You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/mitre-coverage.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,14 +19,14 @@ appliesto:
19
19
20
20
Microsoft Sentinel analyzes ingested data, not only to [detect threats](detect-threats-built-in.md) and help you [investigate](investigate-cases.md), but also to visualize the nature and coverage of your organization's security status.
21
21
22
-
This article describes how to use the **MITRE** page in Microsoft Sentinel to view the detections already active in your workspace, and those available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
22
+
This article describes how to use the **MITRE** page in Microsoft Sentinel to view the analytics rules (detections) already active in your workspace, and the detections available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
23
23
24
24
> [!IMPORTANT]
25
-
> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
25
+
> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
26
26
27
27
## Prerequisites
28
28
29
-
Before you can view the MITRE coverage for your organization in Microsoft Sentinel, ensure you have the following:
29
+
Before you can view the MITRE coverage for your organization in Microsoft Sentinel, ensure you have the following prerequisites:
30
30
31
31
- An active Microsoft Sentinel instance.
32
32
- Necessary permissions to view content in Microsoft Sentinel. For more information, see [Roles and permissions in Microsoft Sentinel](roles.md).
@@ -56,13 +56,13 @@ By default, both currently active scheduled query and near real-time (NRT) rules
56
56
57
57
:::image type="content" source="media/mitre-coverage/mitre-coverage-defender.png" alt-text="Screenshot of the MITRE ATT&CK page in the Defender portal." lightbox="media/mitre-coverage/mitre-coverage-defender.png":::
58
58
59
-
To filter the page by a specific threat scenario, toggle the **View MITRE by threat scenario** option on, and then select a threat scenario from the dropdown. The page is updated accordingly. For example:
59
+
To filter the page by a specific threat scenario, toggle the **View MITRE by threat scenario** option on, and then select a threat scenario from the drop-down menu. The page is updated accordingly. For example:
60
60
61
61
:::image type="content" source="media/mitre-coverage/mitre-by-threat-scenario.png" alt-text="Screenshot of the MITRE ATT&CK page filtered by a specific threat scenario.":::
62
62
63
63
---
64
64
65
-
1.Do any of the following:
65
+
1.Use any of the following methods:
66
66
67
67
-**Use the legend** to understand how many detections are currently active in your workspace for specific technique.
68
68
@@ -106,9 +106,9 @@ Having a scheduled rule with MITRE techniques applied running regularly in your
106
106
107
107
-**Threat hunting**:
108
108
109
-
- When creating a new hunting query, select the specific tactics and techniques to apply to your query.
110
-
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details on the right.
111
-
- When creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
109
+
- When you're creating a new hunting query, select the specific tactics and techniques to apply to your query.
110
+
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details in the details pane on the side
111
+
- When you're creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
112
112
113
113
For more information, see [Hunt for threats with Microsoft Sentinel](hunting.md) and [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md).
Copy file name to clipboardExpand all lines: articles/sentinel/soc-optimization/soc-optimization-access.md
+8-12Lines changed: 8 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,11 +19,9 @@ appliesto:
19
19
20
20
# Optimize your security operations
21
21
22
-
Security operations center (SOC) teams actively look for opportunities to optimize both processes and outcomes. You want to ensure that you have all the data you need to take action against risks in your environment, while also ensuring that you're not paying to ingest *more* data than you need. At the same time, your teams must regularly adjust security controls as threat landscapes and business priorities change, adjusting quickly and efficiently to keep your return on investments high.
22
+
Security operations center (SOC) teams look for ways to improve processes and outcomes and ensure you have the data needed to address risks without extra ingestion costs. SOC teams want to make sure that you have all the necessary data to act against risks, without paying for *more* data than needed. At the same time, SOC teams must also adjust security controls as threats and business priorities change, doing so quickly and efficiently to maximize your return on investment.
23
23
24
-
SOC optimization surfaces ways you can optimize your security controls, gaining more value from Microsoft security services as time goes on.
25
-
26
-
SOC optimizations are high-fidelity and actionable recommendations to help you identify areas where you can reduce costs, without affecting SOC needs or coverage, or where you can add security controls and data where its found to be missing. SOC optimizations are tailored to your environment and based on your current coverage and threat landscape.
24
+
SOC optimizations are actionable recommendations that surface ways that you can optimize your security controls, gaining more value from Microsoft security services as time goes on. Recommendations help you reduce costs without affecting SOC needs or coverage, and can help you add security controls and data where needed. These optimizations are tailored to your environment and based on your current coverage and threat landscape.
27
25
28
26
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
29
27
@@ -71,19 +69,17 @@ Supported metrics at the top of the **Overview** tab include:
71
69
|**Ingested data over the last 3 months**| Shows the total data ingested in your workspace over the last three months. |
72
70
|**Optimizations status**| Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
73
71
74
-
Select **See all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels.
