Skip to content

Commit 0bc143a

Browse files
Merge pull request #211464 from yelevin/yelevin/user-peer-analytics
Heads up on UserPeerAnalytics table
2 parents 342c180 + d8da6bb commit 0bc143a

File tree

1 file changed

+54
-14
lines changed

1 file changed

+54
-14
lines changed

articles/sentinel/whats-new.md

Lines changed: 54 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,62 @@ If you're looking for items older than six months, you'll find them in the [Arch
2727
2828
## September 2022
2929

30+
- [Heads up: Name fields being removed from UEBA UserPeerAnalytics table](#heads-up-name-fields-being-removed-from-ueba-userpeeranalytics-table)
31+
- [Windows DNS Events via AMA connector (Preview)](#windows-dns-events-via-ama-connector-preview)
3032
- [Create and delete incidents manually (Preview)](#create-and-delete-incidents-manually-preview)
3133
- [Add entities to threat intelligence (Preview)](#add-entities-to-threat-intelligence-preview)
32-
- [Windows DNS Events via AMA connector (Preview)](#windows-dns-events-via-ama-connector-preview)
34+
35+
### Heads up: Name fields being removed from UEBA UserPeerAnalytics table
36+
37+
As of **September 30, 2022**, the UEBA engine will no longer perform automatic lookups of user IDs and resolve them into names. This change will result in the removal of four name fields from the *UserPeerAnalytics* table:
38+
39+
- UserName
40+
- UserPrincipalName
41+
- PeerUserName
42+
- PeerUserPrincipalName
43+
44+
The corresponding ID fields remain part of the table, and any built-in queries and other operations will execute the appropriate name lookups in other ways (using the IdentityInfo table), so you shouldn’t be affected by this change in nearly all circumstances.
45+
46+
The only exception to this is if you’ve built custom queries or rules directly referencing any of these name fields. In this scenario, you can incorporate the following lookup queries into your own, so you can access the values that would have been in these name fields.
47+
48+
The following query resolves **user** and **peer identifier fields**:
49+
50+
```kusto
51+
UserPeerAnalytics
52+
| where TimeGenerated > ago(24h)
53+
// join to resolve user identifier fields
54+
| join kind=inner (
55+
IdentityInfo
56+
| where TimeGenerated > ago(14d)
57+
| distinct AccountTenantId, AccountObjectId, AccountUPN, AccountDisplayName
58+
| extend UserPrincipalNameIdentityInfo = AccountUPN
59+
| extend UserNameIdentityInfo = AccountDisplayName
60+
| project AccountTenantId, AccountObjectId, UserPrincipalNameIdentityInfo, UserNameIdentityInfo
61+
) on $left.AADTenantId == $right.AccountTenantId, $left.UserId == $right.AccountObjectId
62+
// join to resolve peer identifier fields
63+
| join kind=inner (
64+
IdentityInfo
65+
| where TimeGenerated > ago(14d)
66+
| distinct AccountTenantId, AccountObjectId, AccountUPN, AccountDisplayName
67+
| extend PeerUserPrincipalNameIdentityInfo = AccountUPN
68+
| extend PeerUserNameIdentityInfo = AccountDisplayName
69+
| project AccountTenantId, AccountObjectId, PeerUserPrincipalNameIdentityInfo, PeerUserNameIdentityInfo
70+
) on $left.AADTenantId == $right.AccountTenantId, $left.PeerUserId == $right.AccountObjectId
71+
```
72+
If your original query referenced the user or peer names (not just their IDs), substitute this query in its entirety for the table name (“UserPeerAnalytics”) in your original query.
73+
74+
### Windows DNS Events via AMA connector (Preview)
75+
76+
You can now use the new [Windows DNS Events via AMA connector](connect-dns-ama.md) to stream and filter events from your Windows Domain Name System (DNS) server logs to the `ASimDnsActivityLog` normalized schema table. You can then dive into your data to protect your DNS servers from threats and attacks.
77+
78+
The Azure Monitor Agent (AMA) and its DNS extension are installed on your Windows Server to upload data from your DNS analytical logs to your Microsoft Sentinel workspace.
79+
80+
Here are some benefits of using AMA for DNS log collection:
81+
82+
- AMA is faster compared to the existing Log Analytics Agent (MMA/OMS). AMA handles up to 5000 events per second (EPS) compared to 2000 EPS with the existing agent.
83+
- AMA provides centralized configuration using Data Collection Rules (DCRs), and also supports multiple DCRs.
84+
- AMA supports transformation from the incoming stream into other data tables.
85+
- AMA supports basic and advanced filtering of the data. The data is filtered on the DNS server and before the data is uploaded, which saves time and resources.
3386

3487
### Create and delete incidents manually (Preview)
3588

@@ -54,19 +107,6 @@ Microsoft Sentinel allows you to flag the entity as malicious, right from within
54107

55108
Learn how to [add an entity to your threat intelligence](add-entity-to-threat-intelligence.md).
56109

57-
### Windows DNS Events via AMA connector (Preview)
58-
59-
You can now use the new [Windows DNS Events via AMA connector](connect-dns-ama.md) to stream and filter events from your Windows Domain Name System (DNS) server logs to the `ASimDnsActivityLog` normalized schema table. You can then dive into your data to protect your DNS servers from threats and attacks.
60-
61-
The Azure Monitor Agent (AMA) and its DNS extension are installed on your Windows Server to upload data from your DNS analytical logs to your Microsoft Sentinel workspace.
62-
63-
Here are some benefits of using AMA for DNS log collection:
64-
65-
- AMA is faster compared to the existing Log Analytics Agent (MMA/OMS). AMA handles up to 5000 events per second (EPS) compared to 2000 EPS with the existing agent.
66-
- AMA provides centralized configuration using Data Collection Rules (DCRs), and also supports multiple DCRs.
67-
- AMA supports transformation from the incoming stream into other data tables.
68-
- AMA supports basic and advanced filtering of the data. The data is filtered on the DNS server and before the data is uploaded, which saves time and resources.
69-
70110

71111
## August 2022
72112

0 commit comments

Comments
 (0)