Skip to content

Commit 53c05b0

Browse files
authored
Merge pull request #54309 from KenMAG/rename-update-KenMAG
Updated to maintain module freshness.
2 parents d4bc3c3 + 8bcdb7d commit 53c05b0

11 files changed

Lines changed: 31 additions & 30 deletions

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Introduction"
7-
ms.date: 06/30/2022
7+
ms.date: 04/19/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/2-understand-user-entity-behavior-analytics.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Understand behavioral analytics
44
metadata:
55
title: Understand behavioral analytics
66
description: "Understand behavioral analytics"
7-
ms.date: 06/30/2022
7+
ms.date: 04/19/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/3-explore-entities.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Explore entities
44
metadata:
55
title: Explore entities
66
description: "Explore entities"
7-
ms.date: 06/30/2022
7+
ms.date: 04/19/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/4-display-entity-behavior-information.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Display entity behavior information
44
metadata:
55
title: Display entity behavior information
66
description: "Display entity behavior information"
7-
ms.date: 06/30/2022
7+
ms.date: 04/19/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/4a-use-anomaly-detection-analytical-rule-templates.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Use Anomaly detection analytical rule templates
44
metadata:
55
title: Use Anomaly detection analytical rule templates
66
description: "Use Anomaly detection analytical rule templates"
7-
ms.date: 06/30/2022
7+
ms.date: 04/19/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/5-knowledge-check.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Module assessment
44
metadata:
55
title: Module assessment
66
description: "Knowledge check"
7-
ms.date: 06/30/2022
7+
ms.date: 04/19/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit
@@ -21,32 +21,32 @@ quiz:
2121
choices:
2222
- content: "Data elements"
2323
isCorrect: true
24-
explanation: "Correct. The data elements include such things as Accounts, IP Addresses, Hosts"
24+
explanation: "Correct. The data elements include such things as Accounts, IP Addresses, Hosts"
2525
- content: "Tables"
2626
isCorrect: false
27-
explanation: "Incorrect. Data elements are derived from the fields in tables."
27+
explanation: "Incorrect. Data elements are derived from the fields in tables."
2828
- content: "Alerts"
2929
isCorrect: false
30-
explanation: "Incorrect. Alerts can be connected to Entities."
30+
explanation: "Incorrect. Alerts can be connected to Entities."
3131
- content: "In the timeline of the Entity page, what type of items are an aggregation of notable events relating to the entity?"
3232
choices:
3333
- content: "Alerts"
3434
isCorrect: false
35-
explanation: "Incorrect. Activities are the aggregation of events."
35+
explanation: "Incorrect. Activities are the aggregation of events."
3636
- content: "Activities"
3737
isCorrect: true
3838
explanation: "Correct. Activities are the aggregation of events."
3939
- content: "Bookmarks"
4040
isCorrect: false
41-
explanation: "Incorrect. Activities are the aggregation of events."
42-
- content: "When you're viewing the investigation graph, what option will show Entity Behavior information?"
41+
explanation: "Incorrect. Activities are the aggregation of events."
42+
- content: "When you're viewing the investigation graph, what option shows Entity Behavior information?"
4343
choices:
4444
- content: "Entities"
4545
isCorrect: false
46-
explanation: "Incorrect. Insights will display Entity Behavior information."
46+
explanation: "Incorrect. Insights display Entity Behavior information."
4747
- content: "Timeline"
4848
isCorrect: false
49-
explanation: "Incorrect. Insights will display Entity Behavior information."
49+
explanation: "Incorrect. Insights display Entity Behavior information."
5050
- content: "Insights"
5151
isCorrect: true
52-
explanation: "Correct. Insights will display Entity Behavior information."
52+
explanation: "Correct. Insights display Entity Behavior information."

