Skip to content

Commit 432a1e2

Browse files
Merge pull request #267915 from yelevin/patch-2
Removed section on deprecated UserAccessAnalytics table
2 parents 4a8d71d + de50fea commit 432a1e2

File tree

1 file changed

+4
-11
lines changed

1 file changed

+4
-11
lines changed

articles/sentinel/identify-threats-with-entity-behavior-analytics.md

Lines changed: 4 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Identify advanced threats with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel | Microsoft Docs
33
description: Create behavioral baselines for entities (users, hostnames, IP addresses) and use them to detect anomalous behavior and identify zero-day advanced persistent threats (APT).
44
author: yelevin
5+
ms.author: yelevin
56
ms.topic: conceptual
67
ms.date: 08/08/2022
7-
ms.author: yelevin
88
---
99

1010
# Identify advanced threats with User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel
@@ -63,7 +63,7 @@ Information about **entity pages** can now be found at [Investigate entities wit
6363

6464
## Querying behavior analytics data
6565

66-
Using [KQL](/azure/data-explorer/kusto/query/), we can query the Behavioral Analytics Table.
66+
Using [KQL](/azure/data-explorer/kusto/query/), we can query the **BehaviorAnalytics** table.
6767

6868
For example – if we want to find all the cases of a user that failed to sign in to an Azure resource, where it was the user's first attempt to connect from a given country/region, and connections from that country/region are uncommon even for the user's peers, we can use the following query:
6969

@@ -84,15 +84,8 @@ Microsoft Sentinel calculates and ranks a user's peers, based on the user’s Mi
8484

8585
You can use the [Jupyter notebook](https://github.com/Azure/Azure-Sentinel-Notebooks/tree/master/scenario-notebooks/UserSecurityMetadata) provided in the Microsoft Sentinel GitHub repository to visualize the user peers metadata. For detailed instructions on how to use the notebook, see the [Guided Analysis - User Security Metadata](https://github.com/Azure/Azure-Sentinel-Notebooks/blob/master/scenario-notebooks/UserSecurityMetadata/Guided%20Analysis%20-%20User%20Security%20Metadata.ipynb) notebook.
8686

87-
### Permission analytics - table and notebook
88-
89-
Permission analytics helps determine the potential impact of the compromising of an organizational asset by an attacker. This impact is also known as the asset's "blast radius." Security analysts can use this information to prioritize investigations and incident handling.
90-
91-
Microsoft Sentinel determines the direct and transitive access rights held by a given user to Azure resources, by evaluating the Azure subscriptions the user can access directly or via groups or service principals. This information, as well as the full list of the user's Microsoft Entra security group membership, is then stored in the **UserAccessAnalytics** table. The screenshot below shows a sample row in the UserAccessAnalytics table, for the user Alex Johnson. **Source entity** is the user or service principal account, and **target entity** is the resource that the source entity has access to. The values of **access level** and **access type** depend on the access-control model of the target entity. You can see that Alex has Contributor access to the Azure subscription *Contoso Hotels Tenant*. The access control model of the subscription is Azure RBAC.
92-
93-
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/user-access-analytics.png" alt-text="Screen shot of user access analytics table":::
94-
95-
You can use the [Jupyter notebook](https://github.com/Azure/Azure-Sentinel-Notebooks/tree/master/scenario-notebooks/UserSecurityMetadata) (the same notebook mentioned above) from the Microsoft Sentinel GitHub repository to visualize the permission analytics data. For detailed instructions on how to use the notebook, see the [Guided Analysis - User Security Metadata](https://github.com/Azure/Azure-Sentinel-Notebooks/blob/master/scenario-notebooks/UserSecurityMetadata/Guided%20Analysis%20-%20User%20Security%20Metadata.ipynb) notebook.
87+
> [!NOTE]
88+
> The *UserAccessAnalytics* table has been deprecated.
9689
9790
### Hunting queries and exploration queries
9891

0 commit comments

Comments
 (0)