You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/identify-threats-with-entity-behavior-analytics.md
+29-25Lines changed: 29 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Advanced threat detection with User and Entity Behavior Analytics (UEBA)
3
3
description: Create behavioral baselines for entities (users, hostnames, IP addresses) and use them to detect anomalous behavior and identify zero-day advanced persistent threats (APT).
4
4
author: guywi-ms
5
5
ms.author: guywild
6
-
ms.topic: conceptual
7
-
ms.date: 10/16/2024
6
+
ms.topic: article
7
+
ms.date: 12/15/2025
8
8
appliesto:
9
9
- Microsoft Sentinel in the Microsoft Defender portal
10
10
- Microsoft Sentinel in the Azure portal
@@ -30,23 +30,23 @@ All the benefits of UEBA are available in the Microsoft Defender portal.
30
30
31
31
## What is UEBA?
32
32
33
-
As Microsoft Sentinel collects logs and alerts from all of your connected data sources, UEBA uses artificial intelligence (AI) to build baseline behavioral profiles of your organization’s entities - such as users, hosts, IP addresses, and applications - over time and across peer groups. UEBA then identifies anomalous activity and helps you determine whether an asset is compromised.
33
+
As Microsoft Sentinel collects logs and alerts from all of your connected data sources, UEBA uses AI to build baseline behavioral profiles of your organization's entities - such as users, hosts, IP addresses, and applications - over time and across peer groups. UEBA then identifies anomalous activity and helps you determine whether an asset is compromised.
34
34
35
-
UEBA also determines the relative sensitivity of particular assets, identifies peer groups of assets, and evaluates the potential impact of any given compromised asset - its “blast radius”. This information lets you prioritize your investigation, hunting, and incident handling effectively.
35
+
UEBA also determines the relative sensitivity of particular assets, identifies peer groups of assets, and evaluates the potential impact of any given compromised asset - its "blast radius." This information lets you prioritize your investigation, hunting, and incident handling effectively.
Inspired by Gartner’s paradigm for UEBA solutions, Microsoft Sentinel provides an "outside-in" approach, based on three frames of reference:
43
+
Inspired by Gartner's paradigm for UEBA solutions, Microsoft Sentinel provides an "outside-in" approach, based on three frames of reference:
44
44
45
-
-**Use cases:** By prioritizing for relevant attack vectors and scenarios based on security research aligned with the MITRE ATT&CK framework of tactics, techniques, and subtechniques that puts various entities as victims, perpetrators, or pivot points in the kill chain; Microsoft Sentinel focuses specifically on the most valuable logs each data source can provide.
45
+
-**Use cases:** By prioritizing relevant attack vectors and scenarios based on security research aligned with the MITRE ATT&CK framework of tactics, techniques, and subtechniques that puts various entities as victims, perpetrators, or pivot points in the attack chain, Microsoft Sentinel focuses specifically on the most valuable logs each data source can provide.
46
46
47
-
-**Data sources:** While first and foremost supporting Azure data sources, Microsoft Sentinel thoughtfully selects third-party data sources to provide data that matches our threat scenarios.
47
+
-**Data sources:** While first and foremost supporting Azure data sources, Microsoft Sentinel thoughtfully selects third-party data sources to provide data that matches its threat scenarios.
48
48
49
-
-**Analytics:**Using various machine learning (ML) algorithms, Microsoft Sentinel identifies anomalous activities and presents evidence clearly and concisely in the form of contextual enrichments, some examples of which appear below.
49
+
-**Analytics:**By using various machine learning (ML) algorithms, Microsoft Sentinel identifies anomalous activities and presents evidence clearly and concisely in the form of contextual enrichments, some examples of which appear in the following image.
@@ -62,31 +62,35 @@ The user entity information that Microsoft Sentinel uses to build its user profi
62
62
- In Microsoft Sentinel in the Azure portal, you query the *IdentityInfo* table in Log Analytics on the **Logs** page.
63
63
- In the Defender portal, you query this table in **Advanced hunting**.
64
64
65
-
Now in preview, you can also sync your on-premises Active Directory user entity information as well, using Microsoft Defender for Identity.
65
+
Now in preview, you can also sync your on-premises Active Directory user entity information by using Microsoft Defender for Identity.
