Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit efefae2

Browse files
committedMay 29, 2022
Proofing planning section
1 parent fe68aa6 commit efefae2

11 files changed

+41
-141
lines changed
 
Loading
Loading
Loading
Loading

‎articles/sentinel/migration-identify-rules.md

Lines changed: 0 additions & 35 deletions
This file was deleted.

‎articles/sentinel/migration-identify-soar-use-cases.md

Lines changed: 0 additions & 19 deletions
This file was deleted.

‎articles/sentinel/migration-identify-use-cases.md

Lines changed: 0 additions & 25 deletions
This file was deleted.

‎articles/sentinel/migration-incident-triage.md

Lines changed: 0 additions & 11 deletions
This file was deleted.

‎articles/sentinel/migration-overview.md

Lines changed: 20 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This article discusses the reasons for migrating from a legacy SIEM, and describ
1515

1616
## Migration steps
1717

18-
In this section, you learn how to migrate your legacy SIEM to Microsoft Sentinel. Follow your migration process through this series of articles, in which you'll learn how to navigate different steps in the process.
18+
In this guide, you learn how to migrate your legacy SIEM to Microsoft Sentinel. Follow your migration process through this series of articles, in which you'll learn how to navigate different steps in the process.
1919

2020
|Step |Article |
2121
|---------|---------|
@@ -36,26 +36,24 @@ Microsoft Sentinel is a scalable, cloud-native, security information and event m
3636

3737
SOC teams face a set of challenges when managing a legacy SIEM:
3838

39-
- **Slow response to threats**: Legacy SIEMs use correlation rules, which are difficult to maintain and ineffective for identifying emerging threats. SOC analysts, faced with large amounts of false positives, alerts from many different security components, and increasingly high volumes of logs, are slower to uncover and respond to critical threats in the environment.
40-
- **Scaling challenges**: As data ingestion rates grow, SOC teams are challenged with scaling their SIEM. Instead of focusing on protecting the organization, SOC teams must invest in infrastructure setup and maintenance, and are bound by storage or query limits.
41-
- **Manual analysis and response**: SOC teams need highly skilled analysts to manually process large amounts of alerts. Teams become overworked and new analysts are hard to find.
42-
- **Complex and inefficient management**: SOC teams typically oversee orchestration and infrastructure, manage connections between the SIEM and various data sources, and perform updates and patches. These tasks are often at the expense of critical triage and analysis.
39+
- **Slow response to threats**. Legacy SIEMs use correlation rules, which are difficult to maintain and ineffective for identifying emerging threats. In addition, SOC analysts are faced with large amounts of false positives, many alerts from many different security components, and increasingly high volumes of logs. Analyzing this data slows down SOC teams in their efforts to respond to critical threats in the environment.
40+
- **Scaling challenges**. As data ingestion rates grow, SOC teams are challenged with scaling their SIEM. Instead of focusing on protecting the organization, SOC teams must invest in infrastructure setup and maintenance, and are bound by storage or query limits.
41+
- **Manual analysis and response**. SOC teams need highly skilled analysts to manually process large amounts of alerts. Teams become overworked and new analysts are hard to find.
42+
- **Complex and inefficient management**. SOC teams typically oversee orchestration and infrastructure, manage connections between the SIEM and various data sources, and perform updates and patches. These tasks are often at the expense of critical triage and analysis.
4343

4444
A cloud-native SIEM addresses these challenges. Microsoft Sentinel collects data automatically and at scale, detects unknown threats, investigates threats with artificial intelligence, and responds to incidents rapidly with built-in automation.
4545

4646
## Plan your migration
4747

48-
During the planning phase, you identify your existing SIEM components, existing SOC processes, and design and plan new use cases. It’s important that each phase includes clear goals for each phase, key activities and the outcome of that phase by specifying the deliverables. Learn about [migration phases](#plan-migration-phases). Thorough planning allows you to maintain protection for both your cloud-based assets—Microsoft Azure, AWS, or GCP—and your SaaS solutions, such as Microsoft Office 365.
48+
During the planning phase, you identify your existing SIEM components, your existing SOC processes, and you design and plan new use cases. Thorough planning allows you to maintain protection for both your cloud-based assets—Microsoft Azure, AWS, or GCP—and your SaaS solutions, such as Microsoft Office 365.
4949

