Skip to content

Commit 900fdfc

Browse files
Merge pull request #309553 from poliveria/poliveria-ueba-12152025
Update UEBA documentation and add Defender portal widget
2 parents 5d5a454 + ec0c72b commit 900fdfc

2 files changed

Lines changed: 35 additions & 27 deletions

File tree

articles/sentinel/identify-threats-with-entity-behavior-analytics.md

Lines changed: 29 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Advanced threat detection with User and Entity Behavior Analytics (UEBA)
33
description: Create behavioral baselines for entities (users, hostnames, IP addresses) and use them to detect anomalous behavior and identify zero-day advanced persistent threats (APT).
44
author: guywi-ms
55
ms.author: guywild
6-
ms.topic: conceptual
7-
ms.date: 10/16/2024
6+
ms.topic: article
7+
ms.date: 12/15/2025
88
appliesto:
99
- Microsoft Sentinel in the Microsoft Defender portal
1010
- Microsoft Sentinel in the Azure portal
@@ -30,23 +30,23 @@ All the benefits of UEBA are available in the Microsoft Defender portal.
3030

3131
## What is UEBA?
3232

33-
As Microsoft Sentinel collects logs and alerts from all of your connected data sources, UEBA uses artificial intelligence (AI) to build baseline behavioral profiles of your organizations entities - such as users, hosts, IP addresses, and applications - over time and across peer groups. UEBA then identifies anomalous activity and helps you determine whether an asset is compromised.
33+
As Microsoft Sentinel collects logs and alerts from all of your connected data sources, UEBA uses AI to build baseline behavioral profiles of your organization's entities - such as users, hosts, IP addresses, and applications - over time and across peer groups. UEBA then identifies anomalous activity and helps you determine whether an asset is compromised.
3434

35-
UEBA also determines the relative sensitivity of particular assets, identifies peer groups of assets, and evaluates the potential impact of any given compromised asset - its blast radius”. This information lets you prioritize your investigation, hunting, and incident handling effectively.
35+
UEBA also determines the relative sensitivity of particular assets, identifies peer groups of assets, and evaluates the potential impact of any given compromised asset - its "blast radius." This information lets you prioritize your investigation, hunting, and incident handling effectively.
3636

3737
### UEBA analytics architecture
3838

3939
:::image type="content" source="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-architecture.png" alt-text="Entity behavior analytics architecture":::
4040

4141
### Security-driven analytics
4242

43-
Inspired by Gartners paradigm for UEBA solutions, Microsoft Sentinel provides an "outside-in" approach, based on three frames of reference:
43+
Inspired by Gartner's paradigm for UEBA solutions, Microsoft Sentinel provides an "outside-in" approach, based on three frames of reference:
4444

45-
- **Use cases:** By prioritizing for relevant attack vectors and scenarios based on security research aligned with the MITRE ATT&CK framework of tactics, techniques, and subtechniques that puts various entities as victims, perpetrators, or pivot points in the kill chain; Microsoft Sentinel focuses specifically on the most valuable logs each data source can provide.
45+
- **Use cases:** By prioritizing relevant attack vectors and scenarios based on security research aligned with the MITRE ATT&CK framework of tactics, techniques, and subtechniques that puts various entities as victims, perpetrators, or pivot points in the attack chain, Microsoft Sentinel focuses specifically on the most valuable logs each data source can provide.
4646

47-
- **Data sources:** While first and foremost supporting Azure data sources, Microsoft Sentinel thoughtfully selects third-party data sources to provide data that matches our threat scenarios.
47+
- **Data sources:** While first and foremost supporting Azure data sources, Microsoft Sentinel thoughtfully selects third-party data sources to provide data that matches its threat scenarios.
4848

49-
- **Analytics:** Using various machine learning (ML) algorithms, Microsoft Sentinel identifies anomalous activities and presents evidence clearly and concisely in the form of contextual enrichments, some examples of which appear below.
49+
- **Analytics:** By using various machine learning (ML) algorithms, Microsoft Sentinel identifies anomalous activities and presents evidence clearly and concisely in the form of contextual enrichments, some examples of which appear in the following image.
5050

5151
:::image type="content" source="media/identify-threats-with-entity-behavior-analytics/behavior-analytics-top-down.png" alt-text="Behavior analytics outside-in approach":::
5252

