Skip to content

Commit a71d16f

Browse files
Merge pull request #281786 from cwatson-cat/7-24-24-sd-sd-migrate
Deploy side-by-side - updates to links, reorganize content
2 parents 8eec9df + d0fcc5a commit a71d16f

File tree

1 file changed

+26
-22
lines changed

1 file changed

+26
-22
lines changed

articles/sentinel/deploy-side-by-side.md

Lines changed: 26 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,52 +1,57 @@
11
---
2-
title: Deploy Microsoft Sentinel side-by-side to an existing SIEM.
2+
title: Deploying Microsoft Sentinel side-by-side to an existing SIEM.
33
description: Learn how to deploy Microsoft Sentinel side-by-side to an existing SIEM.
4-
author: limwainstein
4+
author: cwatson-cat
55
ms.topic: conceptual
6-
ms.date: 05/30/2022
7-
ms.author: lwainstein
6+
ms.date: 07/24/2024
7+
ms.author: cwatson
88
---
99

10-
# Deploy Microsoft Sentinel side-by-side to an existing SIEM
10+
# Deploying Microsoft Sentinel side-by-side to an existing SIEM
1111

1212
Your security operations center (SOC) team uses centralized security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solutions to protect your increasingly decentralized digital estate.
1313

14-
This article describes how to deploy Microsoft Sentinel in a side-by-side configuration together with your existing SIEM.
14+
This article describes the approach and methods to consider when deploying Microsoft Sentinel in a side-by-side configuration together with your existing SIEM.
1515

16-
## Select a side-by-side approach and method
16+
## Side-by-side approach
1717

18-
Use a side-by-side architecture either as a short-term, transitional phase that leads to a completely cloud-hosted SIEM, or as a medium- to long-term operational model, depending on the SIEM needs of your organization.
18+
Use a side-by-side architecture either as a short-term, transitional phase that leads to a cloud-hosted SIEM, or as a medium- to long-term operational model, depending on the SIEM needs of your organization.
1919

20-
For example, while the recommended architecture is to use a side-by-side architecture just long enough to complete a migration to Microsoft Sentinel, your organization may want to stay with your side-by-side configuration for longer, such as if you aren't ready to move away from your legacy SIEM. Typically, organizations who use a long-term, side-by-side configuration use Microsoft Sentinel to analyze only their cloud data.
20+
For example, while the recommended architecture is to use a side-by-side architecture just long enough to complete a migration to Microsoft Sentinel, your organization might want to stay with your side-by-side configuration for longer, such as if you aren't ready to move away from your legacy SIEM. Typically, organizations who use a long-term, side-by-side configuration use Microsoft Sentinel to analyze only their cloud data. Many organizations avoid running multiple on-premises analytics solutions because of cost and complexity.
21+
22+
Microsoft Sentinel provides [pay-as-you-go pricing](billing.md) and flexible infrastructure, giving SOC teams time to adapt to the change. Deploy and test your content at a pace that works best for your organization, and learn about how to [fully migrate to Microsoft Sentinel](migration.md).
2123

2224
Consider the pros and cons for each approach when deciding which one to use.
2325

24-
> [!NOTE]
25-
> Many organizations avoid running multiple on-premises analytics solutions because of cost and complexity.
26-
>
27-
> Microsoft Sentinel provides [pay-as-you-go pricing](billing.md) and flexible infrastructure, giving SOC teams time to adapt to the change. Deploy and test your content at a pace that works best for your organization, and learn about how to [fully migrate to Microsoft Sentinel](migration.md).
28-
>
2926
### Short-term approach
3027

28+
The following table describes the pros and cons of using a side-by-side architecture for a relatively short period of time.
29+
3130
|**Pros** |**Cons** |
3231
|---------|---------|
3332
|• Gives SOC staff time to adapt to new processes as you deploy workloads and analytics.<br><br>• Gains deep correlation across all data sources for hunting scenarios.<br><br>• Eliminates having to do analytics between SIEMs, create forwarding rules, and close investigations in two places.<br><br>• Enables your SOC team to quickly downgrade legacy SIEM solutions, eliminating infrastructure and licensing costs. |• Can require a steep learning curve for SOC staff. |
3433

3534
### Medium- to long-term approach
3635

36+
The following table describes the pros and cons of using a side-by-side architecture for a relatively medium or longer period of time.
37+
3738
|**Pros** |**Cons** |
3839
|---------|---------|
3940
|• Lets you use key Microsoft Sentinel benefits, like AI, ML, and investigation capabilities, without moving completely away from your legacy SIEM.<br><br>• Saves money compared to your legacy SIEM, by analyzing cloud or Microsoft data in Microsoft Sentinel. |• Increases complexity by separating analytics across different databases.<br><br>• Splits case management and investigations for multi-environment incidents.<br><br>• Incurs greater staff and infrastructure costs.<br><br>• Requires SOC staff to be knowledgeable about two different SIEM solutions. |
4041

41-
### Send alerts from a legacy SIEM to Microsoft Sentinel (Recommended)
42+
## Side-by-side method
43+
44+
Determine how you'll configure and use Microsoft Sentinel side-by-side with your legacy SIEM.
45+
46+
### Method 1: Send alerts from a legacy SIEM to Microsoft Sentinel (Recommended)
4247

