Skip to content

Commit 2cee61e

Browse files
Merge pull request #266536 from cwatson-cat/patch-22
Sentinel - Add Power Platform to whats-new.md
2 parents 61c8ce3 + 77a3c25 commit 2cee61e

File tree

1 file changed

+24
-1
lines changed

1 file changed

+24
-1
lines changed

articles/sentinel/whats-new.md

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes new features in Microsoft Sentinel from the
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: conceptual
7-
ms.date: 01/11/2024
7+
ms.date: 02/28/2024
88
---
99

1010
# What's new in Microsoft Sentinel
@@ -23,11 +23,33 @@ The listed features were released in the last three months. For information abou
2323

2424
## February 2024
2525

26+
27+
- [Microsoft Sentinel solution for Microsoft Power Platform preview available](#microsoft-sentinel-solution-for-microsoft-power-platform-preview-available)
2628
- [New Google Pub/Sub-based connector for ingesting Security Command Center findings (Preview)](#new-google-pubsub-based-connector-for-ingesting-security-command-center-findings-preview)
2729
- [Incident tasks now generally available (GA)](#incident-tasks-now-generally-available-ga)
2830
- [AWS and GCP data connectors now support Azure Government clouds](#aws-and-gcp-data-connectors-now-support-azure-government-clouds)
2931
- [Windows DNS Events via AMA connector now generally available (GA)](#windows-dns-events-via-ama-connector-now-generally-available-ga)
3032

33+
34+
### Microsoft Sentinel solution for Microsoft Power Platform preview available
35+
36+
The Microsoft Sentinel solution for Power Platform (preview) allows you to monitor and detect suspicious or malicious activities in your Power Platform environment. The solution collects activity logs from different Power Platform components and inventory data. It analyzes those activity logs to detect threats and suspicious activities like the following activities:
37+
38+
- Power Apps execution from unauthorized geographies
39+
- Suspicious data destruction by Power Apps
40+
- Mass deletion of Power Apps
41+
- Phishing attacks made possible through Power Apps
42+
- Power Automate flows activity by departing employees
43+
- Microsoft Power Platform connectors added to the environment
44+
- Update or removal of Microsoft Power Platform data loss prevention policies
45+
46+
Find this solution in the Microsoft Sentinel content hub.
47+
48+
For more information, see:
49+
- [Microsoft Sentinel solution for Microsoft Power Platform overview](business-applications/power-platform-solution-overview.md)
50+
- [Microsoft Sentinel solution for Microsoft Power Platform: security content reference](business-applications/power-platform-solution-security-content.md)
51+
- [Deploy the Microsoft Sentinel solution for Microsoft Power Platform](business-applications/deploy-power-platform-solution.md)
52+
3153
### New Google Pub/Sub-based connector for ingesting Security Command Center findings (Preview)
3254

3355
You can now ingest logs from Google Security Command Center, using the new Google Cloud Platform (GCP) Pub/Sub-based connector (now in PREVIEW).
@@ -38,6 +60,7 @@ The integration with Microsoft Sentinel allows you to have visibility and contro
3860

3961
- Learn how to [set up the new connector](connect-google-cloud-platform.md) and ingest events from Google Security Command Center.
4062

63+
4164
### Incident tasks now generally available (GA)
4265

4366
Incident tasks, which help you standardize your incident investigation and response practices so you can more effectively manage incident workflow, are now generally available (GA) in Microsoft Sentinel.

0 commit comments

Comments
 (0)