Introducing Microsoft Sentinel Optimization Workbook
Published Aug 23 2023 11:30 AM 23.7K Views
Microsoft

Optimizing Microsoft Sentinel ingestion cost, improving operational efficiency, and enhancing threat management is crucial for several reasons. Each of these contributes to enhancing the overall efficiency, cost-effectiveness, and efficacy of an organization's security operations. To assist with these challenges, we are introducing the Optimization Workbook.

 

This workbook aims to empower security teams by providing invaluable insights into your Microsoft Sentinel environment and offering recommendations to enhance cost efficiency, operational effectiveness, and overall management overview.

 

The Three Pillars of Insight:

 

At the core of the Microsoft Sentinel Optimization Workbook are three comprehensive tabs: Cost and Ingestion Optimization, Operational Optimization and Effectiveness, and Management and Acceleration.

 

Each tab includes a Summary section that provides an overview filled with high-level insights, presented through tiles displaying useful high-level information. More detailed information related to the summary can be found in the Details section. Here, you'll discover comprehensive data and practical recommendations that complement the insights from the summary.

 

OptimizationWorkbookWhite.png

 

1. Cost and Ingestion Optimization:

 

Gaining a clear understanding of cost management is crucial for any organization's security strategy. The Cost and Ingestion Optimization tab of the workbook offers a detailed analysis of your current Microsoft Sentinel environment, providing recommendations on how to optimize costs while ensuring efficient data ingestion. Harnessing the power of this tab will help you make informed decisions on resource allocation and budgeting, ultimately saving you time and resources.

 

In the tab, you will find information related to the following:

  • Top ingestions
  • Ingestion anomalies
  • Pricing sku & commitment tier
  • E5 benefit utilization
  • Basic logs
  • Active restoration
  • Search job
  • Data collection rules & ingestion transformation

 

Here are some sample charts you will find in the tab. These insights provide visibility into the most significant data sources, detect irregular patterns in data ingestion, help users understand their pricing model and commitment level, and highlight key findings that enable effective cost management and optimization.

 

Cost_1.png

 

Cost_2.png

 

Cost_3.png

 

Cost_4.png

 

 

2. Operational Optimization and Effectiveness:

 

To stay protected against the ever-evolving cybersecurity landscape, operational optimization is key. This tab is designed to provide you with a comprehensive overview of your operational efficiency, empowering you to identify potential bottlenecks and areas for improvement.

 

Below is a list of insights you will find in this tab, which, armed with these insights, can help your security team enhance its response time and ensure your organization remains one step ahead of potential threats.

  • Number of incidents with Automation used
  • Number of incidents without Automation used
  • Mean time to respond with Automation
  • Average time to acknowledge
  • Average time to closure
  • Mean time to respond without Automation
  • Mean time to response with tasks
  • Highest mean timne to response
  • Closing classifications over time
  • Alerts over time per severity
  • Incidents over time per severity
  • Incidents owned per user
  • Failed Analytics
  • Top modified rules

 

For example, here are some of the charts you will find in the workbook. By understanding the number of incidents with and without Automation, mean time to respond, and other time-related metrics, the security team can identify areas where operational efficiency can be improved. They can focus on reducing response times, promptly acknowledging incidents, and streamlining incident closure processes.

 

Operational_1.png

 

Operational_2.png

 

Operational_3.png

 

Operational_4.png

 

 

3. Management and Acceleration:

 

Leading and managing security operations efficiently is a challenging task. The Management and Acceleration tab of the Microsoft Sentinel Workbook provides a panoramic view of your threat management.

 

Below is a list of details available in this tab, giving you the insights to make well-informed decisions and foster accelerated growth.

  • Workspace & Table Retention
  • Microsoft Defender for Cloud Benefits
  • Automation Rules
  • Playbooks
  • Workbooks
  • Threat Intelligence Indicators
  • Watchlists
  • Analytics Rules

 

Here are some sample charts you will find in the workbook. The panoramic view of Microsoft Sentinel and threat management provided by the tab offers a holistic understanding of the organization's security landscape. This enables the security team to grasp the bigger picture and identify potential areas of concern.

 

Management_1.png

 

Management_2.png

 

 

 

Prerequisite:

 

To visualize data under the 'Operational Optimization and Effectiveness' and 'Management and Acceleration' tabs, it is necessary to have auditing and health monitoring data.
Follow the instructions on how to Turn on auditing and health monitoring for Microsoft Sentinel.

 

 

Getting started with the workbook:

 

  • Search for the 'Microsoft Sentinel Optimization Workbook' in the Content hub and install the solution.

Solution_1.png

 

  • After that, click on 'Configuration,' or go to the Workbooks blade, and you will find the workbook under 'Templates.' Proceed to save the workbook, and it will be available under 'My Workbooks.'

Solution_2.png

 

 

 

 

 

 

Special thanks to @Matt_Lowe  and @MargaretMwaura  for their collaborations on this workbook.

8 Comments
Co-Authors
Version history
Last update:
‎Aug 22 2023 03:49 PM
Updated by: