Skip to content

Commit 568a629

Browse files
authored
Merge pull request #203075 from yelevin/patch-1
Added requirement to enable UEBA
2 parents 9ea4509 + d1035cd commit 568a629

File tree

3 files changed

+8
-1
lines changed

3 files changed

+8
-1
lines changed

articles/sentinel/anomalies-reference.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ Microsoft Sentinel uses two different models to create baselines and detect anom
2525

2626
Sentinel UEBA detects anomalies based on dynamic baselines created for each entity across various data inputs. Each entity's baseline behavior is set according to its own historical activities, those of its peers, and those of the organization as a whole. Anomalies can be triggered by the correlation of different attributes such as action type, geo-location, device, resource, ISP, and more.
2727

28+
You must [enable the UEBA feature](enable-entity-behavior-analytics.md) for UEBA anomalies to be detected.
29+
2830
- [Anomalous Account Access Removal](#anomalous-account-access-removal)
2931
- [Anomalous Account Creation](#anomalous-account-creation)
3032
- [Anomalous Account Deletion](#anomalous-account-deletion)

articles/sentinel/enable-entity-behavior-analytics.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,10 @@ If you haven't yet enabled UEBA, you will be taken to the **Settings** page. Sel
5757

5858
## Next steps
5959

60-
In this document, you learned how to enable and configure User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel. To learn more about Microsoft Sentinel, see the following articles:
60+
In this document, you learned how to enable and configure User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel. For more information about UEBA:
61+
- See the [list of anomalies](anomalies-reference.md#ueba-anomalies) detected using UEBA.
62+
- Learn more about [how UEBA works](identify-threats-with-entity-behavior-analytics.md) and how to use it.
63+
64+
To learn more about Microsoft Sentinel, see the following articles:
6165
- Learn how to [get visibility into your data, and potential threats](get-visibility.md).
6266
- Get started [detecting threats with Microsoft Sentinel](detect-threats-built-in.md).

articles/sentinel/identify-threats-with-entity-behavior-analytics.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,7 @@ As legacy defense tools become obsolete, organizations may have such a vast and
166166
In this document, you learned about Microsoft Sentinel's entity behavior analytics capabilities. For practical guidance on implementation, and to use the insights you've gained, see the following articles:
167167

168168
- [Enable entity behavior analytics](./enable-entity-behavior-analytics.md) in Microsoft Sentinel.
169+
- See the [list of anomalies](anomalies-reference.md#ueba-anomalies) detected by the UEBA engine.
169170
- [Investigate incidents with UEBA data](investigate-with-ueba.md).
170171
- [Hunt for security threats](./hunting.md).
171172

0 commit comments

Comments
 (0)