50-
#### Plan migration phases
50+
This diagram describes the high-level phases that a typical migration includes. Each phase includes clear goals, key activities, and specified outcomes and deliverables.
5151

52-
This section describes the high-level phases that a typical migration includes. Each phase includes clear goals, activities, and specified outcomes and deliverables.
53-
54-
The phases below are a guideline to a complete and typical migration procedure. An actual migration may not include some phases or may include additional phases. Rather than reviewing the full set of phases, the following sections in this guide review specific tasks and steps that are especially important to a Microsoft Sentinel migration.
52+
The phases in this diagram are a guideline for how to complete a typical migration procedure. An actual migration may not include some phases or may include additional phases. Rather than reviewing the full set of phases, [the articles in this guide](#migration-steps) review specific tasks and steps that are especially important to a Microsoft Sentinel migration.
5553

5654
:::image type="content" source="media/migration-overview/migration-phases.png" alt-text="Diagram of the Microsoft Sentinel migration phases." lightbox="media/migration-overview/migration-phases.png":::
5755

58-
##### Considerations
56+
### Considerations
5957

6058
Review these key considerations for each phase.
6159

@@ -64,9 +62,9 @@ Review these key considerations for each phase.
6462
|Discover |[Identify use cases](#identify-use-cases) and [migration priorities](#identify-your-migration-priorities) as part of this phase. |
6563
|Design |Define a detailed design and architecture for your Microsoft Sentinel implementation. You will use this information to get approval from the relevant stakeholders before you start the implementation phase. |
6664
|Implement |As you implement Microsoft Sentinel components according to the design phase, and before you convert your entire infrastructure, consider whether you can use Microsoft Sentinel out-of-the-box content instead of migrating all components. You can begin using Microsoft Sentinel gradually, starting with a minimum viable product (MVP) for several use cases. As you add more use cases, you can use this Microsoft Sentinel instance as a user acceptance testing (UAT) environment to validate the use cases. |
67-
|Operationalize |You migrate your content and SOC processes to ensure that the existing analyst experience is not disrupted. |
65+
|Operationalize |You [migrate your content and SOC processes](migration-soc-processes.md) to ensure that the existing analyst experience is not disrupted. |
6866

69-
###### Identify your migration priorities
67+
#### Identify your migration priorities
7068

7169
Use these questions to pin down your migration priorities:
7270
- What are the most critical infrastructure components, systems, apps, and data in your business?
@@ -78,7 +76,7 @@ Use these questions to pin down your migration priorities:
7876

7977
Before you begin migration, identify key use cases, detection rules, data, and automation in your current SIEM. Approach your migration as a gradual process. Be intentional and thoughtful about what you migrate first, what you deprioritize, and what doesn’t actually need to be migrated. Your team might have an overwhelming number of detections and use cases running in your current SIEM. Before beginning migration, decide which ones are actively useful to your business.
8078

81-
###### Identify use cases
79+
#### Identify use cases
8280

8381
When planning the discover phase, use the following guidance to identify your use cases.
8482
- Identify and analyze your current use cases by threat, operating system, product, and so on.
@@ -92,4 +90,11 @@ When planning the discover phase, use the following guidance to identify your us
9290
- Review rules that haven’t triggered any alerts in the last 6 to 12 months.
9391
- Eliminate low-level threats or alerts you routinely ignore.
9492
- Prepare a validation process. Define test scenarios and build a test script.
95-
- Can you apply a methodology to prioritize use cases? You can follow a methodology such as MoSCoW to prioritize a leaner set of use cases for migration.
93+
- Can you apply a methodology to prioritize use cases? You can follow a methodology such as MoSCoW to prioritize a leaner set of use cases for migration.
94+
95+
## Next steps
96+
97+
In this article, you learned how to plan and prepare for your migration.
98+
99+
> [!div class="nextstepaction"]
100+
> [Track your migration with a workbook](migration-track.md)

‎articles/sentinel/migration-phases.md

Lines changed: 0 additions & 11 deletions
This file was deleted.

