Skip to content

Commit 7873b2c

Browse files
committed
update module
1 parent e69d00a commit 7873b2c

4 files changed

Lines changed: 19 additions & 13 deletions

File tree

learn-pr/wwl-sci/design-solutions-security-operations/3-design-centralized-logging-auditing.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-security-operations.design-centralized-logging-auditing
3-
title: Design centralized logging and auditing, including Microsoft Purview Audit
3+
title: Design solutions to support centralized logging and auditing
44
metadata:
5-
title: Design centralized logging and auditing, including Microsoft Purview Audit
6-
description: "SC-100 preparatory unit on the topic: design centralized logging and auditing, including Microsoft Purview Audit."
5+
title: Design solutions to support centralized logging and auditing
6+
description: "SC-100 preparatory unit on the topic: design centralized logging and auditing."
77
ms.date: 02/02/2026
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/design-solutions-security-operations/includes/0-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
This module covers designing security operations solutions in hybrid, multicloud, and edge environments. You learn about Microsoft's unified security operations platform that combines extended detection and response (XDR), security information and event management (SIEM), and security orchestration, automation, and response (SOAR) capabilities.
1+
This module covers designing security operations solutions in hybrid and multicloud environments. You learn about Microsoft's unified security operations platform that combines extended detection and response (XDR), security information and event management (SIEM), and security orchestration, automation, and response (SOAR) capabilities.
22

3-
Imagine you're a security architect in an organization operating across hybrid, multicloud, and edge environments. Your security operations center (SOC) faces challenges managing security consistently across different platforms while controlling costs and analyst workload. This module guides you through designing security operations solutions using Microsoft's unified approach.
3+
Imagine you're a security architect in an organization operating across hybrid and multicloud environments. Your security operations center (SOC) faces challenges managing security consistently across different platforms while controlling costs and analyst workload. This module guides you through designing security operations solutions using Microsoft's unified approach.
44

55
## Learning objectives
66

learn-pr/wwl-sci/design-solutions-security-operations/includes/1-introduction-security-operations-secops.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ The primary objective of a cloud security operations (SecOps) function is to det
44
- Reactively respond to attacks detected by tools
55
- Proactively hunt for attacks that slipped past reactive detections
66

7-
The Microsoft Cybersecurity Reference Architecture (MCRA) provides guidance for designing end-to-end security using Zero Trust principles. The MCRA includes detailed diagrams for security operations (SecOps/SOC), helping organizations plan unified operations across hybrid and multicloud environments.
7+
[The Microsoft Cybersecurity Reference Architecture (MCRA)](https://aka.ms/MCRA) provides guidance for designing end-to-end security using Zero Trust principles and includes detailed diagrams for security operations (SecOps/SOC), helping organizations plan unified operations across hybrid and multicloud environments.
88

99
## Security operations strategy overview
1010

@@ -18,7 +18,6 @@ Modern security operations platforms address this challenge by integrating SIEM,
1818

1919
## Security operations functions
2020

21-
2221
Security operations teams often focus on three key outcomes:
2322

2423
- **Incident management:** Manage active attacks on the environment, including:
@@ -36,7 +35,6 @@ To deliver against these outcomes, security operations teams should be structure
3635

3736
:::image type="content" source="../media/security-operations-functions.png" alt-text="Diagram that shows security Operations functions (Tiers)." lightbox="../media/security-operations-functions.png":::
3837