66
66
67
67
See [Enable User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](enable-entity-behavior-analytics.md) to learn how to enable UEBA and synchronize user identities.
68
68
69
69
### Scoring
70
70
71
-
Each activity is scored with “Investigation Priority Score” – which determine the probability of a specific user performing a specific activity, based on behavioral learning of the user and their peers. Activities identified as the most abnormal receive the highest scores (on a scale of 0-10).
71
+
Each activity is scored with an "Investigation Priority Score" – which determines the probability of a specific user performing a specific activity, based on behavioral learning of the user and their peers. Activities identified as the most abnormal receive the highest scores (on a scale of 0-10).
72
72
73
-
See how behavior analytics is used in [Microsoft Defender for Cloud Apps](https://techcommunity.microsoft.com/t5/microsoft-security-and/prioritize-user-investigations-in-cloud-app-security/ba-p/700136) for an example of how this works.
73
+
For an example of how this works, see [Microsoft Defender for Cloud Apps](https://techcommunity.microsoft.com/t5/microsoft-security-and/prioritize-user-investigations-in-cloud-app-security/ba-p/700136).
74
74
75
75
Learn more about [entities in Microsoft Sentinel](entities.md) and see the full list of [supported entities and identifiers](entities-reference.md).
76
76
77
77
### Entity pages
78
78
79
79
Information about **entity pages** can now be found at [Entity pages in Microsoft Sentinel](entity-pages.md).
80
80
81
-
## UEBA experiences in the Defender portal empower analysts and streamline workflows
81
+
## UEBA experiences in the Defender portal empower analysts and streamline workflows (preview)
82
82
83
83
By surfacing anomalies in investigation graphs and user pages, and prompting analysts to incorporate anomaly data in hunting queries, UEBA facilitates faster threat detection, smarter prioritization, and more efficient incident response.
84
84
85
85
This section outlines the key UEBA analyst experiences available in the Defender portal when you enable UEBA.
86
86
87
+
### UEBA home page widget
88
+
89
+
The Defender portal home page includes a UEBA widget where analysts can immediately have visibility into anomalous user behavior and therefore accelerate threat detection workflows. If the tenant isn't onboarded yet to UEBA, this widget also provides security admins quick access to the onboarding process.
90
+
87
91
### UEBA insights in user investigations
88
92
89
-
Analysts can quickly assess user risk using UEBA context displayed in side panels and the Overview tab on all user pages. When unusual behavior is detected, the portal automatically tags users with **UEBA anomalies** helping prioritize investigations based on recent activity. For more information, see [User entity page in Microsoft Defender](https://aka.ms/ueba-entity-details).
93
+
Analysts can quickly assess user risk using UEBA context displayed in side panels and the **Overview** tab on all user pages. When unusual behavior is detected, the portal automatically tags users with **UEBA anomalies** helping prioritize investigations based on recent activity. For more information, see [User entity page in Microsoft Defender](https://aka.ms/ueba-entity-details).
90
94
91
95
Each user page includes a **Top UEBA anomalies** section, showing the top three anomalies from the past 30 days, along with direct links to pre-built anomaly queries and the Sentinel events timeline for deeper analysis.
92
96
@@ -100,9 +104,9 @@ During incident investigations, analysts can launch built-in queries directly fr
100
104
101
105
For more information, see [Investigate incidents in the Microsoft Defender portal](https://aka.ms/ueba-go-hunt).
102
106
103
-
### Enrich Advanced Hunting queries and custom detections with UEBA data
107
+
### Enrich advanced hunting queries and custom detections with UEBA data
104
108
105
-
When analysts write Advanced Hunting or custom detection queries using UEBA-related tables, the Defender portal displays a banner that prompts them to join the **Anomalies** table. This helps enrich investigations with behavioral insights and strengthens the overall analysis.
109
+
When analysts write advanced hunting or custom detection queries using UEBA-related tables, the Defender portal displays a banner that prompts them to join the **Anomalies** table. This action enriches investigations with behavioral insights and strengthens the overall analysis.
