Build the SOC Operations Dashboard
Objective
Build a Sentinel workbook that displays 4 key SOC operational metrics. This is the dashboard the SOC lead checks daily and the SOC manager presents weekly.
Required: Sentinel workspace with SecurityIncident data (you need at least 2 weeks of closed incidents for meaningful metrics).
Step 1: Create the workbook
Navigate to: Sentinel → Workbooks → Add workbook → Start with empty workbook
Save the workbook as “SOC Operations Dashboard.”
Step 2: Add the time range parameter
Click Add → Add parameters → Add parameter
| Field | Value |
|---|---|
| Parameter name | TimeRange |
| Parameter type | Time range picker |
| Default value | Last 30 days |
This parameter controls the time window for all panels.
Step 3: Panel 1 — Alert volume trend
Click Add → Add query
| |
Visualization: Time chart. Title: “Daily Incident Volume by Severity.”
This shows the workload trend. Sudden spikes indicate new attack campaigns or new detection rules generating alerts. Consistent decline indicates effective tuning.
Step 4: Panel 2 — Detection rule performance
Click Add → Add query
| |
Visualization: Table. Title: “Detection Rule Performance.” Rules at the top (highest FP rate) are your priority tuning targets.
Step 5: Panel 3 — SLA compliance
Click Add → Add query
| |
Visualization: Bar chart. Title: “SLA Compliance by Severity.”
Step 6: Panel 4 — Incident classification
Click Add → Add query
| |
Visualization: Pie chart. Title: “Incident Classification (30 days).”
If “Undetermined” dominates, analysts are closing incidents without classifying them — fix this process issue before trusting SNR metrics.
Step 7: Save and share
Save the workbook. Pin it to the SOC team’s Sentinel favourites. If your team uses a shared display, set this workbook as the default view.
Verification checklist
- Workbook created with 4 panels
- Time range parameter controls all panels
- Alert volume trend shows daily data
- Detection rule performance table identifies tuning targets
- SLA compliance shows per-severity percentages
- Incident classification reveals data quality gaps
- Workbook saved and shared with SOC team