Skip to content

Commit d6ba8b2

Browse files
authored
Merge pull request #202494 from yelevin/yelevin/ueba-edits
Added anomalies to entity timeline
2 parents 825c215 + c854d78 commit d6ba8b2

File tree

3 files changed

+53
-7
lines changed

3 files changed

+53
-7
lines changed

articles/sentinel/entities.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -72,15 +72,18 @@ Learn [which identifiers strongly identify an entity](entities-reference.md).
7272

7373
## Entity pages
7474

75-
When you encounter any entity (currently limited to users and hosts) in a search, an alert, or an investigation, you can select the entity and be taken to an **entity page**, a datasheet full of useful information about that entity. The types of information you will find on this page include basic facts about the entity, a timeline of notable events related to this entity and insights about the entity's behavior.
75+
When you encounter a user or host entity (IP address entities are in preview) in an entity search, an alert, or an investigation, you can select the entity and be taken to an **entity page**, a datasheet full of useful information about that entity. The types of information you will find on this page include basic facts about the entity, a timeline of notable events related to this entity and insights about the entity's behavior.
7676

7777
Entity pages consist of three parts:
7878

79-
- The left-side panel contains the entity's identifying information, collected from data sources like Azure Active Directory, Azure Monitor, Microsoft Defender for Cloud, and Microsoft Defender for Cloud.
79+
- The left-side panel contains the entity's identifying information, collected from data sources like Azure Active Directory, Azure Monitor, Microsoft Defender for Cloud, CEF/Syslog, and Microsoft 365 Defender.
8080

81-
- The center panel shows a graphical and textual timeline of notable events related to the entity, such as alerts, bookmarks, and activities. Activities are aggregations of notable events from Log Analytics. The queries that detect those activities are developed by Microsoft security research teams.
81+
- The center panel shows a graphical and textual timeline of notable events related to the entity, such as alerts, bookmarks, [anomalies](soc-ml-anomalies.md), and activities. Activities are aggregations of notable events from Log Analytics. The queries that detect those activities are developed by Microsoft security research teams, and you can now [add your own custom queries to detect activities](customize-entity-activities.md) of your choosing.
8282

83-
- The right-side panel presents behavioral insights on the entity. These insights help to quickly identify anomalies and security threats. The insights are developed by Microsoft security research teams, and are based on anomaly detection models.
83+
- The right-side panel presents behavioral insights on the entity. These insights help to quickly identify [anomalies](soc-ml-anomalies.md) and security threats. The insights are developed by Microsoft security research teams, and are based on anomaly detection models.
84+
85+
> [!NOTE]
86+
> The **IP address entity page** (now in preview) contains **geolocation data** supplied by the **Microsoft Threat Intelligence service**. This service combines geolocation data from Microsoft solutions and third-party vendors and partners. The data is then available for analysis and investigation in the context of a security incident. For more information, see also [Enrich entities in Microsoft Sentinel with geolocation data via REST API (Public preview)](geolocation-data-api.md).
8487
8588
### The timeline
8689

@@ -96,7 +99,9 @@ The following types of items are included in the timeline:
9699

97100
- Bookmarks - any bookmarks that include the specific entity shown on the page.
98101

99-
- Activities - aggregation of notable events relating to the entity.
102+
- Anomalies - UEBA detections based on dynamic baselines created for each entity across various data inputs and against its own historical activities, those of its peers, and those of the organization as a whole.
103+
104+
- Activities - aggregation of notable events relating to the entity. A wide range of activities are collected automatically, and you can now [customize this section by adding activities](customize-entity-activities.md) of your own choosing.
100105

101106
### Entity Insights
102107

@@ -119,6 +124,8 @@ Entity pages are designed to be part of multiple usage scenarios, and can be acc
119124

120125
:::image type="content" source="./media/identify-threats-with-entity-behavior-analytics/entity-pages-use-cases.png" alt-text="Entity page use cases":::
121126

127+
Entity page information is stored in the **BehaviorAnalytics** table, described in detail in the [Microsoft Sentinel UEBA enrichments reference](ueba-enrichments.md).
128+
122129
## Next steps
123130

124131
In this document, you learned about working with entities in Microsoft Sentinel. For practical guidance on implementation, and to use the insights you've gained, see the following articles:

articles/sentinel/identify-threats-with-entity-behavior-analytics.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,11 +66,12 @@ Learn more about [entities in Microsoft Sentinel](entities.md) and see the full
6666
When you encounter a user or host entity (IP address entities are in preview) in an entity search, an alert, or an investigation, you can select the entity and be taken to an **entity page**, a datasheet full of useful information about that entity. The types of information you will find on this page include basic facts about the entity, a timeline of notable events related to this entity and insights about the entity's behavior.
6767

6868
Entity pages consist of three parts:
69+
6970
- The left-side panel contains the entity's identifying information, collected from data sources like Azure Active Directory, Azure Monitor, Microsoft Defender for Cloud, CEF/Syslog, and Microsoft 365 Defender.
7071

