Skip to content

Commit 2b91d04

Browse files
committed
Risk based optimization
1 parent a73c82a commit 2b91d04

File tree

2 files changed

+23
-7
lines changed

2 files changed

+23
-7
lines changed

articles/sentinel/soc-optimization/soc-optimization-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,15 +69,15 @@ Supported metrics at the top of the **Overview** tab include:
6969
| **Ingested data over the last 3 months** | Shows the total data ingested in your workspace over the last three months. |
7070
|**Optimizations status** | Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
7171

72-
Select **See all threat scenarios** to view the full list of relevant threats, percentages of active and recommended analytics rules, and coverage levels.
72+
Select **See all threat scenarios** to view the full list of relevant threat and risk-based scenarios , percentages of active and recommended analytics rules, and coverage levels.
7373

7474
### [Defender portal](#tab/defender-portal)
7575

7676
|Title | Description |
7777
|---------|---------|
7878
|**Recent optimization value** | Shows value gained based on recommendations you recently implemented |
7979
|**Data ingested** | Shows the total data ingested in your workspace over the last 90 days. |
80-
|**Threat-based coverage optimizations** | Shows one of the following coverage indicators, based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team: <br>- **High**: Over 75% of recommended rules are activated <br>- **Medium**: 30%-74% of recommended rules are activated <br>- **Low**: 0%-29% of recommended rules are activated. <br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
80+
|**Threat-based coverage optimizations** | Shows one of the following coverage indicators, based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team: <br>- **High**: Over 75% of recommended rules are activated <br>- **Medium**: 30%-74% of recommended rules are activated <br>- **Low**: 0%-29% of recommended rules are activated. <br><br>Select **View all threat scenarios** to view the full list of relevant threat and risk-based scenarios, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
8181
|**Optimization status** | Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
8282

8383
---

articles/sentinel/soc-optimization/soc-optimization-reference.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: SOC optimization reference
33
description: Learn about the Microsoft Sentinel SOC optimization recommendations available to help you optimize your security operations.
4-
ms.author: bagol
5-
author: batamig
6-
manager: raynew
4+
ms.author: abbyweisberg
5+
author: AbbyMSFT
6+
manager: orspod
77
ms.collection:
88
- usx-security
99
ms.topic: reference
10-
ms.date: 12/18/2024
10+
ms.date: 04/08/2025
1111
appliesto:
1212
- Microsoft Sentinel in the Microsoft Defender portal
1313
- Microsoft Sentinel in the Azure portal
@@ -23,9 +23,11 @@ Use SOC optimization recommendations to help you close coverage gaps against spe
2323

2424
Microsoft Sentinel SOC optimizations include the following types of recommendations:
2525

26+
- **Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
27+
2628
- **Threat-based recommendations** suggest adding security controls that help you close coverage gaps.
2729

28-
- **Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
30+
- **Risk-based recommendations** suggest adding security controls that help you protect against Operational, Financial, Reputational, Compliance and Legal business risks.
2931

3032
- **Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
3133

@@ -68,6 +70,20 @@ The following table lists the available types of threat-based SOC optimization r
6870
| Templates are turned on, but data sources are missing. | Connect new data sources. |
6971
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
7072

73+
## Risk-based optimization recommendations
74+
75+
Organizations often struggle to align security measures with business risks, leading to inefficient resource allocation and vulnerabilities. The Risk-Based Optimization feature helps manage security coverage based on business risks. It prioritizes security measures by evaluating the potential impact and likelihood of risks, ensuring resources are allocated effectively.
76+
77+
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
78+
79+
The following table lists the available types of threat-based SOC optimization recommendations:
80+
81+
| Type of observation | Action |
82+
|---------|---------|
83+
| | |
84+
| | |
85+
| | |
86+
7187
## Similar organizations recommendations
7288

7389
SOC optimization uses advanced machine learning to identify tables that are missing from your workspace, but are used by organizations with similar ingestion trends and industry profiles to yours. It shows how other organizations use these tables and recommends to you the relevant data sources, along with related rules, to improve your security coverage.

0 commit comments

Comments
 (0)