You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/configure-data-connector.md
+9-3Lines changed: 9 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
title: Connect Data Sources to Microsoft Sentinel Using Data Connectors
2
+
title: Connect data sources to Microsoft Sentinel by using data connectors
3
3
description: Learn how to connect data sources to Microsoft Sentinel using data connectors for improved threat detection.
4
-
author: batamig
4
+
author: EdB-MSFT
5
5
ms.topic: how-to
6
6
ms.date: 07/09/2025
7
-
ms.author: bagol
7
+
ms.author: edbaynash
8
8
appliesto:
9
9
- Microsoft Sentinel in the Microsoft Defender portal
10
10
- Microsoft Sentinel in the Azure portal
@@ -90,6 +90,12 @@ After you configure the data connector, it might take some time for the data to
90
90
91
91
:::image type="content" source="media/configure-data-connector/connected-data-connector.png" alt-text="Screenshot of a data connector page with status connected and graph that shows the data received.":::
92
92
93
+
## Enable User and Entity Behavior Analytics (UEBA) from supported connectors
94
+
95
+
[User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel](identify-threats-with-entity-behavior-analytics.md) analyzes logs and alerts from connected data sources to build baseline behavioral profiles of your organization's entities—such as users, hosts, IP addresses, and applications. Using machine learning, UEBA identifies anomalous activity that may indicate a compromised asset.
Copy file name to clipboardExpand all lines: articles/sentinel/enable-entity-behavior-analytics.md
+18-8Lines changed: 18 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,9 +18,16 @@ ms.custom: sfi-image-nochange
18
18
19
19
# Enable User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel
20
20
21
-
In the previous deployment step, you enabled the Microsoft Sentinel security content you need to protect your systems. In this article, you learn how to enable and use the UEBA feature to streamline the analysis process. This article is part of the [Deployment guide for Microsoft Sentinel](deploy-overview.md).
21
+
User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel analyzes logs and alerts from connected data sources to build baseline behavioral profiles of your organization's entities—such as users, hosts, IP addresses, and applications. Using machine learning, UEBA identifies anomalous activity that may indicate a compromised asset.
22
22
23
-
As Microsoft Sentinel collects logs and alerts from all of its connected data sources, it analyzes them and builds baseline behavioral profiles of your organization’s entities (such as users, hosts, IP addresses, and applications) across time and peer group horizon. Using various techniques and machine learning capabilities, Microsoft Sentinel can then identify anomalous activity and help you determine whether an asset is compromised. Learn more about [UEBA](identify-threats-with-entity-behavior-analytics.md).
23
+
You can enable User and Entity Behavior Analytics in two ways, both with the same result:
24
+
25
+
-**From the Microsoft Sentinel workspace settings**: Enable UEBA for your workspace and select which data sources to connect in the Microsoft Defender portal or Azure portal.
26
+
-**From supported data connectors**: Enable UEBA when you configure UEBA supported data connectors in the Microsoft Defender portal.
27
+
28
+
This article explains how to enable UEBA and configure data sources from your Microsoft Sentinel workspace settings and from supported data connectors.
29
+
30
+
For more information about UEBA, see [Identify threats with entity behavior analytics](identify-threats-with-entity-behavior-analytics.md).
@@ -41,14 +48,12 @@ To enable or disable this feature (these prerequisites aren't required to use th
41
48
> - No special license is required to add UEBA functionality to Microsoft Sentinel, and there's no extra cost for using it.
42
49
> - However, since UEBA generates new data and stores it in new tables that UEBA creates in your Log Analytics workspace, **additional data storage charges** apply.
43
50
44
-
## How to enable User and Entity Behavior Analytics
51
+
## Enable UEBA from workspace settings
45
52
46
-
- Users of Microsoft Sentinel in the Azure portal, follow the instructions in the **Azure portal** tab.
47
-
- Users of Microsoft Sentinel as part of the Microsoft Defender portal, follow the instructions in the **Defender portal** tab.
53
+
To enable UEBA from your Microsoft Sentinel workspace settings:
48
54
49
55
1. Go to the **Entity behavior configuration** page.
50
56
51
-
52
57
# [Azure portal](#tab/azure)
53
58
54
59
Use any one of these three ways to get to the **Entity behavior configuration** page:
@@ -71,7 +76,7 @@ To enable or disable this feature (these prerequisites aren't required to use th
71
76
72
77
1. On the **Entity behavior configuration** page, toggle on **Turn on UEBA feature**.
73
78
74
-
:::image type="content" source="media/enable-entity-behavior-analytics/ueba-configuration.png" alt-text="Screenshot of UEBA configuration settings." lightbox="media/enable-entity-behavior-analytics/ueba-configuration.png":::
79
+
:::image type="content" source="media/enable-entity-behavior-analytics/entity-behavior-analytics-configuration.png" alt-text="Screenshot of UEBA configuration settings." lightbox="media/enable-entity-behavior-analytics/entity-behavior-analytics-configuration.png":::
75
80
76
81
1. Select the directory services from which you want to synchronize user entities with Microsoft Sentinel.
77
82
@@ -104,12 +109,17 @@ To enable or disable this feature (these prerequisites aren't required to use th
104
109
105
110
1. Select **Connect**.
106
111
107
-
1. Enable anomaly detection in your Sentinel workspace:
112
+
1. Enable anomaly detection in your Microsoft Sentinel workspace:
108
113
109
114
1. From the Microsoft Defender portal navigation menu, select **Settings** > **Microsoft Sentinel** > **SIEM workspaces**.
110
115
1. Select the workspace you want to configure.
111
116
1. From the workspace configuration page, select **Anomalies** and toggle on **Detect Anomalies**.
For more information about configuring Microsoft Sentinel data connectors, see [Connect data sources to Microsoft Sentinel by using data connectors](./configure-data-connector.md).
title: Enable UEBA from supported data connectors in Microsoft Defender portal
3
+
ms.date: 12/17/2025
4
+
ms.topic: include
5
+
---
6
+
7
+
<!-- docutune:disable -->
8
+
9
+
To enable UEBA from supported data connectors in Microsoft Defender portal:
10
+
11
+
1. From the Microsoft Defender portal navigation menu, select **Microsoft Sentinel > Configuration > Data connectors**.
12
+
1. Select a UEBA supported data connector that supports UEBA. For more information about UEBA supported data connectors and tables, see [Microsoft Sentinel UEBA reference](./../ueba-reference.md#ueba-data-sources).
13
+
1. From the data connector pane, select **Open connector page**.
14
+
1. On the **Connector details** page, select **Advanced options**.
15
+
1. Under **Configure UEBA**, toggle on the tables you want to enable for UEBA.
16
+
17
+
:::image type="content" source="../media/enable-entity-behavior-analytics/entity-behavior-analytics-data-connector.png" alt-text="Screenshot of UEBA configuration in data connector." lightbox="../media/enable-entity-behavior-analytics/entity-behavior-analytics-data-connector.png":::
0 commit comments