71-
- The center panel shows a graphical and textual timeline of notable events related to the entity, such as alerts, bookmarks, and activities. Activities are aggregations of notable events from Log Analytics. The queries that detect those activities are developed by Microsoft security research teams, and you can now [add your own custom queries to detect activities](customize-entity-activities.md) of your choosing.
72+
- The center panel shows a graphical and textual timeline of notable events related to the entity, such as alerts, bookmarks, [anomalies](soc-ml-anomalies.md), and activities. Activities are aggregations of notable events from Log Analytics. The queries that detect those activities are developed by Microsoft security research teams, and you can now [add your own custom queries to detect activities](customize-entity-activities.md) of your choosing.
7273

73-
- The right-side panel presents behavioral insights on the entity. These insights help to quickly identify anomalies and security threats. The insights are developed by Microsoft security research teams, and are based on anomaly detection models.
74+
- The right-side panel presents behavioral insights on the entity. These insights help to quickly identify [anomalies](soc-ml-anomalies.md) and security threats. The insights are developed by Microsoft security research teams, and are based on anomaly detection models.
7475

7576
> [!NOTE]
7677
> The **IP address entity page** (now in preview) contains **geolocation data** supplied by the **Microsoft Threat Intelligence service**. This service combines geolocation data from Microsoft solutions and third-party vendors and partners. The data is then available for analysis and investigation in the context of a security incident. For more information, see also [Enrich entities in Microsoft Sentinel with geolocation data via REST API (Public preview)](geolocation-data-api.md).
@@ -89,6 +90,8 @@ The following types of items are included in the timeline:
8990

9091
- Bookmarks - any bookmarks that include the specific entity shown on the page.
9192

93+
- Anomalies - UEBA detections based on dynamic baselines created for each entity across various data inputs and against its own historical activities, those of its peers, and those of the organization as a whole.
94+
9295
- Activities - aggregation of notable events relating to the entity. A wide range of activities are collected automatically, and you can now [customize this section by adding activities](customize-entity-activities.md) of your own choosing.
9396

9497
### Entity Insights

articles/sentinel/whats-new.md

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,42 @@ If you're looking for items older than six months, you'll find them in the [Arch
2727
>
2828
> You can also contribute! Join us in the [Microsoft Sentinel Threat Hunters GitHub community](https://github.com/Azure/Azure-Sentinel/wiki).
2929
30+
## June 2022
31+
32+
- [Microsoft Purview Data Loss Prevention (DLP) integration in Microsoft Sentinel (Preview)](#microsoft-purview-data-loss-prevention-dlp-integration-in-microsoft-sentinel-preview)
33+
- [Incident update trigger for automation rules (Preview)](#incident-update-trigger-for-automation-rules-preview)
34+
35+
### Microsoft Purview Data Loss Prevention (DLP) integration in Microsoft Sentinel (Preview)
36+
37+
[Microsoft 365 Defender integration with Microsoft Sentinel](microsoft-365-defender-sentinel-integration.md) now includes the integration of Microsoft Purview DLP alerts and incidents in Microsoft Sentinel's incidents queue.
38+
39+
With this feature, you will be able to do the following:
40+
41+
- View all DLP alerts grouped under incidents in the Microsoft 365 Defender incident queue.
42+
43+
- View intelligent inter-solution (DLP-MDE, DLP-MDO) and intra-solution (DLP-DLP) alerts correlated under a single incident.
44+
45+
- Retain DLP alerts and incidents for **180 days**.
46+
47+
- Hunt for compliance logs along with security logs under Advanced Hunting.
48+
49+
- Take in-place administrative remediation actions on users, files, and devices.
50+
51+
- Associate custom tags to DLP incidents and filter by them.
52+
53+
- Filter the unified incident queue by DLP policy name, tag, Date, service source, incident status, and user.
54+
55+
In addition to the native experience in the Microsoft 365 Defender Portal, customers will also be able to use the one-click Microsoft 365 Defender connector to [ingest and investigate DLP incidents in Microsoft Sentinel](/microsoft-365/security/defender/investigate-dlp).
56+
57+
58+
### Incident update trigger for automation rules (Preview)
59+
60+
Automation rules are an essential tool for triaging your incidents queue, reducing the noise in it, and generally coping with the high volume of incidents in your SOC seamlessly and transparently. Previously you could create and run automation rules and playbooks that would run upon the creation of an incident, but your automation options were more limited past that point in the incident lifecycle.
61+
62+
You can now create automation rules and playbooks that will run when incident fields are modified - for example, when an owner is assigned, when its status or severity is changed, or when alerts and comments are added.
63+
64+
Learn more about the [update trigger in automation rules](automate-incident-handling-with-automation-rules.md).
65+
3066
## May 2022
3167

3268
- [Relate alerts to incidents](#relate-alerts-to-incidents-preview)

0 commit comments

Comments
 (0)