You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-access.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
2
title: Optimize security operations
3
3
description: Use Microsoft Sentinel SOC optimization recommendations to optimize your security operations center (SOC) team activities.
4
-
ms.author: bagol
5
-
author: batamig
6
-
manager: raynew
4
+
ms.author: abbyweisberg
5
+
author: AbbyMSFT
6
+
manager: orpsod
7
7
ms.collection:
8
8
- usx-security
9
9
ms.topic: how-to
10
-
ms.date: 10/16/2024
10
+
ms.date: 05/06/2025
11
11
appliesto:
12
12
- Microsoft Sentinel in the Microsoft Defender portal
13
13
- Microsoft Sentinel in the Azure portal
@@ -107,8 +107,9 @@ SOC optimization recommendations are calculated every 24 hours. Each optimizatio
107
107
108
108
Filter the optimizations based on optimization type, or search for a specific optimization title using the search box on the side. Optimization types include:
109
109
110
-
-**Coverage**: Includes threat-based recommendations for adding security controls to help close coverage gaps for various types of attacks, and risk-based recommendations for adding security controls to help close coverage gaps for various types of business risks.
111
-
-
110
+
-**Coverage** : Includes recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. Includes:
111
+
-**Threat-based recommendations** for adding security controls to help close coverage gaps for various types of attacks.
112
+
-**AI MITRE ATT&CK recommendations** for adding tagging recommendations to help close coverage gaps for various types of attacks, based on the MITRE ATT&CK framework. - **Risk-based recommendations** for adding security controls to help close coverage gaps for various types of business risks.
112
113
-**Data value**: Includes recommendations that suggest ways to improve your data usage for maximizing security value from ingested data, or suggest a better data plan for your organization.
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-reference.md
+21-10Lines changed: 21 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: orspod
7
7
ms.collection:
8
8
- usx-security
9
9
ms.topic: reference
10
-
ms.date: 04/28/2025
10
+
ms.date: 05/06/2025
11
11
appliesto:
12
12
- Microsoft Sentinel in the Microsoft Defender portal
13
13
- Microsoft Sentinel in the Azure portal
@@ -27,8 +27,8 @@ Microsoft Sentinel SOC optimizations include the following types of recommendati
27
27
28
28
-**Coverage based recommendations** suggest adding controls to prevent coverage gaps that can lead to vulnerability to attacks or scenarios that can lead to financial loss.
29
29
-**Threat-based recommendations** suggest adding security controls that help you detect coverage gaps to prevent attacks and vulnerabilities.
30
-
31
-
-**Risk-based recommendations** suggest adding controls to detect coverage gaps that correlate with use cases that could lead to business risks and financial loss, including Operational, Financial, Reputational, Compliance and Legal business risks.
30
+
-**AI MITRE ATT&CK tagging recommendations (Preview)** increase security coverage using artificial intelligence to automatically tag security detections with MITRE ATT&CK tactics and techniques.
31
+
-**Risk-based recommendations (Preview)** suggest adding controls to detect coverage gaps that correlate with use cases that could lead to business risks and financial loss, including Operational, Financial, Reputational, Compliance, and Legal business risks.
32
32
33
33
-**Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
34
34
@@ -48,7 +48,7 @@ The following table lists the available types of data value SOC optimization rec
48
48
|---------|---------|
49
49
| The table wasn't used by analytics rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move the table to a [basic logs plan](../billing.md#auxiliary-logs) if the table is eligible. |
50
50
| The table wasn’t used at all in the last 30 days. | Turn on analytics rule templates <br>OR<br> Stop data ingestion and remove the table or move the table to long term retention. |
51
-
| The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a non-security Log Analytics workspace. |
51
+
| The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a nonsecurity Log Analytics workspace. |
52
52
53
53
If a table is chosen for [UEBA](/azure/sentinel/enable-entity-behavior-analytics) or a [threat intelligence matching analytics rule](/azure/sentinel/use-matching-analytics-to-detect-threats), SOC optimization doesn't recommend any changes in ingestion.
54
54
@@ -71,7 +71,7 @@ Coverage-based optimization recommendations help you close coverage gaps against
71
71
72
72
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
73
73
74
-
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks.
74
+
SOC optimization provides threat-based recommendations by analyzing your ingested logs and enabled analytics rules, then comparing them to the logs and detections needed to address specific types of attacks.
75
75
76
76
Threat-based optimizations consider both predefined and user-defined detections.
77
77
@@ -83,14 +83,25 @@ The following table lists the available types of threat-based SOC optimization r
83
83
| Templates are turned on, but data sources are missing. | Connect new data sources. |
84
84
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
85
85
86
-
### Risk-based optimization recommendations
86
+
### AI MITRE ATT&CK tagging recommendations (Preview)
87
+
88
+
The AI MITRE ATT&CK Tagging feature uses artificial intelligence to automatically tag security detections. The AI model runs on the customer's workspace to create tagging recommendations for untagged detections with relevant MITRE ATT&CK tactic and techniques.
89
+
90
+
Customers can apply these recommendations to ensure their security coverage is thorough and precise. This ensures complete and accurate security coverage, enhancing threat detection and response capabilities.
87
91
88
-
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
92
+
These are 3 ways to apply the AI MITRE ATT&CK tagging recommendations:
93
+
- Apply the recommendation to a specific analytics rule.
94
+
- Apply the recommendation to all analytics rules in the workspace.
95
+
- Don't apply the recommendation to any analytics rules.
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance, and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
89
100
90
101
To provide risk-based recommendations, SOC optimization looks at your ingested logs and analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks that may cause business risks.
91
102
Risk-based recommendations optimizations consider both predefined and user-defined detections.
92
103
93
-
The following table lists the available types of threat-based SOC optimization recommendations:
104
+
The following table lists the available types of risk-based SOC optimization recommendations:
94
105
95
106
| Type of observation | Action |
96
107
|---------|---------|
@@ -108,9 +119,9 @@ SOC optimization uses advanced machine learning to identify tables that are miss
108
119
109
120
### Considerations
110
121
111
-
-Not all workspaces get similar organizations recommendations. A workspace receives these recommendations only if our machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't. SOCs in their early or onboarding stages are more likely to receive these recommendations than SOCs with a higher level of maturity.
122
+
-A workspace only receives similar organization recommendationsif the machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't. SOCs in their early or onboarding stages are more likely to receive these recommendations than SOCs with a higher level of maturity. Not all workspaces get similar organizations recommendations.
112
123
113
-
-Recommendations are based on machine learning models that rely solely on Organizational Identifiable Information (OII) and system metadata. The models never access or analyze the content of customer logs or ingest them at any point. No customer data, content, or personal data (EUII) is exposed to the analysis.
124
+
-The machine learning models never access or analyze the content of customer logs or ingest them at any point. No customer data, content, or personal data (EUII) is exposed to the analysis. Recommendations are based on machine learning models that rely solely on Organizational Identifiable Information (OII) and system metadata.
0 commit comments