Skip to content

Commit 372a73e

Browse files
committed
Risk based optimizations
1 parent 6a29d08 commit 372a73e

File tree

2 files changed

+20
-15
lines changed

2 files changed

+20
-15
lines changed

articles/sentinel/soc-optimization/soc-optimization-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Supported metrics at the top of the **Overview** tab include:
6969
| **Ingested data over the last 3 months** | Shows the total data ingested in your workspace over the last three months. |
7070
|**Optimizations status** | Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
7171

72-
Select **See all threat scenarios** to view the full list of relevant threat and risk-based scenarios , percentages of active and recommended analytics rules, and coverage levels.
72+
Select **See all threat scenarios** to view the full list of relevant threat and risk-based scenarios, percentages of active and recommended analytics rules, and coverage levels.
7373

7474
### [Defender portal](#tab/defender-portal)
7575

@@ -107,8 +107,8 @@ SOC optimization recommendations are calculated every 24 hours. Each optimizatio
107107

108108
Filter the optimizations based on optimization type, or search for a specific optimization title using the search box on the side. Optimization types include:
109109

110-
- **Coverage**: Includes threat-based recommendations for adding security controls to help close coverage gaps for various types of attacks.
111-
110+
- **Coverage**: Includes threat-based recommendations for adding security controls to help close coverage gaps for various types of attacks, and risk-based recommendations for adding security controls to help close coverage gaps for various types of business risks.
111+
-
112112
- **Data value**: Includes recommendations that suggest ways to improve your data usage for maximizing security value from ingested data, or suggest a better data plan for your organization.
113113

114114
### View optimization details and take action

articles/sentinel/soc-optimization/soc-optimization-reference.md

Lines changed: 17 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: orspod
77
ms.collection:
88
- usx-security
99
ms.topic: reference
10-
ms.date: 04/08/2025
10+
ms.date: 04/28/2025
1111
appliesto:
1212
- Microsoft Sentinel in the Microsoft Defender portal
1313
- Microsoft Sentinel in the Azure portal
@@ -17,17 +17,18 @@ appliesto:
1717

1818
---
1919

20-
# SOC optimization reference of recommendations types
20+
# SOC optimization recommendations types
2121

2222
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
2323

2424
Microsoft Sentinel SOC optimizations include the following types of recommendations:
2525

2626
- **Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
2727

28-
- **Threat-based recommendations** suggest adding security controls that help you close coverage gaps.
28+
- **Coverage based recommendations** suggest adding controls to prevent coverage gaps that can lead to vulnerability to attacks or scenarios that can lead to financial loss.
29+
- **Threat-based recommendations** suggest adding security controls that help you detect coverage gaps to prevent attacks and vulnerabilities.
2930

30-
- **Risk-based recommendations** suggest adding security controls that help you protect against Operational, Financial, Reputational, Compliance and Legal business risks.
31+
- **Risk-based recommendations** suggest adding controls to detect coverage gaps that correlate with use cases that could lead to business risks and financial loss, including Operational, Financial, Reputational, Compliance and Legal business risks.
3132

3233
- **Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
3334

@@ -62,8 +63,11 @@ SOC optimization also surfaces unused columns in your tables. The following tabl
6263

6364
> [!IMPORTANT]
6465
> When making changes to ingestion plans, we recommend always ensuring that the limits of your ingestion plans are clear, and that the affected tables aren't ingested for compliance or other similar reasons.
65-
>
66-
## Threat-based optimization recommendations
66+
67+
## Coverage-based optimization recommendations
68+
Coverage-based optimization recommendations help you close coverage gaps against specific threats or to scenarios that can lead to business risks and financial loss.
69+
70+
### Threat-based optimization recommendations
6771

6872
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
6973

@@ -79,19 +83,20 @@ The following table lists the available types of threat-based SOC optimization r
7983
| Templates are turned on, but data sources are missing. | Connect new data sources. |
8084
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
8185

82-
## Risk-based optimization recommendations
83-
84-
Organizations often struggle to align security measures with business risks, leading to inefficient resource allocation and vulnerabilities. The Risk-Based Optimization feature helps manage security coverage based on business risks. It prioritizes security measures by evaluating the potential impact and likelihood of risks, ensuring resources are allocated effectively.
86+
### Risk-based optimization recommendations
8587

8688
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
8789

90+
To provide risk-based recommendations, SOC optimization looks at your ingested logs and analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks that may cause business risks.
91+
Risk-based recommendations optimizations consider both predefined and user-defined detections.
92+
8893
The following table lists the available types of threat-based SOC optimization recommendations:
8994

9095
| Type of observation | Action |
9196
|---------|---------|
92-
| | |
93-
| | |
94-
| | |
97+
| There are data sources, but detections are missing. | Turn on analytics rule templates based on the business risks: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. |
98+
| Templates are turned on, but data sources are missing. | Connect new data sources. |
99+
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
95100

96101
## Similar organizations recommendations
97102

0 commit comments

Comments
 (0)