Skip to content

Commit b113172

Browse files
authored
Merge pull request #270635 from cwatson-cat/patch-25
Sentinel - add USX to whats-new.md [READY to MERGE]
2 parents 5f65b58 + d2a512b commit b113172

File tree

3 files changed

+18
-121
lines changed

3 files changed

+18
-121
lines changed

articles/sentinel/entity-pages.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,10 +29,7 @@ More specifically, entity pages consist of three parts:
2929

3030
- The right-side panel presents [behavioral insights](#entity-insights) on the entity. These insights are continuously developed by Microsoft security research teams. They are based on various data sources and provide context for the entity and its observed activities, helping you to quickly identify [anomalous behavior](soc-ml-anomalies.md) and security threats.
3131

32-
As of November 2023, the next generation of insights is starting to be made available in **PREVIEW**, in the form of [enrichment widgets](whats-new.md#visualize-data-with-enrichment-widgets-preview). These new insights can integrate data from external sources and get updates in real time, and they can be seen alongside the existing insights. To take advantage of these new widgets, you must [enable the widget experience](enable-enrichment-widgets.md).
33-
34-
- [See the instructions for enabling the widget experience](enable-enrichment-widgets.md).
35-
- [Learn more about enrichment widgets](whats-new.md#visualize-data-with-enrichment-widgets-preview).
32+
As of November 2023, the next generation of insights is starting to be made available in **PREVIEW**, in the form of enrichment widgets. These new insights can integrate data from external sources and get updates in real time, and they can be seen alongside the existing insights. To take advantage of these new widgets, you must [enable the widget experience](enable-enrichment-widgets.md).
3633

3734
If you're investigating an incident using the **[new investigation experience](investigate-incidents.md)**, you'll be able to see a panelized version of the entity page right inside the incident details page. You have a [list of all the entities in a given incident](investigate-incidents.md#explore-the-incidents-entities), and selecting an entity opens a side panel with three "cards"—**Info**, **Timeline**, and **Insights**— showing all the same information described above, within the specific time frame corresponding with that of the alerts in the incident.
3835

articles/sentinel/incident-investigation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ The **Entities tab** contains a list of all the entities in the incident. When a
7070
- **Timeline** contains a list of the alerts that feature this entity and activities the entity has done, as collected from logs in which the entity appears.
7171
- **Insights** contains answers to questions about the entity relating to its behavior in comparison to its peers and its own history, its presence on watchlists or in threat intelligence, or any other sort of unusual occurrence relating to it. These answers are the results of queries defined by Microsoft security researchers that provide valuable and contextual security information on entities, based on data from a collection of sources.
7272

73-
As of November 2023, the **Insights** panel includes the next generation of insights, available in **PREVIEW**, in the form of [enrichment widgets](whats-new.md#visualize-data-with-enrichment-widgets-preview), alongside the existing insights. To take advantage of these new widgets, you must [enable the widget experience](enable-enrichment-widgets.md).
73+
As of November 2023, the **Insights** panel includes the next generation of insights, available in **PREVIEW**, in the form of enrichment widgets, alongside the existing insights. To take advantage of these new widgets, you must [enable the widget experience](enable-enrichment-widgets.md).
7474

7575
Depending on the entity type, you can take a number of further actions from this side panel:
7676
- Pivot to the entity's full [entity page](entity-pages.md) to get even more details over a longer timespan or launch the graphical investigation tool centered on that entity.

articles/sentinel/whats-new.md

Lines changed: 16 additions & 116 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the latest new features and announcement in Microsoft S
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: concept
7-
ms.date: 03/11/2024
7+
ms.date: 03/29/2024
88
---
99

1010
# What's new in Microsoft Sentinel
@@ -13,14 +13,24 @@ This article lists recent features added for Microsoft Sentinel, and new feature
1313

1414
The listed features were released in the last three months. For information about earlier features delivered, see our [Tech Community blogs](https://techcommunity.microsoft.com/t5/azure-sentinel/bg-p/AzureSentinelBlog/label-name/What's%20New).
1515

16-
17-
> [!TIP]
18-
> Get notified when this page is updated by copying and pasting the following URL into your feed reader:
19-
>
20-
> `https://aka.ms/sentinel/rss`
16+
Get notified when this page is updated by copying and pasting the following URL into your feed reader:
17+
`https://aka.ms/sentinel/rss`
2118

2219
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2320

21+
## April 2024
22+
23+
[Unified security operations platform in the Microsoft Defender portal (preview)](#unified-security-operations-platform-in-the-microsoft-defender-portal-preview)
24+
25+
### Unified security operations platform in the Microsoft Defender portal (preview)
26+
27+
The unified security operations platform in the Microsoft Defender portal is now available. This release brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, and Microsoft Copilot in Microsoft Defender. For more information, see the following resources:
28+
29+
- Blog announcement: [​​Unified security operations platform ready to revolutionize protection and efficiency](https://aka.ms/unified-soc-announcement)
30+
- [Microsoft Sentinel in the Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2263690)
31+
- [Connect Microsoft Sentinel to Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-sentinel-onboard)
32+
- [Microsoft Security Copilot in Microsoft Defender XDR](/microsoft-365/security/defender/security-copilot-in-microsoft-365-defender)
33+
2434
## March 2024
2535