‎articles/sentinel/migration-track.md

Lines changed: 21 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 05/03/2022
99

1010
# Track your Microsoft Sentinel migration with a workbook
1111

12-
As your organization's Security Operations Center (SOC) handles growing amounts of data, it's essential to plan and monitor your deployment status. While you can track migration process using generic tools such as Microsoft Project, Microsoft Excel, Teams, or Azure DevOps, these tools aren’t specific to SIEM migration tracking. To help you with tracking, we provide a dedicated migration tracker workbook in Microsoft Sentinel.
12+
As your organization's Security Operations Center (SOC) handles growing amounts of data, it's essential to plan and monitor your deployment status. While you can track your migration process using generic tools such as Microsoft Project, Microsoft Excel, Teams, or Azure DevOps, these tools aren’t specific to SIEM migration tracking. To help you with tracking, we provide a dedicated workbook in Microsoft Sentinel named **Microsoft Sentinel Deployment and Migration**.
1313

1414
The workbook helps you to:
1515
- Visualize migration progress
@@ -19,7 +19,7 @@ The workbook helps you to:
1919
- Deploy and perform automation
2020
- Deploy and customize user and entity behavioral analytics (UEBA)
2121

22-
This article describes how to track your migration with the migration tracker workbook, how to customize and manage the workbook, and how to use the workbook tabs to deploy and monitor data connectors, analytics, incidents, playbooks, automation rules, UEBA, and data management. Learn more about how to use [Azure Monitor workbooks](monitor-your-data).
22+
This article describes how to track your migration with the **Microsoft Sentinel Deployment and Migration** workbook, how to customize and manage the workbook, and how to use the workbook tabs to deploy and monitor data connectors, analytics, incidents, playbooks, automation rules, UEBA, and data management. Learn more about how to use [Azure Monitor workbooks](monitor-your-data.md) in Microsoft Sentinel.
2323

2424
## Deploy the workbook content
2525

@@ -43,19 +43,15 @@ This step is crucial to the tracking setup process. If you skip this step, the w
4343

4444
To update the watchlist with deployment and migration actions:
4545

46-
1. In the Azure portal, select Microsoft Sentinel and then select **Watchlists**.
46+
1. In the Azure portal, select Microsoft Sentinel and then select **Watchlist**.
4747
1. Locate the watchlist with the **Deployment** alias.
48-
1. Select the watchlist, and then select **Update watchlist > edit watchlist items**.
48+
1. Select the watchlist, and then select **Update watchlist > edit watchlist items** on the bottom right.
4949
:::image type="content" source="media/migration-track/migration-track-update-watchlist.png" alt-text="Screenshot of updating watchlist items." lightbox="media/migration-track/migration-track-update-watchlist.png":::
5050
1. Provide the information for the actions needed for the deployment and migration, and select **Save**.
5151

52-
You can now the watchlist within the migration tracker workbook. Learn how to [manage watchlists](watchlists-manage.md).
52+
You can now view the watchlist within the migration tracker workbook. Learn how to [manage watchlists](watchlists-manage.md).
5353

54-
## Manage workbook actions
55-
56-
Your team might update or complete tasks during the deployment process. To address these changes, you can update existing actions or add new actions as you identify new use cases or set new requirements. To update or add actions, edit the **Deployment** watchlist that you [deployed previously](#deploy-the-watchlist). To simplify the process, you can open the watchlist directly from the workbook.
57-
58-
:::image type="content" source="media/migration-track/migration-track-update.png" alt-text="Screenshot of the Microsoft Sentinel Edit watchlist items screen, showing an example list of watchlist items." lightbox="media/migration-track/migration-track-update.png":::
54+
In addition, your team might update or complete tasks during the deployment process. To address these changes, you can update existing actions or add new actions as you identify new use cases or set new requirements. To update or add actions, edit the **Deployment** watchlist that you [deployed previously](#deploy-the-watchlist). To simplify the process, select **Edit Deployment Watchlist** on the bottom left to open the watchlist directly from the workbook.
5955

