You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/mitre-coverage.md
+30-9Lines changed: 30 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,14 +19,14 @@ appliesto:
19
19
20
20
Microsoft Sentinel analyzes ingested data, not only to [detect threats](detect-threats-built-in.md) and help you [investigate](investigate-cases.md), but also to visualize the nature and coverage of your organization's security status.
21
21
22
-
This article describes how to use the **MITRE** page in Microsoft Sentinel to view the detections already active in your workspace, and those available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
22
+
This article describes how to use the **MITRE** page in Microsoft Sentinel to view the analytics rules (detections) already active in your workspace, and the detections available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
23
23
24
24
> [!IMPORTANT]
25
-
> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
25
+
> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
26
26
27
27
## Prerequisites
28
28
29
-
Before you can view the MITRE coverage for your organization in Microsoft Sentinel, ensure you have the following:
29
+
Before you can view the MITRE coverage for your organization in Microsoft Sentinel, ensure you have the following prerequisites:
30
30
31
31
- An active Microsoft Sentinel instance.
32
32
- Necessary permissions to view content in Microsoft Sentinel. For more information, see [Roles and permissions in Microsoft Sentinel](roles.md).
@@ -40,11 +40,29 @@ Microsoft Sentinel is currently aligned to The MITRE ATT&CK framework, version 1
40
40
41
41
## View current MITRE coverage
42
42
43
-
1. In Microsoft Sentinel, under **Threat management**, select **MITRE ATTA&CK (Preview)**. By default, both currently active scheduled query and near real-time (NRT) rules are indicated in the coverage matrix.
43
+
By default, both currently active scheduled query and near real-time (NRT) rules are indicated in the coverage matrix.
44
44
45
-
:::image type="content" source="media/mitre-coverage/mitre-coverage.png" alt-text="Screenshot of the MITRE coverage page with both active and simulated indicators selected.":::
45
+
1. Do one of the following, depending on the portal you're using:
46
+
47
+
### [Azure portal](#tab/azure-portal)
46
48
47
-
1. Do any of the following:
49
+
In the Azure portal, under **Threat management**, select **MITRE ATT&CK (Preview)**.
50
+
51
+
:::image type="content" source="media/mitre-coverage/mitre-coverage.png" alt-text="Screenshot of the MITRE coverage page." lightbox="media/mitre-coverage/mitre-coverage.png":::
52
+
53
+
### [Defender portal](#tab/defender-portal)
54
+
55
+
In the Defender portal, select **Microsoft Sentinel > Threat management > MITRE ATT&CK**.
56
+
57
+
:::image type="content" source="media/mitre-coverage/mitre-coverage-defender.png" alt-text="Screenshot of the MITRE ATT&CK page in the Defender portal." lightbox="media/mitre-coverage/mitre-coverage-defender.png":::
58
+
59
+
To filter the page by a specific threat scenario, toggle the **View MITRE by threat scenario** option on, and then select a threat scenario from the drop-down menu. The page is updated accordingly. For example:
60
+
61
+
:::image type="content" source="media/mitre-coverage/mitre-by-threat-scenario.png" alt-text="Screenshot of the MITRE ATT&CK page filtered by a specific threat scenario.":::
62
+
63
+
---
64
+
65
+
1. Use any of the following methods:
48
66
49
67
-**Use the legend** to understand how many detections are currently active in your workspace for specific technique.
50
68
@@ -58,6 +76,9 @@ Microsoft Sentinel is currently aligned to The MITRE ATT&CK framework, version 1
58
76
59
77
For example, select **Hunting queries** to jump to the **Hunting** page. There, you see a filtered list of the hunting queries that are associated with the selected technique, and available for you to configure in your workspace.
60
78
79
+
On the Defender portal, the details pane also shows recommended coverage details, including the ratio of active detections and security services (products) out of all recommended detections and services for the selected technique.
80
+
81
+
61
82
## Simulate possible coverage with available detections
62
83
63
84
In the MITRE coverage matrix, *simulated* coverage refers to detections that are available, but not currently configured in your Microsoft Sentinel workspace. View your simulated coverage to understand your organization's possible security status, were you to configure all detections available to you.
@@ -85,9 +106,9 @@ Having a scheduled rule with MITRE techniques applied running regularly in your
85
106
86
107
-**Threat hunting**:
87
108
88
-
- When creating a new hunting query, select the specific tactics and techniques to apply to your query.
89
-
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details on the right.
90
-
- When creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
109
+
- When you're creating a new hunting query, select the specific tactics and techniques to apply to your query.
