You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/whats-new.md
+54-14Lines changed: 54 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,9 +27,62 @@ If you're looking for items older than six months, you'll find them in the [Arch
27
27
28
28
## September 2022
29
29
30
+
-[Heads up: Name fields being removed from UEBA UserPeerAnalytics table](#heads-up-name-fields-being-removed-from-ueba-userpeeranalytics-table)
31
+
-[Windows DNS Events via AMA connector (Preview)](#windows-dns-events-via-ama-connector-preview)
30
32
-[Create and delete incidents manually (Preview)](#create-and-delete-incidents-manually-preview)
31
33
-[Add entities to threat intelligence (Preview)](#add-entities-to-threat-intelligence-preview)
32
-
-[Windows DNS Events via AMA connector (Preview)](#windows-dns-events-via-ama-connector-preview)
34
+
35
+
### Heads up: Name fields being removed from UEBA UserPeerAnalytics table
36
+
37
+
As of **September 30, 2022**, the UEBA engine will no longer perform automatic lookups of user IDs and resolve them into names. This change will result in the removal of four name fields from the *UserPeerAnalytics* table:
38
+
39
+
- UserName
40
+
- UserPrincipalName
41
+
- PeerUserName
42
+
- PeerUserPrincipalName
43
+
44
+
The corresponding ID fields remain part of the table, and any built-in queries and other operations will execute the appropriate name lookups in other ways (using the IdentityInfo table), so you shouldn’t be affected by this change in nearly all circumstances.
45
+
46
+
The only exception to this is if you’ve built custom queries or rules directly referencing any of these name fields. In this scenario, you can incorporate the following lookup queries into your own, so you can access the values that would have been in these name fields.
47
+
48
+
The following query resolves **user** and **peer identifier fields**:
) on $left.AADTenantId == $right.AccountTenantId, $left.PeerUserId == $right.AccountObjectId
71
+
```
72
+
If your original query referenced the user or peer names (not just their IDs), substitute this query in its entirety for the table name (“UserPeerAnalytics”) in your original query.
73
+
74
+
### Windows DNS Events via AMA connector (Preview)
75
+
76
+
You can now use the new [Windows DNS Events via AMA connector](connect-dns-ama.md) to stream and filter events from your Windows Domain Name System (DNS) server logs to the `ASimDnsActivityLog` normalized schema table. You can then dive into your data to protect your DNS servers from threats and attacks.
77
+
78
+
The Azure Monitor Agent (AMA) and its DNS extension are installed on your Windows Server to upload data from your DNS analytical logs to your Microsoft Sentinel workspace.
79
+
80
+
Here are some benefits of using AMA for DNS log collection:
81
+
82
+
- AMA is faster compared to the existing Log Analytics Agent (MMA/OMS). AMA handles up to 5000 events per second (EPS) compared to 2000 EPS with the existing agent.
83
+
- AMA provides centralized configuration using Data Collection Rules (DCRs), and also supports multiple DCRs.
84
+
- AMA supports transformation from the incoming stream into other data tables.
85
+
- AMA supports basic and advanced filtering of the data. The data is filtered on the DNS server and before the data is uploaded, which saves time and resources.
33
86
34
87
### Create and delete incidents manually (Preview)
35
88
@@ -54,19 +107,6 @@ Microsoft Sentinel allows you to flag the entity as malicious, right from within
54
107
55
108
Learn how to [add an entity to your threat intelligence](add-entity-to-threat-intelligence.md).
56
109
57
-
### Windows DNS Events via AMA connector (Preview)
58
-
59
-
You can now use the new [Windows DNS Events via AMA connector](connect-dns-ama.md) to stream and filter events from your Windows Domain Name System (DNS) server logs to the `ASimDnsActivityLog` normalized schema table. You can then dive into your data to protect your DNS servers from threats and attacks.
60
-
61
-
The Azure Monitor Agent (AMA) and its DNS extension are installed on your Windows Server to upload data from your DNS analytical logs to your Microsoft Sentinel workspace.
62
-
63
-
Here are some benefits of using AMA for DNS log collection:
64
-
65
-
- AMA is faster compared to the existing Log Analytics Agent (MMA/OMS). AMA handles up to 5000 events per second (EPS) compared to 2000 EPS with the existing agent.
66
-
- AMA provides centralized configuration using Data Collection Rules (DCRs), and also supports multiple DCRs.
67
-
- AMA supports transformation from the incoming stream into other data tables.
68
-
- AMA supports basic and advanced filtering of the data. The data is filtered on the DNS server and before the data is uploaded, which saves time and resources.
0 commit comments