Skip to content

Commit 59c25d5

Browse files
committed
Adding what's new for Microsoft Secure features + new announcement
1 parent 2360c57 commit 59c25d5

File tree

1 file changed

+21
-43
lines changed

1 file changed

+21
-43
lines changed

articles/sentinel/whats-new.md

Lines changed: 21 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,22 @@ See these [important announcements](#announcements) about recent changes to feat
1919

2020
## March 2023
2121

22+
- [Stream audit log data from GCP into Microsoft Sentinel](#stream-audit-log-data-from-gcp-into-microsoft-sentinel)
23+
- [Work with the Microsoft Sentinel solution for SAP® applications across multiple workspaces](#work-with-the-microsoft-sentinel-solution-for-sap-applications-across-multiple-workspaces)
24+
- [Automatically update the SAP data connector agent (Preview)](#automatically-update-the-sap-data-connector-agent-preview)
25+
26+
### Stream audit log data from GCP into Microsoft Sentinel
27+
28+
You can now [stream audit log data from the Google Cloud Platform (GCP) into Microsoft Sentinel](connect-google-cloud-platform.md) using the **GCP Pub/Sub Audit Logs** connector, based on our [Codeless Connector Platform](create-codeless-connector.md?tabs=deploy-via-arm-template%2Cconnect-via-the-azure-portal) (CCP). The new connector ingests logs from your GCP environment using the GCP [Pub/Sub capability](https://cloud.google.com/pubsub/docs/overview).
29+
30+
### Work with the Microsoft Sentinel solution for SAP® applications across multiple workspaces
31+
32+
You can now [work with the Microsoft Sentinel solution for SAP® applications across multiple workspaces](cross-workspcace.md) in different scenarios. This feature allows improved flexibility for managed security service providers (MSSPs) or a global or federated SOC, data residency requirements, organizational hierarchy/IT design, and insufficient role-based access control (RBAC) in a single workspace. One common use case is the need for collaboration between the security operations center (SOC) and SAP teams in your organization. Read about [the scenarios that address this use case](cross-workspcace.md).
33+
34+
### Monitor risky SAP configuration changes
35+
36+
TBD
37+
2238
### Automatically update the SAP data connector agent (Preview)
2339

2440
You can now [enable automatic updates for the SAP data connector agent](sap/update-sap-data-connector.md#automatically-update-the-sap-data-connector-agent-preview). You can choose to apply automatic updates to all existing containers or to a specific container.
@@ -116,58 +132,20 @@ You've already been able to use the **alert details** feature to override these
116132

117133
See which ones, and learn how to use the updated mechanism, in [Customize alert details in Microsoft Sentinel](customize-alert-details.md).
118134

