Skip to content

Commit d1035cd

Browse files
authored
Added link to reference doc
1 parent ed86ecc commit d1035cd

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

articles/sentinel/identify-threats-with-entity-behavior-analytics.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,7 @@ As legacy defense tools become obsolete, organizations may have such a vast and
166166
In this document, you learned about Microsoft Sentinel's entity behavior analytics capabilities. For practical guidance on implementation, and to use the insights you've gained, see the following articles:
167167

168168
- [Enable entity behavior analytics](./enable-entity-behavior-analytics.md) in Microsoft Sentinel.
169+
- See the [list of anomalies](anomalies-reference.md#ueba-anomalies) detected by the UEBA engine.
169170
- [Investigate incidents with UEBA data](investigate-with-ueba.md).
170171
- [Hunt for security threats](./hunting.md).
171172

0 commit comments

Comments
 (0)