You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/entity-behaviors-layer.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,15 +27,19 @@ This article explains how the UEBA behaviors layer works, how to enable the beha
27
27
28
28
## How the UEBA behaviors layer works
29
29
30
-
Behaviors are part of Microsoft Sentinel’s [User and Entity Behavior Analytics (UEBA)](../sentinel/identify-threats-with-entity-behavior-analytics.md) capabilities, providing normalized, contextualized activity summaries that complement anomaly detection and enrich investigations. This table shows how behaviors differ from anomalies and alerts:
30
+
Behaviors are part of Microsoft Sentinel’s [User and Entity Behavior Analytics (UEBA)](../sentinel/identify-threats-with-entity-behavior-analytics.md) capabilities, providing normalized, contextualized activity summaries that complement anomaly detection and enrich investigations.
31
31
32
+
### Differences between behaviors, anomalies, and alerts
33
+
This table shows how behaviors differ from anomalies and alerts:
32
34
33
35
|**Capability**|**What it represents**|**Purpose**|
|**Anomalies**| Patterns that deviate from established baselines | Highlight unusual or suspicious activity |
36
38
|**Alerts**| Signal a potential security issue requiring attention | Trigger incident response workflows |
37
39
|**Behaviors**| Neutral, structured summaries of activity - normal or abnormal- based on time windows or triggers, enriched with MITRE ATT&CK mappings and entity roles | Provide context and clarity for investigations, hunting, and detection |
38
40
41
+
### Behavior types and records
42
+
39
43
When you [enable the UEBA behaviors layer](#enable-the-ueba-behaviors-layer), Microsoft Sentinel processes supported security logs you collect into your Sentinel workspace in near real-time and summarizes two types of behavioral patterns:
-**MITRE ATT&CK mapping**: Every behavior is tagged with relevant MITRE tactics and techniques, providing industry-standard context at a glance. You don't just see *what* happened, but also *how it fits* in an attack framework or timeline.
53
57
-**Entity relationship mapping**: Each behavior identifies involved entities (users, hosts, IP addresses) and their roles (actor, target, or other).
54
58
59
+
### Behavior storage and tables
60
+
55
61
The UEBA behaviors layer stores behavior records in two types of tables:
56
62
57
63
- A *behavior information* table, which contains the behavior title, description, MITRE mappings, categories, and links to raw logs, and
@@ -61,6 +67,8 @@ These tables integrate seamlessly with your existing workflows for detection rul
61
67
62
68
For information about using behaviors tables, see [Best practices and troubleshooting tips for querying behaviors](#best-practices-and-troubleshooting-tips-for-querying-behaviors).
63
69
70
+
### Data flow diagram
71
+
64
72
This diagram illustrates how the UEBA behaviors layer transform raw logs into structured behavior records that enhance security operations:
65
73
66
74
:::image type="content" source="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" alt-text="Diagram that shows how the UEBA behaviors layer transform raw logs into structured behavior records that enhance security operations." lightbox="media/entity-behaviors-layer/entity-behaviors-data-flow.svg" :::
0 commit comments