🚀 New Data Sources for Enhanced User and Entity Behavior Analytics (UEBA) in Microsoft Sentinel (Preview)
Microsoft Sentinel’s UEBA now empowers SOC teams with even deeper, AI-driven anomaly detection—thanks to six new data sources!
What’s new?
Microsoft authentication sources:
🔹Defender XDR device logon events: Detect lateral movement, unusual access, or compromised endpoints.
🔹Entra ID managed identity sign-in logs: Monitor automation/service account activity to catch silent misuse.
🔹Entra ID service principal sign-in logs: Track app/script sign-ins for unexpected access or privilege escalation.
Third-party cloud & identity platforms:
🔹AWS CloudTrail login events: Flag risky AWS logins, failed MFA, or root account use.
🔹GCP audit logs – Failed IAM access: Identify denied access attempts and privilege escalation in Google Cloud.
🔹Okta MFA & authentication security changes: Surface MFA challenges and policy changes—potential signals of targeted attacks.
Why does this matter? These new sources enrich UEBA’s ability to detect identity compromise, privilege misuse, and risky behaviors—across Microsoft and hybrid environments. You get enhanced user, device, and service identity context, plus new cross-platform anomaly detection.
💡 To get to the Entity behavior configuration page:
1. From the Microsoft Defender portal navigation menu, select Settings > Microsoft Sentinel > SIEM workspaces.
2. Select the workspace you want to configure.
3. From the workspace configuration page, select Entity behavior analytics > Configure UEBA.
Read more:https://lnkd.in/dEMj4KJV
#MicrosoftSentinel #UEBA #SOC #CyberSecurity #CloudSecurity #SIEM #IdentityProtection #DefenderXDR
Every Minute We Deliver Proactive IT & Security For Finance and Hospitality Ensuring Your Business Remains Protected & Confidential 24/7.
2wsuper excited