Skip to content

Commit 40bafef

Browse files
authored
Merge pull request #269600 from batamig/soc-opt-sentinel-post-usx
Soc opt sentinel post usx
2 parents 66d940d + a01511e commit 40bafef

File tree

9 files changed

+253
-3
lines changed

9 files changed

+253
-3
lines changed

articles/sentinel/TOC.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1098,6 +1098,12 @@
10981098
href: define-playbook-access-restrictions.md
10991099
- name: Create and perform advanced incident tasks using playbooks
11001100
href: create-tasks-playbook.md
1101+
- name: Optimize your security operations
1102+
items:
1103+
- name: SOC optimizations overview
1104+
href: soc-optimization/soc-optimization-access.md
1105+
- name: SOC optimization reference
1106+
href: soc-optimization/soc-optimization-reference.md
11011107
- name: Manage Microsoft Sentinel
11021108
items:
11031109
- name: Manage costs and billing

articles/sentinel/feature-availability.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: bagol
66
ms.topic: feature-availability
77
ms.custom: references_regions
88
ms.service: microsoft-sentinel
9-
ms.date: 04/04/2024
9+
ms.date: 04/11/2024
1010
---
1111

1212
# Microsoft Sentinel feature support for Azure commercial/other clouds
@@ -124,7 +124,7 @@ This article describes the features available in Microsoft Sentinel across diffe
124124
|[Workspace manager](workspace-manager.md) |Public preview | ✅ |✅ |❌ |
125125
|[SIEM migration experience](siem-migration.md) | GA | ✅ |❌ |❌ |
126126

127-
## Normalization
127+
## Normalization
128128

129129
|Feature |Feature stage |Azure commercial |Azure Government |Azure China 21Vianet |
130130
|---------|---------|---------|---------|---------|
@@ -137,6 +137,12 @@ This article describes the features available in Microsoft Sentinel across diffe
137137
|[Notebooks](notebooks.md) |GA |✅ |✅ |✅ |
138138
|[Notebook integration with Azure Synapse](notebooks-with-synapse.md) |Public preview |✅ |✅ |✅ |
139139

140+
## SOC optimizations
141+
142+
|Feature |Feature stage |Azure commercial |Azure Government |Azure China 21Vianet |
143+
|---------|---------|---------|---------|---------|
144+
|[SOC optimizations](soc-optimization/soc-optimization-access.md) |Public preview |✅ |❌ |❌ |
145+
140146
## SAP
141147

