Skip to content

Commit 4d82b2b

Browse files
committed
look and feel
1 parent 1e321b5 commit 4d82b2b

File tree

1 file changed

+44
-6
lines changed

1 file changed

+44
-6
lines changed

articles/sentinel/migration.md

Lines changed: 44 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -59,13 +59,51 @@ Use a side-by-side architecture either as a short-term, transitional phase that
5959

6060
For example, while the recommended architecture is to use a side-by-side architecture just long enough to complete the migration, your organization may want stay with your side-by-side configuration for longer, such as if you aren't ready to move away from your legacy SIEM. Typically, organizations who use a long-term, side-by-side configuration use Azure Sentinel to analyze only their cloud data.
6161

62-
The following table lists the pros and cons of each architecture configuration.
62+
Consider the pros and cons for each approach when deciding which one to use in your migration.
6363

64-
|Approach |Pros |Cons |
65-
|---------|---------|---------|
66-
|**Short-term approach** | - Gives SOC staff time to adapt to new processes as workloads and analytics migrate.<br><br>- Gains deep correlation across all data sources for hunting scenarios.<br><br>- Eliminates having to do analytics between SIEMs, create forwarding rules, and close investigations in two places.<br><br>- Enables your SOC team to quickly downgrade legacy SIEM solutions, eliminating infrastructure and licensing costs. |- Can require a steep learning curve for SOC staff. |
67-
|**Medium- to long-term approach** | - Lets you use key Azure Sentinel benefits, like AI, ML, and investigation capabilities, without moving completely away from your legacy SIEM.<br><br>- Saves money compared to your legacy SIEM, by analyzing cloud or Microsoft data in Azure Sentinel. | - Increases complexity by separating analytics across different databases.<br><br>- Splits case management and investigations for multi-environment incidents.<br><br>- Incurs greater staff and infrastructure costs.<br><br>- Requires SOC staff to be knowledgeable about two different SIEM solutions. |
68-
| | | |
64+
### Short-term approach
65+
66+
:::row:::
67+
:::column span="":::
68+
**Pros**
69+
70+
- Gives SOC staff time to adapt to new processes as workloads and analytics migrate.
71+
72+
- Gains deep correlation across all data sources for hunting scenarios.
73+
74+
- Eliminates having to do analytics between SIEMs, create forwarding rules, and close investigations in two places.
75+
76+
- Enables your SOC team to quickly downgrade legacy SIEM solutions, eliminating infrastructure and licensing costs.
77+
:::column-end:::
78+
:::column span="":::
79+
**Cons**
80+
81+
- Can require a steep learning curve for SOC staff.
82+
:::column-end:::
83+
:::row-end:::
84+
85+
### Medium- to long-term approach
86+
87+
:::row:::
88+
:::column span="":::
89+
**Pros**
90+
91+
- Lets you use key Azure Sentinel benefits, like AI, ML, and investigation capabilities, without moving completely away from your legacy SIEM.
92+
93+
- Saves money compared to your legacy SIEM, by analyzing cloud or Microsoft data in Azure Sentinel.
94+
:::column-end:::
95+
:::column span="":::
96+
**Cons**
97+
98+
- Increases complexity by separating analytics across different databases.
99+
100+
- Splits case management and investigations for multi-environment incidents.
101+
102+
- Incurs greater staff and infrastructure costs.
103+
104+
- Requires SOC staff to be knowledgeable about two different SIEM solutions.
105+
:::column-end:::
106+
:::row-end:::
69107

70108
> [!NOTE]
71109
> Many organizations avoid running multiple on-premises analytics solutions because of cost and complexity.

0 commit comments

Comments
 (0)