics-to-detect-threats.md).
567
-
568
-
### Threat intelligence management interface has moved
569
-
570
-
Threat intelligence for Microsoft Sentinel in the Defender portal has changed! We've renamed the page **Intel management** and moved it with other threat intelligence workflows. There's no change for customers using Microsoft Sentinel in the Azure experience.
571
-
572
-
:::image type="content" source="media/whats-new/intel-management-navigation.png" alt-text="Screenshot showing new menu placement for Microsoft Sentinel threat intelligence.":::
573
-
574
-
Enhancements to threat intelligence capabilities are available for customers using both Microsoft Sentinel experiences. The management interface streamlines the creation and curation of threat intel with these key features:
575
-
576
-
- Define relationships as you create new STIX objects.
577
-
- Curate existing threat intelligence with the new relationship builder.
578
-
- Create multiple objects quickly by copying common metadata from a new or existing TI object using a duplication feature.
579
-
- Use advanced search to sort and filter your threat intelligence objects without even writing a Log Analytics query.
580
-
581
-
For more information, see the following articles:
582
-
-[New STIX objects in Microsoft Sentinel](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/announcing-public-preview-new-stix-objects-in-microsoft-sentinel/4369164)
-[Uncover adversaries with threat intelligence in the Defender portal](/unified-secops-platform/threat-intelligence-overview)
585
-
586
-
### Unlock advanced hunting with new STIX objects by opting in to new threat intelligence tables
587
-
588
-
Tables supporting the new STIX object schema aren't available publicly. In order to query threat intelligence for STIX objects with KQL and unlock the hunting model that uses them, request to opt in with [this form](https://forms.office.com/r/903VU5x3hz?origin=lprLink). Ingest your threat intelligence into the new tables, `ThreatIntelIndicators` and `ThreatIntelObjects` alongside with or instead of the current table, `ThreatIntelligenceIndicator`, with this opt-in process.
589
-
590
-
For more information, see the blog announcement [New STIX objects in Microsoft Sentinel](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/announcing-public-preview-new-stix-objects-in-microsoft-sentinel/4369164).
591
-
592
-
### Threat intelligence upload API now supports more STIX objects
593
-
594
-
Make the most of your threat intelligence platforms when you connect them to Microsoft Sentinel with the upload API. Now you can ingest more objects than just indicators, reflecting the varied threat intelligence available. The upload API supports the following STIX objects:
595
-
596
-
-`indicator`
597
-
-`attack-pattern`
598
-
-`identity`
599
-
-`threat-actor`
600
-
-`relationship`
601
-
602
-
For more information, see the following articles:
603
-
604
-
-[Connect your threat intelligence platform with the upload API (Preview)](connect-threat-intelligence-upload-api.md)
605
-
-[Import threat intelligence to Microsoft Sentinel with the upload API (Preview)](stix-objects-api.md)
606
-
-[New STIX objects in Microsoft Sentinel](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/announcing-public-preview-new-stix-objects-in-microsoft-sentinel/4369164)
607
-
608
-
### Microsoft Defender Threat Intelligence data connectors now generally available (GA)
609
-
610
-
Both premium and standard Microsoft Defender Threat Intelligence data connectors are now generally available (GA) in content hub. For more information, see the following articles:
-[Enable the Microsoft Defender Threat Intelligence data connector](connect-mdti-data-connector.md)
614
-
615
-
### Bicep file support for repositories (Preview)
616
-
Use Bicep files alongside or as a replacement of ARM JSON templates in Microsoft Sentinel repositories. Bicep provides an intuitive way to create templates of Azure resources and Microsoft Sentinel content items. Not only is it easier to develop new content items, Bicep makes reviewing and updating content easier for anyone that's a part of the continuous integration and delivery of your Microsoft Sentinel content.
617
-
618
-
For more information, see [Plan your repository content](ci-cd-custom-content.md#plan-your-repository-content).
619
-
620
-
### SOC optimization updates for unified coverage management
621
-
622
-
In workspaces onboarded to the Defender portal, SOC optimizations now support both SIEM and XDR data, with detection coverage from across Microsoft Defender services.
623
-
624
-
In the Defender portal, the **SOC optimizations** and **MITRE ATT&CK** pages also now provide extra functionality for threat-based coverage optimizations to help you understand the impact of the recommendations on your environment and help you prioritize which to implement first.
625
-
626
-
Enhancements include:
627
-
628
-
|Area | Details|
629
-
|-----|--------|
630
-
|**SOC optimizations Overview page**| - A **High**, **Medium**, or **Low** score for your current detection coverage. This sort of scoring can help you decide which recommendations to prioritize at a glance. <br><br>- An indication of the number of active Microsoft Defender products (services) out of all available products. This helps you understand whether there's a whole product that you're missing in your environment. |
631
-
|**Optimization details side pane**,<br> shown when you drill down to a specific optimization| - Detailed coverage analysis, including the number of user-defined detections, response actions, and products you have active. <br><br>- Detailed spider charts that show your coverage across different threat categories, for both user-defined and out-of-the-box detections. <br><br>- An option to jump to the specific threat scenario in the **MITRE ATT&CK** page instead of viewing MITRE ATT&CK coverage only in the side pane.<br><br>- An option to **View full threat scenario** to drill down to even further details about the security products and detections available to provide security coverage in your environment. |
632
-
|**MITRE ATT&CK page**| - A new toggle to view coverage by threat scenario. If you've jumped to the **MITRE ATT&CK** page from either a recommendation details side pane or from the **View full threat scenario** page, the **MITRE ATT&CK** page is pre-filtered for your threat scenario. <br><br>- The technique details pane, shown on the side when you select a specific MITRE ATT&CK technique, now shows the number of active detections out of all available detections for that technique. |
633
-
634
-
For more information, see [Optimize your security operations](soc-optimization/soc-optimization-access.md) and [Understand security coverage by the MITRE ATT&CK framework](mitre-coverage.md).
635
-
636
-
### View granular solution content in the Microsoft Sentinel content hub
637
-
638
-
Now you can view the individual content available in a specific solution directly from the **Content hub**, even before you've installed the solution. This new visibility helps you understand the content available to you, and more easily identify, plan, and install the specific solutions you need.
639
-
640
-
Expand each solution in the Content hub to view included security content. For example:
641
-
642
-
:::image type="content" source="media/sentinel-solutions-deploy/solutions-list.png" alt-text="Screenshot of showing granular content.":::
643
-
644
-
The granular solution content updates also include a generative AI-based search engine that helps you run more robust searches, diving deep into the solution content and returning results for similar terms.
645
-
646
-
For more information, see [Discover content](sentinel-solutions-deploy.md#discover-content).
0 commit comments