119-
## November 2022
120-
121-
- [Use Incident tasks to manage incident workflow (Preview)](#use-incident-tasks-to-manage-incident-workflow-preview)
122-
- [Common Event Format (CEF) via AMA (Preview)](#common-event-format-cef-via-ama-preview)
123-
- [Monitor the health of automation rules and playbooks](#monitor-the-health-of-automation-rules-and-playbooks)
124-
- [Updated Microsoft Sentinel Logstash plugin](#updated-microsoft-sentinel-logstash-plugin)
125-
126-
### Use Incident tasks to manage incident workflow (Preview)
127-
128-
SecOps analysts are expected to perform a list of steps, or tasks, in the process of triaging, investigating, or remediating an incident. Standardizing and formalizing the list of tasks can help keep your SOC running smoothly, ensuring the same requirements apply to all analysts.
129-
130-
SOC managers, automation engineers, and senior analysts can use Microsoft Sentinel's automation capabilities to generate lists of tasks that will apply across groups of incidents based on their content, ensuring that front-line analysts apply the same standards of care across the board and don't miss any critical steps.
131-
132-
- Learn more about [incident tasks](incident-tasks.md).
133-
- Learn how analysts can [use tasks to handle incident workflow](work-with-tasks.md).
134-
- Learn how to add tasks to groups of incidents automatically using [automation rules](create-tasks-automation-rule.md) or [playbooks](create-tasks-playbook.md).
135-
136-
### Common Event Format (CEF) via AMA (Preview)
137-
138-
The [Common Event Format (CEF) via AMA](connect-cef-ama.md) connector allows you to quickly filter and upload logs over CEF from multiple on-premises appliances to Microsoft Sentinel via the Azure Monitor Agent (AMA).
139-
140-
The AMA supports Data Collection Rules (DCRs), which you can use to filter the logs before ingestion, for quicker upload, efficient analysis, and querying.
141-
142-
### Monitor the health of automation rules and playbooks
143-
144-
To ensure proper functioning and performance of your security orchestration, automation, and response operations in your Microsoft Sentinel service, keep track of the health of your automation rules and playbooks by monitoring their execution logs.
145-
146-
Set up notifications of health events for relevant stakeholders, who can then take action. For example, define and send email or Microsoft Teams messages, create new tickets in your ticketing system, and so on.
147-
148-
- Learn what [health monitoring in Microsoft Sentinel](health-audit.md) can do for you.
149-
- [Turn on health monitoring](enable-monitoring.md) in Microsoft Sentinel.
150-
- Monitor the health of your [automation rules and playbooks](monitor-automation-health.md).
151-
- See more information about the [*SentinelHealth* table schema](health-table-reference.md).
152-
153-
### Updated Microsoft Sentinel Logstash plugin
154-
155-
A [new version of the Microsoft Sentinel Logstash plugin](connect-logstash-data-connection-rules.md) leverages the new Azure Monitor Data Collection Rules (DCR) based Logs Ingestion API. The new plugin:
156-
157-
- Provides data transformation capabilities like filtering, masking, and enrichment.
158-
- Allows full control over the output schema, including configuration of the column names and types.
159-
- Can forward logs from external data sources into both custom tables and standard tables.
160-
- Provides performance improvements, compression, and better telemetry and error handling.
161-
162135
## Announcements
163136

137+
- [Microsoft Defender for Identity alerts will no longer refer to the MDA policies in the Alert ExternalLinks properties](#microsoft-defender-for-identity-alerts-will-no-longer-refer-to-the-mda-policies-in-the-alert-externallinks-properties)
164138
- [WindowsEvent table enhancements](#windowsevent-table-enhancements)
165139
- [Out-of-the-box content centralization changes](#out-of-the-box-content-centralization-changes)
166140
- [New behavior for alert grouping in analytics rules](#new-behavior-for-alert-grouping-in-analytics-rules)
167141
- [Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)](#microsoft-365-defender-now-integrates-azure-active-directory-identity-protection-aadip)
168142
- [Account enrichment fields removed from Azure AD Identity Protection connector](#account-enrichment-fields-removed-from-azure-ad-identity-protection-connector)
169143
- [Name fields removed from UEBA UserPeerAnalytics table](#name-fields-removed-from-ueba-userpeeranalytics-table)
170144

145+
### Microsoft Defender for Identity alerts will no longer refer to the MDA policies in the Alert ExternalLinks properties
146+
147+
Microsoft Defender for Identity alerts will no longer refer to the MDA policies in the Alert ExternalLinks properties due to a change in infrastructure performed on MDIs. Alerts will no longer contain any MDA links under **ExtendedLinks** with a **Label** that starts with **Defender for Cloud Apps**. This change will take effect April 30th, 2023. [Read more about this change](/defender-for-identity/whats-new#defender-for-identity-release-2198)
148+
171149
### WindowsEvent table enhancements
172150

173151
The WindowsEvent schema has been expanded to include new fields, such as `Keywords`, `Version`, `Opcode`, `Correlation`, `SystemProcessId`, `SystemThreadId` and `EventRecordId`.

0 commit comments

Comments
 (0)