@@ -62,31 +62,35 @@ The user entity information that Microsoft Sentinel uses to build its user profi
6262
- In Microsoft Sentinel in the Azure portal, you query the *IdentityInfo* table in Log Analytics on the **Logs** page.
6363
- In the Defender portal, you query this table in **Advanced hunting**.
6464

65-
Now in preview, you can also sync your on-premises Active Directory user entity information as well, using Microsoft Defender for Identity.
65+
Now in preview, you can also sync your on-premises Active Directory user entity information by using Microsoft Defender for Identity.
6666

6767
See [Enable User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](enable-entity-behavior-analytics.md) to learn how to enable UEBA and synchronize user identities.
6868

6969
### Scoring
7070

71-
Each activity is scored with Investigation Priority Score – which determine the probability of a specific user performing a specific activity, based on behavioral learning of the user and their peers. Activities identified as the most abnormal receive the highest scores (on a scale of 0-10).
71+
Each activity is scored with an "Investigation Priority Score" – which determines the probability of a specific user performing a specific activity, based on behavioral learning of the user and their peers. Activities identified as the most abnormal receive the highest scores (on a scale of 0-10).
7272

73-
See how behavior analytics is used in [Microsoft Defender for Cloud Apps](https://techcommunity.microsoft.com/t5/microsoft-security-and/prioritize-user-investigations-in-cloud-app-security/ba-p/700136) for an example of how this works.
73+
For an example of how this works, see [Microsoft Defender for Cloud Apps](https://techcommunity.microsoft.com/t5/microsoft-security-and/prioritize-user-investigations-in-cloud-app-security/ba-p/700136).
7474

7575
Learn more about [entities in Microsoft Sentinel](entities.md) and see the full list of [supported entities and identifiers](entities-reference.md).
7676

7777
### Entity pages
7878

7979
Information about **entity pages** can now be found at [Entity pages in Microsoft Sentinel](entity-pages.md).
8080

81-
## UEBA experiences in the Defender portal empower analysts and streamline workflows
81+
## UEBA experiences in the Defender portal empower analysts and streamline workflows (preview)
8282

8383
By surfacing anomalies in investigation graphs and user pages, and prompting analysts to incorporate anomaly data in hunting queries, UEBA facilitates faster threat detection, smarter prioritization, and more efficient incident response.
8484

8585
This section outlines the key UEBA analyst experiences available in the Defender portal when you enable UEBA.
8686

87+
### UEBA home page widget
88+
89+
The Defender portal home page includes a UEBA widget where analysts can immediately have visibility into anomalous user behavior and therefore accelerate threat detection workflows. If the tenant isn't onboarded yet to UEBA, this widget also provides security admins quick access to the onboarding process.
90+
8791
### UEBA insights in user investigations
8892

89-
Analysts can quickly assess user risk using UEBA context displayed in side panels and the Overview tab on all user pages. When unusual behavior is detected, the portal automatically tags users with **UEBA anomalies** helping prioritize investigations based on recent activity. For more information, see [User entity page in Microsoft Defender](https://aka.ms/ueba-entity-details).
93+
Analysts can quickly assess user risk using UEBA context displayed in side panels and the **Overview** tab on all user pages. When unusual behavior is detected, the portal automatically tags users with **UEBA anomalies** helping prioritize investigations based on recent activity. For more information, see [User entity page in Microsoft Defender](https://aka.ms/ueba-entity-details).
9094

9195
Each user page includes a **Top UEBA anomalies** section, showing the top three anomalies from the past 30 days, along with direct links to pre-built anomaly queries and the Sentinel events timeline for deeper analysis.
9296

@@ -100,9 +104,9 @@ During incident investigations, analysts can launch built-in queries directly fr
100104

101105
For more information, see [Investigate incidents in the Microsoft Defender portal](https://aka.ms/ueba-go-hunt).
102106

103-
### Enrich Advanced Hunting queries and custom detections with UEBA data
107+
### Enrich advanced hunting queries and custom detections with UEBA data
104108

105-
When analysts write Advanced Hunting or custom detection queries using UEBA-related tables, the Defender portal displays a banner that prompts them to join the **Anomalies** table. This helps enrich investigations with behavioral insights and strengthens the overall analysis.
109+
When analysts write advanced hunting or custom detection queries using UEBA-related tables, the Defender portal displays a banner that prompts them to join the **Anomalies** table. This action enriches investigations with behavioral insights and strengthens the overall analysis.
106110