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/6-summary-resources.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Summary and resources
44
metadata:
55
title: Summary and resources
66
description: "Summary and resources"
7-
ms.date: 06/30/2022
7+
ms.date: 04/19/2026
88
author: wwlpublish
99
ms.author: kelawson
1010
ms.topic: unit

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/includes/2-understand-user-entity-behavior-analytics.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
Identifying threats inside your organization and their potential impact - whether a compromised entity or a malicious insider - has always been a time-consuming and labor-intensive process. When you're sifting through alerts, connecting the dots, and actively hunting, it adds up to massive amounts of time and effort expended with minimal returns. And, the possibility of sophisticated threats evading discovery. Elusive threats like zero-day, targeted, and advanced persistent threats can be the most dangerous to your organization, making their detection all the more critical.
1+
Identifying threats inside your organization and their potential impact - whether a compromised entity or a malicious insider - is a time-consuming and labor-intensive process. When you're sifting through alerts, connecting the dots, and actively hunting, it adds up to massive amounts of time and effort expended with minimal returns. And, the possibility of sophisticated threats evading discovery. Elusive threats like zero-day, targeted, and advanced persistent threats can be the most dangerous to your organization, making their detection all the more critical.
22

33
The Entity Behavior capability in Microsoft Sentinel eliminates the drudgery from your analysts’ workloads, and the uncertainty from their efforts. The Entity Behavior capability delivers high-fidelity and actionable intelligence, so they can focus on investigation and remediation.
44

5-
As Microsoft Sentinel collects logs and alerts from all the connected data sources, it analyzes and builds baseline behavioral profiles of your organization’s entities (users, hosts, IP addresses, applications etc.). The analysis is across the time and peer group horizon. Microsoft Sentinel uses various techniques and machine learning capabilities, and can then identify anomalous activity and help you determine if an asset has been compromised. Not only that, but it can also figure out the relative sensitivity of particular assets, identify peer groups of assets, and evaluate the potential impact of any given compromised asset (its blast radius). Armed with this information, you can effectively prioritize your investigation and incident handling.
5+
As Microsoft Sentinel collects logs and alerts from all the connected data sources, it analyzes and builds baseline behavioral profiles of your organization’s entities (users, hosts, IP addresses, applications, etc.). The analysis is across the time and peer group horizon. Microsoft Sentinel uses various techniques and machine learning capabilities, and can then identify anomalous activity and help you determine if an asset is compromised. Not only that, but it can also figure out the relative sensitivity of particular assets, identify peer groups of assets, and evaluate the potential impact of any given compromised asset (its "blast radius"). Armed with this information, you can effectively prioritize your investigation and incident handling.
66

77
### Architecture overview
88

9-
:::image type="content" source="../media/entity-behavior-1.png" alt-text="Diagram of the E U B A architecture overview.":::
9+
:::image type="content" source="../media/entity-behavior-1.png" alt-text="Diagram of the UEBA architecture overview.":::
1010

1111
### Security-driven analytics
1212

@@ -18,7 +18,7 @@ Microsoft adopted Gartner’s paradigm for UEBA solutions, Microsoft Sentinel pr
1818

1919
**Analytics:** Microsoft Sentinel uses machine learning (ML) algorithms, and identifies anomalous activities that presents evidence clearly and concisely in the form of contextual enrichments. See the examples below.
2020

21-
:::image type="content" source="../media/entity-behavior-2.png" alt-text="Image of Security Driven Analytics enrichment.":::
21+
:::image type="content" source="../media/entity-behavior-2.png" alt-text="Diagram showing security-driven analytics enrichment examples in Microsoft Sentinel.":::
2222

2323
Microsoft Sentinel presents artifacts that help your security analysts get a clear understanding of anomalous activities in context, and in comparison with the user's baseline profile. Actions performed by a user (or a host, or an address) are evaluated contextually, where a "true" outcome indicates an identified anomaly:
2424

@@ -30,9 +30,9 @@ Microsoft Sentinel presents artifacts that help your security analysts get a cle
3030

3131
- As compared to organization's behavior.
3232

33-
:::image type="content" source="../media/entity-behavior-3.png" alt-text="image showing the E U B A Context rings.":::
33+
:::image type="content" source="../media/entity-behavior-3.png" alt-text="Diagram showing the UEBA context rings used to evaluate user activity.":::
3434

3535
### Scoring
3636

37-
Each activity is scored with Investigation Priority Score. The score determines the probability of a specific user performing a specific activity based on behavioral learning of the user and their peers. Activities identified as the most abnormal receive the highest scores (on a scale of 0-10).
37+
Each activity is scored with "Investigation Priority Score". The score determines the probability of a specific user performing a specific activity based on behavioral learning of the user and their peers. Activities identified as the most abnormal receive the highest scores (on a scale of 0-10).
3838

