Skip to content

Commit b540a1e

Browse files
authored
Merge branch 'main' into AHtimeilne
2 parents 0c8dd06 + 7eddd09 commit b540a1e

File tree

5 files changed

+39
-6
lines changed

5 files changed

+39
-6
lines changed

defender-xdr/investigate-incidents.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,9 @@ The ***go hunt*** action takes advantage of the [advanced hunting](advanced-hunt
8787
- See all available queries – the option returns all available queries for the entity type you're investigating.
8888
- All Activity – the query returns all activities associated with an entity, providing you with a comprehensive view of the incident's context.
8989
- Related Alerts – the query searches for and returns all security alerts involving a specific entity, ensuring you don't miss any information.
90+
- All User anomalies (Preview) – the query returns all anomalies associated with the user from the past 30 days, helping you identify unusual behavior that might be relevant to the incident. Available only for user entities if you have enabled [Microsoft Sentinel User and Entity Behavior Analytics (UEBA)](/azure/sentinel/identify-threats-with-entity-behavior-analytics).
9091

91-
:::image type="content" source="./media/investigate-incidents/fig1-gohunt-attackstory.png" alt-text="Selecting the go hunt option on a device in an attack story" lightbox="./media/investigate-incidents/fig1-gohunt-attackstory.png":::
92+
:::image type="content" source="./media/investigate-incidents/gohunt-attackstory.png" alt-text="Selecting the go hunt option on a device in an attack story" lightbox="./media/investigate-incidents/gohunt-attackstory.png":::
9293

9394
The resulting logs or alerts can be linked to an incident by selecting a result and then selecting *Link to incident*.
9495

defender-xdr/investigate-users.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -57,17 +57,20 @@ The identity page shows the Microsoft Entra organization and groups, helping you
5757

5858
### Entity details
5959

60-
The **Entity details** panel on the left side of the page provides information about the user, such as the Microsoft Entra identity risk level, the insider risk severity level (Preview), the number of devices the user is signed in to, when the user was first and last seen, the user's accounts, groups that the user belongs to, contact information, and more. You see other details depending on the integration features you enabled.
60+
The **Entity details** panel on the left side of the page provides information about the user, such as the Microsoft Entra identity risk level, the insider risk severity level (Preview), the number of devices the user is signed in to, when the user was first and last seen, the user's accounts, groups that the user belongs to, and contact information. This card includes all incidents and alerts associated with the user entity, grouped by severity.
6161

6262
> [!NOTE]
6363
> **Investigation Priority Score** was deprecated on December 3, 2024. The Investigation Priority Score breakdown and the Scored activities cards are no longer available.
6464
65-
> [!NOTE]
66-
> (Preview) Microsoft Defender XDR users with access to [Microsoft Purview Insider Risk Management](/purview/insider-risk-management-solution-overview) can now see a user's insider risk severity and gain insights on a user's suspicious activities in the user page. Select the **insider risk severity** under Entity details to see the risk insights about the user.
67-
### Visual view of incidents and alerts
65+
You see other details depending on the services and features you enabled, including:
6866

69-
This card includes all incidents and alerts associated with the user entity, grouped by severity.
67+
- (Preview) Microsoft Defender XDR users with access to [Microsoft Purview Insider Risk Management](/purview/insider-risk-management-solution-overview) can now see a user's insider risk severity and gain insights on a user's suspicious activities in the user page. Select the **insider risk severity** under Entity details to see the risk insights about the user.
68+
- (Preview) If you enable [Microsoft Sentinel User and Entity Behavior Analytics (UEBA)](/azure/sentinel/identify-threats-with-entity-behavior-analytics), you'll see:
69+
- The user's top three UEBA anomalies from the last 30 days.
70+
- Links to launch pre-built advanced hunting queries and view all anomalous behaviors related to the user on the [Sentinel events tab](#microsoft-sentinel-events).
71+
This is available only for customers who have UEBA enabled.
7072

73+
7174
### Active directory account controls
7275

7376
This card highlights important Microsoft Defender for Identity security settings for the user's account. For example, it shows if the user can bypass the password by pressing enter, or if the user's password never expires. Review these flags to identify account settings that might need your attention.
Binary file not shown.
134 KB
Loading

unified-secops-platform/whats-new.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,35 @@ ms.topic: concept-article
2222
This article lists recent features added for unified security operations in the Microsoft Defender portal.
2323

2424

25+
## November 2025
26+
27+
### New Entity Behavior Analytics (UEBA) experiences in the Defender portal (Preview)
28+
29+
Microsoft Sentinel introduces new UEBA experiences in the Defender portal, bringing behavioral insights directly into key analyst workflows. These enhancements help analysts prioritize investigations and apply UEBA context more effectively.
30+
31+
#### Anomaly-focused user investigations
32+
33+
In the Defender portal, users with behavioral anomalies are automatically tagged with **UEBA Anomalies**, helping analysts quickly identify which users to prioritize.
34+
35+
Analysts can view the top three anomalies from the past 30 days in a dedicated Top UEBA anomalies section, available in:
36+
37+
- User side panels accessible from various portal locations.
38+
- The **Overview** tab of user entity pages.
39+
40+
This section also includes direct links to anomaly queries and the Sentinel events timeline, enabling deeper investigation and faster context gathering.
41+
42+
#### Drilldown to user anomalies from incident graphs
43+
44+
Analysts can quickly access all anomalies related to a user by selecting **Go Hunt > All user anomalies** from the incident graph. This built-in query provides immediate UEBA context to support deeper investigation.
45+
46+
#### Enriched advanced hunting and custom detections queries with behavior insights
47+
48+
Advanced hunting and custom detection experiences now include a contextual banner that prompts analysts to join the UEBA Anomalies table to queries that include UEBA data sources.
49+
50+
All features require UEBA to be enabled and are workspace-scoped to the currently selected workspace.
51+
52+
For more information, see [UEBA experiences in the Defender portal empower analysts and streamline workflows](/azure/sentinel/identify-threats-with-entity-behavior-analytics.md#ueba-experiences-in-the-defender-portal-empower-analysts-and-streamline-workflows).
53+
2554
## September 2025
2655

2756

0 commit comments

Comments
 (0)