142148
|Feature |Feature stage |Azure commercial |Azure Government |Azure China 21Vianet |
382 KB
Loading
398 KB
Loading
934 KB
Loading
655 KB
Loading
Lines changed: 149 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,149 @@
1+
---
2+
title: Optimize security operations (preview)
3+
description: Use SOC optimization recommendations to optimize your security operations center (SOC) team activities.
4+
ms.service: defender-xdr
5+
ms.pagetype: security
6+
ms.author: bagol
7+
author: batamig
8+
manager: raynew
9+
ms.collection:
10+
- m365-security
11+
- tier1
12+
- usx-security
13+
ms.topic: how-to
14+
ms.date: 04/30/2024
15+
appliesto:
16+
- Microsoft Sentinel in the Microsoft Defender portal
17+
- Microsoft Sentinel in the Azure portal
18+
#customerIntent: As a SOC admin or SOC engineer, I want to learn about about how to optimize my security operations center with SOC optimization recommendations.
19+
---
20+
21+
# Optimize your security operations (preview)
22+
23+
Security operations center (SOC) teams actively look for opportunities to optimize both processes and outcomes. You want to ensure that you have all the data you need to take action against risks in your environment, while also ensuring that you're not paying to ingest *more* data than you need. At the same time, your teams must regularly adjust security controls as threat landscapes and business priorities change, adjusting quickly and efficiently to keep your return on investments high.
24+
25+
SOC optimization surfaces ways you can optimize your security controls, gaining more value from Microsoft security services as time goes on.
26+
27+
SOC optimizations are high-fidelity and actionable recommendations to help you identify areas where you can reduce costs, without affecting SOC needs or coverage, or where you can add security controls and data where its found to be missing. SOC optimizations are tailored to your environment and based on your current coverage and threat landscape.
28+
29+
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
30+
31+
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
32+
33+
## Prerequisites
34+
35+
- SOC optimization uses standard Microsoft Sentinel roles and permissions. For more information, see [Roles and permissions in Microsoft Sentinel](../roles.md).
36+
37+
- To use SOC optimization in the Microsoft Defender portal, you must have Microsoft Sentinel integrated with Microsoft Defender XDR. For more information, see [Connect Microsoft Sentinel to Microsoft Defender XDR](/microsoft-365/security/defender/microsoft-sentinel-onboard).
38+
39+
## Access the SOC optimization page
40+
41+
Use one of the following tabs, depending on whether you're working in the unified SOC operations platform or in the Azure portal:
42+
43+
### [Azure portal](#tab/azure-portal)
44+
45+
In Microsoft Sentinel in the Azure portal, under **Threat management**, select **SOC optimization**.
46+
47+
:::image type="content" source="media/soc-optimization-access/soc-optimization-azure.png" alt-text="Screenshot of the SOC optimization page in the Azure portal.":::
48+
49+
### [Defender portal](#tab/defender-portal)
50+
51+
In the unified SOC operations platform in the Microsoft Defender portal, select **SOC optimization**.
52+
53+
:::image type="content" source="media/soc-optimization-access/soc-optimization-xdr.png" alt-text="Screenshot of the SOC optimization page in Microsoft Defender XDR." lightbox="media/soc-optimization-access/soc-optimization-xdr.png":::
54+
55+
---
56+
57+
## Understand SOC optimization overview metrics
58+
59+
Optimization metrics shown at the top of the **Overview** tab give you a high level understanding of how efficiently you're using your data, and will change over time as you implement recommendations.
60+
61+
Supported metrics at the top of the **Overview** tab include:
62+
63+
### [Azure portal](#tab/azure-portal)
64+
65+
|Title |Description |
66+
|---------|---------|
67+
| **Ingested data over the last 3 months** | Shows the total data ingested in your workspace over the last three months. |
68+
|**Optimizations status** | Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
69+
70+
Select **See all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels.
71+
72+
### [Defender portal](#tab/defender-portal)
73+
74+
|Title | Description |
75+
|---------|---------|
76+
|**Recent optimization value** | Shows value gained based on recommendations you recently implemented |
77+
|**Ingested data** | Shows the total data ingested in your workspace over the last 90 days. |
78+
|**Threat-based coverage optimizations** | Shows coverage levels for relevant threats. <br>Coverage levels are based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team. <br><br>Supported coverage levels include:<br>- **Best**: 90% to 100% of recommended rules are found<br>- **Better**: 60% to 89% of recommended rules were created<br>- **Good**: 40% to 59% of recommended rules were created<br>- **Moderate**: 20% to 39% of recommended rules were created<br>- **None**: 0% to 19% of recommended rules were created<br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. |
79+
|**Optimization status** | Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
80+
81+
---
82+
83+
## View and manage optimization recommendations
84+
85+
### [Azure portal](#tab/azure-portal)
86+
87+
In the Azure portal, SOC optimization recommendations are listed on the **SOC optimization > Overview** tab.
88+
89+
For example:
90+
91+
:::image type="content" source="media/soc-optimization-access/soc-optimization-overview-azure.png" alt-text="Screenshot of the SOC optimization Overview tab in the Azure portal." lightbox="media/soc-optimization-access/soc-optimization-overview-azure.png":::
92+
93+
94+
### [Defender portal](#tab/defender-portal)
95+
96+
In the Defender portal, SOC optimization recommendations are listed in the **Your Optimizations** area on the **SOC optimizations** tab.
97+
98+
:::image type="content" source="media/soc-optimization-access/soc-optimization-overview-defender.png" alt-text="Screenshot of the SOC optimization Overview tab in the Defender portal." lightbox="media/soc-optimization-access/soc-optimization-overview-defender.png":::
99+
100+
---
101+
102+
Each optimization card includes the status, title, the date it was created, a high-level description, and the workspace it applies to.
103+
104+
### Filter optimizations
105+
106+
Filter the optimizations based on optimization type, or search for a specific optimization title using the search box on the side. Optimization types include:
107+
108+
- **Coverage**: Includes threat-based recommendations for adding security controls to help close coverage gaps for various types of attacks.
109+
110+
- **Data value**: Includes recommendations that suggest ways to improve your data usage for maximizing security value from ingested data, or suggest a better data plan for your organization.
111+
112+
### View optimization details and take action
113+
114+
