You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-access.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,15 +69,15 @@ Supported metrics at the top of the **Overview** tab include:
69
69
|**Ingested data over the last 3 months**| Shows the total data ingested in your workspace over the last three months. |
70
70
|**Optimizations status**| Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
71
71
72
-
Select **See all threat scenarios** to view the full list of relevant threats, percentages of active and recommended analytics rules, and coverage levels.
72
+
Select **See all threat scenarios** to view the full list of relevant threat and risk-based scenarios , percentages of active and recommended analytics rules, and coverage levels.
73
73
74
74
### [Defender portal](#tab/defender-portal)
75
75
76
76
|Title | Description |
77
77
|---------|---------|
78
78
|**Recent optimization value**| Shows value gained based on recommendations you recently implemented |
79
79
|**Data ingested**| Shows the total data ingested in your workspace over the last 90 days. |
80
-
|**Threat-based coverage optimizations**| Shows one of the following coverage indicators, based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team: <br>- **High**: Over 75% of recommended rules are activated <br>- **Medium**: 30%-74% of recommended rules are activated <br>- **Low**: 0%-29% of recommended rules are activated. <br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
80
+
|**Threat-based coverage optimizations**| Shows one of the following coverage indicators, based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team: <br>- **High**: Over 75% of recommended rules are activated <br>- **Medium**: 30%-74% of recommended rules are activated <br>- **Low**: 0%-29% of recommended rules are activated. <br><br>Select **View all threat scenarios** to view the full list of relevant threat and risk-based scenarios, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
81
81
|**Optimization status**| Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-reference.md
+21-5Lines changed: 21 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
2
title: SOC optimization reference
3
3
description: Learn about the Microsoft Sentinel SOC optimization recommendations available to help you optimize your security operations.
4
-
ms.author: bagol
5
-
author: batamig
6
-
manager: raynew
4
+
ms.author: abbyweisberg
5
+
author: AbbyMSFT
6
+
manager: orspod
7
7
ms.collection:
8
8
- usx-security
9
9
ms.topic: reference
10
-
ms.date: 12/18/2024
10
+
ms.date: 04/08/2025
11
11
appliesto:
12
12
- Microsoft Sentinel in the Microsoft Defender portal
13
13
- Microsoft Sentinel in the Azure portal
@@ -23,9 +23,11 @@ Use SOC optimization recommendations to help you close coverage gaps against spe
23
23
24
24
Microsoft Sentinel SOC optimizations include the following types of recommendations:
25
25
26
+
-**Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
27
+
26
28
-**Threat-based recommendations** suggest adding security controls that help you close coverage gaps.
27
29
28
-
-**Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
30
+
-**Risk-based recommendations** suggest adding security controls that help you protect against Operational, Financial, Reputational, Compliance and Legal business risks.
29
31
30
32
-**Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
31
33
@@ -68,6 +70,20 @@ The following table lists the available types of threat-based SOC optimization r
68
70
| Templates are turned on, but data sources are missing. | Connect new data sources. |
69
71
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
70
72
73
+
## Risk-based optimization recommendations
74
+
75
+
Organizations often struggle to align security measures with business risks, leading to inefficient resource allocation and vulnerabilities. The Risk-Based Optimization feature helps manage security coverage based on business risks. It prioritizes security measures by evaluating the potential impact and likelihood of risks, ensuring resources are allocated effectively.
76
+
77
+
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
78
+
79
+
The following table lists the available types of threat-based SOC optimization recommendations:
80
+
81
+
| Type of observation | Action |
82
+
|---------|---------|
83
+
|||
84
+
|||
85
+
|||
86
+
71
87
## Similar organizations recommendations
72
88
73
89
SOC optimization uses advanced machine learning to identify tables that are missing from your workspace, but are used by organizations with similar ingestion trends and industry profiles to yours. It shows how other organizations use these tables and recommends to you the relevant data sources, along with related rules, to improve your security coverage.
0 commit comments