Skip to content

Commit bea0c5e

Browse files
authored
Merge pull request #311179 from guywi-ms/wi-444136-ueba-docs-improvements-cxe
Wi 444136 ueba docs improvements cxe
2 parents 4b703ee + 1709e83 commit bea0c5e

16 files changed

Lines changed: 182 additions & 161 deletions

articles/sentinel/TOC.yml

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -316,17 +316,26 @@
316316
href: /defender-xdr/custom-detection-rules?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
317317
- name: Manage detection rules
318318
href: /defender-xdr/custom-detection-manage?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
319+
- name: User and Entity Behavior Analytics (UEBA)
320+
items:
321+
- name: UEBA overview
322+
href: identify-threats-with-entity-behavior-analytics.md
323+
displayName: User and Entity Behavior Analytics
324+
- name: Enable UEBA
325+
href: enable-entity-behavior-analytics.md
326+
- name: UEBA investigation examples
327+
href: investigate-with-ueba.md
328+
- name: Aggregate behavioral insights from raw logs
329+
href: entity-behaviors-layer.md
330+
- name: UEBA data sources and table schemas
331+
href: ueba-reference.md
319332
- name: Data classification with entities
320333
items:
321334
- name: Overview
322335
href: entities.md
323336
displayName: data classification, entities
324337
- name: Entity pages
325338
href: entity-pages.md
326-
- name: User and entity behavior analytics (UEBA)
327-
href: identify-threats-with-entity-behavior-analytics.md
328-
- name: Aggregate behavioral insights from raw logs
329-
href: entity-behaviors-layer.md
330339
- name: Create custom entity activities
331340
href: customize-entity-activities.md
332341
- name: Watchlists
@@ -412,8 +421,6 @@
412421
displayName: close incidents, search incidents, comment on incidents
413422
- name: Investigate incidents in depth
414423
href: investigate-incidents.md
415-
- name: Tutorial - Investigate with UEBA
416-
href: investigate-with-ueba.md
417424
- name: Relate alerts to incidents
418425
href: relate-alerts-to-incidents.md
419426
- name: Create incidents manually

articles/sentinel/anomalies-reference.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,21 @@ In the [Anomalies](/azure/azure-monitor/reference/tables/anomalies) table:
3232
> - Domain generation algorithm (DGA) on DNS domains
3333
> - Potential domain generation algorithm (DGA) on next-level DNS Domains
3434
35-
[!INCLUDE [unified-soc-preview](includes/unified-soc-preview.md)]
35+
## Compare UEBA and machine learning-based anomalies
36+
37+
UEBA and machine learning (ML) -based anomalies are complementary approaches to anomaly detection. Both populate the `Anomalies` table but serve different purposes:
38+
39+
| Aspect | UEBA anomalies | ML anomaly detection rules |
40+
|--------|----------------|----------------------------|
41+
| **Focus** | *Who* is behaving unusually | *What* activity is unusual |
42+
| **Detection approach** | Entity-focused behavioral baselines compared against historical activity, peer behavior, and organization-wide patterns | Customizable rule templates using statistical and ML models trained on specific data patterns |
43+
| **Baseline source** | Each entity's own history, peer group, and organization | Training period (typically 7-21 days) on specific event types |
44+
| **Customization** | Enabled/disabled using UEBA settings | Tunable thresholds and parameters using the analytics rule UI |
45+
| **Examples** | Anomalous sign-in, anomalous account creation, anomalous privilege modification | Attempted brute force, excessive downloads, network beaconing |
46+
47+
For more information, see:
48+
- [UEBA overview](identify-threats-with-entity-behavior-analytics.md)
49+
- [Customizable ML anomaly detection rules](soc-ml-anomalies.md)
3650

3751
## UEBA anomalies
3852

@@ -667,7 +681,5 @@ Microsoft Sentinel's customizable, machine learning-based anomalies can identify
667681
## Next steps
668682

669683
- Learn about [machine learning-generated anomalies](soc-ml-anomalies.md) in Microsoft Sentinel.
670-
671684
- Learn how to [work with anomaly rules](work-with-anomaly-rules.md).
672-
673685
- [Investigate incidents](investigate-cases.md) with Microsoft Sentinel.

