Skip to content

Commit f11bb22

Browse files
committed
Update entity-behaviors-layer.md
1 parent 781aa2a commit f11bb22

1 file changed

Lines changed: 9 additions & 1 deletion

File tree

articles/sentinel/entity-behaviors-layer.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,15 +27,19 @@ This article explains how the UEBA behaviors layer works, how to enable the beha
2727

2828
## How the UEBA behaviors layer works
2929

30-
Behaviors are part of Microsoft Sentinel’s [User and Entity Behavior Analytics (UEBA)](../sentinel/identify-threats-with-entity-behavior-analytics.md) capabilities, providing normalized, contextualized activity summaries that complement anomaly detection and enrich investigations. This table shows how behaviors differ from anomalies and alerts:
30+
Behaviors are part of Microsoft Sentinel’s [User and Entity Behavior Analytics (UEBA)](../sentinel/identify-threats-with-entity-behavior-analytics.md) capabilities, providing normalized, contextualized activity summaries that complement anomaly detection and enrich investigations.
3131

32+
### Differences between behaviors, anomalies, and alerts
33+
This table shows how behaviors differ from anomalies and alerts:
3234

3335
| **Capability** | **What it represents** | **Purpose** |
3436
|---------------|-------------------------|-------------|
3537
| **Anomalies** | Patterns that deviate from established baselines | Highlight unusual or suspicious activity |
3638
| **Alerts** | Signal a potential security issue requiring attention | Trigger incident response workflows |
3739
| **Behaviors** | Neutral, structured summaries of activity - normal or abnormal- based on time windows or triggers, enriched with MITRE ATT&CK mappings and entity roles | Provide context and clarity for investigations, hunting, and detection |
3840

41+
### Behavior types and records
42+
3943
When you [enable the UEBA behaviors layer](#enable-the-ueba-behaviors-layer), Microsoft Sentinel processes supported security logs you collect into your Sentinel workspace in near real-time and summarizes two types of behavioral patterns:
4044

4145
| **Behavior type** | **Description** | **Examples** | **Use case** |
@@ -52,6 +56,8 @@ Each behavior record includes:
5256
- **MITRE ATT&CK mapping**: Every behavior is tagged with relevant MITRE tactics and techniques, providing industry-standard context at a glance. You don't just see *what* happened, but also *how it fits* in an attack framework or timeline.
5357
- **Entity relationship mapping**: Each behavior identifies involved entities (users, hosts, IP addresses) and their roles (actor, target, or other).
5458

59+
### Behavior storage and tables
60+
5561
The UEBA behaviors layer stores behavior records in two types of tables:
5662

5763
- A *behavior information* table, which contains the behavior title, description, MITRE mappings, categories, and links to raw logs, and
@@ -61,6 +67,8 @@ These tables integrate seamlessly with your existing workflows for detection rul
6167

6268
For information about using behaviors tables, see [Best practices and troubleshooting tips for querying behaviors](#best-practices-and-troubleshooting-tips-for-querying-behaviors).
6369

70+
### Data flow diagram
71+
6472
This diagram illustrates how the UEBA behaviors layer transform raw logs into structured behavior records that enhance security operations:
6573

6674
:::image type="content" source="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" alt-text="Diagram that shows how the UEBA behaviors layer transform raw logs into structured behavior records that enhance security operations." lightbox="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" :::

0 commit comments

Comments
 (0)