You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-access.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ Supported metrics at the top of the **Overview** tab include:
69
69
|**Ingested data over the last 3 months**| Shows the total data ingested in your workspace over the last three months. |
70
70
|**Optimizations status**| Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
71
71
72
-
Select **See all threat scenarios** to view the full list of relevant threat and risk-based scenarios, percentages of active and recommended analytics rules, and coverage levels.
72
+
Select **See all threat scenarios** to view the full list of relevant threat and risk-based scenarios, percentages of active and recommended analytics rules, and coverage levels.
73
73
74
74
### [Defender portal](#tab/defender-portal)
75
75
@@ -107,8 +107,8 @@ SOC optimization recommendations are calculated every 24 hours. Each optimizatio
107
107
108
108
Filter the optimizations based on optimization type, or search for a specific optimization title using the search box on the side. Optimization types include:
109
109
110
-
-**Coverage**: Includes threat-based recommendations for adding security controls to help close coverage gaps for various types of attacks.
111
-
110
+
-**Coverage**: Includes threat-based recommendations for adding security controls to help close coverage gaps for various types of attacks, and risk-based recommendations for adding security controls to help close coverage gaps for various types of business risks.
111
+
-
112
112
-**Data value**: Includes recommendations that suggest ways to improve your data usage for maximizing security value from ingested data, or suggest a better data plan for your organization.
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-reference.md
+17-12Lines changed: 17 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: orspod
7
7
ms.collection:
8
8
- usx-security
9
9
ms.topic: reference
10
-
ms.date: 04/08/2025
10
+
ms.date: 04/28/2025
11
11
appliesto:
12
12
- Microsoft Sentinel in the Microsoft Defender portal
13
13
- Microsoft Sentinel in the Azure portal
@@ -17,17 +17,18 @@ appliesto:
17
17
18
18
---
19
19
20
-
# SOC optimization reference of recommendations types
20
+
# SOC optimization recommendations types
21
21
22
22
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
23
23
24
24
Microsoft Sentinel SOC optimizations include the following types of recommendations:
25
25
26
26
-**Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
27
27
28
-
-**Threat-based recommendations** suggest adding security controls that help you close coverage gaps.
28
+
-**Coverage based recommendations** suggest adding controls to prevent coverage gaps that can lead to vulnerability to attacks or scenarios that can lead to financial loss.
29
+
-**Threat-based recommendations** suggest adding security controls that help you detect coverage gaps to prevent attacks and vulnerabilities.
29
30
30
-
-**Risk-based recommendations** suggest adding security controls that help you protect against Operational, Financial, Reputational, Compliance and Legal business risks.
31
+
-**Risk-based recommendations** suggest adding controls to detect coverage gaps that correlate with use cases that could lead to business risks and financial loss, including Operational, Financial, Reputational, Compliance and Legal business risks.
31
32
32
33
-**Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
33
34
@@ -62,8 +63,11 @@ SOC optimization also surfaces unused columns in your tables. The following tabl
62
63
63
64
> [!IMPORTANT]
64
65
> When making changes to ingestion plans, we recommend always ensuring that the limits of your ingestion plans are clear, and that the affected tables aren't ingested for compliance or other similar reasons.
65
-
>
66
-
## Threat-based optimization recommendations
66
+
67
+
## Coverage-based optimization recommendations
68
+
Coverage-based optimization recommendations help you close coverage gaps against specific threats or to scenarios that can lead to business risks and financial loss.
69
+
70
+
### Threat-based optimization recommendations
67
71
68
72
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
69
73
@@ -79,19 +83,20 @@ The following table lists the available types of threat-based SOC optimization r
79
83
| Templates are turned on, but data sources are missing. | Connect new data sources. |
80
84
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
81
85
82
-
## Risk-based optimization recommendations
83
-
84
-
Organizations often struggle to align security measures with business risks, leading to inefficient resource allocation and vulnerabilities. The Risk-Based Optimization feature helps manage security coverage based on business risks. It prioritizes security measures by evaluating the potential impact and likelihood of risks, ensuring resources are allocated effectively.
86
+
### Risk-based optimization recommendations
85
87
86
88
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
87
89
90
+
To provide risk-based recommendations, SOC optimization looks at your ingested logs and analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks that may cause business risks.
91
+
Risk-based recommendations optimizations consider both predefined and user-defined detections.
92
+
88
93
The following table lists the available types of threat-based SOC optimization recommendations:
89
94
90
95
| Type of observation | Action |
91
96
|---------|---------|
92
-
|||
93
-
|||
94
-
|||
97
+
|There are data sources, but detections are missing. | Turn on analytics rule templates based on the business risks: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment.|
98
+
|Templates are turned on, but data sources are missing. | Connect new data sources.|
99
+
|There are no existing detections or data sources. | Connect detections and data sources or install a solution.|
0 commit comments