Skip to content

Commit 840e0e1

Browse files
committed
Deploy side-by-side - upds
1 parent f6bab60 commit 840e0e1

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

articles/sentinel/deploy-side-by-side.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,28 @@
11
---
2-
title: Deploy Microsoft Sentinel side-by-side to an existing SIEM.
2+
title: Deploying Microsoft Sentinel side-by-side to an existing SIEM.
33
description: Learn how to deploy Microsoft Sentinel side-by-side to an existing SIEM.
4-
author: limwainstein
4+
author: cwatson-cat
55
ms.topic: conceptual
6-
ms.date: 05/30/2022
7-
ms.author: lwainstein
6+
ms.date: 07/24/2024
7+
ms.author: cwatson
88
---
99

10-
# Deploy Microsoft Sentinel side-by-side to an existing SIEM
10+
# Deploying Microsoft Sentinel side-by-side to an existing SIEM
1111

1212
Your security operations center (SOC) team uses centralized security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solutions to protect your increasingly decentralized digital estate.
1313

14-
This article describes how to deploy Microsoft Sentinel in a side-by-side configuration together with your existing SIEM.
14+
This article describes the approach and methods to consider when deploying Microsoft Sentinel in a side-by-side configuration together with your existing SIEM.
1515

16-
## Select a side-by-side approach and method
16+
## Side-by-side approach
1717

18-
Use a side-by-side architecture either as a short-term, transitional phase that leads to a completely cloud-hosted SIEM, or as a medium- to long-term operational model, depending on the SIEM needs of your organization.
18+
Use a side-by-side architecture either as a short-term, transitional phase that leads to a cloud-hosted SIEM, or as a medium- to long-term operational model, depending on the SIEM needs of your organization.
1919

20-
For example, while the recommended architecture is to use a side-by-side architecture just long enough to complete a migration to Microsoft Sentinel, your organization may want to stay with your side-by-side configuration for longer, such as if you aren't ready to move away from your legacy SIEM. Typically, organizations who use a long-term, side-by-side configuration use Microsoft Sentinel to analyze only their cloud data.
20+
For example, while the recommended architecture is to use a side-by-side architecture just long enough to complete a migration to Microsoft Sentinel, your organization might want to stay with your side-by-side configuration for longer, such as if you aren't ready to move away from your legacy SIEM. Typically, organizations who use a long-term, side-by-side configuration use Microsoft Sentinel to analyze only their cloud data. Many organizations avoid running multiple on-premises analytics solutions because of cost and complexity.
21+
22+
Microsoft Sentinel provides [pay-as-you-go pricing](billing.md) and flexible infrastructure, giving SOC teams time to adapt to the change. Deploy and test your content at a pace that works best for your organization, and learn about how to [fully migrate to Microsoft Sentinel](migration.md).
2123

2224
Consider the pros and cons for each approach when deciding which one to use.
2325

24-
> [!NOTE]
25-
> Many organizations avoid running multiple on-premises analytics solutions because of cost and complexity.
26-
>
27-
> Microsoft Sentinel provides [pay-as-you-go pricing](billing.md) and flexible infrastructure, giving SOC teams time to adapt to the change. Deploy and test your content at a pace that works best for your organization, and learn about how to [fully migrate to Microsoft Sentinel](migration.md).
28-
>
2926
### Short-term approach
3027

3128
|**Pros** |**Cons** |
@@ -38,6 +35,10 @@ Consider the pros and cons for each approach when deciding which one to use.
3835
|---------|---------|
3936
|• Lets you use key Microsoft Sentinel benefits, like AI, ML, and investigation capabilities, without moving completely away from your legacy SIEM.<br><br>• Saves money compared to your legacy SIEM, by analyzing cloud or Microsoft data in Microsoft Sentinel. |• Increases complexity by separating analytics across different databases.<br><br>• Splits case management and investigations for multi-environment incidents.<br><br>• Incurs greater staff and infrastructure costs.<br><br>• Requires SOC staff to be knowledgeable about two different SIEM solutions. |
4037

38+
## Side-by-side method
39+
40+
Determine how you'll configure and use Microsoft Sentinel side-by-side with your legacy SIEM.
41+
4142
### Send alerts from a legacy SIEM to Microsoft Sentinel (Recommended)
4243

4344
Send alerts, or indicators of anomalous activity, from your legacy SIEM to Microsoft Sentinel.
@@ -46,7 +47,7 @@ Send alerts, or indicators of anomalous activity, from your legacy SIEM to Micro
4647
- Use your legacy SIEM to analyze on-premises data and generate alerts.
4748
- Forward the alerts from your on-premises SIEM into Microsoft Sentinel to establish a single interface.
4849

