You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-reference.md
+34-16Lines changed: 34 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: raynew
7
7
ms.collection:
8
8
- usx-security
9
9
ms.topic: reference
10
-
ms.date: 06/09/2024
10
+
ms.date: 12/18/2024
11
11
appliesto:
12
12
- Microsoft Sentinel in the Microsoft Defender portal
13
13
- Microsoft Sentinel in the Azure portal
@@ -23,46 +23,64 @@ Use SOC optimization recommendations to help you close coverage gaps against spe
23
23
24
24
Microsoft Sentinel SOC optimizations include the following types of recommendations:
25
25
26
-
-**Threat-based optimizations**recommend adding security controls that help you close coverage gaps.
26
+
-**Threat-based recommendations**suggest adding security controls that help you close coverage gaps.
27
27
28
-
-**Data value optimizations** recommend ways to improve your data use, such as a better data plan for your organization.
28
+
-**Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
29
+
30
+
-**Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
29
31
30
32
This article provides a reference of the SOC optimization recommendations available.
To optimize your cost to security value ratio, SOC optimization surfaces hardly used data connectors or tables, and suggests ways to either reduce the cost of a table or improve its value, depending on your coverage. This type of optimization is also called *data value optimization*.
38
+
To optimize your cost/security value ratio, SOC optimization surfaces hardly used data connectors or tables, and suggests ways to either reduce the cost of a table or improve its value, depending on your coverage. This type of optimization is also called *data value optimization*.
37
39
38
40
Data value optimizations only look at billable tables that ingested data in the past 30 days.
39
41
40
42
The following table lists the available data value SOC optimization recommendations:
41
43
42
-
|Observation |Action |
44
+
|Observation | Action|
43
45
|---------|---------|
44
-
|The table wasn’t used by analytic rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. |Turn on analytics rule templates <br>OR<br>Move to basic logs if the table is eligible |
45
-
|The table wasn’t used at all in the last 30 days | Turn on analytics rule templates <br>OR<br> Stop data ingestion or archive the table |
46
-
|The table was only used by Azure Monitor |Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a nonsecurity Log Analytics workspace |
46
+
|The table wasn’t used by analytics rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move to basic logs if the table is eligible.|
47
+
|The table wasn’t used at all in the last 30 days.| Turn on analytics rule templates <br>OR<br> Stop data ingestion or archive the table.|
48
+
|The table was only used by Azure Monitor.| Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a non-security Log Analytics workspace.|
47
49
48
50
If a table is chosen for [UEBA](/azure/sentinel/enable-entity-behavior-analytics) or a [threat intelligence matching analytics rule](/azure/sentinel/use-matching-analytics-to-detect-threats), SOC optimization doesn't recommend any changes in ingestion.
49
51
50
52
> [!IMPORTANT]
51
53
> When making changes to ingestion plans, we recommend always ensuring that the limits of your ingestion plans are clear, and that the affected tables aren't ingested for compliance or other similar reasons.
52
54
>
53
-
## Threat-based optimization
55
+
## Threat-based optimization recommendations
56
+
57
+
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
54
58
55
-
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach.
59
+
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks.
56
60
57
-
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares it to the logs and detections that are required to protect, detect, and respond to specific types of attacks. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research. SOC optimization considers both user-defined and out-of-the-box detections.
61
+
Threat-based optimizations consider both predefined and user-defined detections.
58
62
59
63
The following table lists the available threat-based SOC optimization recommendations:
60
64
61
-
|Observation |Action |
65
+
|Observation | Action|
62
66
|---------|---------|
63
-
|There are data sources, but detections are missing. | Turn on analytics rule templates based on the threat: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. <br><br>For more information, see [Threat detection in Microsoft Sentinel](../threat-detection.md). |
64
-
|Templates are turned on, but data sources are missing. | Connect new data sources. |
65
-
|There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
67
+
| There are data sources, but detections are missing. | Turn on analytics rule templates based on the threat: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. <br><br>For more information, see [Threat detection in Microsoft Sentinel](../threat-detection.md). |
68
+
| Templates are turned on, but data sources are missing. | Connect new data sources. |
69
+
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
70
+
71
+
## Similar organizations recommendations
72
+
73
+
SOC optimization uses advanced machine learning to identify tables that are missing from your workspace, but are used by organizations with similar ingestion trends and industry profiles to yours. It shows how other organizations use these tables and recommends to you the relevant data sources, along with related rules, to improve your security coverage.