articles/sentinel/enable-entity-behavior-analytics.md

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -122,15 +122,24 @@ To enable UEBA from your Microsoft Sentinel workspace settings:
122122

123123
For more information about configuring Microsoft Sentinel data connectors, see [Connect data sources to Microsoft Sentinel by using data connectors](./configure-data-connector.md).
124124

125+
## Install the UEBA Essentials solution (optional)
126+
127+
The **UEBA Essentials** solution is a collection of dozens of pre-built hunting queries curated and maintained by Microsoft security experts. The solution includes multi-cloud anomaly detection queries across Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), and Okta.
128+
129+
Install the solution to get started quickly with threat hunting and investigations using UEBA data, instead of building these detection capabilities from scratch.
130+
131+
For more information, see [Install or update Microsoft Sentinel solutions](sentinel-solutions-deploy.md#install-or-update-content).
132+
125133
## Enable the UEBA behaviors layer (Preview)
126134

127-
The UEBA behaviors layer generates enriched summaries of activity observed across multiple data sources. Unlike alerts or anomalies, behaviors don’t necessarily indicate risk - they create an abstraction layer that optimizes your data for investigations, hunting, and detection by enhancing
135+
The UEBA behaviors layer generates enriched summaries of activity observed across multiple data sources. Unlike alerts or anomalies, behaviors don’t necessarily indicate risk - they create an abstraction layer that optimizes your data for investigations, hunting, and detection by enhancing clarity, context, and correlation.
128136

129137
For more information about the UEBA behaviors layer and how to enable it, see [Enable the UEBA behaviors layer in Microsoft Sentinel](../sentinel/entity-behaviors-layer.md).
130138

139+
131140
## Next steps
132141

133-
In this article, you learned how to enable and configure User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel. For more information about UEBA:
142+
Learn how to investigate UEBA anomalies and use UEBA data in your investigations:
134143

135-
> [!div class="nextstepaction"]
136-
>>[Identify threats with UEBA](./identify-threats-with-entity-behavior-analytics.md)
144+
- [Investigate incidents with UEBA data](investigate-with-ueba.md)
145+
- [UEBA data sources and table schemas](ueba-reference.md)

articles/sentinel/entity-behaviors-layer.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)
2+
title: Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel
33
description: The Microsoft Sentinel UEBA behaviors layer translates security telemetry into normalized behavioral patterns for investigation, hunting, and detection engineering.
44
author: guywi-ms
55
ms.author: guywild
@@ -10,7 +10,7 @@ ms.service: microsoft-sentinel
1010
#Customer intent: As a security analyst, I want to use the UEBA behaviors layer to translate raw security telemetry into human-readable patterns with MITRE ATT&CK context for faster threat detection and investigation.
1111
---
1212

13-
# Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel (Preview)
13+
# Translate raw security logs to behavioral insights using UEBA behaviors in Microsoft Sentinel
1414

1515
The User and Entity Behavior Analytics (UEBA) behavior layer in Microsoft Sentinel aggregates and summarizes high-volume raw logs into clear, plain-language patterns of security actions, explaining “who did what to whom” in a structured way.
1616

@@ -25,6 +25,8 @@ This abstraction layer enables faster threat detection, investigation, and respo
2525

2626
This article explains how the UEBA behaviors layer works, how to enable the behaviors layer, and how to use behaviors to enhance security operations.
2727

28+
Watch the [UEBA behaviors webinar](https://www.youtube.com/watch?v=SqbxmGdMP7c) for a full overview and demo of the UEBA behaviors layer.
29+
2830
## How the UEBA behaviors layer works
2931