107111
:::image type="content" source="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-advanced-hunting.png" alt-text="Screenshot that shows the Advanced Hunting page with a banner that prompts the analyst to join the Anomalies table and enrich their analysis with behavioral insights." lightbox="media/identify-threats-with-entity-behavior-analytics/entity-behavior-analytics-advanced-hunting.png":::
108112

@@ -114,9 +118,9 @@ For more information, see:
114118

115119
## Querying behavior analytics data
116120

117-
Using [KQL](/kusto/query/?view=microsoft-sentinel&preserve-view=true), we can query the **BehaviorAnalytics** table.
121+
Using [KQL](/kusto/query/?view=microsoft-sentinel&preserve-view=true), you can query the `BehaviorAnalytics` table.
118122

119-
For exampleif we want to find all the cases of a user that failed to sign in to an Azure resource, where it was the user's first attempt to connect from a given country/region, and connections from that country/region are uncommon even for the user's peers, we can use the following query:
123+
For example, if you want to find all the cases of a user that failed to sign in to an Azure resource, where it was the user's first attempt to connect from a given country or region, and connections from that country or region are uncommon even for the user's peers, you can use the following query:
120124

121125
```Kusto
122126
BehaviorAnalytics
@@ -125,32 +129,32 @@ BehaviorAnalytics
125129
| where ActivityInsights.CountryUncommonlyConnectedFromAmongPeers == True
126130
```
127131

128-
- In Microsoft Sentinel in the Azure portal, you query the *BehaviorAnalytics* table in Log Analytics on the **Logs** page.
132+
- In Microsoft Sentinel in the Azure portal, you query the `BehaviorAnalytics` table in Log Analytics on the **Logs** page.
129133
- In the Defender portal, you query this table in **Advanced hunting**.
130134

131135
### User peers metadata - table and notebook
132136

133-
User peers' metadata provides important context in threat detections, in investigating an incident, and in hunting for a potential threat. Security analysts can observe the normal activities of users` peers to determine whether a user's activities are unusual as compared to those of their peers.
137+
User peers' metadata provides important context in threat detections, in investigating an incident, and in hunting for a potential threat. Security analysts can observe the normal activities of users' peers to determine whether a user's activities are unusual as compared to those of their peers.
134138

135-
Microsoft Sentinel calculates and ranks a user's peers, based on the users Microsoft Entra security group membership, mailing list, et cetera, and stores the peers ranked 1-20 in the **UserPeerAnalytics** table. The screenshot below shows the schema of the UserPeerAnalytics table, and displays the top eight-ranked peers of the user Kendall Collins. Microsoft Sentinel uses the *term frequency-inverse document frequency* (TF-IDF) algorithm to normalize the weighing for calculating the rank: the smaller the group, the higher the weight.
139+
Microsoft Sentinel calculates and ranks a user's peers, based on the user's Microsoft Entra security group membership, mailing list, and other factors. It stores the peers ranked 1-20 in the `UserPeerAnalytics` table. The following screenshot shows the schema of the `UserPeerAnalytics` table, and displays the top eight-ranked peers of the user Kendall Collins. Microsoft Sentinel uses the *term frequency-inverse document frequency* (TF-IDF) algorithm to normalize the weighing for calculating the rank: the smaller the group, the higher the weight.
136140

137141
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/user-peers-metadata.png" alt-text="Screen shot of user peers metadata table" lightbox="./media/identify-threats-with-entity-behavior-analytics/user-peers-metadata.png":::
138142

139143
You can use the [Jupyter notebook](https://github.com/Azure/Azure-Sentinel-Notebooks/tree/master/scenario-notebooks/UserSecurityMetadata) provided in the Microsoft Sentinel GitHub repository to visualize the user peers metadata. For detailed instructions on how to use the notebook, see the [Guided Analysis - User Security Metadata](https://github.com/Azure/Azure-Sentinel-Notebooks/blob/master/scenario-notebooks/UserSecurityMetadata/Guided%20Analysis%20-%20User%20Security%20Metadata.ipynb) notebook.
140144

141145
> [!NOTE]
142-
> The *UserAccessAnalytics* table has been deprecated.
146+
> The `UserAccessAnalytics` table is deprecated.
143147
144148
### Hunting queries and exploration queries
145149

