Skip to content

Commit e750274

Browse files
committed
acrolinx and adding percentage details
1 parent 27e2d3d commit e750274

File tree

2 files changed

+16
-20
lines changed

2 files changed

+16
-20
lines changed

articles/sentinel/mitre-coverage.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ appliesto:
1919

2020
Microsoft Sentinel analyzes ingested data, not only to [detect threats](detect-threats-built-in.md) and help you [investigate](investigate-cases.md), but also to visualize the nature and coverage of your organization's security status.
2121

22-
This article describes how to use the **MITRE** page in Microsoft Sentinel to view the detections already active in your workspace, and those available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
22+
This article describes how to use the **MITRE** page in Microsoft Sentinel to view the analytics rules (detections) already active in your workspace, and the detections available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
2323

2424
> [!IMPORTANT]
25-
> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
25+
> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
2626
2727
## Prerequisites
2828

29-
Before you can view the MITRE coverage for your organization in Microsoft Sentinel, ensure you have the following:
29+
Before you can view the MITRE coverage for your organization in Microsoft Sentinel, ensure you have the following prerequisites:
3030

3131
- An active Microsoft Sentinel instance.
3232
- Necessary permissions to view content in Microsoft Sentinel. For more information, see [Roles and permissions in Microsoft Sentinel](roles.md).
@@ -56,13 +56,13 @@ By default, both currently active scheduled query and near real-time (NRT) rules
5656

5757
:::image type="content" source="media/mitre-coverage/mitre-coverage-defender.png" alt-text="Screenshot of the MITRE ATT&CK page in the Defender portal." lightbox="media/mitre-coverage/mitre-coverage-defender.png":::
5858

59-
To filter the page by a specific threat scenario, toggle the **View MITRE by threat scenario** option on, and then select a threat scenario from the drop down. The page is updated accordingly. For example:
59+
To filter the page by a specific threat scenario, toggle the **View MITRE by threat scenario** option on, and then select a threat scenario from the drop-down menu. The page is updated accordingly. For example:
6060

6161
:::image type="content" source="media/mitre-coverage/mitre-by-threat-scenario.png" alt-text="Screenshot of the MITRE ATT&CK page filtered by a specific threat scenario.":::
6262

6363
---
6464

65-
1. Do any of the following:
65+
1. Use any of the following methods:
6666

6767
- **Use the legend** to understand how many detections are currently active in your workspace for specific technique.
6868

@@ -106,9 +106,9 @@ Having a scheduled rule with MITRE techniques applied running regularly in your
106106

107107
- **Threat hunting**:
108108

109-
- When creating a new hunting query, select the specific tactics and techniques to apply to your query.
110-
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details on the right.
111-
- When creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
109+
- When you're creating a new hunting query, select the specific tactics and techniques to apply to your query.
110+
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details in the details pane on the side
111+
- When you're creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
112112

113113
For more information, see [Hunt for threats with Microsoft Sentinel](hunting.md) and [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md).
114114

articles/sentinel/soc-optimization/soc-optimization-access.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,9 @@ appliesto:
1919

2020
# Optimize your security operations
2121

22-
Security operations center (SOC) teams actively look for opportunities to optimize both processes and outcomes. You want to ensure that you have all the data you need to take action against risks in your environment, while also ensuring that you're not paying to ingest *more* data than you need. At the same time, your teams must regularly adjust security controls as threat landscapes and business priorities change, adjusting quickly and efficiently to keep your return on investments high.
22+
Security operations center (SOC) teams look for ways to improve processes and outcomes and ensure you have the data needed to address risks without extra ingestion costs. SOC teams want to make sure that you have all the necessary data to act against risks, without paying for *more* data than needed. At the same time, SOC teams must also adjust security controls as threats and business priorities change, doing so quickly and efficiently to maximize your return on investment.
2323

24-
SOC optimization surfaces ways you can optimize your security controls, gaining more value from Microsoft security services as time goes on.
25-
26-
SOC optimizations are high-fidelity and actionable recommendations to help you identify areas where you can reduce costs, without affecting SOC needs or coverage, or where you can add security controls and data where its found to be missing. SOC optimizations are tailored to your environment and based on your current coverage and threat landscape.
24+
SOC optimizations are actionable recommendations that surface ways that you can optimize your security controls, gaining more value from Microsoft security services as time goes on. Recommendations help you reduce costs without affecting SOC needs or coverage, and can help you add security controls and data where needed. These optimizations are tailored to your environment and based on your current coverage and threat landscape.
2725