6056
## View deployment status
6157

@@ -82,10 +78,10 @@ To monitor deployed resources and deploy new connectors, in the **Microsoft Sent
8278
- Data connector health (changes and failures)
8379
- Health logs within the specified time range
8480

85-
:::image type="content" source="media/migration-track/migration-track-data-connectors.png" alt-text="Screenshot of the Microsoft Sentinel Data Connectors tab Monitor view." lightbox="media/migration-track/migration-track-data-connectors.png":::
81+
:::image type="content" source="media/migration-track/migration-track-data-connectors-new.png" alt-text="Screenshot of the Microsoft Sentinel Data Connectors tab Monitor view." lightbox="media/migration-track/migration-track-data-connectors-new.png":::
8682

87-
To configure a connector:
88-
1. Select **Data Connectors > Configure**.
83+
To configure a data connector:
84+
1. Select the **Configure** view.
8985
1. Select the button with the name of the connector you want to configure.
9086
1. Configure the connector in the connector status screen that opens. If you cannot find a connector you need, select the connector name to open the connector gallery or solution gallery.
9187

@@ -97,7 +93,7 @@ Once the data is reported in the workspace, you can now configure and monitor an
9793

9894
:::image type="content" source="media/migration-track/migration-track-analytics.png" alt-text="Screenshot of the Microsoft Sentinel Deployment Tracker Analytics tab." lightbox="media/migration-track/migration-track-analytics.png":::
9995

100-
If you need more coverage, select **Review MITRE coverage** below the table and define which areas receive more coverage and which rules are deployed, at any stage of the migration project.
96+
If you need more coverage, select **Review MITRE coverage** below the table on the left. Use this option to define which areas receive more coverage and which rules are deployed, at any stage of the migration project.
10197

10298
:::image type="content" source="media/migration-track/migration-track-mitre.png" alt-text="Screenshot of the Microsoft Sentinel Deployment Tracker Review MITRE Coverage view." lightbox="media/migration-track/migration-track-mitre.png":::
10399

@@ -107,11 +103,11 @@ Once the desired analytics rules are deployed and the Defender product connector
107103

108104
## Deploy and utilize workbooks
109105

110-
To visualize information regarding the data ingestion and detections that Microsoft Sentinel performs, in the **Microsoft Sentinel Deployment and Migration** workbook, select **Workbooks**. Similar to the **Data Connectors** tab, you can by use the available views to view monitoring and configuration information.
106+
To visualize information regarding the data ingestion and detections that Microsoft Sentinel performs, in the **Microsoft Sentinel Deployment and Migration** workbook, select **Workbooks**. Similar to the **Data Connectors** tab, you can use the **Monitor** and **Configure** views to view monitoring and configuration information.
111107

112108
Here are some useful tasks you can perform in the **Workbooks** tab:
113109

114-
- To view a list of all workbooks in the environment and how many are deployed, select **Monitor**.
110+
- To view a list of all workbooks in the environment and how many workbooks are deployed, select **Monitor**.
115111
- To view a specific workbook within the **Microsoft Sentinel Deployment and Migration** workbook, select a workbook and then select **Open Selected Workbook**.
116112

117113
:::image type="content" source="media/migration-track/migration-track-workbook.png" alt-text="Screenshot of the Microsoft Sentinel Deployment Tracker Workbook tab Monitor view." lightbox="media/migration-track/migration-track-workbook.png":::
@@ -122,12 +118,12 @@ Here are some useful tasks you can perform in the **Workbooks** tab:
122118

