Skip to content

Commit a8dd065

Browse files
authored
Merge pull request #291651 from yelevin/patch-2
Similar customers - Sentinel
2 parents 91d9425 + ce04140 commit a8dd065

File tree

2 files changed

+42
-17
lines changed

2 files changed

+42
-17
lines changed

articles/sentinel/soc-optimization/soc-optimization-reference.md

Lines changed: 34 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: raynew
77
ms.collection:
88
- usx-security
99
ms.topic: reference
10-
ms.date: 06/09/2024
10+
ms.date: 12/18/2024
1111
appliesto:
1212
- Microsoft Sentinel in the Microsoft Defender portal
1313
- Microsoft Sentinel in the Azure portal
@@ -23,46 +23,64 @@ Use SOC optimization recommendations to help you close coverage gaps against spe
2323

2424
Microsoft Sentinel SOC optimizations include the following types of recommendations:
2525

26-
- **Threat-based optimizations** recommend adding security controls that help you close coverage gaps.
26+
- **Threat-based recommendations** suggest adding security controls that help you close coverage gaps.
2727

28-
- **Data value optimizations** recommend ways to improve your data use, such as a better data plan for your organization.
28+
- **Data value recommendations** suggest ways to improve your data use, such as a better data plan for your organization.
29+
30+
- **Similar organizations recommendations** suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
2931

3032
This article provides a reference of the SOC optimization recommendations available.
3133

3234
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
3335

34-
## Data value optimizations
36+
## Data value optimization recommendations
3537

36-
To optimize your cost to security value ratio, SOC optimization surfaces hardly used data connectors or tables, and suggests ways to either reduce the cost of a table or improve its value, depending on your coverage. This type of optimization is also called *data value optimization*.
38+
To optimize your cost/security value ratio, SOC optimization surfaces hardly used data connectors or tables, and suggests ways to either reduce the cost of a table or improve its value, depending on your coverage. This type of optimization is also called *data value optimization*.
3739

3840
Data value optimizations only look at billable tables that ingested data in the past 30 days.
3941

4042
The following table lists the available data value SOC optimization recommendations:
4143

42-
|Observation |Action |
44+
| Observation | Action |
4345
|---------|---------|
44-
|The table wasn’t used by analytic rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move to basic logs if the table is eligible |
45-
|The table wasn’t used at all in the last 30 days | Turn on analytics rule templates <br>OR<br> Stop data ingestion or archive the table |
46-
|The table was only used by Azure Monitor | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a nonsecurity Log Analytics workspace |
46+
| The table wasn’t used by analytics rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates <br>OR<br>Move to basic logs if the table is eligible. |
47+
| The table wasn’t used at all in the last 30 days. | Turn on analytics rule templates <br>OR<br> Stop data ingestion or archive the table. |
48+
| The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value <br>OR<br>Move to a non-security Log Analytics workspace. |
4749

4850
If a table is chosen for [UEBA](/azure/sentinel/enable-entity-behavior-analytics) or a [threat intelligence matching analytics rule](/azure/sentinel/use-matching-analytics-to-detect-threats), SOC optimization doesn't recommend any changes in ingestion.
4951

5052
> [!IMPORTANT]
5153
> When making changes to ingestion plans, we recommend always ensuring that the limits of your ingestion plans are clear, and that the affected tables aren't ingested for compliance or other similar reasons.
5254
>
53-
## Threat-based optimization
55+
## Threat-based optimization recommendations
56+
57+
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research.
5458

55-
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach.
59+
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks.
5660

57-
To provide threat-based recommendations, SOC optimization looks at your ingested logs and enabled analytics rules, and compares it to the logs and detections that are required to protect, detect, and respond to specific types of attacks. This optimization type is also known as *coverage optimization*, and is based on Microsoft's security research. SOC optimization considers both user-defined and out-of-the-box detections.
61+
Threat-based optimizations consider both predefined and user-defined detections.
5862