106
110
107
111
:::image type="content" source="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-advanced-hunting.png" alt-text="Screenshot that shows the Advanced Hunting page with a banner that prompts the analyst to join the Anomalies table and enrich their analysis with behavioral insights." lightbox="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-advanced-hunting.png":::
108
112
@@ -114,9 +118,9 @@ For more information, see:
114
118
115
119
## Querying behavior analytics data
116
120
117
-
Using [KQL](/kusto/query/?view=microsoft-sentinel&preserve-view=true), we can query the **BehaviorAnalytics** table.
121
+
Using [KQL](/kusto/query/?view=microsoft-sentinel&preserve-view=true), you can query the `BehaviorAnalytics` table.
118
122
119
-
For example – if we want to find all the cases of a user that failed to sign in to an Azure resource, where it was the user's first attempt to connect from a given country/region, and connections from that country/region are uncommon even for the user's peers, we can use the following query:
123
+
For example, if you want to find all the cases of a user that failed to sign in to an Azure resource, where it was the user's first attempt to connect from a given country or region, and connections from that country or region are uncommon even for the user's peers, you can use the following query:
120
124
121
125
```Kusto
122
126
BehaviorAnalytics
@@ -125,32 +129,32 @@ BehaviorAnalytics
125
129
| where ActivityInsights.CountryUncommonlyConnectedFromAmongPeers == True
126
130
```
127
131
128
-
- In Microsoft Sentinel in the Azure portal, you query the *BehaviorAnalytics* table in Log Analytics on the **Logs** page.
132
+
- In Microsoft Sentinel in the Azure portal, you query the `BehaviorAnalytics` table in Log Analytics on the **Logs** page.
129
133
- In the Defender portal, you query this table in **Advanced hunting**.
130
134
131
135
### User peers metadata - table and notebook
132
136
133
-
User peers' metadata provides important context in threat detections, in investigating an incident, and in hunting for a potential threat. Security analysts can observe the normal activities of users` peers to determine whether a user's activities are unusual as compared to those of their peers.
137
+
User peers' metadata provides important context in threat detections, in investigating an incident, and in hunting for a potential threat. Security analysts can observe the normal activities of users' peers to determine whether a user's activities are unusual as compared to those of their peers.
134
138
135
-
Microsoft Sentinel calculates and ranks a user's peers, based on the user’s Microsoft Entra security group membership, mailing list, et cetera, and stores the peers ranked 1-20 in the **UserPeerAnalytics** table. The screenshot below shows the schema of the UserPeerAnalytics table, and displays the top eight-ranked peers of the user Kendall Collins. Microsoft Sentinel uses the *term frequency-inverse document frequency* (TF-IDF) algorithm to normalize the weighing for calculating the rank: the smaller the group, the higher the weight.
139
+
Microsoft Sentinel calculates and ranks a user's peers, based on the user's Microsoft Entra security group membership, mailing list, and other factors. It stores the peers ranked 1-20 in the `UserPeerAnalytics` table. The following screenshot shows the schema of the `UserPeerAnalytics` table, and displays the top eight-ranked peers of the user Kendall Collins. Microsoft Sentinel uses the *term frequency-inverse document frequency* (TF-IDF) algorithm to normalize the weighing for calculating the rank: the smaller the group, the higher the weight.
136
140
137
141
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/user-peers-metadata.png" alt-text="Screen shot of user peers metadata table" lightbox="./media/identify-threats-with-entity-behavior-analytics/user-peers-metadata.png":::
138
142
139
143
You can use the [Jupyter notebook](https://github.com/Azure/Azure-Sentinel-Notebooks/tree/master/scenario-notebooks/UserSecurityMetadata) provided in the Microsoft Sentinel GitHub repository to visualize the user peers metadata. For detailed instructions on how to use the notebook, see the [Guided Analysis - User Security Metadata](https://github.com/Azure/Azure-Sentinel-Notebooks/blob/master/scenario-notebooks/UserSecurityMetadata/Guided%20Analysis%20-%20User%20Security%20Metadata.ipynb) notebook.
140
144
141
145
> [!NOTE]
142
-
> The *UserAccessAnalytics* table has been deprecated.
146
+
> The `UserAccessAnalytics` table is deprecated.
143
147
144
148
### Hunting queries and exploration queries
145
149
146
-
Microsoft Sentinel provides out-of-the-box a set of hunting queries, exploration queries, and the **User and Entity Behavior Analytics** workbook, which is based on the **BehaviorAnalytics** table. These tools present enriched data, focused on specific use cases, that indicate anomalous behavior.