123119
## Deploy and monitor playbooks and automation rules
124120

125-
Once you configure data ingestion, detections, and visualizations, you can now look into automation. in the **Microsoft Sentinel Deployment and Migration** workbook, select **Automation** to view deployed playbooks, and to see which playbooks are currently connected to an automation rule. If automation rules exist, the workbook highlights the following information regarding the automation rule:
121+
Once you configure data ingestion, detections, and visualizations, you can now look into automation. In the **Microsoft Sentinel Deployment and Migration** workbook, select **Automation** to view deployed playbooks, and to see which playbooks are currently connected to an automation rule. If automation rules exist, the workbook highlights the following information regarding each rule:
126122
- Name
127123
- Status
128124
- Action or actions of the rule
129125
- The last date the rule was modified and the user that modified the rule
130-
- The date the rule was created of the user that created the rule
126+
- The date the rule was created
131127

132128
To view, deploy, and test automation within the current section of the workbook, select **Deploy automation resources** on the bottom left.
133129

@@ -154,13 +150,13 @@ To customize the timeline:
154150
1. Create a custom item, or select one of the out-of-the-box templates.
155151
1. To deploy the template and complete the wizard, select **Create**.
156152

157-
Learn more about [UEBA](identify-threats-with-entity-behavior-analytics.md) or learn how to [customize the timeline](customize-entity-activities).
153+
Learn more about [UEBA](identify-threats-with-entity-behavior-analytics.md) or learn how to [customize the timeline](customize-entity-activities.md).
158154

159155
## Configure and manage the data lifecycle
160156

161157
When you deploy or migrate to Microsoft Sentinel, it's essential to manage the usage and lifecycle of the incoming logs. To assist with this, in the **Microsoft Sentinel Deployment and Migration** workbook, select **Data Management** to view and configure table retention and archival.
162158

163-
:::image type="content" source="media/migration-track/migration-track-data-management.png" alt-text="Screenshot of the Microsoft Sentinel Deployment Tracker Data Management tab." lightbox="media/migration-track/migration-track-data-management":::
159+
:::image type="content" source="media/migration-track/migration-track-data-management.png" alt-text="Screenshot of the Microsoft Sentinel Deployment Tracker Data Management tab." lightbox="media/migration-track/migration-track-data-management.png":::
164160

165161
You can view information regarding:
166162

@@ -169,9 +165,9 @@ You can view information regarding:
169165
- Tables configured to be archived
170166
- Tables on the default workspace retention
171167

172-
To modify the existing retention policy for tables, select **Default Retention Tables view**, select the relevant table, and select **Update Retention** to edit the following information:
173-
1. Select **Default Retention Tables**.
174-
2. Select the table you want to modify, and select **Update Retention**. You can edit the following information:
168+
To modify the existing retention policy for tables:
169+
1. Select the **Default Retention Tables** view.
170+
1. Select the table you want to modify, and select **Update Retention**. You can edit the following information:
175171
- Current retention in the workspace
176172
- Current retention in the archive
177173
- Total number of days the data will live in the environment
@@ -185,6 +181,6 @@ Learn about [data lifecycle management](../azure-monitor/logs/data-retention-arc
185181

186182
## Enable migration tips and instructions
187183

188-
To assist with the deployment and migration process, the workbook includes tips that explain how to use the different tabs and links to relevant resources. The tips are based on Microsoft Sentinel migration documentation and are relevant to your current SIEM. To enable tips and instructions, in the **Microsoft Sentinel Deployment and Migration** workbook, select **Automation**, and on the top right, set **MigrationTips** and **Instruction** to **Yes**.
184+
To assist with the deployment and migration process, the workbook includes tips that explain how to use the different tabs, and links to relevant resources. The tips are based on Microsoft Sentinel migration documentation and are relevant to your current SIEM. To enable tips and instructions, in the **Microsoft Sentinel Deployment and Migration** workbook, on the top right, set **MigrationTips** and **Instruction** to **Yes**.
189185

190-
:::image type="content" source="media/migration-track/migration-track-tips.png" alt-text="Screenshot of the Microsoft Sentinel Deployment Tracker Data Management tab." lightbox="media/migration-track/migration-track-tips":::
186+
:::image type="content" source="media/migration-track/migration-track-tips.png" alt-text="Screenshot of the Microsoft Sentinel Deployment Tracker migration tips and instructions." lightbox="media/migration-track/migration-track-tips.png":::

0 commit comments

Comments
 (0)
Please sign in to comment.