39-
4038
## Modernization
4139

4240
Detecting and responding to threats is currently undergoing significant modernization at all levels.
@@ -46,8 +44,10 @@ Detecting and responding to threats is currently undergoing significant moderniz
4644
- **Responsiveness** via mean time to acknowledge (MTTA).
4745
- **Remediation speed** via mean time to remediate (MTTR).
4846
- **Technology evolution:** SOC technology is evolving from exclusive use of static analysis of logs in a SIEM to add the use of specialized tooling and sophisticated analysis techniques. This provides deep insights into assets that provide high quality alerts and investigation experience that complement the breadth view of the SIEM. Both types of tooling are increasingly using AI and machine learning, behavior analytics, and integrated threat intelligence to help spot and prioritize anomalous actions that could be a malicious attacker.
47+
- **AI-assisted security operations:** Generative AI is transforming how SOC analysts work by accelerating investigation and response. AI copilots help analysts quickly summarize incidents, correlate alerts across data sources, generate investigation queries using natural language, and recommend response actions. This assistance reduces the expertise barrier for junior analysts, helps experienced analysts work faster, and enables teams to handle higher alert volumes without proportional staffing increases.
4948
- **Threat hunting:** SOCs are adding hypothesis driven threat hunting to proactively identify advanced attackers and shift noisy alerts out of frontline analyst queues.
50-
- **Incident management:** Discipline is becoming formalized to coordinate nontechnical elements of incidents with legal, communications, and other teams. **Integration of internal context:** To help prioritize SOC activities such as the relative risk scores of user accounts and devices, sensitivity of data and applications, and key security isolation boundaries to closely defend.
49+
- **Incident management:** Discipline is becoming formalized to coordinate nontechnical elements of incidents with legal, communications, and other teams.
50+
- **Integration of internal context:** SOCs are incorporating business context to prioritize activities, including relative risk scores of user accounts and devices, sensitivity of data and applications, and key security isolation boundaries to defend.
5151

5252
## Team composition and key relationships
5353

learn-pr/wwl-sci/design-solutions-security-operations/includes/2-design-security-operations-capabilities-hybrid-multicloud-environments.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,14 @@ This centralized visibility eliminates the need for security teams to switch bet
9999

100100
### Workspace architecture decisions
101101

102-
As a cybersecurity architect, one of your key decisions is workspace topology. Consider these patterns:
102+
As a cybersecurity architect, one of your key decisions is workspace topology. This decision directly impacts your monitoring effectiveness because:
103+
104+
- **Threat correlation** - Security analysts need to correlate events across identities, endpoints, and network traffic. Data in separate workspaces requires cross-workspace queries, which are slower and more complex.
105+
- **Alert context** - When an alert fires, analysts need surrounding context from related logs. Fragmented workspaces mean analysts may miss critical context during investigations.
106+
- **Detection rules** - Analytics rules and detection logic work most efficiently when all relevant data sources are in the same workspace.
107+
- **Cost efficiency** - Commitment tier pricing applies per workspace, so consolidation can reduce costs, but data egress charges may offset savings if sources are geographically dispersed.
108+
109+
Consider these patterns:
103110

104111
| Pattern | When to use | Trade-offs |
105112
|---------|-------------|------------|
@@ -111,14 +118,13 @@ For most hybrid and multicloud scenarios, a primary workspace with Azure Lightho
111118

112119
### Agent deployment strategy at scale
113120

114-
Design your agent deployment approach based on environment characteristics:
121+
Deploying the Azure Monitor agent consistently across hybrid environments ensures complete monitoring coverage. For non-Azure machines, the Azure Arc agent must be installed first to enable Azure Monitor agent deployment. Design your agent deployment approach based on environment characteristics:
115122

116123
- **Azure Policy with remediation tasks** - Automatically deploy Azure Monitor agent to Arc-enabled servers that don't have it installed. Best for enforcing consistent monitoring across large estates.
117124
- **Defender for Cloud auto-provisioning** - Automatically deploys Arc agent and monitoring extensions to AWS EC2 and GCP VM instances when connectors are configured. Simplifies multicloud onboarding.
118-
- **Configuration management tools** - Use Ansible, Puppet, or DSC for environments with existing automation. Provides flexibility but requires maintenance.
119125

120126
> [!TIP]
121-
> Use Azure Resource Graph queries to identify monitoring coverage gaps—resources that are Arc-enabled but missing the Azure Monitor agent or required data collection rules.
127+
> Use Azure Resource Graph queries to identify monitoring coverage gaps—resources that are Arc-enabled but missing the Azure Monitor agent or required data collection rules. For sample queries, see [Azure Resource Graph sample queries for Azure Arc-enabled servers](/azure/azure-arc/servers/resource-graph-samples).
122128
123129
### Monitoring coverage and resilience
124130

0 commit comments

Comments
 (0)