150
+
Microsoft Sentinel provides an out-of-the-box set of hunting queries, exploration queries, and the **User and Entity Behavior Analytics** workbook, which is based on the `BehaviorAnalytics` table. These tools present enriched data, focused on specific use cases, that indicate anomalous behavior.
147
151
148
152
For more information, see:
149
153
150
154
-[Hunt for threats with Microsoft Sentinel](hunting.md)
151
155
-[Visualize and monitor your data](monitor-your-data.md)
152
156
153
-
As legacy defense tools become obsolete, organizations may have such a vast and porous digital estate that it becomes unmanageable to obtain a comprehensive picture of the risk and posture their environment may be facing. Relying heavily on reactive efforts, such as analytics and rules, enable bad actors to learn how to evade those efforts. This is where UEBA comes to play, by providing risk scoring methodologies and algorithms to figure out what is really happening.
157
+
As legacy defense tools become obsolete, organizations might have such a vast and porous digital property that it becomes unmanageable to obtain a comprehensive picture of the risk and posture their environment might be facing. Relying heavily on reactive efforts, such as analytics and rules, enables threat actors to learn how to evade those efforts. This is where UEBA comes to play, by providing risk scoring methodologies and algorithms to figure out what is really happening.
154
158
155
159
## Aggregate behavior insights with the UEBA behaviors layer (Preview)
156
160
@@ -166,11 +170,11 @@ By converting fragmented logs into coherent behavior objects, the behaviors laye
166
170
For more information, see [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)](../sentinel/entity-behaviors-layer.md).
167
171
168
172
## Next steps
169
-
In this document, you learned about Microsoft Sentinel's entity behavior analytics capabilities. For practical guidance on implementation, and to use the insights you've gained, see the following articles:
173
+
In this document, you learned about Microsoft Sentinel's entity behavior analytics capabilities. For practical guidance on implementation, and to use the insights you gained, see the following articles:
170
174
171
175
-[Enable entity behavior analytics](./enable-entity-behavior-analytics.md) in Microsoft Sentinel.
172
176
- See the [list of anomalies](anomalies-reference.md#ueba-anomalies) detected by the UEBA engine.
173
177
-[Investigate incidents with UEBA data](investigate-with-ueba.md).
174
178
-[Hunt for security threats](./hunting.md).
175
179
176
-
For more information, also see the [Microsoft Sentinel UEBA reference](ueba-reference.md).
180
+
For more information, see the [Microsoft Sentinel UEBA reference](ueba-reference.md).
Copy file name to clipboardExpand all lines: articles/sentinel/whats-new.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,10 @@ The listed features were released in the last six months. For information about
20
20
21
21
## January 2026
22
22
23
+
### New Entity Behavior Analytics (UEBA) widget in the Defender portal home page (Preview)
24
+
25
+
The Defender portal home page now includes a UEBA widget where analysts can immediately have visibility into anomalous user behavior and therefore accelerate threat detection workflows. For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows-preview).
26
+
23
27
### Updated date: Microsoft Sentinel in the Azure portal to be retired March 2027
@@ -67,7 +71,7 @@ This update expands [detection coverage for SAP BTP](../sentinel/sap/sap-btp-sec
67
71
68
72
### New Entity Behavior Analytics (UEBA) experiences in the Defender portal (Preview)
69
73
70
-
Microsoft Sentinel introduces new UEBA experiences in the Defender portal, bringing behavioral insights directly into key analyst workflows. These enhancements help analysts prioritize investigations and apply UEBA context more effectively.
74
+
Microsoft Sentinel introduces new UEBA experiences in the Defender portal, bringing behavioral insights directly into key analyst workflows. These enhancements help analysts prioritize investigations and apply UEBA context more effectively.
71
75
72
76
#### Anomaly-focused user investigations
73
77
@@ -90,7 +94,7 @@ Advanced hunting and custom detection experiences now include a contextual banne
90
94
91
95
All features require UEBA to be enabled and are workspace-scoped to the currently selected workspace.
92
96
93
-
For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows).
97
+
For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows-preview).
0 commit comments