You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/best-practices.md
+22-13Lines changed: 22 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,6 @@ ms.author: edbaynash
6
6
ms.topic: conceptual
7
7
ms.date: 07/16/2025
8
8
9
-
10
9
#Customer intent: As a security operations center (SOC) analyst, I want to implement best practices for deploying and managing a cloud-based SIEM solution so that I can enhance threat detection, incident response, and overall security posture.
11
10
12
11
---
@@ -17,38 +16,49 @@ Best practice guidance is provided throughout the technical documentation for Mi
To get started with Microsoft Sentinel, see the [deployment guide](deploy-overview.md), which covers the high level steps to plan, deploy, and fine-tune your Microsoft Sentinel deployment. From that guide, select the provided links to find detailed guidance for each stage in your deployment.
21
20
21
+
<<<<<<< HEAD
22
+
## Recommended Microsoft security service integrations
23
+
=======
22
24
Start with the [deployment guide for Microsoft Sentinel](deploy-overview.md). The deployment guide covers the high level steps to plan, deploy, and fine-tune your Microsoft Sentinel deployment. From that guide, select the provided links to find detailed guidance for each stage in your deployment.
23
25
24
26
## Adopt a single-platform architecture
25
27
26
28
Microsoft Sentinel is integrated with a modern data lake that offers affordable, long-term storage enabling teams to simplify data management, optimize costs, and accelerate the adoption of AI. The Microsoft Sentinel data lake (preview) enables a single-platform architecture for security data and empowers analysts with a unified query experience while leveraging Microsoft Sentinel’s rich connector ecosystem. For more information, see [Microsoft Sentinel data lake (preview)](datalake/sentinel-lake-overview.md).
27
29
28
30
## Microsoft security service integrations
31
+
>>>>>>> 0ed5fa14c7c07cacf9e47dfc308cd405d74a052a
29
32
30
33
Microsoft Sentinel is empowered by the components that send data to your workspace, and is made stronger through integrations with other Microsoft services. Any logs ingested into products, such as Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, and Microsoft Defender for Identity, allow these services to create detections, and in turn provide those detections to Microsoft Sentinel. Logs can also be ingested directly into Microsoft Sentinel to provide a fuller picture for events and incidents.
31
34
32
-
For example, the following image shows how Microsoft Sentinel ingests data from other Microsoft services, multicloud, and partner platforms to provide coverage for your environment:
35
+
The following illustration shows how Microsoft's XDR solution seamlessly integrates with Microsoft Sentinel.
33
36
34
37
:::image type="content" source="media/best-practices/azure-sentinel-and-other-services.png" lightbox="media/best-practices/azure-sentinel-and-other-services.png" alt-text="A diagram showing the Microsoft Sentinel integrating with other Microsoft and partner services.":::
35
38
36
39
More than ingesting alerts and logs from other sources, Microsoft Sentinel also:
37
40
38
-
-**Uses the information it ingests with [machine learning](bring-your-own-ml.md)** that allows for better event correlation, alert aggregation, anomaly detection, and more.
39
-
-**Builds and presents interactive visuals via [workbooks](get-visibility.md)**, showing trends, related information, and key data used for both admin tasks and investigations.
40
-
-**Runs [playbooks](tutorial-respond-threats-playbook.md) to act on alerts**, gathering information, performing actions on items, and sending notifications to various platforms.
41
-
-**Integrates with partner platforms**, such as ServiceNow and Jira, to provide essential services for SOC teams.
42
-
-**Ingests and fetches enrichment feeds** from [threat intelligence platforms](threat-intelligence-integration.md) to bring valuable data for investigating.
43
-
44
-
For more information about integrating data from other services or providers, see [Microsoft Sentinel data connectors](connect-data-sources.md).
45
-
41
+
- Provides **[threat detection capabilities](overview.md#detect-threats) with artificial intelligence**, allowing you to:
42
+
- Build and present interactive visuals via workbooks
43
+
- Run playbooks to automatically act on alerts
44
+
- Integrate [machine learning models](bring-your-own-ml.md) to enhance your security operations
45
+
- Ingest and fetch enrichment feeds from threat intelligence platforms.
46
+
- Provides **[threat investigation capabilities](overview.md#investigate-threats)**, allowing you to visualize and explore alerts and entities, detect anomalies in user and entity behavior, and monitor real-time events during an investigation.
47
+
-**[Collect data](overview.md#collect-data-at-scale)** across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds.
48
+
- Provides **[threat response capabilities](overview.md#respond-to-threats)**, such as playbooks that integrate with Azure services and your existing tools.
49
+
-**Integrates with partner platforms** using [Microsoft Sentinel data connectors](connect-data-sources.md), providing essential services for SOC teams.
50
+
51
+
<<<<<<< HEAD
52
+
## Microsoft Sentinel in the Microsoft Defender portal
53
+
54
+
Consider onboarding Microsoft Sentinel to the Microsoft Defender portal to unify capabilities with Microsoft Defender XDR like incident management and advanced hunting. For more information, see the following articles:
55
+
=======
46
56
If you're using Microsoft Sentinel in the Azure portal, consider onboarding Microsoft Sentinel to the Microsoft Defender portal to unify capabilities with Microsoft Defender XDR like incident management and advanced hunting. For more information, see the following articles:
57
+
>>>>>>> 0ed5fa14c7c07cacf9e47dfc308cd405d74a052a
47
58
48
59
-[Connect Microsoft Sentinel to Microsoft Defender XDR](/defender-xdr/microsoft-sentinel-onboard)
49
60
-[Microsoft Sentinel in the Microsoft Defender portal](microsoft-sentinel-defender-portal.md)
50
61
51
-
52
62
## Incident management and response
53
63
54
64
The following image shows recommended steps in an incident management and response process.
@@ -74,4 +84,3 @@ The following table provides high-level descriptions for how to use Microsoft Se
74
84
-[On-board Microsoft Sentinel data lake](datalake/sentinel-lake-onboarding.md)
75
85
-[Deployment guide for Microsoft Sentinel](deploy-overview.md)
76
86
-[Protecting MSSP intellectual property in Microsoft Sentinel](mssp-protect-intellectual-property.md)
0 commit comments