74
+
75
+
| Observation | Action |
76
+
|---------|---------|
77
+
| Log sources ingested by similar customers are missing | Connect the suggested data sources. <br><br>This recommendation doesn't include: <ul><li>Custom connectors<li>Custom tables<li>Tables that are ingested by fewer than 10 workspaces <li>Tables that contain multiple log sources, like the `Syslog` or `CommonSecurityLog` tables |
78
+
79
+
### Considerations
80
+
81
+
- Not all workspaces get similar organizations recommendations. A workspace receives these recommendations only if our machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't. SOCs in their early or onboarding stages are generally more likely to receive these recommendations than SOCs with a higher level of maturity.
82
+
83
+
- Recommendations are based on machine learning models that rely solely on Organizational Identifiable Information (OII) and system metadata. The models never access or analyze the content of customer logs or ingest them at any point. No customer data, content, or End User Identifiable Information (EUII) is exposed to the analysis.
Copy file name to clipboardExpand all lines: articles/sentinel/whats-new.md
+8-1Lines changed: 8 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about the latest new features and announcement in Microsoft S
4
4
author: yelevin
5
5
ms.author: yelevin
6
6
ms.topic: concept-article
7
-
ms.date: 12/15/2024
7
+
ms.date: 12/18/2024
8
8
9
9
10
10
#Customer intent: As a security team member, I want to stay updated on the latest features and enhancements in Microsoft Sentinel so that I can effectively manage and optimize my organization's security posture.
@@ -24,12 +24,19 @@ Get notified when this page is updated by copying and pasting the following URL
24
24
25
25
## December 2024
26
26
27
+
-[New SOC optimization recommendation based on similar organizations (Preview)](#new-soc-optimization-recommendation-based-on-similar-organizations-preview)
27
28
-[Agentless deployment for SAP applications (Limited preview)](#agentless-deployment-for-sap-applications-limited-preview)
28
29
-[Microsoft Sentinel workbooks now available to view directly in the Microsoft Defender portal](#microsoft-sentinel-workbooks-now-available-to-view-directly-in-the-microsoft-defender-portal)
29
30
-[Unified Microsoft Sentinel solution for Microsoft Business Apps](#unified-microsoft-sentinel-solution-for-microsoft-business-apps)
30
31
-[New documentation library for Microsoft's unified security operations platform](#new-documentation-library-for-microsofts-unified-security-operations-platform)
31
32
-[New S3-based data connector for Amazon Web Services WAF logs (Preview)](#new-s3-based-data-connector-for-amazon-web-services-waf-logs-preview)
32
33
34
+
### New SOC optimization recommendation based on similar organizations (Preview)
35
+
36
+
SOC optimization now includes new recommendations for adding data sources to your workspace based on the security posture of other customers in similar industries and sectors as you, and with similar data ingestion patterns. Add the recommended data sources to improve security coverage for your organization.
37
+
38
+
For more information, see [SOC optimization reference of recommendations](soc-optimization/soc-optimization-reference.md).
39
+
33
40
### Agentless deployment for SAP applications (Limited preview)
34
41
35
42
The Microsoft Sentinel solution for SAP applications now supports an agentless deployment, using SAP's own cloud platform features to provide simplified, agentless deployment and connectivity. Instead of deploying a virtual machine and containerized agent, use the SAP Cloud Connector and its existing connections to back-end ABAP systems to connect your SAP system to Microsoft Sentinel.
0 commit comments