Skip to content

Commit 48bd25d

Browse files
authored
Merge pull request #297814 from AbbyMSFT/risk-based-optimization
Risk based optimization
2 parents e1ef3d7 + 055b2df commit 48bd25d

File tree

3 files changed

+60
-18
lines changed

3 files changed

+60
-18
lines changed

articles/sentinel/soc-optimization/soc-optimization-access.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Optimize security operations
33
description: Use Microsoft Sentinel SOC optimization recommendations to optimize your security operations center (SOC) team activities.
4-
ms.author: bagol
5-
author: batamig
6-
manager: raynew
4+
ms.author: abbyweisberg
5+
author: AbbyMSFT
6+
manager: orpsod
77
ms.collection:
88
- usx-security
99
ms.topic: how-to
10-
ms.date: 10/16/2024
10+
ms.date: 05/06/2025
1111
appliesto:
1212
- Microsoft Sentinel in the Microsoft Defender portal
1313
- Microsoft Sentinel in the Azure portal
@@ -67,7 +67,7 @@ Supported metrics at the top of the **Overview** tab include:
6767
|---------|---------|
6868
|**Recent optimization value** | Shows value gained based on recommendations you recently implemented |
6969
|**Data ingested** | Shows the total data ingested in your workspace over the last 90 days. |
70-
|**Threat-based coverage optimizations** | Shows one of the following coverage indicators, based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team: <br>- **High**: Over 75% of recommended rules are activated <br>- **Medium**: 30%-74% of recommended rules are activated <br>- **Low**: 0%-29% of recommended rules are activated. <br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
70+
|**Threat-based coverage optimizations** | Shows one of the following coverage indicators, based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team: <br>- **High**: Over 75% of recommended rules are activated <br>- **Medium**: 30%-74% of recommended rules are activated <br>- **Low**: 0%-29% of recommended rules are activated. <br><br>Select **View all threat scenarios** to view the full list of relevant threat and risk-based scenarios, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
7171
|**Optimization status** | Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
7272

7373
### [Azure portal](#tab/azure-portal)
@@ -77,7 +77,7 @@ Supported metrics at the top of the **Overview** tab include:
7777
| **Ingested data over the last 3 months** | Shows the total data ingested in your workspace over the last three months. |
7878
|**Optimizations status** | Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
7979

80-
Select **See all threat scenarios** to view the full list of relevant threats, percentages of active and recommended analytics rules, and coverage levels.
80+
Select **See all threat scenarios** to view the full list of relevant threat and risk-based scenarios, percentages of active and recommended analytics rules, and coverage levels.
8181

8282
---
8383

@@ -105,8 +105,10 @@ SOC optimization recommendations are calculated every 24 hours. Each optimizatio
105105

106106
Filter the optimizations based on optimization type, or search for a specific optimization title using the search box on the side. Optimization types include:
107107

108-
- **Coverage**: Includes threat-based recommendations for adding security controls to help close coverage gaps for various types of attacks.
109-
108+
- **Coverage** : Includes recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. Coverage recommendations include:
109+
- **Threat-based recommendations** for adding security controls to help close coverage gaps for various types of attacks.
110+
- **AI MITRE ATT&CK recommendations** for adding tagging recommendations to help close coverage gaps for various types of attacks, based on the MITRE ATT&CK framework.
111+
- **Risk-based recommendations** for adding security controls to help close coverage gaps for various types of business risks.
110112
- **Data value**: Includes recommendations that suggest ways to improve your data usage for maximizing security value from ingested data, or suggest a better data plan for your organization.
111113

112114
### View optimization details and take action

articles/sentinel/soc-optimization/soc-optimization-reference.md

Lines changed: 42 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: orspod
77
ms.collection:
88
- usx-security
99
ms.topic: reference
10-
ms.date: 04/08/2025
10+
ms.date: 05/06/2025
1111
appliesto:
1212
- Microsoft Sentinel in the Microsoft Defender portal
1313
- Microsoft Sentinel in the Azure portal
@@ -17,14 +17,18 @@ appliesto:
1717

1818
---
1919

20-
# SOC optimization reference of recommendations types
20+
# SOC optimization recommendations types
2121

2222
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
2323

2424
Microsoft Sentinel SOC optimizations include the following types of recommendations:
2525

2626
- **Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
27-
- **Threat-based recommendations** suggest adding security controls that help you close coverage gaps.
27+
28+
- **Coverage based recommendations** suggest adding controls to prevent coverage gaps that can lead to vulnerability to attacks or scenarios that can lead to financial loss. Coverage recommendations include:
29+
- **Threat-based recommendations**: Recommends adding security controls that help you detect coverage gaps to prevent attacks and vulnerabilities.
30+
- **AI MITRE ATT&CK tagging recommendations (Preview)**: Uses artificial intelligence to suggest tagging security detections with MITRE ATT&CK tactics and techniques.
31+
- **Risk-based recommendations (Preview)**: Recommends implementing controls to address coverage gaps linked to use cases that may result in business risks or financial losses, including operational, financial, reputational, compliance, and legal risks.
2832
- **Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
2933

3034
This article provides a detailed reference of the types of SOC optimization recommendations available.
@@ -43,7 +47,7 @@ The following table lists the available types of data value SOC optimization rec
4347
|---------|---------|
4448
| The table wasn't used by analytics rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move the table to a [basic logs plan](../billing.md#auxiliary-logs) if the table is eligible. |
4549
| The table wasn’t used at all in the last 30 days. | Turn on analytics rule templates <br>OR<br> Stop data ingestion and remove the table or move the table to long term retention. |
46-
| The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a non-security Log Analytics workspace. |
50+
| The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a nonsecurity Log Analytics workspace. |
4751

