Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Use SOC optimization recommendations to help you close coverage gaps against specific threats and tighten your ingestion rates against data that doesn't provide security value. SOC optimizations help you optimize your Microsoft Sentinel workspace, without having your SOC teams spend time on manual analysis and research.
Microsoft Sentinel SOC optimizations include the following types of recommendations:
Data value recommendations suggest ways to improve your data use, such as a better data plan for your organization.
Coverage based recommendations suggest adding controls to prevent coverage gaps that can lead to vulnerability to attacks or scenarios that can lead to financial loss. Coverage recommendations include:
- Threat-based recommendations: Recommends adding security controls that help you detect coverage gaps to prevent attacks and vulnerabilities.
- AI MITRE ATT&CK tagging recommendations (Preview): Uses artificial intelligence to suggest tagging security detections with MITRE ATT&CK tactics and techniques.
- Risk-based recommendations (Preview): Recommends implementing controls to address coverage gaps linked to use cases that may result in business risks or financial losses, including operational, financial, reputational, compliance, and legal risks.
Similar organizations recommendations suggest ingesting data from the types of sources used by organizations which have similar ingestion trends and industry profiles to yours.
This article provides a detailed reference of the types of SOC optimization recommendations available.
Important
Microsoft Sentinel is generally available within Microsoft's unified security operations platform in the Microsoft Defender portal, including for customers without Microsoft Defender XDR or an E5 license. For more information, see Microsoft Sentinel in the Microsoft Defender portal.
Data value optimization recommendations
To optimize your cost/security value ratio, SOC optimization surfaces hardly used data connectors or tables. SOC optimization suggests ways to either reduce the cost of a table or improve its value, depending on your coverage. This type of optimization is also called data value optimization.
Data value optimizations only look at billable tables that ingested data in the past 30 days.
The following table lists the available types of data value SOC optimization recommendations:
Type of observation | Action |
---|---|
The table wasn't used by analytics rules or detections in the last 30 days but was used by other sources, such as workbooks, log queries, hunting queries. | Turn on analytics rule templates OR Move the table to a basic logs plan if the table is eligible. |
The table wasn’t used at all in the last 30 days. | Turn on analytics rule templates OR Stop data ingestion and remove the table or move the table to long term retention. |
The table was only used by Azure Monitor. | Turn on any relevant analytics rule templates for tables with security value OR Move to a nonsecurity Log Analytics workspace. |
If a table is chosen for UEBA or a threat intelligence matching analytics rule, SOC optimization doesn't recommend any changes in ingestion.
Unused columns (Preview)
SOC optimization also surfaces unused columns in your tables. The following table lists the available types of columns available for SOC optimization recommendations:
Type of observation | Action |
---|---|
The ConditionalAccessPolicies column in the SignInLogs table or the AADNonInteractiveUserSignInLogs table isn't in use. | Stop data ingestion for the column. |
Important
When making changes to ingestion plans, we recommend always ensuring that the limits of your ingestion plans are clear, and that the affected tables aren't ingested for compliance or other similar reasons.
Coverage-based optimization recommendations
Coverage-based optimization recommendations help you close coverage gaps against specific threats or to scenarios that can lead to business risks and financial loss.
Threat-based optimization recommendations
To optimize data value, SOC optimization recommends adding security controls to your environment in the form of extra detections and data sources, using a threat-based approach. This optimization type is also known as coverage optimization, and is based on Microsoft's security research.
SOC optimization provides threat-based recommendations by analyzing your ingested logs and enabled analytics rules, then comparing them to the logs and detections needed to address specific types of attacks.
Threat-based optimizations consider both predefined and user-defined detections.
The following table lists the available types of threat-based SOC optimization recommendations:
Type of observation | Action |
---|---|
There are data sources, but detections are missing. | Turn on analytics rule templates based on the threat: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. For more information, see Threat detection in Microsoft Sentinel. |
Templates are turned on, but data sources are missing. | Connect new data sources. |
There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
AI MITRE ATT&CK tagging recommendations (Preview)
The AI MITRE ATT&CK Tagging feature uses artificial intelligence to automatically tag security detections. The AI model runs on the customer's workspace to create tagging recommendations for untagged detections with relevant MITRE ATT&CK tactic and techniques.
Customers can apply these recommendations to ensure their security coverage is thorough and precise. This ensures complete and accurate security coverage, enhancing threat detection and response capabilities.
These are 3 ways to apply the AI MITRE ATT&CK tagging recommendations:
- Apply the recommendation to a specific analytics rule.
- Apply the recommendation to all analytics rules in the workspace.
- Don't apply the recommendation to any analytics rules.
Risk-based optimization recommendations (Preview)
Risk-based optimizations consider real world security scenarios with a set of business risks associated with it, including Operational, Financial, Reputational, Compliance, and Legal risks. The recommendations are based on the Microsoft Sentinel risk-based approach to security.
To provide risk-based recommendations, SOC optimization looks at your ingested logs and analytics rules, and compares them to the logs and detections that are required to protect, detect, and respond to specific types of attacks that may cause business risks. Risk-based recommendations optimizations consider both predefined and user-defined detections.
The following table lists the available types of risk-based SOC optimization recommendations:
Type of observation | Action |
---|---|
There are data sources, but detections are missing. | Turn on analytics rule templates based on the business risks: Create a rule using an analytics rule template, and adjust the name, description, and query logic to suit your environment. |
Templates are turned on, but data sources are missing. | Connect new data sources. |
There are no existing detections or data sources. | Connect detections and data sources or install a solution. |
Similar organizations recommendations
SOC optimization uses advanced machine learning to identify tables that are missing from your workspace, but are used by organizations with similar ingestion trends and industry profiles. It shows how other organizations use these tables and recommends the relevant data sources, along with related rules, to improve your security coverage.
Type of observation | Action |
---|---|
Log sources ingested by similar customers are missing | Connect the suggested data sources. This recommendation doesn't include:
|
Considerations
A workspace only receives similar organization recommendations if the machine learning model identifies significant similarities with other organizations and discovers tables that they have but you don't. SOCs in their early or onboarding stages are more likely to receive these recommendations than SOCs with a higher level of maturity. Not all workspaces get similar organizations recommendations.
The machine learning models never access or analyze the content of customer logs or ingest them at any point. No customer data, content, or personal data (EUII) is exposed to the analysis. Recommendations are based on machine learning models that rely solely on Organizational Identifiable Information (OII) and system metadata.
Related content
- Using SOC optimizations programmatically (Preview)
- Blog: SOC optimization: unlock the power of precision-driven security management