2826
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
2927

@@ -71,19 +69,17 @@ Supported metrics at the top of the **Overview** tab include:
7169
| **Ingested data over the last 3 months** | Shows the total data ingested in your workspace over the last three months. |
7270
|**Optimizations status** | Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
7371

74-
Select **See all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels.
72+
Select **See all threat scenarios** to view the full list of relevant threats, percentages of active and recommended analytics rules, and coverage levels.
7573

7674
### [Defender portal](#tab/defender-portal)
7775

7876
|Title | Description |
7977
|---------|---------|
8078
|**Recent optimization value** | Shows value gained based on recommendations you recently implemented |
8179
|**Data ingested** | Shows the total data ingested in your workspace over the last 90 days. |
82-
|**Threat-based coverage optimizations** | Shows a **High**, **Medium**, and **Low** coverage indicator, based on the number of analytics rules (detections) found in your workspace, compared with the number of rules recommended by the Microsoft research team.<br><br>The metrics show a ratio of your active detections and the ratio of active security services in your environment.<br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
80+
|**Threat-based coverage optimizations** | Shows one of the following coverage indicators, based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team: <br>- **High**: Over 75% of recommended rules are activated <br>- **Medium**: 30%-74% of recommended rules are activated <br>- **Low**: 0%-29% of recommended rules are activated. <br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
8381
|**Optimization status** | Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
8482

85-
<!--do we have an indication of what low med high mean? we use to have best, better, good, moderate, none-->
86-
8783
---
8884

8985
## View and manage optimization recommendations
@@ -135,7 +131,7 @@ Scroll down to the bottom of the details pane for a link to where you can take t
135131
1. For threat-based coverage optimizations:
136132

137133
- Toggle between the spider charts to understand your coverage across different tactics and techniques, based on the user-defined and out-of-the-box detections active in your environment.
138-
- Select **View threat scenario in MITRE ATT&CK** to jump to the [**MITRE ATT&CK** page in Microsoft Sentinel](../mitre-coverage.md?tabs=defender-portal), pre-filtered for your threat scenario. For more information, see [Understand security coverage by the MITRE ATT&CK® framework].
134+
- Select **View threat scenario in MITRE ATT&CK** to jump to the [**MITRE ATT&CK** page in Microsoft Sentinel](../mitre-coverage.md?tabs=defender-portal), prefiltered for your threat scenario. For more information, see [Understand security coverage by the MITRE ATT&CK® framework].
139135

140136
1. Scroll down to the bottom of the details pane for a link to where you can take the recommended actions. For example:
141137

@@ -147,7 +143,7 @@ Scroll down to the bottom of the details pane for a link to where you can take t
147143

148144
---
149145

150-
If you choose to install an analytics rule template from the Content hub, and you don't already have the solution installed, only the analytics rule template that you install is shown in the solution when you're done.
146+
If you install an analytics rule template from the Content hub without the solution installed, only the installed template appears in the solution.
151147

152148
Install the full solution to see all available content items from the selected solution. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](../sentinel-solutions-deploy.md).
153149

@@ -166,7 +162,7 @@ Either select the options menu or select **View details** to take one of the fol
166162

167163
## View completed and dismissed optimizations
168164

169-
If you marked a specific optimization as *Completed* or *Dismissed*, or if an optimization was automatically completed, it's listed on the **Completed** and **Dismissed** tabs, respectively.
165+
If you marked a specific optimization as *Completed* or *Dismissed*, or if an optimization is automatically completed, it's listed on the **Completed** and **Dismissed** tabs, respectively.
170166

171167
From here, either select the options menu or select **View full details** to take one of the following actions:
172168

@@ -189,7 +185,7 @@ This section provides a sample flow for using SOC optimizations, from either the
189185

190186
- Add analytics rules to use the table for enhanced protection. To use this option, select **Go to the Content Hub** to view and configure specific out-of-the-box analytic rule templates that use the selected table. In the Content hub, you don't need to search for the relevant rule, as you're taken directly to the relevant rule.
191187

192-
If new analytic rules require additional log sources, consider ingesting them to improve threat coverage.
188+
If new analytic rules require extra log sources, consider ingesting them to improve threat coverage.
193189

194190
For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](../sentinel-solutions-deploy.md) and [Detect threats out-of-the-box](../detect-threats-built-in.md).
195191

0 commit comments

Comments
 (0)