110
+
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details in the details pane on the side
111
+
- When you're creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
91
112
92
113
For more information, see [Hunt for threats with Microsoft Sentinel](hunting.md) and [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md).
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-access.md
+38-17Lines changed: 38 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,11 +19,9 @@ appliesto:
19
19
20
20
# Optimize your security operations
21
21
22
-
Security operations center (SOC) teams actively look for opportunities to optimize both processes and outcomes. You want to ensure that you have all the data you need to take action against risks in your environment, while also ensuring that you're not paying to ingest *more* data than you need. At the same time, your teams must regularly adjust security controls as threat landscapes and business priorities change, adjusting quickly and efficiently to keep your return on investments high.
22
+
Security operations center (SOC) teams look for ways to improve processes and outcomes and ensure you have the data needed to address risks without extra ingestion costs. SOC teams want to make sure that you have all the necessary data to act against risks, without paying for *more* data than needed. At the same time, SOC teams must also adjust security controls as threats and business priorities change, doing so quickly and efficiently to maximize your return on investment.
23
23
24
-
SOC optimization surfaces ways you can optimize your security controls, gaining more value from Microsoft security services as time goes on.
25
-
26
-
SOC optimizations are high-fidelity and actionable recommendations to help you identify areas where you can reduce costs, without affecting SOC needs or coverage, or where you can add security controls and data where its found to be missing. SOC optimizations are tailored to your environment and based on your current coverage and threat landscape.
24
+
SOC optimizations are actionable recommendations that surface ways that you can optimize your security controls, gaining more value from Microsoft security services as time goes on. Recommendations help you reduce costs without affecting SOC needs or coverage, and can help you add security controls and data where needed. These optimizations are tailored to your environment and based on your current coverage and threat landscape.
27
25
28
26
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
29
27
@@ -41,7 +39,8 @@ Watch the following video for an overview and demo of SOC optimization in the Mi
41
39
42
40
## Access the SOC optimization page
43
41
44
-
Use one of the following tabs, depending on whether you're working in the Azure portal or Defender portal:
42
+
Use one of the following tabs, depending on whether you're working in the Azure portal or Defender portal. When your workspace is onboarded for unified security operations, SOC optimizations include coverage from across Microsoft security services.
43
+
45
44
46
45
### [Azure portal](#tab/azure-portal)
47
46
@@ -70,15 +69,15 @@ Supported metrics at the top of the **Overview** tab include:
70
69
|**Ingested data over the last 3 months**| Shows the total data ingested in your workspace over the last three months. |
71
70
|**Optimizations status**| Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
72
71
73
-
Select **See all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels.
72
+
Select **See all threat scenarios** to view the full list of relevant threats, percentages of active and recommended analytics rules, and coverage levels.
74
73
75
74
### [Defender portal](#tab/defender-portal)
76
75
77
76
|Title | Description |
78
77
|---------|---------|
79
78
|**Recent optimization value**| Shows value gained based on recommendations you recently implemented |
80
-
|**Ingested data**| Shows the total data ingested in your workspace over the last 90 days. |
81
-
|**Threat-based coverage optimizations**|Shows coverage levels for relevant threats. <br>Coverage levels are based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team. <br><br>Supported coverage levels include:<br>- **Best**: 90% to 100% of recommended rules are found<br>- **Better**: 60% to 89% of recommended rules were created<br>- **Good**: 40% to 59% of recommended rules were created<br>- **Moderate**: 20% to 39% of recommended rules were created<br>- **None**: 0% to 19% of recommended rules were created<br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. |
79
+
|**Data ingested**| Shows the total data ingested in your workspace over the last 90 days. |
80
+
|**Threat-based coverage optimizations**| Shows one of the following coverage indicators, based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team: <br>- **High**: Over 75% of recommended rules are activated <br>- **Medium**: 30%-74% of recommended rules are activated <br>- **Low**: 0%-29% of recommended rules are activated. <br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page.|
82
81
|**Optimization status**| Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
83
82
84
83
---
@@ -102,10 +101,7 @@ In the Defender portal, SOC optimization recommendations are listed in the **You
102
101
103
102
---
104
103
105
-
Each optimization card includes the status, title, the date it was created, a high-level description, and the workspace it applies to.
106
-
107
-
> [!NOTE]
108
-
> SOC optimization recommendations are calculated every 24 hours.
104
+
SOC optimization recommendations are calculated every 24 hours. Each optimization card includes the status, title, the date it was created, a high-level description, and the workspace it applies to.
109
105
110
106
### Filter optimizations
111
107
@@ -117,20 +113,45 @@ Filter the optimizations based on optimization type, or search for a specific op
117
113
118
114
### View optimization details and take action
119
115
120
-
In each optimization card, select **View full details** to see a full description of the observation that led to the recommendation, and the value you see in your environment when that recommendation is implemented.