49-
For example, forward alerts using [Logstash](connect-logstash.md), [APIs](/rest/api/securityinsights/), or [Syslog](connect-syslog.md), and store them in [JSON](https://techcommunity.microsoft.com/t5/azure-sentinel/tip-easily-use-json-fields-in-sentinel/ba-p/768747) format in your Microsoft Sentinel [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md).
50+
For example, forward alerts using [Logstash](connect-logstash-data-connection-rules.md), [APIs](/rest/api/securityinsights/), or [Syslog](connect-cef-syslog-ama.md), and store them in [JSON](https://techcommunity.microsoft.com/t5/azure-sentinel/tip-easily-use-json-fields-in-sentinel/ba-p/768747) format in your Microsoft Sentinel Log Analytics workspace.
5051

5152
By sending alerts from your legacy SIEM to Microsoft Sentinel, your team can cross-correlate and investigate those alerts in Microsoft Sentinel. The team can still access the legacy SIEM for deeper investigation if needed. Meanwhile, you can continue deploying data sources over an extended transition period.
5253

@@ -81,27 +82,26 @@ The following table describes side-by-side configurations that are *not* recomme
8182
|**Send logs from a legacy SIEM to Microsoft Sentinel** | While this method provides you with the full functionality of Microsoft Sentinel, your organization still pays for two different data ingestion sources. Besides adding architectural complexity, this model can result in higher costs. |
8283
|**Use Microsoft Sentinel and your legacy SIEM as two fully separate solutions** | You could use Microsoft Sentinel to analyze some data sources, like your cloud data, and continue to use your on-premises SIEM for other sources. This setup allows for clear boundaries for when to use each solution, and avoids duplication of costs. <br><br>However, cross-correlation becomes difficult, and you can't fully diagnose attacks that cross both sets of data sources. In today's landscape, where threats often move laterally across an organization, such visibility gaps can pose significant security risks. |
8384

84-
## Use automation to streamline processes
85+
## Automation to streamline processes
8586

8687
Use automated workflows to group and prioritize alerts into a common incident, and modify its priority.
8788

8889
For more information, see:
8990

90-
- [Security Orchestration, Automation, and Response (SOAR) in Microsoft Sentinel](automation.md).
91+
- [Automation in Microsoft Sentinel: Security orchestration, automation, and response (SOAR)](automation/automation.md)
9192
- [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md)
9293
- [Automate incident handling in Microsoft Sentinel with automation rules](automate-incident-handling-with-automation-rules.md)
9394

94-
## Next steps
95+
## Related content
9596

9697
Explore Microsoft's Microsoft Sentinel resources to expand your skills and get the most out of Microsoft Sentinel.
9798

98-
Also consider increasing your threat protection by using Microsoft Sentinel alongside [Microsoft Defender XDR](./microsoft-365-defender-sentinel-integration.md) and [Microsoft Defender for Cloud](../security-center/azure-defender.md) for [integrated threat protection](https://www.microsoft.com/security/business/threat-protection). Benefit from the breadth of visibility that Microsoft Sentinel delivers, while diving deeper into detailed threat analysis.
99+
Consider increasing your threat protection by using Microsoft Sentinel alongside [Microsoft Defender XDR](./microsoft-365-defender-sentinel-integration.md) and [Microsoft Defender for Cloud](../security-center/azure-defender.md) for [integrated threat protection](https://www.microsoft.com/security/business/threat-protection). Benefit from the breadth of visibility that Microsoft Sentinel delivers, while diving deeper into detailed threat analysis.
99100

100101
For more information, see:
101102

102103
- [Rule migration best practices](https://techcommunity.microsoft.com/t5/azure-sentinel/best-practices-for-migrating-detection-rules-from-arcsight/ba-p/2216417)
103104
- [Webinar: Best Practices for Converting Detection Rules](https://www.youtube.com/watch?v=njXK1h9lfR4)
104-
- [Security Orchestration, Automation, and Response (SOAR) in Microsoft Sentinel](automation.md)
105105
- [Manage your SOC better with incident metrics](manage-soc-with-incident-metrics.md)
106106
- [Microsoft Sentinel learning path](/training/paths/security-ops-sentinel/)
107107
- [SC-200 Microsoft Security Operations Analyst certification](/certifications/exams/sc-200)

0 commit comments

Comments
 (0)