Skip to content

Commit 5f30200

Browse files
committed
Completed draft of message
1 parent 1ae3be0 commit 5f30200

File tree

1 file changed

+38
-41
lines changed

1 file changed

+38
-41
lines changed

articles/sentinel/whats-new.md

Lines changed: 38 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -27,55 +27,52 @@ If you're looking for items older than six months, you'll find them in the [Arch
2727
2828
## October 2022
2929

30-
- [Heads up: Name fields removed from Azure AD Identity Protection connector](#heads-up-name-fields-removed-from-azure-ad-identity-protection-connector)
30+
- [Heads up: Account enrichment fields removed from Azure AD Identity Protection connector](#heads-up-account-enrichment-fields-removed-from-azure-ad-identity-protection-connector)
3131
- [Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)](#microsoft-365-defender-now-integrates-azure-active-directory-identity-protection-aadip)
3232
- [Out of the box anomaly detection on the SAP audit log (Preview)](#out-of-the-box-anomaly-detection-on-the-sap-audit-log-preview)
3333
- [IoT device entity page (Preview)](#iot-device-entity-page-preview)
3434

35-
### Heads up: Name fields removed from Azure AD Identity Protection connector
35+
### Heads up: Account enrichment fields removed from Azure AD Identity Protection connector
3636

3737
As of **September 30 2022**, alerts coming from the Azure Activity Directory Information Protection connector will no longer contain the following fields:
3838

39-
- Name
40-
- UPNSuffix
41-
- DisplayName
42-
- ExtendedProperties["UserAccount"]
4339
- CompromisedEntity
44-
- ExtendedProperties["UserPrincipalName”]
45-
46-
Customers wishing to use the fields that have been removed are advised to utilize the UEBA solution that provides a way to access the data through the IdentityInfo table.
47-
48-
The following query shows an example of retrieving the removed information by joining the SecurityAlert table with the IdentityInfo table:
49-
50-
```kusto
51-
SecurityAlert
52-
| where TimeGenerated > ago(7d)
53-
| where ProductName == "Azure Active Directory Identity Protection"
54-
| mv-expand Entity = todynamic(Entities)
55-
| where Entity.Type == "account"
56-
| extend AadTenantId = tostring(Entity.AadTenantId)
57-
| extend AadUserId = tostring(Entity.AadUserId)
58-
| join kind=inner (
59-
IdentityInfo
60-
| where TimeGenerated > ago(14d)
61-
| distinct AccountTenantId, AccountObjectId, AccountUPN, AccountDisplayName
62-
| extend UserPrincipalNameIdentityInfo = AccountUPN
63-
| extend UserNameIdentityInfo = AccountDisplayName
64-
| where isnotempty(AccountDisplayName) and isnotempty(UserPrincipalNameIdentityInfo)
65-
| project AccountTenantId, AccountObjectId, UserPrincipalNameIdentityInfo, UserNameIdentityInfo
66-
)
67-
on
68-
$left.AadTenantId == $right.AccountTenantId,
69-
$left.AadUserId == $right.AccountObjectId
70-
| extend CompromisedEntity = iff(CompromisedEntity == "N/A" or isempty(CompromisedEntity), UserPrincipalNameIdentityInfo, CompromisedEntity)
71-
| project-away AccountTenantId, AccountObjectId, UserPrincipalNameIdentityInfo
72-
```
73-
74-
More information on joining the tables to enable enrichment of the removed fields to the UserPeerAnalytics table, please refer to the following link, where you can find example KQL query.
75-
76-
If you don’t use the UEBA solution, and you want to activate it, log in to the portal using an account with Global Administrator or System Administrator privileges, browse to Sentinel in the relevant workspace and follow instructions here.
77-
78-
There is no need to configure the behavior analytics for the IdentityInfo table.
40+
- ExtendedProperties["User Account"]
41+
- ExtendedProperties["User Name”]
42+
43+
The corresponding ID field remains part of the table, and any built-in queries and other operations will execute the appropriate name lookups in other ways (using the IdentityInfo table), so you shouldn’t be affected by this change in nearly all circumstances.
44+
45+
If you've built any custom queries or rules directly referencing these fields, you'll need another way to get this information. Use the following two-step process to look up these values in the *IdentityInfo* table:
46+
47+
1. Enable the UEBA solution to sync the *IdentityInfo* table with your Azure AD logs. Follow the instructions in [this document](enable-entity-behavior-analytics.md).
48+
(If you don't intend to use UEBA in general, you can ignore the last instruction about selecting data sources on which to enable entity behavior analytics.)
49+
1. Incorporate the query below in your existing custom queries or rules to look up this data by joining the *SecurityAlert* table with the *IdentityInfo* table.
50+
51+
```kusto
52+
SecurityAlert
53+
| where TimeGenerated > ago(7d)
54+
| where ProductName == "Azure Active Directory Identity Protection"
55+
| mv-expand Entity = todynamic(Entities)
56+
| where Entity.Type == "account"
57+
| extend AadTenantId = tostring(Entity.AadTenantId)
58+
| extend AadUserId = tostring(Entity.AadUserId)
59+
| join kind=inner (
60+
IdentityInfo
61+
| where TimeGenerated > ago(14d)
62+
| distinct AccountTenantId, AccountObjectId, AccountUPN, AccountDisplayName
63+
| extend UserPrincipalNameIdentityInfo = AccountUPN
64+
| extend UserNameIdentityInfo = AccountDisplayName
65+
| where isnotempty(AccountDisplayName) and isnotempty(UserPrincipalNameIdentityInfo)
66+
| project AccountTenantId, AccountObjectId, UserPrincipalNameIdentityInfo, UserNameIdentityInfo
67+
)
68+
on
69+
$left.AadTenantId == $right.AccountTenantId,
70+
$left.AadUserId == $right.AccountObjectId
71+
| extend CompromisedEntity = iff(CompromisedEntity == "N/A" or isempty(CompromisedEntity), UserPrincipalNameIdentityInfo, CompromisedEntity)
72+
| project-away AccountTenantId, AccountObjectId, UserPrincipalNameIdentityInfo
73+
```
74+
75+
For information on looking up data to replace enrichment fields removed from the UEBA UserPeerAnalytics table, See [Heads up: Name fields being removed from UEBA UserPeerAnalytics table](#heads-up-name-fields-being-removed-from-ueba-userpeeranalytics-table) for a sample query.
7976
8077
### Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)
8178

0 commit comments

Comments
 (0)