Blog Post

Microsoft Sentinel Blog
5 MIN READ

Microsoft Sentinel’s AI-driven UEBA ushers in the next era of behavioral analytics

MichalShechter's avatar
Sep 09, 2025
Co-author - Ashwin Patil

Security teams today face an overwhelming challenge: every data point is now a potential security signal and SOCs are drowning in complex logs, trying to find the needle in the haystack. Microsoft Sentinel User and Entity Behavior Analytics (UEBA) brings the power of AI to automatically surface anomalous behaviors, helping analysts cut through the noise, save time, and focus on what truly matters. 

Microsoft Sentinel UEBA has already helped SOCs uncover insider threats, detect compromised accounts, and reveal subtle attack signals that traditional rule-based methods often miss. These capabilities were previously powered by a core set of high-value data sources - such as sign-in activity, audit logs, and identity signals - that consistently delivered rich context and accurate detections. 

Today, we’re excited to announce a major expansion: Sentinel UEBA now supports six new data sources including Microsoft first- and third-party platforms like Azure, AWS, GCP, and Okta, bringing deeper visibility, broader context, and more powerful anomaly detection tailored to your environment. This isn’t just about ingesting more logs. It’s about transforming how SOCs understand behavior, detect threats, and prioritize response. 

With this evolution, analysts gain a unified, cross-platform view of user and entity behavior, enabling them to correlate signals, uncover hidden risks, and act faster with greater confidence. 

 

Newly supported data sources are built for real-world security use cases: 

Authentication activities 

  • MDE DeviceLogonEvents – Ideal for spotting lateral movement and unusual access. 
  • AADManagedIdentitySignInLogs – Critical for spotting stealthy abuse of non - human identities. 
  • AADServicePrincipalSignInLogs - Identifying anomalies in service principal usage such as token theft or over - privileged automation. 
     

Cloud platforms & identity management 

  • AWS CloudTrail Login Events - Surfaces risky AWS account activity based on AWS CloudTrail ConsoleLogin events and logon related attributes. 
  • GCP Audit Logs - Failed IAM Access, Captures denied access attempts indicating reconnaissance, brute force, or privilege misuse in GCP. 
  • Okta MFA & Auth Security Change Events – Flags MFA challenges, resets, and policy modifications that may reveal MFA fatigue, session hijacking, or policy tampering. Currently supports the Okta_CL table (unified Okta connector support coming soon). 

These sources feed directly into UEBA’s entity profiles and baselines - enriching users, devices, and service identities with behavioral context and anomalies that would otherwise be fragmented across platforms. This will complement our existing supported log sources - monitoring Entra ID sign-in logs, Azure Activity logs and Windows Security Events. Due to the unified schema available across data sources, UEBA enables feature-rich investigation and the capability to correlate across data sources, cross platform identities or devices insights, anomalies, and more. 

 

AI-powered UEBA that understands your environment 

Microsoft Sentinel UEBA goes beyond simple log collection - it continuously learns from your environment. By applying AI models trained on your organization’s behavioral data, UEBA builds dynamic baselines and peer groups, enabling it to spot truly anomalous activity. UBEA builds baselines from 10 days (for uncommon activities) to 6 months, both for the user and their dynamically calculated peers. Then, insights are surfaced on the activities and logs - such as an uncommon activity or first-time activity - not only for the user but among peers. Those insights are used by an advanced AI model to identify high confidence anomalies. So, if a user signs in for the first time from an uncommon location, a common pattern in the environment due to reliance on global vendors, for example, then this will not be identified as an anomaly, keeping the noise down. However, in a tightly controlled environment, this same behavior can be an indication of an attack and will surface in the Anomalies table. Including those signals in custom detections can help affect the severity of an alert. So, while logic is maintained, the SOC is focused on the right priorities. 

 

How to use UEBA for maximum impact 

Security teams can leverage UEBA in several key ways. All the examples below leverage UEBA’s dynamic behavioral baselines looking back up to 6 months. Teams can also leverage the hunting queries from the "UEBA essentials" solution in Microsoft Sentinel's Content Hub.

