Security

Microsoft Sentinel UEBA Expands AWS Detection

3 min read

Summary

Microsoft Sentinel UEBA now adds richer behavioral analytics for AWS CloudTrail data, giving security teams built-in context like first-time geography, uncommon ISP, unusual actions, and abnormal operation volume. The update helps defenders detect suspicious AWS activity faster and reduces the need for complex KQL baselines and manual enrichment.

Need help with Security?Talk to an Expert

Introduction

Microsoft is expanding Microsoft Sentinel UEBA to strengthen AWS threat detection with richer behavioral analytics. For security operations teams managing hybrid and multi-cloud environments, this matters because AWS CloudTrail events now arrive with built-in context that can speed up investigations and improve detection quality.

Instead of relying on complex KQL queries, static thresholds, or manually maintained baselines, defenders can use precomputed UEBA insights to identify suspicious behavior in AWS activity more quickly.

What’s new in Microsoft Sentinel UEBA for AWS

Microsoft has added broader UEBA support across multi-cloud and identity data sources, including AWS, GCP, Okta, and more authentication logs. For AWS specifically, the key enhancements include:

  • More AWS behavioral enrichments for CloudTrail events at ingestion time
  • Binary insights such as:
    • First-time geography
    • Uncommon ISP
    • Unusual action
    • Abnormal operation volume
  • BehaviorAnalytics table support for AWS activity, exposing user, device, and activity insights
  • Anomalies table with six built-in AWS anomaly detections from Microsoft’s machine learning models
  • Defender portal integration for surfacing UEBA anomalies in user entity pages and incident graphs

Microsoft refers to this approach as binary feature stacking, where analysts combine simple true/false behavioral indicators to quickly spot attacker activity that may otherwise blend into normal AWS operations.

Why this matters for security teams

AWS investigations often depend on raw CloudTrail logs and custom logic to determine whether behavior is actually suspicious. That process can be time-consuming and expensive, especially in fast-changing cloud environments.

With Sentinel UEBA, administrators and analysts get:

  • Faster triage of AWS alerts
  • Less reliance on manually engineered KQL baselines
  • Better context for both human and non-human identities
  • More consistent anomaly detection across hybrid and multi-cloud estates

The update is especially useful for SOC teams that want to reduce alert fatigue while improving visibility into risky AWS actions such as unusual logons, IAM privilege changes, or previously unseen user agents.

Key implementation details

The AWS behavioral context appears in two main tables:

BehaviorAnalytics

This is the main investigation surface for UEBA-enriched AWS activity. It includes fields such as EventSource, ActivityType, and ActionType, plus dynamic insight fields like UserInsights, DeviceInsights, and ActivityInsights.

Anomalies

This table contains Microsoft’s pre-trained anomaly detections for AWS. Records include:

  • MITRE ATT&CK mappings
  • AnomalyScore
  • AnomalyReasons
  • Related behavioral enrichments

What IT and security admins should do next

  • Review current AWS CloudTrail detections in Sentinel
  • Identify analytics rules that rely on heavy baseline logic
  • Test UEBA enrichments in the BehaviorAnalytics and Anomalies tables
  • Use Defender portal hunting workflows to investigate user anomalies faster
  • Update SOC playbooks to take advantage of precomputed AWS behavioral context

For organizations securing AWS alongside Microsoft environments, this update can simplify detection engineering and improve response efficiency.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Microsoft SentinelUEBAAWSCloudTrailthreat detection

Related Posts

Security

Microsoft AI-Powered Defense for Emerging AI Threats

Microsoft says AI is accelerating how vulnerabilities are found and exploited, shrinking the time defenders have to respond. In response, the company is expanding AI-driven vulnerability discovery, exposure management, and Defender-based protections, while also previewing a new multi-model scanning solution for customers in June 2026.

Security

Microsoft Defender Detects Infiltrating IT Workers

Microsoft has outlined detection strategies for identifying North Korea-aligned threat actors posing as remote IT hires to infiltrate organizations. The guidance focuses on correlating HR SaaS, identity, email, conferencing, and Microsoft 365 signals so security and HR teams can spot suspicious candidates before and after onboarding.

Security

Opportunistic Cyberattacks: Microsoft’s Design Playbook

Microsoft is urging organizations to make opportunistic cyberattacks harder by removing credentials, shrinking public attack surfaces, and standardizing secure platform patterns. The guidance is especially relevant for teams running Azure, Dynamics 365, and Power Platform workloads at scale, where inconsistent architectures and exposed secrets can make lateral movement easier for attackers.

Security

Cross-Tenant Teams Impersonation Attack Playbook

Microsoft has detailed a human-operated intrusion chain where attackers use cross-tenant Microsoft Teams chats to impersonate helpdesk staff and trick users into granting remote access through tools like Quick Assist. The campaign matters because it blends legitimate collaboration, remote support, and admin tools to enable lateral movement, persistence, and data exfiltration while appearing like normal IT activity.

Security

Microsoft Defender Predictive Shielding Stops AD Attacks

Microsoft detailed how Defender’s predictive shielding can contain Active Directory domain compromise by restricting exposed high-privilege accounts before attackers can reuse stolen credentials. The capability helps security teams reduce lateral movement and close the response gap during fast-moving identity attacks.

Security

Sapphire Sleet macOS Intrusion: Key Defender Insights

Microsoft Threat Intelligence detailed a macOS-focused campaign by Sapphire Sleet that uses social engineering and fake software updates instead of exploiting vulnerabilities. The attack chain relies on user-initiated AppleScript and Terminal execution to bypass native macOS protections, making layered defenses, user awareness, and endpoint detection especially important.