146-
Microsoft Sentinel provides out-of-the-box a set of hunting queries, exploration queries, and the **User and Entity Behavior Analytics** workbook, which is based on the **BehaviorAnalytics** table. These tools present enriched data, focused on specific use cases, that indicate anomalous behavior.
150+
Microsoft Sentinel provides an out-of-the-box set of hunting queries, exploration queries, and the **User and Entity Behavior Analytics** workbook, which is based on the `BehaviorAnalytics` table. These tools present enriched data, focused on specific use cases, that indicate anomalous behavior.
147151

148152
For more information, see:
149153

150154
- [Hunt for threats with Microsoft Sentinel](hunting.md)
151155
- [Visualize and monitor your data](monitor-your-data.md)
152156

153-
As legacy defense tools become obsolete, organizations may have such a vast and porous digital estate that it becomes unmanageable to obtain a comprehensive picture of the risk and posture their environment may be facing. Relying heavily on reactive efforts, such as analytics and rules, enable bad actors to learn how to evade those efforts. This is where UEBA comes to play, by providing risk scoring methodologies and algorithms to figure out what is really happening.
157+
As legacy defense tools become obsolete, organizations might have such a vast and porous digital property that it becomes unmanageable to obtain a comprehensive picture of the risk and posture their environment might be facing. Relying heavily on reactive efforts, such as analytics and rules, enables threat actors to learn how to evade those efforts. This is where UEBA comes to play, by providing risk scoring methodologies and algorithms to figure out what is really happening.
154158

155159
## Aggregate behavior insights with the UEBA behaviors layer (Preview)
156160

@@ -166,11 +170,11 @@ By converting fragmented logs into coherent behavior objects, the behaviors laye
166170
For more information, see [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)](../sentinel/entity-behaviors-layer.md).
167171

168172
## Next steps
169-
In this document, you learned about Microsoft Sentinel's entity behavior analytics capabilities. For practical guidance on implementation, and to use the insights you've gained, see the following articles:
173+
In this document, you learned about Microsoft Sentinel's entity behavior analytics capabilities. For practical guidance on implementation, and to use the insights you gained, see the following articles:
170174

171175
- [Enable entity behavior analytics](./enable-entity-behavior-analytics.md) in Microsoft Sentinel.
172176
- See the [list of anomalies](anomalies-reference.md#ueba-anomalies) detected by the UEBA engine.
173177
- [Investigate incidents with UEBA data](investigate-with-ueba.md).
174178
- [Hunt for security threats](./hunting.md).
175179

176-
For more information, also see the [Microsoft Sentinel UEBA reference](ueba-reference.md).
180+
For more information, see the [Microsoft Sentinel UEBA reference](ueba-reference.md).

articles/sentinel/whats-new.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@ The listed features were released in the last six months. For information about
2020

2121
## January 2026
2222

23+
### New Entity Behavior Analytics (UEBA) widget in the Defender portal home page (Preview)
24+
25+
The Defender portal home page now includes a UEBA widget where analysts can immediately have visibility into anomalous user behavior and therefore accelerate threat detection workflows. For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows-preview).
26+
2327
### Updated date: Microsoft Sentinel in the Azure portal to be retired March 2027
2428

2529
[!INCLUDE [sentinel-azure-deprecation](includes/sentinel-azure-deprecation.md)]
@@ -67,7 +71,7 @@ This update expands [detection coverage for SAP BTP](../sentinel/sap/sap-btp-sec
6771

6872
### New Entity Behavior Analytics (UEBA) experiences in the Defender portal (Preview)
6973

70-
Microsoft Sentinel introduces new UEBA experiences in the Defender portal, bringing behavioral insights directly into key analyst workflows. These enhancements help analysts prioritize investigations and apply UEBA context more effectively.
74+
Microsoft Sentinel introduces new UEBA experiences in the Defender portal, bringing behavioral insights directly into key analyst workflows. These enhancements help analysts prioritize investigations and apply UEBA context more effectively.
7175

7276
#### Anomaly-focused user investigations
7377

@@ -90,7 +94,7 @@ Advanced hunting and custom detection experiences now include a contextual banne
9094

9195
All features require UEBA to be enabled and are workspace-scoped to the currently selected workspace.
9296

93-
For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows).
97+
For more information, see [How UEBA empowers analysts and streamlines workflows](identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows-preview).
9498

9599
### SAP data connectors
96100

0 commit comments

Comments
 (0)