4852
If a table is chosen for [UEBA](/azure/sentinel/enable-entity-behavior-analytics) or a [threat intelligence matching analytics rule](/azure/sentinel/use-matching-analytics-to-detect-threats), SOC optimization doesn't recommend any changes in ingestion.
4953

@@ -58,12 +62,15 @@ SOC optimization also surfaces unused columns in your tables. The following tabl
5862

5963
> [!IMPORTANT]
6064
> When making changes to ingestion plans, we recommend always ensuring that the limits of your ingestion plans are clear, and that the affected tables aren't ingested for compliance or other similar reasons.
61-
>
62-
## Threat-based optimization recommendations
65+
66+
## Coverage-based optimization recommendations
67+
Coverage-based optimization recommendations help you close coverage gaps against specific threats or to scenarios that can lead to business risks and financial loss.
68+
69+
### Threat-based optimization recommendations
6370

6471
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
6572

66-
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks.
73+
SOC optimization provides threat-based recommendations by analyzing your ingested logs and enabled analytics rules, then comparing them to the logs and detections needed to address specific types of attacks.
6774

6875
Threat-based optimizations consider both predefined and user-defined detections.
6976

@@ -75,6 +82,32 @@ The following table lists the available types of threat-based SOC optimization r
7582
| Templates are turned on, but data sources are missing. | Connect new data sources. |
7683
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
7784

85+
### AI MITRE ATT&CK tagging recommendations (Preview)
86+
87+
The AI MITRE ATT&CK Tagging feature uses artificial intelligence to automatically tag security detections. The AI model runs on the customer's workspace to create tagging recommendations for untagged detections with relevant MITRE ATT&CK tactic and techniques.
88+
89+
Customers can apply these recommendations to ensure their security coverage is thorough and precise. This ensures complete and accurate security coverage, enhancing threat detection and response capabilities.
90+
91+
These are 3 ways to apply the AI MITRE ATT&CK tagging recommendations:
92+
- Apply the recommendation to a specific analytics rule.
93+
- Apply the recommendation to all analytics rules in the workspace.
94+
- Don't apply the recommendation to any analytics rules.
95+
96+
### Risk-based optimization recommendations (Preview)
97+
98+
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance, and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
99+
100+
To provide risk-based recommendations, SOC optimization looks at your ingested logs and analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks that may cause business risks.
101+
Risk-based recommendations optimizations consider both predefined and user-defined detections.
102+
103+
The following table lists the available types of risk-based SOC optimization recommendations:
104+
105+
| Type of observation | Action |
106+
|---------|---------|
107+
| There are data sources, but detections are missing. | Turn on analytics rule templates based on the business risks: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. |
108+
| Templates are turned on, but data sources are missing. | Connect new data sources. |
109+
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
110+
78111
## Similar organizations recommendations
79112

80113
SOC optimization uses advanced machine learning to identify tables that are missing from your workspace, but are used by organizations with similar ingestion trends and industry profiles. It shows how other organizations use these tables and recommends the relevant data sources, along with related rules, to improve your security coverage.
@@ -85,9 +118,9 @@ SOC optimization uses advanced machine learning to identify tables that are miss
85118

86119
### Considerations
87120

88-
- Not all workspaces get similar organizations recommendations. A workspace receives these recommendations only if our machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't. SOCs in their early or onboarding stages are more likely to receive these recommendations than SOCs with a higher level of maturity.
121+
- A workspace only receives similar organization recommendations if the machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't. SOCs in their early or onboarding stages are more likely to receive these recommendations than SOCs with a higher level of maturity. Not all workspaces get similar organizations recommendations.
89122

90-
- Recommendations are based on machine learning models that rely solely on Organizational Identifiable Information (OII) and system metadata. The models never access or analyze the content of customer logs or ingest them at any point. No customer data, content, or personal data (EUII) is exposed to the analysis.
123+
- The machine learning models never access or analyze the content of customer logs or ingest them at any point. No customer data, content, or personal data (EUII) is exposed to the analysis. Recommendations are based on machine learning models that rely solely on Organizational Identifiable Information (OII) and system metadata.
91124

92125
## Related content
93126

articles/sentinel/whats-new.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the latest new features and announcement in Microsoft S
44
author: batamig
55
ms.author: bagol
66
ms.topic: concept-article
7-
ms.date: 04/28/2025
7+
ms.date: 05/06/2025
88

99
#Customer intent: As a security team member, I want to stay updated on the latest features and enhancements in Microsoft Sentinel so that I can effectively manage and optimize my organization's security posture.
1010

@@ -18,6 +18,13 @@ The listed features were released in the last three months. For information abou
1818

1919
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
2020

21+
## May 2025
22+
SOC optimization support for:
23+
- **AI MITRE ATT&CK tagging recommendations (Preview)**: Uses artificial intelligence to suggest tagging security detections with MITRE ATT&CK tactics and techniques.
24+
- **Risk-based recommendations (Preview)**: Recommends implementing controls to address coverage gaps linked to use cases that may result in business risks or financial losses, including operational, financial, reputational, compliance, and legal risks.
25+
26+
For more information, see [SOC optimization reference](soc-optimization/soc-optimization-reference.md).
27+
2128
## April 2025
2229

2330
- [Security Copilot generates incident summaries in Microsoft Sentinel in the Azure portal (Preview)](#security-copilot-generates-incident-summaries-in-microsoft-sentinel-in-the-azure-portal-preview)

0 commit comments

Comments
 (0)