2636
- [SIEM migration experience now generally available (GA)](#siem-migration-experience-now-generally-available-ga)
@@ -140,116 +150,6 @@ Use analytics rules together with the [Microsoft Sentinel solution for SAP® app
140150

141151
For more information, see [Microsoft Sentinel solution for SAP® applications data reference](sap/sap-solution-log-reference.md) and [Handle false positives in Microsoft Sentinel](false-positives.md).
142152

143-
## November 2023
144-
145-
- [Take advantage of Microsoft Defender for Cloud integration with Microsoft Defender XDR (Preview)](#take-advantage-of-microsoft-defender-for-cloud-integration-with-microsoft-defender-xdr-preview)
146-
- [Near-real-time rules now generally available](#near-real-time-rules-now-generally-available)
147-
- [Elevate your cybersecurity intelligence with enrichment widgets (Preview)](#elevate-your-cybersecurity-intelligence-with-enrichment-widgets-preview)
148-
149-
### Take advantage of Microsoft Defender for Cloud integration with Microsoft Defender XDR (Preview)
150-
151-
Microsoft Defender for Cloud is now [integrated with Microsoft Defender XDR](../defender-for-cloud/release-notes.md#defender-for-cloud-is-now-integrated-with-microsoft-365-defender-preview), formerly known as Microsoft 365 Defender. This integration, currently **in Preview**, allows Defender XDR to collect alerts from Defender for Cloud and create Defender XDR incidents from them.
152-
153-
Thanks to this integration, Microsoft Sentinel customers who have enabled [Defender XDR incident integration](microsoft-365-defender-sentinel-integration.md) will now be able to ingest and synchronize Defender for Cloud incidents, with all their alerts, through Microsoft Defender XDR.
154-
155-
To support this integration, Microsoft has added a new **Tenant-based Microsoft Defender for Cloud (Preview)** connector. This connector will allow Microsoft Sentinel customers to receive Defender for Cloud alerts and incidents across their entire tenants, without having to monitor and maintain the connector's enrollment to all their Defender for Cloud subscriptions.
156-
157-
This connector can be used to ingest Defender for Cloud alerts, regardless of whether you have Defender XDR incident integration enabled.
158-
159-
- Learn more about [Microsoft Defender for Cloud integration with Microsoft Defender XDR](../defender-for-cloud/release-notes.md#defender-for-cloud-is-now-integrated-with-microsoft-365-defender-preview).
160-
- Learn more about [ingesting Defender for Cloud incidents into Microsoft Sentinel](ingest-defender-for-cloud-incidents.md).
161-
<!--
162-
- Learn how to [connect the tenant-based Defender for Cloud data connector](connect-defender-for-cloud-tenant.md) (in Preview).
163-
-->
164-
165-
### Near-real-time rules now generally available
166-
167-
Microsoft Sentinel’s [near-real-time analytics rules](detect-threats-built-in.md#nrt) are now generally available (GA). These highly responsive rules provide up-to-the-minute threat detection by running their queries at intervals just one minute apart.
168-
169-
- [Learn more about near-real-time rules](near-real-time-rules.md).
170-
- [Create and work with near-real-time rules](create-nrt-rules.md).
171-
172-
<a name="visualize-data-with-enrichment-widgets-preview"></a>
173-
### Elevate your cybersecurity intelligence with enrichment widgets (Preview)
174-
175-
Enrichment widgets in Microsoft Sentinel are dynamic components designed to provide you with in-depth, actionable intelligence about entities. They integrate external and internal content and data from various sources, offering a comprehensive understanding of potential security threats. These widgets serve as a powerful enhancement to your cybersecurity toolkit, offering both depth and breadth in information analysis.
176-
177-
Widgets are already available in Microsoft Sentinel today (in Preview). They currently appear for IP entities, both on their full [entity pages](entity-pages.md) and on their [entity info panels](incident-investigation.md) that appear in Incident pages. These widgets show you valuable information about the entities, from both internal and third-party sources.
178-
179-
**What makes widgets essential in Microsoft Sentinel?**
180-
181-
- **Real-time updates:** In the ever-evolving cybersecurity landscape, real-time data is of paramount importance. Widgets provide live updates, ensuring that your analysts are always looking at the most recent data.
182-
183-
- **Integration:** Widgets are seamlessly integrated into Microsoft Sentinel data sources, drawing from their vast reservoir of logs, alerts, and intelligence. This integration means that the visual insights presented by widgets are backed by the robust analytical power of Microsoft Sentinel.
184-
185-
In essence, widgets are more than just visual aids. They are powerful analytical tools that, when used effectively, can greatly enhance the speed and efficiency of threat detection, investigation, and response.
186-
187-
- [Enable the enrichment widgets experience in Microsoft Sentinel](enable-enrichment-widgets.md)
188-
189-
## October 2023
190-
191-
- [Microsoft Applied Skill - Configure SIEM security operations using Microsoft Sentinel](#microsoft-applied-skill-available-for-microsoft-sentinel)
192-
- [Changes to the documentation table of contents](#changes-to-the-documentation-table-of-contents)