72
+
Select **See all threat scenarios** to view the full list of relevant threats, percentages of active and recommended analytics rules, and coverage levels.
75
73
76
74
### [Defender portal](#tab/defender-portal)
77
75
78
76
|Title | Description |
79
77
|---------|---------|
80
78
|**Recent optimization value**| Shows value gained based on recommendations you recently implemented |
81
79
|**Data ingested**| Shows the total data ingested in your workspace over the last 90 days. |
82
-
|**Threat-based coverage optimizations**|Shows a **High**, **Medium**, and **Low**coverage indicator, based on the number of analytics rules (detections) found in your workspace, compared with the number of rules recommended by the Microsoft research team.<br><br>The metrics show a ratio of your active detections and the ratio of active security services in your environment.<br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
80
+
|**Threat-based coverage optimizations**| Shows one of the following coverage indicators, based on the number of analytics rules found in your workspace, compared with the number of rules recommended by the Microsoft research team: <br>- **High**: Over 75% of recommended rules are activated <br>- **Medium**: 30%-74% of recommended rules are activated <br>- **Low**: 0%-29% of recommended rules are activated. <br><br>Select **View all threat scenarios** to view the full list of relevant threats, active and recommended detections, and coverage levels. Then, select a threat scenario to drill down for more details about the recommendation on a separate, threat scenario details page. |
83
81
|**Optimization status**| Shows the number of recommended optimizations that are currently active, completed, and dismissed. |
84
82
85
-
<!--do we have an indication of what low med high mean? we use to have best, better, good, moderate, none-->
86
-
87
83
---
88
84
89
85
## View and manage optimization recommendations
@@ -135,7 +131,7 @@ Scroll down to the bottom of the details pane for a link to where you can take t
135
131
1. For threat-based coverage optimizations:
136
132
137
133
- Toggle between the spider charts to understand your coverage across different tactics and techniques, based on the user-defined and out-of-the-box detections active in your environment.
138
-
- Select **View threat scenario in MITRE ATT&CK** to jump to the [**MITRE ATT&CK** page in Microsoft Sentinel](../mitre-coverage.md?tabs=defender-portal), pre-filtered for your threat scenario. For more information, see [Understand security coverage by the MITRE ATT&CK® framework].
134
+
- Select **View threat scenario in MITRE ATT&CK** to jump to the [**MITRE ATT&CK** page in Microsoft Sentinel](../mitre-coverage.md?tabs=defender-portal), prefiltered for your threat scenario. For more information, see [Understand security coverage by the MITRE ATT&CK® framework].
139
135
140
136
1. Scroll down to the bottom of the details pane for a link to where you can take the recommended actions. For example:
141
137
@@ -147,7 +143,7 @@ Scroll down to the bottom of the details pane for a link to where you can take t
147
143
148
144
---
149
145
150
-
If you choose to install an analytics rule template from the Content hub, and you don't already have the solution installed, only the analytics rule template that you install is shown in the solution when you're done.
146
+
If you install an analytics rule template from the Content hub without the solution installed, only the installed template appears in the solution.
151
147
152
148
Install the full solution to see all available content items from the selected solution. For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](../sentinel-solutions-deploy.md).
153
149
@@ -166,7 +162,7 @@ Either select the options menu or select **View details** to take one of the fol
166
162
167
163
## View completed and dismissed optimizations
168
164
169
-
If you marked a specific optimization as *Completed* or *Dismissed*, or if an optimization was automatically completed, it's listed on the **Completed** and **Dismissed** tabs, respectively.
165
+
If you marked a specific optimization as *Completed* or *Dismissed*, or if an optimization is automatically completed, it's listed on the **Completed** and **Dismissed** tabs, respectively.
170
166
171
167
From here, either select the options menu or select **View full details** to take one of the following actions:
172
168
@@ -189,7 +185,7 @@ This section provides a sample flow for using SOC optimizations, from either the
189
185
190
186
- Add analytics rules to use the table for enhanced protection. To use this option, select **Go to the Content Hub** to view and configure specific out-of-the-box analytic rule templates that use the selected table. In the Content hub, you don't need to search for the relevant rule, as you're taken directly to the relevant rule.
191
187
192
-
If new analytic rules require additional log sources, consider ingesting them to improve threat coverage.
188
+
If new analytic rules require extra log sources, consider ingesting them to improve threat coverage.
193
189
194
190
For more information, see [Discover and manage Microsoft Sentinel out-of-the-box content](../sentinel-solutions-deploy.md) and [Detect threats out-of-the-box](../detect-threats-built-in.md).
0 commit comments