Skip to content

Commit d0fcc5a

Browse files
committed
Added intro to tables and upd-ed heading
1 parent 840e0e1 commit d0fcc5a

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

articles/sentinel/deploy-side-by-side.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,12 +25,16 @@ Consider the pros and cons for each approach when deciding which one to use.
2525

2626
### Short-term approach
2727

28+
The following table describes the pros and cons of using a side-by-side architecture for a relatively short period of time.
29+
2830
|**Pros** |**Cons** |
2931
|---------|---------|
3032
|• Gives SOC staff time to adapt to new processes as you deploy workloads and analytics.<br><br>• Gains deep correlation across all data sources for hunting scenarios.<br><br>• Eliminates having to do analytics between SIEMs, create forwarding rules, and close investigations in two places.<br><br>• Enables your SOC team to quickly downgrade legacy SIEM solutions, eliminating infrastructure and licensing costs. |• Can require a steep learning curve for SOC staff. |
3133

3234
### Medium- to long-term approach
3335

36+
The following table describes the pros and cons of using a side-by-side architecture for a relatively medium or longer period of time.
37+
3438
|**Pros** |**Cons** |
3539
|---------|---------|
3640
|• Lets you use key Microsoft Sentinel benefits, like AI, ML, and investigation capabilities, without moving completely away from your legacy SIEM.<br><br>• Saves money compared to your legacy SIEM, by analyzing cloud or Microsoft data in Microsoft Sentinel. |• Increases complexity by separating analytics across different databases.<br><br>• Splits case management and investigations for multi-environment incidents.<br><br>• Incurs greater staff and infrastructure costs.<br><br>• Requires SOC staff to be knowledgeable about two different SIEM solutions. |
@@ -39,7 +43,7 @@ Consider the pros and cons for each approach when deciding which one to use.
3943

4044
Determine how you'll configure and use Microsoft Sentinel side-by-side with your legacy SIEM.
4145

42-
### Send alerts from a legacy SIEM to Microsoft Sentinel (Recommended)
46+
### Method 1: Send alerts from a legacy SIEM to Microsoft Sentinel (Recommended)
4347

4448
Send alerts, or indicators of anomalous activity, from your legacy SIEM to Microsoft Sentinel.
4549

@@ -60,7 +64,7 @@ For more information, see:
6064

6165
If you want to fully migrate to Microsoft Sentinel, review the full [migration guide](migration.md).
6266

63-
### Send alerts and enriched incidents from Microsoft Sentinel to a legacy SIEM
67+
### Method 2: Send alerts and enriched incidents from Microsoft Sentinel to a legacy SIEM
6468

6569
Analyze some data in Microsoft Sentinel, such as cloud data, and then send the generated alerts to a legacy SIEM. Use the *legacy* SIEM as your single interface to do cross-correlation with the alerts that Microsoft Sentinel generated. You can still use Microsoft Sentinel for deeper investigation of the Microsoft Sentinel-generated alerts.
6670

@@ -82,7 +86,7 @@ The following table describes side-by-side configurations that are *not* recomme
8286
|**Send logs from a legacy SIEM to Microsoft Sentinel** | While this method provides you with the full functionality of Microsoft Sentinel, your organization still pays for two different data ingestion sources. Besides adding architectural complexity, this model can result in higher costs. |
8387
|**Use Microsoft Sentinel and your legacy SIEM as two fully separate solutions** | You could use Microsoft Sentinel to analyze some data sources, like your cloud data, and continue to use your on-premises SIEM for other sources. This setup allows for clear boundaries for when to use each solution, and avoids duplication of costs. <br><br>However, cross-correlation becomes difficult, and you can't fully diagnose attacks that cross both sets of data sources. In today's landscape, where threats often move laterally across an organization, such visibility gaps can pose significant security risks. |
8488

85-
## Automation to streamline processes
89+
## Streamline processes by using automation
8690

8791
Use automated workflows to group and prioritize alerts into a common incident, and modify its priority.
8892

0 commit comments

Comments
 (0)