193-
194-
### Microsoft Applied Skill available for Microsoft Sentinel
195-
196-
This month Microsoft Worldwide Learning announced [Applied Skills](https://techcommunity.microsoft.com/t5/microsoft-learn-blog/announcing-microsoft-applied-skills-the-new-credentials-to/ba-p/3775645) to help you acquire the technical skills you need to reach your full potential. Microsoft Sentinel is included in the initial set of credentials offered! This credential is based on the learning path with the same name.
197-
- **Learning path** - [Configure SIEM security operations using Microsoft Sentinel](/training/paths/configure-security-information-event-management-operations-using-microsoft-sentinel/)
198-
<br>Learn at your own pace, and the modules require you to have your own Azure subscription.
199-
- **Applied Skill** - [Configure SIEM security operations using Microsoft Sentinel](/credentials/applied-skills/configure-siem-security-operations-using-microsoft-sentinel/)
200-
<br>A 2 hour assessment is contained in a sandbox virtual desktop. You are provided an Azure subscription with some features already configured.
201-
202-
### Changes to the documentation table of contents
203-
204-
We've made some significant changes in how the Microsoft Sentinel documentation is organized in the table of contents on the left-hand side of the library. Two important things to know:
205-
206-
- Bookmarked links persist. Unless we retire an article, your saved and shared links to Microsoft Sentinel articles still work.
207-
- Articles used to be divided by concepts, how-tos, and tutorials. Now, the articles are organized by lifecycle or scenario with the related concepts, how-tos, and tutorials in those buckets.
208-
209-
We hope these changes to the organization makes your exploration of Microsoft Sentinel documentation more intuitive!
210-
211-
## September 2023
212-
213-
- [Improve SOX compliance with new workbook for SAP](#improve-sox-compliance-with-new-workbook-for-sap)
214-
215-
### Improve SOX compliance with new workbook for SAP
216-
217-
The **SAP Audit Controls workbook** is now provided to you as part of the [Microsoft Sentinel solution for SAP® applications](./sap/solution-overview.md).
218-
219-
This workbook helps you check your SAP® environment's security controls for compliance with your chosen control framework, be it [SOX](https://www.bing.com/search?q=sox+compliance+IT+security&qs=n&form=QBRE&sp=-1&lq=0&pq=sox+compliance+it+security&sc=8-26&sk=&cvid=3ACE338C88CE43368A223D4DB7FC35E6&ghsh=0&ghacc=0&ghpl=), [NIST](https://www.nist.gov/cyberframework/framework), or a custom framework of your choice.
220-
221-
The workbook provides tools for you to assign analytics rules in your environment to specific security controls and control families, monitor and categorize the incidents generated by the SAP solution-based analytics rules, and report on your compliance.
222-
223-
Learn more about the [**SAP Audit Controls workbook**](./sap/sap-audit-controls-workbook.md).
224-
225-
## August 2023
226-
227-
- [New incident investigation experience is now GA](#new-incident-investigation-experience-is-now-ga)
228-
- [Updated MISP2Sentinel solution utilizes the new upload indicators API.](#updated-misp2sentinel-solution)
229-
- [New and improved entity pages](#new-and-improved-entity-pages)
230-
231-
### New incident investigation experience is now GA
232-
233-
Microsoft Sentinel's comprehensive [incident investigation and case management experience](incident-investigation.md) is now generally available in both commercial and government clouds. This experience includes the revamped incident page, which itself includes displays of the incident's entities, insights, and similar incidents for comparison. The new experience also includes an incident log history and a task list.
234-
235-
Also generally available are the similar incidents widget and the ability to add entities to your threat intelligence list of indicators of compromise (IoCs).
236-
237-
- Learn more about [investigating incidents](investigate-incidents.md) in Microsoft Sentinel.
238-
239-
### Updated MISP2Sentinel solution
240-
241-
The open source threat intelligence sharing platform, MISP, has an updated solution to push indicators to Microsoft Sentinel. This notable solution utilizes the new upload indicators API to take advantage of workspace granularity and align the MISP ingested TI to STIX-based properties.
242-
243-
Learn more about the implementation details from the [MISP blog entry for MISP2Sentinel](https://www.misp-project.org/2023/08/26/MISP-Sentinel-UploadIndicatorsAPI.html/).
244-
245-
### New and improved entity pages
246-
247-
Microsoft Sentinel now provides you enhanced and enriched entity pages and panels, giving you more security information on user accounts, full entity data to enrich your incident context, and a reduction in latency for a faster, smoother experience.
248-
249-
- Read more about these changes in this blog post: [Taking Entity Investigation to the Next Level: Microsoft Sentinel’s Upgraded Entity Pages](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/taking-entity-investigation-to-the-next-level-microsoft-sentinel/ba-p/3878382).
250-
251-
- Learn more about [entities in Microsoft Sentinel](entities.md).
252-
253153
## Next steps
254154

255155
> [!div class="nextstepaction"]

0 commit comments

Comments
 (0)