5963
The following table lists the available threat-based SOC optimization recommendations:
6064

61-
|Observation |Action |
65+
| Observation | Action |
6266
|---------|---------|
63-
|There are data sources, but detections are missing. | Turn on analytics rule templates based on the threat: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. <br><br>For more information, see [Threat detection in Microsoft Sentinel](../threat-detection.md). |
64-
|Templates are turned on, but data sources are missing. | Connect new data sources. |
65-
|There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
67+
| There are data sources, but detections are missing. | Turn on analytics rule templates based on the threat: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. <br><br>For more information, see [Threat detection in Microsoft Sentinel](../threat-detection.md). |
68+
| Templates are turned on, but data sources are missing. | Connect new data sources. |
69+
| There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
70+
71+
## Similar organizations recommendations
72+
73+
SOC optimization uses advanced machine learning to identify tables that are missing from your workspace, but are used by organizations with similar ingestion trends and industry profiles to yours. It shows how other organizations use these tables and recommends to you the relevant data sources, along with related rules, to improve your security coverage.
74+
75+
| Observation | Action |
76+
|---------|---------|
77+
| Log sources ingested by similar customers are missing | Connect the suggested data sources. <br><br>This recommendation doesn't include: <ul><li>Custom connectors<li>Custom tables<li>Tables that are ingested by fewer than 10 workspaces <li>Tables that contain multiple log sources, like the `Syslog` or `CommonSecurityLog` tables |
78+
79+
### Considerations
80+
81+
- Not all workspaces get similar organizations recommendations. A workspace receives these recommendations only if our machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't. SOCs in their early or onboarding stages are generally more likely to receive these recommendations than SOCs with a higher level of maturity.
82+
83+
- Recommendations are based on machine learning models that rely solely on Organizational Identifiable Information (OII) and system metadata. The models never access or analyze the content of customer logs or ingest them at any point. No customer data, content, or End User Identifiable Information (EUII) is exposed to the analysis.
6684

6785
## Related content
6886

articles/sentinel/whats-new.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the latest new features and announcement in Microsoft S
44
author: yelevin
55
ms.author: yelevin
66
ms.topic: concept-article
7-
ms.date: 12/15/2024
7+
ms.date: 12/18/2024
88

99

1010
#Customer intent: As a security team member, I want to stay updated on the latest features and enhancements in Microsoft Sentinel so that I can effectively manage and optimize my organization's security posture.
@@ -24,12 +24,19 @@ Get notified when this page is updated by copying and pasting the following URL
2424

2525
## December 2024
2626

27+
- [New SOC optimization recommendation based on similar organizations (Preview)](#new-soc-optimization-recommendation-based-on-similar-organizations-preview)
2728
- [Agentless deployment for SAP applications (Limited preview)](#agentless-deployment-for-sap-applications-limited-preview)
2829
- [Microsoft Sentinel workbooks now available to view directly in the Microsoft Defender portal](#microsoft-sentinel-workbooks-now-available-to-view-directly-in-the-microsoft-defender-portal)
2930
- [Unified Microsoft Sentinel solution for Microsoft Business Apps](#unified-microsoft-sentinel-solution-for-microsoft-business-apps)
3031
- [New documentation library for Microsoft's unified security operations platform](#new-documentation-library-for-microsofts-unified-security-operations-platform)
3132
- [New S3-based data connector for Amazon Web Services WAF logs (Preview)](#new-s3-based-data-connector-for-amazon-web-services-waf-logs-preview)
3233

34+
### New SOC optimization recommendation based on similar organizations (Preview)
35+
36+
SOC optimization now includes new recommendations for adding data sources to your workspace based on the security posture of other customers in similar industries and sectors as you, and with similar data ingestion patterns. Add the recommended data sources to improve security coverage for your organization.
37+
38+
For more information, see [SOC optimization reference of recommendations](soc-optimization/soc-optimization-reference.md).
39+
3340
### Agentless deployment for SAP applications (Limited preview)
3441

3542
The Microsoft Sentinel solution for SAP applications now supports an agentless deployment, using SAP's own cloud platform features to provide simplified, agentless deployment and connectivity. Instead of deploying a virtual machine and containerized agent, use the SAP Cloud Connector and its existing connections to back-end ABAP systems to connect your SAP system to Microsoft Sentinel.

0 commit comments

Comments
 (0)