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/includes/3-explore-entities.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
When alerts are sent to Microsoft Sentinel, they include data elements that Microsoft Sentinel identifies and classifies as entities, such as user accounts, hosts, IP addresses and others. On occasion, this identification can be a challenge, if the alert doesn't contain sufficient information about the entity.
1+
When alerts are sent to Microsoft Sentinel, they include data elements that Microsoft Sentinel identifies and classifies as entities, such as user accounts, hosts, IP addresses, and others. On occasion, this identification can be a challenge, if the alert doesn't contain sufficient information about the entity.
22

33
For example, user accounts can be identified in more than one way: using a Microsoft Entra account’s numeric identifier (GUID), or its User Principal Name (UPN) value, or alternatively, using a combination of its username and its NT domain name. Different data sources can identify the same user in different ways. Therefore, whenever possible, Microsoft Sentinel merges those identifiers into a single entity, so that it can be properly identified.
44

55
It can happen, though, that one of your resource providers creates an alert in which an entity isn't sufficiently identified - for example, a user name without the domain name context. In such a case, the user entity can't be merged with other instances of the same user account, which would be identified as a separate entity, and those two entities would remain separate instead of unified.
66

7-
In order to minimize the risk of this happening, you should verify that all of your alert providers properly identify the entities in the alerts they produce. Additionally, synchronizing user account entities with Microsoft Entra ID may create a unifying directory, which will be able to merge user account entities.
7+
In order to minimize the risk of this happening, you should verify that all of your alert providers properly identify the entities in the alerts they produce. Additionally, synchronizing user account entities with Microsoft Entra ID may create a unifying directory, which is able to merge user account entities.
88

99
The following types of entities are currently identified in Microsoft Sentinel:
1010

@@ -48,7 +48,7 @@ The following types of entities are currently identified in Microsoft Sentinel:
4848

4949
### Entity pages
5050

51-
When you encounter any entity (currently limited to users and hosts) in a search, an alert, or an investigation, you can select the entity and be taken to an **entity page**, a datasheet full of useful information about that entity. The types of information you'll find on this page include basic facts about the entity, a timeline of notable events related to this entity and insights about the entity's behavior.
51+
When you encounter any entity (currently limited to users and hosts) in a search, an alert, or an investigation, you can select the entity and be taken to an **entity page**, a datasheet full of useful information about that entity. The types of information you find on this page include basic facts about the entity, a timeline of notable events related to this entity and insights about the entity's behavior.
5252

5353
Entity pages consist of three parts:
5454

@@ -60,7 +60,7 @@ Entity pages consist of three parts:
6060

6161
### The timeline
6262

63-
:::image type="content" source="../media/entity-behavior-4.png" alt-text="Screen shot of an Entity Behavior timeline.":::
63+
:::image type="content" source="../media/entity-behavior-4.png" alt-text="Screenshot of an entity behavior timeline in Microsoft Sentinel.":::
6464

6565
The timeline is a major part of the entity page's contribution to behavior analytics in Microsoft Sentinel. It presents a story about entity-related events, helping you understand the entity's activity within a specific time frame.
6666

learn-pr/wwl-sci/use-entity-behavior-analytics-azure-sentinel/includes/6-summary-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
You should have learned how to use entity behavior analytics in Microsoft Sentinel to identify threats inside your organization.
1+
You learned how to use entity behavior analytics in Microsoft Sentinel to identify threats inside your organization.
22

33
You should now be able to:
44

@@ -10,6 +10,6 @@ You should now be able to:
1010

1111
You can learn more by reviewing the following.
1212

13-
[Become a Microsoft Sentinel Ninja](https://techcommunity.microsoft.com/t5/azure-sentinel/become-an-azure-sentinel-ninja-the-complete-level-400-training/ba-p/1246310?azure-portal=true)
13+
[Become a Microsoft Sentinel Ninja](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/become-a-microsoft-sentinel-ninja-the-complete-level-400/ba-p/1246310?azure-portal=true)
1414

1515
[Microsoft Tech Community Security Webinars](https://techcommunity.microsoft.com/t5/microsoft-security-and/security-community-webinars/ba-p/927888?azure-portal=true)

0 commit comments

Comments
 (0)