You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/deploy-side-by-side.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,12 +25,16 @@ Consider the pros and cons for each approach when deciding which one to use.
25
25
26
26
### Short-term approach
27
27
28
+
The following table describes the pros and cons of using a side-by-side architecture for a relatively short period of time.
29
+
28
30
|**Pros**|**Cons**|
29
31
|---------|---------|
30
32
|• Gives SOC staff time to adapt to new processes as you deploy workloads and analytics.<br><br>• Gains deep correlation across all data sources for hunting scenarios.<br><br>• Eliminates having to do analytics between SIEMs, create forwarding rules, and close investigations in two places.<br><br>• Enables your SOC team to quickly downgrade legacy SIEM solutions, eliminating infrastructure and licensing costs. |• Can require a steep learning curve for SOC staff. |
31
33
32
34
### Medium- to long-term approach
33
35
36
+
The following table describes the pros and cons of using a side-by-side architecture for a relatively medium or longer period of time.
37
+
34
38
|**Pros**|**Cons**|
35
39
|---------|---------|
36
40
|• Lets you use key Microsoft Sentinel benefits, like AI, ML, and investigation capabilities, without moving completely away from your legacy SIEM.<br><br>• Saves money compared to your legacy SIEM, by analyzing cloud or Microsoft data in Microsoft Sentinel. |• Increases complexity by separating analytics across different databases.<br><br>• Splits case management and investigations for multi-environment incidents.<br><br>• Incurs greater staff and infrastructure costs.<br><br>• Requires SOC staff to be knowledgeable about two different SIEM solutions. |
@@ -39,7 +43,7 @@ Consider the pros and cons for each approach when deciding which one to use.
39
43
40
44
Determine how you'll configure and use Microsoft Sentinel side-by-side with your legacy SIEM.
41
45
42
-
### Send alerts from a legacy SIEM to Microsoft Sentinel (Recommended)
46
+
### Method 1: Send alerts from a legacy SIEM to Microsoft Sentinel (Recommended)
43
47
44
48
Send alerts, or indicators of anomalous activity, from your legacy SIEM to Microsoft Sentinel.
45
49
@@ -60,7 +64,7 @@ For more information, see:
60
64
61
65
If you want to fully migrate to Microsoft Sentinel, review the full [migration guide](migration.md).
62
66
63
-
### Send alerts and enriched incidents from Microsoft Sentinel to a legacy SIEM
67
+
### Method 2: Send alerts and enriched incidents from Microsoft Sentinel to a legacy SIEM
64
68
65
69
Analyze some data in Microsoft Sentinel, such as cloud data, and then send the generated alerts to a legacy SIEM. Use the *legacy* SIEM as your single interface to do cross-correlation with the alerts that Microsoft Sentinel generated. You can still use Microsoft Sentinel for deeper investigation of the Microsoft Sentinel-generated alerts.
66
70
@@ -82,7 +86,7 @@ The following table describes side-by-side configurations that are *not* recomme
82
86
|**Send logs from a legacy SIEM to Microsoft Sentinel**| While this method provides you with the full functionality of Microsoft Sentinel, your organization still pays for two different data ingestion sources. Besides adding architectural complexity, this model can result in higher costs. |
83
87
|**Use Microsoft Sentinel and your legacy SIEM as two fully separate solutions**| You could use Microsoft Sentinel to analyze some data sources, like your cloud data, and continue to use your on-premises SIEM for other sources. This setup allows for clear boundaries for when to use each solution, and avoids duplication of costs. <br><br>However, cross-correlation becomes difficult, and you can't fully diagnose attacks that cross both sets of data sources. In today's landscape, where threats often move laterally across an organization, such visibility gaps can pose significant security risks. |
84
88
85
-
## Automation to streamline processes
89
+
## Streamline processes by using automation
86
90
87
91
Use automated workflows to group and prioritize alerts into a common incident, and modify its priority.
0 commit comments