You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/migration.md
+44-6Lines changed: 44 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,13 +59,51 @@ Use a side-by-side architecture either as a short-term, transitional phase that
59
59
60
60
For example, while the recommended architecture is to use a side-by-side architecture just long enough to complete the migration, your organization may want stay with your side-by-side configuration for longer, such as if you aren't ready to move away from your legacy SIEM. Typically, organizations who use a long-term, side-by-side configuration use Azure Sentinel to analyze only their cloud data.
61
61
62
-
The following table lists the pros and cons of each architecture configuration.
62
+
Consider the pros and cons for each approach when deciding which one to use in your migration.
63
63
64
-
|Approach |Pros |Cons |
65
-
|---------|---------|---------|
66
-
|**Short-term approach**| - Gives SOC staff time to adapt to new processes as workloads and analytics migrate.<br><br>- Gains deep correlation across all data sources for hunting scenarios.<br><br>- Eliminates having to do analytics between SIEMs, create forwarding rules, and close investigations in two places.<br><br>- Enables your SOC team to quickly downgrade legacy SIEM solutions, eliminating infrastructure and licensing costs. |- Can require a steep learning curve for SOC staff. |
67
-
|**Medium- to long-term approach**| - Lets you use key Azure Sentinel benefits, like AI, ML, and investigation capabilities, without moving completely away from your legacy SIEM.<br><br>- Saves money compared to your legacy SIEM, by analyzing cloud or Microsoft data in Azure Sentinel. | - Increases complexity by separating analytics across different databases.<br><br>- Splits case management and investigations for multi-environment incidents.<br><br>- Incurs greater staff and infrastructure costs.<br><br>- Requires SOC staff to be knowledgeable about two different SIEM solutions. |
68
-
||||
64
+
### Short-term approach
65
+
66
+
:::row:::
67
+
:::column span="":::
68
+
**Pros**
69
+
70
+
- Gives SOC staff time to adapt to new processes as workloads and analytics migrate.
71
+
72
+
- Gains deep correlation across all data sources for hunting scenarios.
73
+
74
+
- Eliminates having to do analytics between SIEMs, create forwarding rules, and close investigations in two places.
75
+
76
+
- Enables your SOC team to quickly downgrade legacy SIEM solutions, eliminating infrastructure and licensing costs.
77
+
:::column-end:::
78
+
:::column span="":::
79
+
**Cons**
80
+
81
+
- Can require a steep learning curve for SOC staff.
82
+
:::column-end:::
83
+
:::row-end:::
84
+
85
+
### Medium- to long-term approach
86
+
87
+
:::row:::
88
+
:::column span="":::
89
+
**Pros**
90
+
91
+
- Lets you use key Azure Sentinel benefits, like AI, ML, and investigation capabilities, without moving completely away from your legacy SIEM.
92
+
93
+
- Saves money compared to your legacy SIEM, by analyzing cloud or Microsoft data in Azure Sentinel.
94
+
:::column-end:::
95
+
:::column span="":::
96
+
**Cons**
97
+
98
+
- Increases complexity by separating analytics across different databases.
99
+
100
+
- Splits case management and investigations for multi-environment incidents.
101
+
102
+
- Incurs greater staff and infrastructure costs.
103
+
104
+
- Requires SOC staff to be knowledgeable about two different SIEM solutions.
105
+
:::column-end:::
106
+
:::row-end:::
69
107
70
108
> [!NOTE]
71
109
> Many organizations avoid running multiple on-premises analytics solutions because of cost and complexity.
0 commit comments