3032
Behaviors are part of Microsoft Sentinel’s [User and Entity Behavior Analytics (UEBA)](../sentinel/identify-threats-with-entity-behavior-analytics.md) capabilities, providing normalized, contextualized activity summaries that complement anomaly detection and enrich investigations.
@@ -189,7 +191,7 @@ Behaviors simplify rule logic by providing normalized, high‑quality signals wi
189191
The list of supported data sources and vendors or services that send logs to these data sources is evolving.
190192
The UEBA behaviors layer automatically aggregates insights for all supported vendors based on the logs you collect.
191193
192-
During public preview, the UEBA behaviors layer focuses on these non-Microsoft data sources that traditionally lack easy behavioral context in Microsoft Sentinel:
194+
The UEBA behaviors layer currently focuses on these non-Microsoft data sources that traditionally lack easy behavioral context in Microsoft Sentinel:
193195
194196
| Data source | Supported vendors, services, and logs | Connector | Supported behaviors |
195197
|-------------|---------------------------|-------|----------------|
@@ -241,13 +243,13 @@ To enable the UEBA behaviors layer in your workspace:
241243
1. Select **Connect**.
242244
243245
> [!IMPORTANT]
244-
> During public preview, you can only enable behaviors in a single workspace in your tenant.
246+
> You can currently enable behaviors in a single workspace in your tenant.
245247
246248
## Pricing model
247249
248250
Using the UEBA behaviors layer results in the following costs:
249251
250-
- **No extra license cost:** Behaviors are included as part of Microsoft Sentinel (currently in preview). You don’t need a separate SKU, UEBA add‑on, or additional licensing. If your workspace is connected to Sentinel and onboarded to the Defender portal, you can use behaviors at no extra feature cost.
252+
- **No extra license cost:** Behaviors are included as part of Microsoft Sentinel. You don’t need a separate SKU, UEBA add‑on, or additional licensing. If your workspace is connected to Sentinel and onboarded to the Defender portal, you can use behaviors at no extra feature cost.
251253
252254
- **Log data ingestion charges:** Behavior records are stored in the `SentinelBehaviorInfo` and `SentinelBehaviorEntities` tables in your Sentinel workspace. Each behavior contributes to your workspace’s data ingestion volume and is billed at your existing Log Analytics/Sentinel ingestion rate. Behaviors are additive - they don’t replace your existing raw logs.
253255
@@ -323,9 +325,9 @@ For more information about Kusto Query Language (KQL), see [Kusto query language
323325
- **I see fewer behaviors than expected**: Our coverage of supported behavior types is partial and growing. For more information, see [Supported data sources and behaviors](#supported-data-sources-and-behaviors). The UEBA behaviors layer might also not be able to detect a behavior pattern if there are very few instances of a specific behavior type.
324326
- **Behavior counts**: A single behavior might represent tens or hundreds of raw events - this is designed to reduce noise.
325327

326-
## Limitations in public preview
328+
## Limitations
327329

328-
These limitations apply during the public preview of the UEBA behaviors layer:
330+
These limitations currently apply to the UEBA behaviors layer:
329331

330332
- You can enable behaviors on a single Sentinel workspace per tenant.
331333
- The UEBA behaviors layer generates behaviors for a limited set of [supported data sources and vendors or services](#supported-data-sources-and-behaviors).

articles/sentinel/feature-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ For more information, see [Microsoft Defender XDR for US Government customers](/
188188
|[Entity pages](entity-pages.md) |GA |Yes |Yes |Yes |
189189
|[Identity info table data ingestion](investigate-with-ueba.md) |GA |Yes |Yes |Yes |
190190
|[IoT device entity page](/azure/defender-for-iot/organizations/iot-advanced-threat-monitoring#investigate-further-with-iot-device-entities) |Public preview |Yes |Yes |No |
191-
|[Peer/Blast radius enrichments](identify-threats-with-entity-behavior-analytics.md#what-is-ueba) |Public preview |Yes |No |No |
191+
|[Peer/Blast radius enrichments](identify-threats-with-entity-behavior-analytics.md#how-ueba-works) |Public preview |Yes |No |No |
192192
|[SOC-ML anomalies](soc-ml-anomalies.md#what-are-customizable-anomalies) |GA |Yes |Yes |No |
193193
|[UEBA anomalies](soc-ml-anomalies.md#ueba-anomalies) |GA |Yes |Yes |No |
194194
|[UEBA enrichments\insights](investigate-with-ueba.md) |GA |Yes |Yes |Yes |

0 commit comments

Comments
 (0)