In each optimization card, select **View full details** to see a full description of the observation that led to the recommendation, and the value you see in your environment when that recommendation is implemented.
115+
116+
Scroll down to the bottom of the details pane for a link to where you can take the recommended actions. For example:
117+
118+
- If an optimization includes recommendations to add analytics rules, select **Got to Content Hub**.
119+
- If an optimization includes recommendations to move a table to basic logs, select **Change plan**.
120+
121+
### Manage optimizations
122+
123+
By default, optimization statuses are **Active**. Change their statuses as your teams progress through triaging and implementing recommendations.
124+
125+
Either select the options menu or select **View full details** to take one of the following actions:
126+
127+
|Action |Description |
128+
|---------|---------|
129+
|**Complete** | Complete an optimization when you completed each recommended action. <br><br>If a change in your environment is detected that makes the recommendation irrelevant, the optimization is automatically completed and moved to the **Completed** tab. <br><br>For example, you might have an optimization related to a previously unused table. If your table is now used in a new analytics rule, the optimization recommendation is now irrelevant. <br><br>In such cases, a banner shows in the **Overview** tab with the number of automatically completed optimizations since your last visit. |
130+
| **Mark as in progress** / **Mark as active**| Mark an optimization as in progress or active to notify other team members that you're actively working on it. <br><br>Use these two statuses flexibly, but consistently, as needed for your organization. |
131+
|**Dismiss** | Dismiss an optimization if you're not planning to take the recommended action and no longer want to see it in the list. |
132+
|**Provide feedback** | We invite you to share your thoughts on the recommended actions with the Microsoft team! <br><br>When sharing your feedback, be careful not to share any confidential data. For more information, see [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement). |
133+
134+
## View completed and dismissed optimizations
135+
136+
If you marked a specific optimization as *Completed* or *Dismissed*, or if an optimization was automatically completed, it's listed on the **Completed** and **Dismissed** tabs, respectively.
137+
138+
From here, either select the options menu or select **View full details** to take one of the following actions:
139+
140+
- **Reactivate the optimization**, sending it back to the **Overview** tab. Reactivated optimizations are recalculated to provide the most updated value and action. Recalculating these details can take up to an hour, so wait before checking the details and recommended actions again.
141+
142+
Reactivated optimizations might also move directly to the **Completed** tab if, after recalculating the details, they're found to be no longer relevant.
143+
144+
- **Provide further feedback** to the Microsoft team. When sharing your feedback, be careful not to share any confidential data. For more information, see [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement).
145+
146+
147+
## Related content
148+
149+
- [SOC optimization reference of recommendations (preview)](soc-optimization-reference.md)
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
---
2+
title: SOC optimization reference (preview)
3+
description: Learn about the SOC optimization recommendations available to help you optimize your security operations.
4+
ms.service: defender-xdr
5+
ms.pagetype: security
6+
ms.author: bagol
7+
author: batamig
8+
manager: raynew
9+
ms.collection:
10+
- m365-security
11+
- tier1
12+
- usx-security
13+
ms.topic: reference
14+
ms.date: 04/30/2024
15+
appliesto:
16+
- Microsoft Sentinel in the Microsoft Defender portal
17+
- Microsoft Sentinel in the Azure portal
18+
#customerIntent: As a SOC admin or SOC engineer, I want to learn about the SOC optimization recommendations available to help me optimize my security operations.
19+
---
20+
21+
# SOC optimization reference of recommendations (preview)
22+
23+
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
24+
25+
Microsoft Sentinel SOC optimizations include the following types of recommendations:
26+
27+
- **Threat-based optimizations** recommend adding security controls that help you close coverage gaps.
28+
29+
- **Data value optimizations** recommend ways to improve your data use, such as a better data plan for your organization.
30+
31+
This article provides a reference of the SOC optimization recommendations available.
32+
33+
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
34+
35+
## Data value optimizations
36+
37+
To optimize your cost to security value ratio, SOC optimization surfaces hardly used data connectors or tables, and suggests ways to either reduce the cost of a table or improve its value, depending on your coverage. This type of optimization is also called *data value optimization*.
38+
39+
Data value optimizations only look at billable tables that ingested data in the past 30 days.
40+
41+
The following table lists the available data value SOC optimization recommendations:
42+
43+
|Observation |Action |
44+
|---------|---------|
45+
|The table wasn’t used by analytic rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move to basic logs if the table is eligible |
46+
|The table wasn’t used at all in the last 30 days | Turn on analytics rule templates <br>OR<br> Stop data ingestion or archive the table |
47+
|The table was only used by Azure Monitor | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a nonsecurity Log Analytics workspace |
48+
49+
If a table is chosen for [UEBA](/azure/sentinel/enable-entity-behavior-analytics) or a [threat intelligence matching analytics rule](/azure/sentinel/use-matching-analytics-to-detect-threats), SOC optimization doesn't recommend any changes in ingestion.
50+
51+
> [!IMPORTANT]
52+
> When making changes to ingestion plans, we recommend always ensuring that the limits of your ingestion plans are clear, and that the affected tables aren't ingested for compliance or other similar reasons.
53+
>
54+
## Threat-based optimization
55+
56+
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach.
57+
58+
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares it to the logs and detections that are required to protect, detect, and respond to specific types of attacks. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
59+
60+
The following table lists the available threat-based SOC optimization recommendations:
61+
62+
|Observation |Action |
63+
|---------|---------|
64+
|There are data sources, but detections are missing. | Turn on analytics rule templates based on the threat. |
65+
|Templates are turned on, but data sources are missing. | Connect new data sources. |
66+
|There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
67+
68+
69+
## Next step
70+
71+
- [Access SOC optimization](soc-optimization-access.md)