116
+
Select one of the following tabs, depending on the portal you're using:
117
+
118
+
### [Azure portal](#tab/azure-portal)
119
+
120
+
In each optimization card, select **View details** to see a full description of the observation that led to the recommendation, and the value you see in your environment when that recommendation is implemented.
121
121
122
122
Scroll down to the bottom of the details pane for a link to where you can take the recommended actions. For example:
123
123
124
124
- If an optimization includes recommendations to add analytics rules, select **Go to Content Hub**.
125
125
- If an optimization includes recommendations to move a table to basic logs, select **Change plan**.
126
126
127
-
If you choose to install an analytics rule template from the Content Hub, and you don't already have the solution installed, only the analytics rule template that you install is shown in the solution when you're done. Install the full solution to see all available content items from the selected solution. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](../sentinel-solutions-deploy.md).
127
+
### [Defender portal](#tab/defender-portal)
128
+
129
+
1. In each optimization card, select **View details** to see a full description of the observation that led to the recommendation, and the value you see in your environment when that recommendation is implemented.
130
+
131
+
1. For threat-based coverage optimizations:
132
+
133
+
- Toggle between the spider charts to understand your coverage across different tactics and techniques, based on the user-defined and out-of-the-box detections active in your environment.
134
+
- Select **View threat scenario in MITRE ATT&CK** to jump to the [**MITRE ATT&CK** page in Microsoft Sentinel](../mitre-coverage.md?tabs=defender-portal), prefiltered for your threat scenario. For more information, see [Understand security coverage by the MITRE ATT&CK® framework].
135
+
136
+
1. Scroll down to the bottom of the details pane for a link to where you can take the recommended actions. For example:
137
+
138
+
- If an optimization includes recommendations to add analytics rules, select **Go to Content Hub**.
139
+
- If an optimization includes recommendations to move a table to basic logs, select **Change plan**.
140
+
- For threat-based coverage optimizations, select **View full threat scenario** to see the full list of relevant threats, active and recommended detections, and coverage levels. From there you can jump directly to the **Content hub** to activate any recommended detections, or to the **MITRE ATT&CK** page to view the [full MITRE ATT&CK coverage for the selected scenario](../mitre-coverage.md?tabs=defender-portal#view-current-mitre-coverage). For example:
141
+
142
+
:::image type="content" source="media/soc-optimization-access/threat-scenario-page.png" alt-text="Screenshot of the SOC optimization threat scenario page." lightbox="media/soc-optimization-access/threat-scenario-page.png":::
143
+
144
+
---
145
+
146
+
If you install an analytics rule template from the Content hub without the solution installed, only the installed template appears in the solution.
147
+
148
+
Install the full solution to see all available content items from the selected solution. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](../sentinel-solutions-deploy.md).
128
149
129
150
### Manage optimizations
130
151
131
152
By default, optimization statuses are **Active**. Change their statuses as your teams progress through triaging and implementing recommendations.
132
153
133
-
Either select the options menu or select **View full details** to take one of the following actions:
154
+
Either select the options menu or select **View details** to take one of the following actions:
134
155
135
156
|Action |Description |
136
157
|---------|---------|
@@ -141,7 +162,7 @@ Either select the options menu or select **View full details** to take one of th
141
162
142
163
## View completed and dismissed optimizations
143
164
144
-
If you marked a specific optimization as *Completed* or *Dismissed*, or if an optimization was automatically completed, it's listed on the **Completed** and **Dismissed** tabs, respectively.
165
+
If you marked a specific optimization as *Completed* or *Dismissed*, or if an optimization is automatically completed, it's listed on the **Completed** and **Dismissed** tabs, respectively.
145
166
146
167
From here, either select the options menu or select **View full details** to take one of the following actions:
147
168
@@ -164,7 +185,7 @@ This section provides a sample flow for using SOC optimizations, from either the
164
185
165
186
- Add analytics rules to use the table for enhanced protection. To use this option, select **Go to the Content Hub** to view and configure specific out-of-the-box analytic rule templates that use the selected table. In the Content hub, you don't need to search for the relevant rule, as you're taken directly to the relevant rule.
166
187
167
-
If new analytic rules require additional log sources, consider ingesting them to improve threat coverage.
188
+
If new analytic rules require extra log sources, consider ingesting them to improve threat coverage.
168
189
169
190
For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](../sentinel-solutions-deploy.md) and [Detect threats out-of-the-box](../detect-threats-built-in.md).
0 commit comments