Skip to content

Commit b3205e9

Browse files
Merge pull request #305290 from guywi-ms/ueba-what's-new
Update Sentinel whats-new.md with UEBA data sources
2 parents 01be5e5 + b1dc888 commit b3205e9

1 file changed

Lines changed: 40 additions & 0 deletions

File tree

articles/sentinel/whats-new.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,46 @@ The listed features were released in the last six months. For information about
1818

1919
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2020

21+
## September 2025
22+
23+
- [New data sources and enhanced User and Entity Behavior Analytics (UEBA) (Preview)](#new-data-sources-for-enhanced-user-and-entity-behavior-analytics-ueba-preview)
24+
25+
### New data sources for enhanced User and Entity Behavior Analytics (UEBA) (Preview)
26+
27+
Microsoft Sentinel's UEBA empowers SOC teams with AI-powered anomaly detection based on behavioral signals in your tenant. It helps prioritize threats using dynamic baselines, peer comparisons, and enriched entity profiles.
28+
29+
UEBA now supports anomaly detection using six new data sources:
30+
31+
- **Microsoft authentication sources**:
32+
33+
These sources provide deeper visibility into identity behavior across your Microsoft environment.
34+
35+
- **Microsoft Defender XDR device logon events**: Capture logon activity from endpoints, helping identify lateral movement, unusual access patterns, or compromised devices.
36+
- **Microsoft Entra ID managed identity signin logs**: Track sign-ins by managed identities used in automation, such as scripts and services. This is crucial for spotting silent misuse of service identities.
37+
- **Microsoft Entra ID service principal signin logs**: Monitor sign-ins by service principals - often used by apps or scripts - to detect anomalies, such as unexpected access or privilege escalation.
38+
39+
- **Third-party cloud and identity management platforms**:
40+
41+
UEBA now integrates with leading cloud and identity management platforms to enhance detection of identity compromise, privilege misuse, and risky access behaviors across multicloud environments.
42+
43+
- **AWS CloudTrail login events**: Flag risky login attempts in Amazon Web Services (AWS), such as failed multifactor authentication (MFA) or use of the root account—critical indicators of potential account compromise.
44+
- **GCP audit logs - Failed IAM access events**: Capture denied access attempts in Google Cloud Platform, helping identify privilege escalation attempts or misconfigured roles.
45+
- **Okta MFA and authentication security change events**: Surface MFA challenges and changes to authentication policies in Okta—signals that might indicate targeted attacks or identity tampering.
46+
47+
These new sources enhance UEBA’s ability to detect threats across Microsoft and hybrid environments based on enriched user, device, and service identity data, enhanced behavioral context, and new cross-platform anomaly detection capabilities.
48+
49+
To enable the new data sources, you must be onboarded to the Defender portal.
50+
51+
52+
For more information, see:
53+
54+
- [Microsoft Sentinel’s AI-driven UEBA ushers in the next era of behavioral analytics](https://techcommunity.microsoft.com/blog/microsoftsentinelblog/microsoft-sentinel%E2%80%99s-ai-driven-ueba-ushers-in-the-next-era-of-behavioral-analyti/4448390)
55+
- [Advanced threat detection with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](./identify-threats-with-entity-behavior-analytics.md)
56+
- [Enable User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](./enable-entity-behavior-analytics.md)
57+
- [Microsoft Sentinel UEBA reference](ueba-reference.md)
58+
- [UEBA anomalies](./anomalies-reference.md#ueba-anomalies)
59+
60+
2161
## August 2025
2262

2363
- [Edit workbooks directly in the Microsoft Defender portal](#edit-workbooks-directly-in-the-microsoft-defender-portal-preview)

0 commit comments

Comments
 (0)