Skip to content

Commit 1f24973

Browse files
committed
Added AI MITRE attack recommendations
1 parent 372a73e commit 1f24973

File tree

2 files changed

+28
-16
lines changed

2 files changed

+28
-16
lines changed

articles/sentinel/soc-optimization/soc-optimization-access.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Optimize security operations
33
description: Use Microsoft Sentinel SOC optimization recommendations to optimize your security operations center (SOC) team activities.
4-
ms.author: bagol
5-
author: batamig
6-
manager: raynew
4+
ms.author: abbyweisberg
5+
author: AbbyMSFT
6+
manager: orpsod
77
ms.collection:
88
- usx-security
99
ms.topic: how-to
10-
ms.date: 10/16/2024
10+
ms.date: 05/06/2025
1111
appliesto:
1212
- Microsoft Sentinel in the Microsoft Defender portal
1313
- Microsoft Sentinel in the Azure portal
@@ -107,8 +107,9 @@ SOC optimization recommendations are calculated every 24 hours. Each optimizatio
107107

108108
Filter the optimizations based on optimization type, or search for a specific optimization title using the search box on the side. Optimization types include:
109109

110-
- **Coverage**: Includes threat-based recommendations for adding security controls to help close coverage gaps for various types of attacks, and risk-based recommendations for adding security controls to help close coverage gaps for various types of business risks.
111-
-
110+
- **Coverage** : Includes recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. Includes:
111+
- **Threat-based recommendations** for adding security controls to help close coverage gaps for various types of attacks.
112+
- **AI MITRE ATT&CK recommendations** for adding tagging recommendations to help close coverage gaps for various types of attacks, based on the MITRE ATT&CK framework. - **Risk-based recommendations** for adding security controls to help close coverage gaps for various types of business risks.
112113
- **Data value**: Includes recommendations that suggest ways to improve your data usage for maximizing security value from ingested data, or suggest a better data plan for your organization.
113114

114115
### View optimization details and take action

articles/sentinel/soc-optimization/soc-optimization-reference.md

Lines changed: 21 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: orspod
77
ms.collection:
88
- usx-security
99
ms.topic: reference
10-
ms.date: 04/28/2025
10+
ms.date: 05/06/2025
1111
appliesto:
1212
- Microsoft Sentinel in the Microsoft Defender portal
1313
- Microsoft Sentinel in the Azure portal
@@ -27,8 +27,8 @@ Microsoft Sentinel SOC optimizations include the following types of recommendati
2727

2828
- **Coverage based recommendations** suggest adding controls to prevent coverage gaps that can lead to vulnerability to attacks or scenarios that can lead to financial loss.
2929
- **Threat-based recommendations** suggest adding security controls that help you detect coverage gaps to prevent attacks and vulnerabilities.
30-
31-
- **Risk-based recommendations** suggest adding controls to detect coverage gaps that correlate with use cases that could lead to business risks and financial loss, including Operational, Financial, Reputational, Compliance and Legal business risks.
30+
- **AI MITRE ATT&CK tagging recommendations (Preview)** increase security coverage using artificial intelligence to automatically tag security detections with MITRE ATT&CK tactics and techniques.
31+
- **Risk-based recommendations (Preview)** suggest adding controls to detect coverage gaps that correlate with use cases that could lead to business risks and financial loss, including Operational, Financial, Reputational, Compliance, and Legal business risks.
3232

3333
- **Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
3434

@@ -48,7 +48,7 @@ The following table lists the available types of data value SOC optimization rec
4848
|---------|---------|
4949
| The table wasn't used by analytics rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move the table to a [basic logs plan](../billing.md#auxiliary-logs) if the table is eligible. |
5050
| The table wasn’t used at all in the last 30 days. | Turn on analytics rule templates <br>OR<br> Stop data ingestion and remove the table or move the table to long term retention. |
51-
| The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a non-security Log Analytics workspace. |
51+
| The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a nonsecurity Log Analytics workspace. |
5252

5353
If a table is chosen for [UEBA](/azure/sentinel/enable-entity-behavior-analytics) or a [threat intelligence matching analytics rule](/azure/sentinel/use-matching-analytics-to-detect-threats), SOC optimization doesn't recommend any changes in ingestion.
5454

@@ -71,7 +71,7 @@ Coverage-based optimization recommendations help you close coverage gaps against
7171

7272
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
7373

74-
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks.
74+
SOC optimization provides threat-based recommendations by analyzing your ingested logs and enabled analytics rules, then comparing them to the logs and detections needed to address specific types of attacks.
7575

7676
Threat-based optimizations consider both predefined and user-defined detections.
7777

@@ -83,14 +83,25 @@ The following table lists the available types of threat-based SOC optimization r
8383
| Templates are turned on, but data sources are missing. | Connect new data sources. |
8484
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
8585

86-
### Risk-based optimization recommendations
86+
### AI MITRE ATT&CK tagging recommendations (Preview)
87+
88+
The AI MITRE ATT&CK Tagging feature uses artificial intelligence to automatically tag security detections. The AI model runs on the customer's workspace to create tagging recommendations for untagged detections with relevant MITRE ATT&CK tactic and techniques.
89+
90+
Customers can apply these recommendations to ensure their security coverage is thorough and precise. This ensures complete and accurate security coverage, enhancing threat detection and response capabilities.
8791

88-
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
92+
These are 3 ways to apply the AI MITRE ATT&CK tagging recommendations:
93+
- Apply the recommendation to a specific analytics rule.
94+
- Apply the recommendation to all analytics rules in the workspace.
95+
- Don't apply the recommendation to any analytics rules.
96+
97+
### Risk-based optimization recommendations (Preview)
98+
99+
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance, and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
89100

90101
To provide risk-based recommendations, SOC optimization looks at your ingested logs and analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks that may cause business risks.
91102
Risk-based recommendations optimizations consider both predefined and user-defined detections.
92103

93-
The following table lists the available types of threat-based SOC optimization recommendations:
104+
The following table lists the available types of risk-based SOC optimization recommendations:
94105

95106
| Type of observation | Action |
96107
|---------|---------|
@@ -108,9 +119,9 @@ SOC optimization uses advanced machine learning to identify tables that are miss
108119

109120
### Considerations
110121

111-
- Not all workspaces get similar organizations recommendations. A workspace receives these recommendations only if our machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't. SOCs in their early or onboarding stages are more likely to receive these recommendations than SOCs with a higher level of maturity.
122+
- A workspace only receives similar organization recommendations if the machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't. SOCs in their early or onboarding stages are more likely to receive these recommendations than SOCs with a higher level of maturity. Not all workspaces get similar organizations recommendations.
112123

113-
- Recommendations are based on machine learning models that rely solely on Organizational Identifiable Information (OII) and system metadata. The models never access or analyze the content of customer logs or ingest them at any point. No customer data, content, or personal data (EUII) is exposed to the analysis.
124+
- The machine learning models never access or analyze the content of customer logs or ingest them at any point. No customer data, content, or personal data (EUII) is exposed to the analysis. Recommendations are based on machine learning models that rely solely on Organizational Identifiable Information (OII) and system metadata.
114125

115126
## Related content
116127

0 commit comments

Comments
 (0)