Skip to content

Commit 968a81e

Browse files
authored
Merge pull request #309883 from guywi-ms/sentinel-behaviors
Sentinel behaviors
2 parents d33bdc3 + f22f5a2 commit 968a81e

11 files changed

Lines changed: 417 additions & 1 deletion

articles/sentinel/TOC.yml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -325,12 +325,14 @@
325325
href: entity-pages.md
326326
- name: User and entity behavior analytics (UEBA)
327327
href: identify-threats-with-entity-behavior-analytics.md
328+
- name: Aggregate behavioral insights from raw logs
329+
href: entity-behaviors-layer.md
328330
- name: Create custom entity activities
329331
href: customize-entity-activities.md
330332
- name: Watchlists
331333
items:
332334
- name: Overview
333-
href: watchlists.md
335+
href: watchlists.md
334336
- name: Create watchlists
335337
href: watchlists-create.md
336338
- name: Build queries or rules
@@ -1039,6 +1041,12 @@
10391041
href: stix-objects-api.md
10401042
- name: Legacy upload indicator API reference
10411043
href: upload-indicators-api.md
1044+
- name: Responsible AI
1045+
items:
1046+
- name: Responsible AI FAQ for UEBA behaviors layer
1047+
href: entity-behaviors-layer-rai-faqs.md
1048+
- name: Responsible AI FAQ for Microsoft Sentinel MCP
1049+
href: datalake/sentinel-mcp-responsible-ai-faq.md
10421050
- name: Microsoft Sentinel blog
10431051
href: https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/bg-p/MicrosoftSentinelBlog
10441052
- name: Pricing

articles/sentinel/enable-entity-behavior-analytics.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121,6 +121,12 @@ To enable UEBA from your Microsoft Sentinel workspace settings:
121121

122122
For more information about configuring Microsoft Sentinel data connectors, see [Connect data sources to Microsoft Sentinel by using data connectors](./configure-data-connector.md).
123123

124+
## Enable the UEBA behaviors layer (Preview)
125+
126+
The UEBA behaviors layer generates enriched summaries of activity observed across multiple data sources. Unlike alerts or anomalies, behaviors don’t necessarily indicate risk - they create an abstraction layer that optimizes your data for investigations, hunting, and detection by enhancing
127+
128+
For more information about the UEBA behaviors layer and how to enable it, see [Enable the UEBA behaviors layer in Microsoft Sentinel](../sentinel/entity-behaviors-layer.md).
129+
124130
## Next steps
125131

126132
In this article, you learned how to enable and configure User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel. For more information about UEBA:
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: Responsible AI FAQ for the Microsoft Sentinel UEBA behaviors layer
3+
description: This FAQ provides information about the AI technology used in the Microsoft Sentinel UEBA behaviors layer, along with key considerations and details about how AI is used, how it was tested and evaluated, and any specific limitations.
4+
ms.date: 01/11/2026
5+
ms.custom:
6+
- responsible-ai-faqs
7+
ms.topic: contributor-guide
8+
author: guywi-ms
9+
ms.author: guywild
10+
ms.reviewer: mschechter
11+
---
12+
13+
# Responsible AI FAQ for the Microsoft Sentinel UEBA behaviors layer
14+
15+
These frequently asked questions (FAQ) describe the AI impact of the [UEBA behaviors layer](../sentinel/entity-behaviors-layer.md) feature in Microsoft Sentinel.
16+
17+
18+
## What is the UEBA behaviors layer?
19+
20+
The UEBA behaviors layer is an AI-powered capability in Microsoft Sentinel that transforms fragmented raw logs into contextualized behavioral insights that explain "who did what to whom".
21+
22+
- **Inputs:** Raw security logs from sources, such as the AWS CloudTrail and CommonSecurityLog tables.
23+
- **Outputs:** Structured behavior objects enriched with MITRE ATT&CK mappings, entity roles, and natural language explanations.
24+
25+
## What are the capabilities of the UEBA behaviors layer?
26+
27+
The UEBA behaviors layer provides these key capabilities:
28+
- **Behavior aggregation:** Automatically groups and sequences related security events across multiple data sources. Instead of analysts manually correlating raw logs, the behaviors layer creates unified behavior objects that present "what happened" in a structured way.
29+
30+
- **Contextualization:** Each behavior is enriched with security context, including mapping to MITRE ATT&CK tactics and techniques. This helps analysts understand the intent behind an activity - for example, lateral movement, privilege escalation - without needing deep familiarity with every log format.
31+
32+
- **Explainability:** Generates natural language summaries of behaviors, making investigations faster and more accessible. Analysts can quickly see what happened and why it matters.
33+
34+
## What is the intended use of the UEBA behaviors layer?
35+
36+
The intended use is to accelerate threat detection and investigation by providing SOC analysts with a unified, AI-driven view of behaviors. It supports:
37+
38+
- Threat hunting
39+
- Detection rule authoring at using large language models (LLMs)
40+
- Incident investigation and triage
41+
42+
43+
## How was the UEBA behaviors layer evaluated? What metrics are used to measure performance?
44+
45+
Our AI mechanisms generate behavior rules based on samples logs. The behavior rules use aggregation and sequencing of raw logs to reflect the intent and action behind those logs. The rules also provide the security context by mapping the behaviors to MITRE ATT&CK tactics and techniques, so that if the behavior was ill intended, you can understand the security context of that potential attack.
46+
47+
The AI-generated rules are then validated in various ways to ensure that:
48+
- The intent, action, and entities are accurately captured and explained.
49+
- The volume of the behaviors this rule generates is above a defined threshold to provide the most value.
50+
- Sensitive data is protected.
51+
52+
## What are the limitations of the UEBA behaviors layer? How can users minimize the impact?
53+
54+
- **Limited data source coverage:** Currently supports CommonSecurityLogs and AWSCloudTrail.
55+
- **Dependence on log quality:** Incomplete or noisy logs can reduce accuracy.
56+
- **Preview feature:** Behavior schema and AI models might evolve.
57+
**Mitigation:** Ensure high-quality log ingestion, validate AI-generated queries, and use human review for critical detections.
58+
59+
60+
## What operational factors and settings allow for effective and responsible use of the feature?
61+
62+
- **Enable supported connectors** for AWS and CommonSecurityLog sources.
63+
- **Review AI-generated outputs** before deploying detection rules.
64+
- **Monitor updates** as the feature expands to new sources and schemas.
65+
66+
## See also
67+
68+
- [Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)](../sentinel/entity-behaviors-layer.md)

0 commit comments

Comments
 (0)