|
| 1 | +--- |
| 2 | +title: Responsible AI FAQ for the Microsoft Sentinel UEBA behaviors layer |
| 3 | +description: This FAQ provides information about the AI technology used in the Microsoft Sentinel UEBA behaviors layer, along with key considerations and details about how AI is used, how it was tested and evaluated, and any specific limitations. |
| 4 | +ms.date: 01/11/2026 |
| 5 | +ms.custom: |
| 6 | + - responsible-ai-faqs |
| 7 | +ms.topic: contributor-guide |
| 8 | +author: guywi-ms |
| 9 | +ms.author: guywild |
| 10 | +ms.reviewer: mschechter |
| 11 | +--- |
| 12 | + |
| 13 | +# Responsible AI FAQ for the Microsoft Sentinel UEBA behaviors layer |
| 14 | + |
| 15 | +These frequently asked questions (FAQ) describe the AI impact of the [UEBA behaviors layer](../sentinel/entity-behaviors-layer.md) feature in Microsoft Sentinel. |
| 16 | + |
| 17 | + |
| 18 | +## What is the UEBA behaviors layer? |
| 19 | + |
| 20 | +The UEBA behaviors layer is an AI-powered capability in Microsoft Sentinel that transforms fragmented raw logs into contextualized behavioral insights that explain "who did what to whom". |
| 21 | + |
| 22 | +- **Inputs:** Raw security logs from sources, such as the AWS CloudTrail and CommonSecurityLog tables. |
| 23 | +- **Outputs:** Structured behavior objects enriched with MITRE ATT&CK mappings, entity roles, and natural language explanations. |
| 24 | + |
| 25 | +## What are the capabilities of the UEBA behaviors layer? |
| 26 | + |
| 27 | +The UEBA behaviors layer provides these key capabilities: |
| 28 | +- **Behavior aggregation:** Automatically groups and sequences related security events across multiple data sources. Instead of analysts manually correlating raw logs, the behaviors layer creates unified behavior objects that present "what happened" in a structured way. |
| 29 | + |
| 30 | +- **Contextualization:** Each behavior is enriched with security context, including mapping to MITRE ATT&CK tactics and techniques. This helps analysts understand the intent behind an activity - for example, lateral movement, privilege escalation - without needing deep familiarity with every log format. |
| 31 | + |
| 32 | +- **Explainability:** Generates natural language summaries of behaviors, making investigations faster and more accessible. Analysts can quickly see what happened and why it matters. |
| 33 | + |
| 34 | +## What is the intended use of the UEBA behaviors layer? |
| 35 | + |
| 36 | +The intended use is to accelerate threat detection and investigation by providing SOC analysts with a unified, AI-driven view of behaviors. It supports: |
| 37 | + |
| 38 | +- Threat hunting |
| 39 | +- Detection rule authoring at using large language models (LLMs) |
| 40 | +- Incident investigation and triage |
| 41 | + |
| 42 | + |
| 43 | +## How was the UEBA behaviors layer evaluated? What metrics are used to measure performance? |
| 44 | + |
| 45 | +Our AI mechanisms generate behavior rules based on samples logs. The behavior rules use aggregation and sequencing of raw logs to reflect the intent and action behind those logs. The rules also provide the security context by mapping the behaviors to MITRE ATT&CK tactics and techniques, so that if the behavior was ill intended, you can understand the security context of that potential attack. |
| 46 | + |
| 47 | +The AI-generated rules are then validated in various ways to ensure that: |
| 48 | +- The intent, action, and entities are accurately captured and explained. |
| 49 | +- The volume of the behaviors this rule generates is above a defined threshold to provide the most value. |
| 50 | +- Sensitive data is protected. |
| 51 | + |
| 52 | +## What are the limitations of the UEBA behaviors layer? How can users minimize the impact? |
| 53 | + |
| 54 | +- **Limited data source coverage:** Currently supports CommonSecurityLogs and AWSCloudTrail. |
| 55 | +- **Dependence on log quality:** Incomplete or noisy logs can reduce accuracy. |
| 56 | +- **Preview feature:** Behavior schema and AI models might evolve. |
| 57 | +**Mitigation:** Ensure high-quality log ingestion, validate AI-generated queries, and use human review for critical detections. |
| 58 | + |
| 59 | + |
| 60 | +## What operational factors and settings allow for effective and responsible use of the feature? |
| 61 | + |
| 62 | +- **Enable supported connectors** for AWS and CommonSecurityLog sources. |
| 63 | +- **Review AI-generated outputs** before deploying detection rules. |
| 64 | +- **Monitor updates** as the feature expands to new sources and schemas. |
| 65 | + |
| 66 | +## See also |
| 67 | + |
| 68 | +- [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)](../sentinel/entity-behaviors-layer.md) |
0 commit comments