4348
Send alerts, or indicators of anomalous activity, from your legacy SIEM to Microsoft Sentinel.
4449

4550
- Ingest and analyze cloud data in Microsoft Sentinel
4651
- Use your legacy SIEM to analyze on-premises data and generate alerts.
4752
- Forward the alerts from your on-premises SIEM into Microsoft Sentinel to establish a single interface.
4853

49-
For example, forward alerts using [Logstash](connect-logstash.md), [APIs](/rest/api/securityinsights/), or [Syslog](connect-syslog.md), and store them in [JSON](https://techcommunity.microsoft.com/t5/azure-sentinel/tip-easily-use-json-fields-in-sentinel/ba-p/768747) format in your Microsoft Sentinel [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md).
54+
For example, forward alerts using [Logstash](connect-logstash-data-connection-rules.md), [APIs](/rest/api/securityinsights/), or [Syslog](connect-cef-syslog-ama.md), and store them in [JSON](https://techcommunity.microsoft.com/t5/azure-sentinel/tip-easily-use-json-fields-in-sentinel/ba-p/768747) format in your Microsoft Sentinel Log Analytics workspace.
5055

5156
By sending alerts from your legacy SIEM to Microsoft Sentinel, your team can cross-correlate and investigate those alerts in Microsoft Sentinel. The team can still access the legacy SIEM for deeper investigation if needed. Meanwhile, you can continue deploying data sources over an extended transition period.
5257

@@ -59,7 +64,7 @@ For more information, see:
5964

6065
If you want to fully migrate to Microsoft Sentinel, review the full [migration guide](migration.md).
6166

62-
### Send alerts and enriched incidents from Microsoft Sentinel to a legacy SIEM
67+
### Method 2: Send alerts and enriched incidents from Microsoft Sentinel to a legacy SIEM
6368

6469
Analyze some data in Microsoft Sentinel, such as cloud data, and then send the generated alerts to a legacy SIEM. Use the *legacy* SIEM as your single interface to do cross-correlation with the alerts that Microsoft Sentinel generated. You can still use Microsoft Sentinel for deeper investigation of the Microsoft Sentinel-generated alerts.
6570

@@ -81,27 +86,26 @@ The following table describes side-by-side configurations that are *not* recomme
8186
|**Send logs from a legacy SIEM to Microsoft Sentinel** | While this method provides you with the full functionality of Microsoft Sentinel, your organization still pays for two different data ingestion sources. Besides adding architectural complexity, this model can result in higher costs. |
8287
|**Use Microsoft Sentinel and your legacy SIEM as two fully separate solutions** | You could use Microsoft Sentinel to analyze some data sources, like your cloud data, and continue to use your on-premises SIEM for other sources. This setup allows for clear boundaries for when to use each solution, and avoids duplication of costs. <br><br>However, cross-correlation becomes difficult, and you can't fully diagnose attacks that cross both sets of data sources. In today's landscape, where threats often move laterally across an organization, such visibility gaps can pose significant security risks. |
8388

84-
## Use automation to streamline processes
89+
## Streamline processes by using automation
8590

8691
Use automated workflows to group and prioritize alerts into a common incident, and modify its priority.
8792

8893
For more information, see:
8994

90-
- [Security Orchestration, Automation, and Response (SOAR) in Microsoft Sentinel](automation.md).
95+
- [Automation in Microsoft Sentinel: Security orchestration, automation, and response (SOAR)](automation/automation.md)
9196
- [Automate threat response with playbooks in Microsoft Sentinel](automate-responses-with-playbooks.md)
9297
- [Automate incident handling in Microsoft Sentinel with automation rules](automate-incident-handling-with-automation-rules.md)
9398

94-
## Next steps
99+
## Related content
95100

96101
Explore Microsoft's Microsoft Sentinel resources to expand your skills and get the most out of Microsoft Sentinel.
97102

98-
Also consider increasing your threat protection by using Microsoft Sentinel alongside [Microsoft Defender XDR](./microsoft-365-defender-sentinel-integration.md) and [Microsoft Defender for Cloud](../security-center/azure-defender.md) for [integrated threat protection](https://www.microsoft.com/security/business/threat-protection). Benefit from the breadth of visibility that Microsoft Sentinel delivers, while diving deeper into detailed threat analysis.
103+
Consider increasing your threat protection by using Microsoft Sentinel alongside [Microsoft Defender XDR](./microsoft-365-defender-sentinel-integration.md) and [Microsoft Defender for Cloud](../security-center/azure-defender.md) for [integrated threat protection](https://www.microsoft.com/security/business/threat-protection). Benefit from the breadth of visibility that Microsoft Sentinel delivers, while diving deeper into detailed threat analysis.
99104

100105
For more information, see:
101106

102107
- [Rule migration best practices](https://techcommunity.microsoft.com/t5/azure-sentinel/best-practices-for-migrating-detection-rules-from-arcsight/ba-p/2216417)
103108
- [Webinar: Best Practices for Converting Detection Rules](https://www.youtube.com/watch?v=njXK1h9lfR4)
104-
- [Security Orchestration, Automation, and Response (SOAR) in Microsoft Sentinel](automation.md)
105109
- [Manage your SOC better with incident metrics](manage-soc-with-incident-metrics.md)
106110
- [Microsoft Sentinel learning path](/training/paths/security-ops-sentinel/)
107111
- [SC-200 Microsoft Security Operations Analyst certification](/certifications/exams/sc-200)

0 commit comments

Comments
 (0)