You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Compare UEBA and machine learning-based anomalies
36
+
37
+
UEBA and machine learning (ML) -based anomalies are complementary approaches to anomaly detection. Both populate the `Anomalies` table but serve different purposes:
|**Focus**|*Who* is behaving unusually |*What* activity is unusual |
42
+
|**Detection approach**| Entity-focused behavioral baselines compared against historical activity, peer behavior, and organization-wide patterns | Customizable rule templates using statistical and ML models trained on specific data patterns |
43
+
|**Baseline source**| Each entity's own history, peer group, and organization | Training period (typically 7-21 days) on specific event types |
44
+
|**Customization**| Enabled/disabled using UEBA settings | Tunable thresholds and parameters using the analytics rule UI |
Copy file name to clipboardExpand all lines: articles/sentinel/enable-entity-behavior-analytics.md
+13-4Lines changed: 13 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,15 +122,24 @@ To enable UEBA from your Microsoft Sentinel workspace settings:
122
122
123
123
For more information about configuring Microsoft Sentinel data connectors, see [Connect data sources to Microsoft Sentinel by using data connectors](./configure-data-connector.md).
124
124
125
+
## Install the UEBA Essentials solution (optional)
126
+
127
+
The **UEBA Essentials** solution is a collection of dozens of pre-built hunting queries curated and maintained by Microsoft security experts. The solution includes multi-cloud anomaly detection queries across Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and Okta.
128
+
129
+
Install the solution to get started quickly with threat hunting and investigations using UEBA data, instead of building these detection capabilities from scratch.
130
+
131
+
For more information, see [Install or update Microsoft Sentinel solutions](sentinel-solutions-deploy.md#install-or-update-content).
132
+
125
133
## Enable the UEBA behaviors layer (Preview)
126
134
127
-
The UEBA behaviors layer generates enriched summaries of activity observed across multiple data sources. Unlike alerts or anomalies, behaviors don’t necessarily indicate risk - they create an abstraction layer that optimizes your data for investigations, hunting, and detection by enhancing
135
+
The UEBA behaviors layer generates enriched summaries of activity observed across multiple data sources. Unlike alerts or anomalies, behaviors don’t necessarily indicate risk - they create an abstraction layer that optimizes your data for investigations, hunting, and detection by enhancing clarity, context, and correlation.
128
136
129
137
For more information about the UEBA behaviors layer and how to enable it, see [Enable the UEBA behaviors layer in Microsoft Sentinel](../sentinel/entity-behaviors-layer.md).
130
138
139
+
131
140
## Next steps
132
141
133
-
In this article, you learned how to enable and configure User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel. For more information about UEBA:
142
+
Learn how to investigate UEBA anomalies and use UEBA data in your investigations:
134
143
135
-
> [!div class="nextstepaction"]
136
-
>>[Identify threats with UEBA](./identify-threats-with-entity-behavior-analytics.md)
144
+
-[Investigate incidents with UEBA data](investigate-with-ueba.md)
145
+
-[UEBA data sources and table schemas](ueba-reference.md)
Copy file name to clipboardExpand all lines: articles/sentinel/entity-behaviors-layer.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)
2
+
title: Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel
3
3
description: The Microsoft Sentinel UEBA behaviors layer translates security telemetry into normalized behavioral patterns for investigation, hunting, and detection engineering.
4
4
author: guywi-ms
5
5
ms.author: guywild
@@ -10,7 +10,7 @@ ms.service: microsoft-sentinel
10
10
#Customer intent: As a security analyst, I want to use the UEBA behaviors layer to translate raw security telemetry into human-readable patterns with MITRE ATT&CK context for faster threat detection and investigation.
11
11
---
12
12
13
-
# Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)
13
+
# Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel
14
14
15
15
The User and Entity Behavior Analytics (UEBA) behavior layer in Microsoft Sentinel aggregates and summarizes high-volume raw logs into clear, plain-language patterns of security actions, explaining “who did what to whom” in a structured way.