articles/sentinel/whats-new.md

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the latest new features and announcement in Microsoft S
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: concept
7-
ms.date: 04/03/2024
7+
ms.date: 04/30/2024
88
---
99

1010
# What's new in Microsoft Sentinel
@@ -18,6 +18,24 @@ The listed features were released in the last three months. For information abou
1818

1919
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2020

21+
## May 2024
22+
23+
- [Optimize your security operations with SOC optimizations](#optimize-your-security-operations-with-soc-optimizations-preview)
24+
25+
### Optimize your security operations with SOC optimizations (preview)
26+
27+
Microsoft Sentinel now provides SOC optimizations, which are high-fidelity and actionable recommendations that help you identify areas where you can reduce costs, without affecting SOC needs or coverage, or where you can add security controls and data where its found to be missing.
28+
29+
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
30+
31+
If your workspace is onboarded to the unified security operations platform, SOC optimizations are also available in the Microsoft Defender portal.
32+
33+
For more information, see:
34+
35+
- [Optimize your security operations](soc-optimization/soc-optimization-access.md)
36+
- [SOC optimization reference of recommendations](soc-optimization/soc-optimization-reference.md)
37+
38+
2139
## April 2024
2240

2341
- [Unified security operations platform in the Microsoft Defender portal (preview)](#unified-security-operations-platform-in-the-microsoft-defender-portal-preview)

0 commit comments

Comments
 (0)