You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/whats-new.md
+24-1Lines changed: 24 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article describes new features in Microsoft Sentinel from the
4
4
author: yelevin
5
5
ms.author: yelevin
6
6
ms.topic: conceptual
7
-
ms.date: 01/11/2024
7
+
ms.date: 02/28/2024
8
8
---
9
9
10
10
# What's new in Microsoft Sentinel
@@ -23,11 +23,33 @@ The listed features were released in the last three months. For information abou
23
23
24
24
## February 2024
25
25
26
+
27
+
-[Microsoft Sentinel solution for Microsoft Power Platform preview available](#microsoft-sentinel-solution-for-microsoft-power-platform-preview-available)
26
28
-[New Google Pub/Sub-based connector for ingesting Security Command Center findings (Preview)](#new-google-pubsub-based-connector-for-ingesting-security-command-center-findings-preview)
27
29
-[Incident tasks now generally available (GA)](#incident-tasks-now-generally-available-ga)
28
30
-[AWS and GCP data connectors now support Azure Government clouds](#aws-and-gcp-data-connectors-now-support-azure-government-clouds)
29
31
-[Windows DNS Events via AMA connector now generally available (GA)](#windows-dns-events-via-ama-connector-now-generally-available-ga)
30
32
33
+
34
+
### Microsoft Sentinel solution for Microsoft Power Platform preview available
35
+
36
+
The Microsoft Sentinel solution for Power Platform (preview) allows you to monitor and detect suspicious or malicious activities in your Power Platform environment. The solution collects activity logs from different Power Platform components and inventory data. It analyzes those activity logs to detect threats and suspicious activities like the following activities:
37
+
38
+
- Power Apps execution from unauthorized geographies
39
+
- Suspicious data destruction by Power Apps
40
+
- Mass deletion of Power Apps
41
+
- Phishing attacks made possible through Power Apps
42
+
- Power Automate flows activity by departing employees
43
+
- Microsoft Power Platform connectors added to the environment
44
+
- Update or removal of Microsoft Power Platform data loss prevention policies
45
+
46
+
Find this solution in the Microsoft Sentinel content hub.
47
+
48
+
For more information, see:
49
+
-[Microsoft Sentinel solution for Microsoft Power Platform overview](business-applications/power-platform-solution-overview.md)
50
+
-[Microsoft Sentinel solution for Microsoft Power Platform: security content reference](business-applications/power-platform-solution-security-content.md)
51
+
-[Deploy the Microsoft Sentinel solution for Microsoft Power Platform](business-applications/deploy-power-platform-solution.md)
52
+
31
53
### New Google Pub/Sub-based connector for ingesting Security Command Center findings (Preview)
32
54
33
55
You can now ingest logs from Google Security Command Center, using the new Google Cloud Platform (GCP) Pub/Sub-based connector (now in PREVIEW).
@@ -38,6 +60,7 @@ The integration with Microsoft Sentinel allows you to have visibility and contro
38
60
39
61
- Learn how to [set up the new connector](connect-google-cloud-platform.md) and ingest events from Google Security Command Center.
40
62
63
+
41
64
### Incident tasks now generally available (GA)
42
65
43
66
Incident tasks, which help you standardize your incident investigation and response practices so you can more effectively manage incident workflow, are now generally available (GA) in Microsoft Sentinel.
0 commit comments