16
16
@@ -25,6 +25,8 @@ This abstraction layer enables faster threat detection, investigation, and respo
25
25
26
26
This article explains how the UEBA behaviors layer works, how to enable the behaviors layer, and how to use behaviors to enhance security operations.
27
27
28
+
Watch the [UEBA behaviors webinar](https://www.youtube.com/watch?v=SqbxmGdMP7c) for a full overview and demo of the UEBA behaviors layer.
29
+
28
30
## How the UEBA behaviors layer works
29
31
30
32
Behaviors are part of Microsoft Sentinel’s [User and Entity Behavior Analytics (UEBA)](../sentinel/identify-threats-with-entity-behavior-analytics.md) capabilities, providing normalized, contextualized activity summaries that complement anomaly detection and enrich investigations.
@@ -189,7 +191,7 @@ Behaviors simplify rule logic by providing normalized, high‑quality signals wi
189
191
The list of supported data sources and vendors or services that send logs to these data sources is evolving.
190
192
The UEBA behaviors layer automatically aggregates insights for all supported vendors based on the logs you collect.
191
193
192
-
During public preview, the UEBA behaviors layer focuses on these non-Microsoft data sources that traditionally lack easy behavioral context in Microsoft Sentinel:
194
+
The UEBA behaviors layer currently focuses on these non-Microsoft data sources that traditionally lack easy behavioral context in Microsoft Sentinel:
193
195
194
196
| Data source | Supported vendors, services, and logs | Connector | Supported behaviors |
@@ -241,13 +243,13 @@ To enable the UEBA behaviors layer in your workspace:
241
243
1. Select **Connect**.
242
244
243
245
> [!IMPORTANT]
244
-
> During public preview, you can only enable behaviors in a single workspace in your tenant.
246
+
> You can currently enable behaviors in a single workspace in your tenant.
245
247
246
248
## Pricing model
247
249
248
250
Using the UEBA behaviors layer results in the following costs:
249
251
250
-
- **No extra license cost:** Behaviors are included as part of Microsoft Sentinel (currently in preview). You don’t need a separate SKU, UEBA add‑on, or additional licensing. If your workspace is connected to Sentinel and onboarded to the Defender portal, you can use behaviors at no extra feature cost.
252
+
- **No extra license cost:** Behaviors are included as part of Microsoft Sentinel. You don’t need a separate SKU, UEBA add‑on, or additional licensing. If your workspace is connected to Sentinel and onboarded to the Defender portal, you can use behaviors at no extra feature cost.
251
253
252
254
- **Log data ingestion charges:** Behavior records are stored in the `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables in your Sentinel workspace. Each behavior contributes to your workspace’s data ingestion volume and is billed at your existing Log Analytics/Sentinel ingestion rate. Behaviors are additive - they don’t replace your existing raw logs.
253
255
@@ -323,9 +325,9 @@ For more information about Kusto Query Language (KQL), see [Kusto query language
323
325
-**I see fewer behaviors than expected**: Our coverage of supported behavior types is partial and growing. For more information, see [Supported data sources and behaviors](#supported-data-sources-and-behaviors). The UEBA behaviors layer might also not be able to detect a behavior pattern if there are very few instances of a specific behavior type.
324
326
-**Behavior counts**: A single behavior might represent tens or hundreds of raw events - this is designed to reduce noise.
325
327
326
-
## Limitations in public preview
328
+
## Limitations
327
329
328
-
These limitations apply during the public preview of the UEBA behaviors layer:
330
+
These limitations currently apply to the UEBA behaviors layer:
329
331
330
332
- You can enable behaviors on a single Sentinel workspace per tenant.
331
333
- The UEBA behaviors layer generates behaviors for a limited set of [supported data sources and vendors or services](#supported-data-sources-and-behaviors).
0 commit comments