You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/whats-new.md
-71Lines changed: 0 additions & 71 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -553,77 +553,6 @@ For more information, see:
553
553
> You can find more guidance added across our documentation in relevant conceptual and how-to articles. For more information, see [Best practice references](best-practices.md#best-practice-references).
-[Azure AD data and Azure Sentinel's IdentityInfo table (Public preview)](#use-azure-ad-data-with-azure-sentinels-identityinfo-table-public-preview)
561
-
-[Entities enrichment with geolocation data via API (Public preview)](#enrich-entities-with-geolocation-data-via-api-public-preview)
562
-
-[Support for ADX cross-resource queries (Public preview)](#support-for-adx-cross-resource-queries-public-preview)
563
-
-[Watchlists are in general availability](#watchlists-are-in-general-availability)
564
-
-[Support for data residency in more geos](#support-for-data-residency-in-more-geos)
565
-
-[Bidirectional sync in Azure Defender connector (Public preview)](#bidirectional-sync-in-azure-defender-connector-public-preview)
566
-
567
-
### Microsoft Threat Intelligence Matching Analytics (Public preview)
568
-
569
-
Azure Sentinel now provides the built-in **Microsoft Threat Intelligence Matching Analytics** rule, which matches Microsoft-generated threat intelligence data with your logs. This rule generates high-fidelity alerts and incidents, with appropriate severities based on the context of the logs detected. After a match is detected, the indicator is also published to your Azure Sentinel threat intelligence repository.
570
-
571
-
The **Microsoft Threat Intelligence Matching Analytics** rule currently matches domain indicators against the following log sources:
For more information, see [Detect threats using matching analytics (Public preview)](work-with-threat-indicators.md#detect-threats-using-matching-analytics-public-preview).
578
-
579
-
### Use Azure AD data with Azure Sentinel's IdentityInfo table (Public preview)
580
-
581
-
As attackers often use the organization's own user and service accounts, data about those user accounts, including the user identification and privileges, are crucial for the analysts in the process of an investigation.
582
-
583
-
Now, having [UEBA enabled](enable-entity-behavior-analytics.md) in your Azure Sentinel workspace also synchronizes Azure AD data into the new **IdentityInfo** table in Log Analytics. Synchronizations between your Azure AD and the **IdentifyInfo** table create a snapshot of your user profile data that includes user metadata, group information, and the Azure AD roles assigned to each user.
584
-
585
-
Use the **IdentityInfo** table during investigations and when fine-tuning analytics rules for your organization to reduce false positives.
586
-
587
-
For more information, see [IdentityInfo table](ueba-enrichments.md#identityinfo-table-public-preview) in the UEBA enrichments reference and [Use UEBA data to analyze false positives](investigate-with-ueba.md#use-ueba-data-to-analyze-false-positives).
588
-
589
-
### Enrich entities with geolocation data via API (Public preview)
590
-
591
-
Azure Sentinel now offers an API to enrich your data with geolocation information. Geolocation data can then be used to analyze and investigate security incidents.
592
-
593
-
For more information, see [Enrich entities in Azure Sentinel with geolocation data via REST API (Public preview)](geolocation-data-api.md) and [Classify and analyze data using entities in Azure Sentinel](entities.md).
594
-
595
-
596
-
### Support for ADX cross-resource queries (Public preview)
597
-
598
-
The hunting experience in Azure Sentinel now supports [ADX cross-resource queries](../azure-monitor/logs/azure-monitor-data-explorer-proxy.md#cross-query-your-log-analytics-or-application-insights-resources-and-azure-data-explorer).
599
-
600
-
Although Log Analytics remains the primary data storage location for performing analysis with Azure Sentinel, there are cases where ADX is required to store data due to cost, retention periods, or other factors. This capability enables customers to hunt over a wider set of data and view the results in the [Azure Sentinel hunting experiences](hunting.md), including hunting queries, [livestream](livestream.md), and the Log Analytics search page.
601
-
602
-
To query data stored in ADX clusters, use the adx() function to specify the ADX cluster, database name, and desired table. You can then query the output as you would any other table. See more information in the pages linked above.
603
-
604
-
605
-
606
-
607
-
### Watchlists are in general availability
608
-
609
-
The [watchlists](watchlists.md) feature is now generally available. Use watchlists to enrich alerts with business data, to create allowlists or blocklists against which to check access events, and to help investigate threats and reduce alert fatigue.
610
-
611
-
### Support for data residency in more geos
612
-
613
-
Azure Sentinel now supports full data residency in the following additional geos:
614
-
615
-
Brazil, Norway, South Africa, Korea, Germany, United Arab Emirates (UAE), and Switzerland.
616
-
617
-
See the [complete list of supported geos](quickstart-onboard.md#geographical-availability-and-data-residency) for data residency.
618
-
619
-
### Bidirectional sync in Azure Defender connector (Public preview)
620
-
621
-
The Azure Defender connector now supports bi-directional syncing of alerts' status between Defender and Azure Sentinel. When you close a Sentinel incident containing a Defender alert, the alert will automatically be closed in the Defender portal as well.
622
-
623
-
See this [complete description of the updated Azure Defender connector](connect-defender-for-cloud.md).
0 commit comments