Skip to content

Commit 93ba1df

Browse files
committed
clarifying logic
1 parent bf57cc4 commit 93ba1df

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

articles/sentinel/soc-optimization/soc-optimization-reference.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ If a table is chosen for [UEBA](/azure/sentinel/enable-entity-behavior-analytics
5151

5252
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach.
5353

54-
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares it to the logs and detections that are required to protect, detect, and respond to specific types of attacks. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
54+
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares it to the logs and detections that are required to protect, detect, and respond to specific types of attacks. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research. SOC optimization considers both user-defined and out-of-the-box detections.
5555

5656
The following table lists the available threat-based SOC optimization recommendations:
5757

@@ -61,7 +61,6 @@ The following table lists the available threat-based SOC optimization recommenda
6161
|Templates are turned on, but data sources are missing. | Connect new data sources. |
6262
|There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
6363

64-
6564
## Related content
6665

6766
- [Using SOC optimizations programmatically (Preview)](soc-optimization-api.md)

0 commit comments

Comments
 (0)