Behavior Analytics: 
Detect unusual logon times, MFA fatigue, or service principal misuse across hybrid environments. Get visibility into geo-location of events and Threat Intelligence insights. Here’s an example of how you can easily discover Accounts authenticating without MFA and from uncommonly connected countries using UEBA behaviorAnalytics table: 

BehaviorAnalytics  
| where TimeGenerated > ago(7d) 
| where EventSource == "AwsConsoleSignIn" 
| where ActionType == "ConsoleLogin" and ActivityType == "signin.amazonaws.com" 
| where ActivityInsights.IsMfaUsed == "No"  
| where ActivityInsights.CountryUncommonlyConnectedFromInTenant == True 
| evaluate bag_unpack(UsersInsights, "AWS_") 
| where InvestigationPriority > 0  // Filter noise  -  uncomment if you want to see low fidelity noise 
| project TimeGenerated, _WorkspaceId, ActionType, ActivityType, InvestigationPriority, SourceIPAddress, SourceIPLocation, AWS_UserIdentityType, AWS_UserIdentityAccountId, AWS_UserIdentityArn 

 

Anomaly detection 
Identify lateral movement, dormant account reactivation, or brute-force attempts, even when they span cloud platforms. Below are examples of how to discover UEBA Anomalous AwsCloudTrail anomalies via various UEBA activity insights or device insights attributes: 

Anomalies
| where AnomalyTemplateName in (  
    "UEBA Anomalous Logon in AwsCloudTrail", // AWS ClousTrail anomalies 
    "UEBA Anomalous MFA Failures in Okta_CL", "UEBA Anomalous Activity in Okta_CL", // Okta Anomalies 
    "UEBA Anomalous Activity in GCP Audit Logs", // GCP Failed IAM access anomalies 
    "UEBA Anomalous Authentication" // For Authentication related anomalies 
) 
| project TimeGenerated, _WorkspaceId, AnomalyTemplateName, AnomalyScore, Description, AnomalyDetails, ActivityInsights, DeviceInsights, UserInsights, Tactics, Techniques 

 

Alert optimization 
Use UEBA signals to dynamically adjust alert severity in custom detections—turning noisy alerts into high-fidelity detections.  

The example below shows all the users with anomalous sign in patterns based on UEBA. Joining the results with any of the AWS alerts with same AWS identity will increase fidelity.  

BehaviorAnalytics  
| where TimeGenerated > ago(7d) 
| where EventSource == "AwsConsoleSignIn" 
| where ActionType == "ConsoleLogin" and ActivityType == "signin.amazonaws.com" 
| where ActivityInsights.FirstTimeConnectionViaISPInTenant == True or ActivityInsights.FirstTimeUserConnectedFromCountry == True 
| evaluate bag_unpack(UsersInsights, "AWS_") 
| where InvestigationPriority > 0  // Filter noise  -  uncomment if you want to see low fidelity noise 
| project TimeGenerated, _WorkspaceId, ActionType, ActivityType, InvestigationPriority, SourceIPAddress, SourceIPLocation, AWS_UserIdentityType, AWS_UserIdentityAccountId, AWS_UserIdentityArn, ActivityInsights 
| evaluate bag_unpack(ActivityInsights) 

Another example shows anomalous key vault access from service principal with uncommon source country location. Joining this activity with other alerts from the same service principle increases fidelity of the alerts. You can also join the anomaly UEBA Anomalous Authentication with other alerts from the same identity to bring the full power of UEBA into your detections. 

BehaviorAnalytics 
| where TimeGenerated > ago(1d) 
| where EventSource == "Authentication" and SourceSystem == "AAD" 
| evaluate bag_unpack(ActivityInsights) 
| where LogonMethod == "Service Principal" and Resource == "Azure Key Vault" 
| where ActionUncommonlyPerformedByUser == "True" and CountryUncommonlyConnectedFromByUser == "True" 
| where InvestigationPriority > 0 

 

Final thoughts 

This release marks a new chapter for Sentinel UEBA—bringing together AI, behavioral analytics, and cross-cloud and identity management visibility to help defenders stay ahead of threats. 

If you haven’t explored UEBA yet, now’s the time. Enable it in your workspace settings and don’t forget to enable anomalies as well (in Anomalies settings). And if you’re already using it, these new sources will help you unlock even more value. 

Stay tuned for our upcoming Ninja show and webinar (register at aka.ms/secwebinars), where we’ll dive deeper into use cases. Until then, explore the new sources, use the UEBA workbook, update your watchlists, and let UEBA do the heavy lifting. 

Updated Sep 09, 2025
Version 2.0

1 Comment

  • The expansion of Microsoft Sentinel UEBA to include AWS, GCP, and Okta is a significant milestone for enhancing cross-platform visibility and behavioral analytics. It’s exciting to see how these new data signals are enriching anomaly detection and investigation workflows. I’m eager to see how customers will leverage these capabilities to reduce alert fatigue, uncover stealthy threats, and sharpen their detection strategies across hybrid environments.