Skip to content

Commit 2ae0213

Browse files
authored
Similar customers
1 parent e9cbad8 commit 2ae0213

File tree

1 file changed

+34
-16
lines changed

1 file changed

+34
-16
lines changed

articles/sentinel/soc-optimization/soc-optimization-reference.md

Lines changed: 34 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: raynew
77
ms.collection:
88
- usx-security
99
ms.topic: reference
10-
ms.date: 06/09/2024
10+
ms.date: 12/09/2024
1111
appliesto:
1212
- Microsoft Sentinel in the Microsoft Defender portal
1313
- Microsoft Sentinel in the Azure portal
@@ -23,46 +23,64 @@ Use SOC optimization recommendations to help you close coverage gaps against spe
2323

2424
Microsoft Sentinel SOC optimizations include the following types of recommendations:
2525

26-
- **Threat-based optimizations** recommend adding security controls that help you close coverage gaps.
26+
- **Threat-based recommendations** suggest adding security controls that help you close coverage gaps.
2727

28-
- **Data value optimizations** recommend ways to improve your data use, such as a better data plan for your organization.
28+
- **Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
29+
30+
- **Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
2931

3032
This article provides a reference of the SOC optimization recommendations available.
3133

3234
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
3335

34-
## Data value optimizations
36+
## Data value optimization recommendations
3537

36-
To optimize your cost to security value ratio, SOC optimization surfaces hardly used data connectors or tables, and suggests ways to either reduce the cost of a table or improve its value, depending on your coverage. This type of optimization is also called *data value optimization*.
38+
To optimize your cost/security value ratio, SOC optimization surfaces hardly used data connectors or tables, and suggests ways to either reduce the cost of a table or improve its value, depending on your coverage. This type of optimization is also called *data value optimization*.
3739

3840
Data value optimizations only look at billable tables that ingested data in the past 30 days.
3941

4042
The following table lists the available data value SOC optimization recommendations:
4143

42-
|Observation |Action |
44+
| Observation | Action |
4345
|---------|---------|
44-
|The table wasn’t used by analytic rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move to basic logs if the table is eligible |
45-
|The table wasn’t used at all in the last 30 days | Turn on analytics rule templates <br>OR<br> Stop data ingestion or archive the table |
46-
|The table was only used by Azure Monitor | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a nonsecurity Log Analytics workspace |
46+
| The table wasn’t used by analytics rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move to basic logs if the table is eligible. |
47+
| The table wasn’t used at all in the last 30 days. | Turn on analytics rule templates <br>OR<br> Stop data ingestion or archive the table. |
48+
| The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a non-security Log Analytics workspace. |
4749

4850
If a table is chosen for [UEBA](/azure/sentinel/enable-entity-behavior-analytics) or a [threat intelligence matching analytics rule](/azure/sentinel/use-matching-analytics-to-detect-threats), SOC optimization doesn't recommend any changes in ingestion.
4951

5052
> [!IMPORTANT]
5153
> When making changes to ingestion plans, we recommend always ensuring that the limits of your ingestion plans are clear, and that the affected tables aren't ingested for compliance or other similar reasons.
5254
>
53-
## Threat-based optimization
55+
## Threat-based optimization recommendations
56+
57+
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
5458

55-
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach.
59+
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks.
5660

57-
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares it to the logs and detections that are required to protect, detect, and respond to specific types of attacks. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research. SOC optimization considers both user-defined and out-of-the-box detections.
61+
Threat-based optimizations consider both predefined and user-defined detections.
5862

5963
The following table lists the available threat-based SOC optimization recommendations:
6064

61-
|Observation |Action |
65+
| Observation | Action |
6266
|---------|---------|
63-
|There are data sources, but detections are missing. | Turn on analytics rule templates based on the threat: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. <br><br>For more information, see [Threat detection in Microsoft Sentinel](../threat-detection.md). |
64-
|Templates are turned on, but data sources are missing. | Connect new data sources. |
65-
|There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
67+
| There are data sources, but detections are missing. | Turn on analytics rule templates based on the threat: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. <br><br>For more information, see [Threat detection in Microsoft Sentinel](../threat-detection.md). |
68+
| Templates are turned on, but data sources are missing. | Connect new data sources. |
69+
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
70+
71+
## Similar organizations recommendations
72+
73+
SOC optimization uses advanced machine learning to identify tables that are missing from your workspace, but are used by organizations with similar ingestion trends and industry profiles to yours. It shows how other organizations use these tables and recommends to you the relevant data sources, along with related rules, to improve your security coverage.
74+
75+
| Observation | Action |
76+
|---------|---------|
77+
| Log sources ingested by similar customers are missing | Connect the suggested data sources. <br><br>This recommendation doesn't include: <ul><li>Custom connectors<li>Custom tables<li>Tables that are ingested by fewer than 10 workspaces <li>Tables that contain multiple log sources, like the `Syslog` or `CommonSecurityLog` tables |
78+
79+
### Considerations
80+
81+
- Recommendations based on machine learning never look into the content of the logs from our customers or ingest them at any point. No customer data, content, or End User Identifiable Information (EUII) is exposed to the analysis.
82+
83+
- Not all workspaces get similar organizations recommendations. A workspace receives these recommendations only if our machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't.
6684

6785
## Related content
6886

0 commit comments

Comments
 (0)