Skip to content

Commit ea0c746

Browse files
committed
Cleanup
1 parent 091ecf0 commit ea0c746

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

articles/sentinel/whats-new.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,26 +27,27 @@ If you're looking for items older than six months, you'll find them in the [Arch
2727
2828
## October 2022
2929

30-
- [Heads up: Account enrichment fields removed from Azure AD Identity Protection connector](#heads-up-account-enrichment-fields-removed-from-azure-ad-identity-protection-connector)
30+
- [Account enrichment fields removed from Azure AD Identity Protection connector](#account-enrichment-fields-removed-from-azure-ad-identity-protection-connector)
3131
- [Microsoft 365 Defender now integrates Azure Active Directory Identity Protection (AADIP)](#microsoft-365-defender-now-integrates-azure-active-directory-identity-protection-aadip)
3232
- [Out of the box anomaly detection on the SAP audit log (Preview)](#out-of-the-box-anomaly-detection-on-the-sap-audit-log-preview)
3333
- [IoT device entity page (Preview)](#iot-device-entity-page-preview)
3434

35-
### Heads up: Account enrichment fields removed from Azure AD Identity Protection connector
35+
### Account enrichment fields removed from Azure AD Identity Protection connector
3636

37-
As of **September 30 2022**, alerts coming from the Azure Activity Directory Information Protection connector no longer contain the following fields:
37+
As of **September 30, 2022**, alerts coming from the **Azure Activity Directory Information Protection connector** no longer contain the following fields:
3838

3939
- CompromisedEntity
4040
- ExtendedProperties["User Account"]
4141
- ExtendedProperties["User Name”]
4242

4343
We are working to adapt Microsoft Sentinel's built-in queries and other operations affected by this change to look up these values in other ways (using the *IdentityInfo* table).
4444

45-
In the meantime, or if you've built any custom queries or rules directly referencing these fields, you'll need another way to get this information. Use the following two-step process to look up these values in the *IdentityInfo* table:
45+
In the meantime, or if you've built any custom queries or rules directly referencing these fields, you'll need another way to get this information. Use the following two-step process to have your queries look up these values in the *IdentityInfo* table:
4646

4747
1. If you haven't already, **enable the UEBA solution** to sync the *IdentityInfo* table with your Azure AD logs. Follow the instructions in [this document](enable-entity-behavior-analytics.md).
4848
(If you don't intend to use UEBA in general, you can ignore the last instruction about selecting data sources on which to enable entity behavior analytics.)
49-
1. Incorporate the query below in your existing custom queries or rules to look up this data by joining the *SecurityAlert* table with the *IdentityInfo* table.
49+
50+
1. Incorporate the query below in your existing queries or rules to look up this data by joining the *SecurityAlert* table with the *IdentityInfo* table.
5051

5152
```kusto
5253
SecurityAlert

0 commit comments

Comments
 (0)