Manage a security operations environment (25–30%)

Configure settings in Microsoft Defender XDR

Configure a Connection from Defender XDR to a Sentinel Workspace

To establish a connection from Defender XDR (Extended Detection and Response) to a Microsoft Sentinel workspace, follow these steps:

  1. Access Microsoft Sentinel: Sign in to the Microsoft Azure portal and navigate to Microsoft Sentinel. Select the appropriate Sentinel workspace or create a new one if necessary.

  2. Connect Security Solutions: Within the Microsoft Sentinel dashboard, locate the ‘Data connectors’ section. Here, you can find various Microsoft security solutions that can be connected to Microsoft Sentinel, including different Defender products that are part of the Defender XDR suite.

  3. Configure Automatic Incident Creation: For each Defender product you wish to connect, configure the settings to automatically create incidents in Microsoft Sentinel from the alerts generated in the connected service. This ensures that any alerts raised by Defender XDR components are automatically escalated to incidents within Sentinel for further investigation and response https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

  4. Filter Alerts: You have the option to filter these alerts by severity or by specific text contained in the alert name. This helps in managing the volume of incidents and focusing on the most critical ones https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

  5. Verify Connection: After configuring the connection and setting up the automatic incident creation, verify that the alerts from Defender XDR are successfully being sent to the Microsoft Sentinel workspace. This can be done by checking for new incidents in the Sentinel dashboard that correspond to the alerts from Defender XDR.

  6. Customize and Enhance: Once the connection is established, you can further customize and enhance the integration by creating custom analytics rules, workbooks, and playbooks in Microsoft Sentinel to analyze and respond to the data provided by Defender XDR.

For additional information on configuring Microsoft Sentinel and connecting it to various security solutions, you can refer to the following resources:

By following these steps and utilizing the provided resources, you can effectively configure a connection from Defender XDR to a Microsoft Sentinel workspace, enabling a comprehensive security management and response system.

Manage a security operations environment (25–30%)

Configure settings in Microsoft Defender XDR

Configure Alert and Vulnerability Notification Rules

When configuring alert and vulnerability notification rules, it is essential to understand the mechanisms and settings that allow for effective monitoring and response to potential security threats. Here’s a detailed explanation of how to configure these rules:

Alert Notification Rules

  1. Email Notifications: Set up email notifications to inform specified recipients about new alerts. This ensures that individuals responsible for security can act promptly based on the severity of the alerts https://learn.microsoft.com/en-us/training/modules/configure-settings-for-alerts-detections-microsoft-defender-for-endpoint/3-configure-alert-notifications .

  2. Alert Suppression Rules: Create rules to suppress alerts that are known to be innocuous, which helps in reducing noise and focusing on genuine security threats https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/5-manage-investigate-alerts .

Vulnerability Notification Rules

  1. Threat and Vulnerability Management: Manage security settings to receive notifications about vulnerabilities and required remediations https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

  2. Data Retention and Advanced Features: Manage data retention policies and configure advanced features to maintain an optimal balance between historical data and system performance https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  3. Attack Surface Reduction (ASR) Recommendations: Recommend ASR rules for devices to minimize the risk of exploitation by reducing the attackable surface area https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  4. Device Group Management: Configure and manage device groups to apply specific policies and rules to different sets of devices within the organization https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  5. Microsoft Defender Vulnerability Management: Use the Microsoft Defender Vulnerability Management to identify devices at risk and manage endpoint threat indicators effectively https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  6. Device Discovery: Identify unmanaged devices within the network to ensure that all potential endpoints are monitored and protected https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

For additional information on configuring alert and vulnerability notification rules, you can refer to the following resources:

Please note that the URLs provided are for reference and additional information. They should be accessed to gain a deeper understanding of the configuration process and best practices.

Manage a security operations environment (25–30%)

Configure settings in Microsoft Defender XDR

Configure Microsoft Defender for Endpoint Advanced Features

Microsoft Defender for Endpoint offers a suite of advanced features that enhance the security posture of an organization’s devices. Configuring these features is crucial for ensuring robust protection against threats and efficient incident response. Below is a detailed explanation of how to configure the advanced features of Microsoft Defender for Endpoint:

  1. Manage Data Retention and Alert Notification
    • Data retention policies can be set to determine how long data should be kept before it is automatically deleted.
    • Alert notification settings allow you to configure how and when you are notified about potential security incidents.
  2. Recommend Attack Surface Reduction (ASR) Rules
    • ASR rules help reduce the attack surface of your devices by blocking behaviors that are typically used by malware and attack campaigns.
    • You can configure ASR rules to automatically apply to device groups based on their risk profile.
  3. Respond to Incidents and Alerts
    • Set up automated investigation and remediation to respond to alerts efficiently.
    • Configure the automation level to control how Microsoft Defender for Endpoint responds to different types of alerts on devices.
  4. Configure and Manage Device Groups
    • Device groups can be created and managed to apply specific security policies and configurations to a set of devices with similar characteristics or roles.
  5. Identify Devices at Risk with Microsoft Defender Vulnerability Management
    • Use the vulnerability management features to identify and prioritize devices at risk due to unpatched vulnerabilities or misconfigurations.
  6. Manage Endpoint Threat Indicators
    • Configure custom threat indicators to detect activities related to known threats or suspicious behaviors on endpoints.
  7. Identify Unmanaged Devices with Device Discovery
    • Use device discovery features to find and bring unmanaged devices under the protection of Microsoft Defender for Endpoint.
  8. Configure Advanced Features in Microsoft Defender for Endpoint
  9. Manage Automation Settings
  10. Advanced Hunting
  11. Integration with Other Microsoft Security Products

For additional information on configuring these features, you can refer to the official Microsoft documentation:

By configuring these advanced features, organizations can significantly enhance their security capabilities and ensure that their endpoints are well-protected against a wide range of threats.

Manage a security operations environment (25–30%)

Configure settings in Microsoft Defender XDR

Configure Endpoint Rules Settings, Including Indicators and Web Content Filtering

When configuring endpoint rules settings, it is essential to understand the various components involved, such as indicators and web content filtering. These settings are crucial for maintaining the security posture of an organization’s network and endpoints.

Managing Indicators

Indicators in Microsoft Defender for Endpoint are used to define specific attributes or patterns, such as URLs, IPs, and file hashes, that represent known threats. By configuring indicators, you can control how the system responds when it detects these attributes in your environment.

To manage indicators, follow these steps:

  1. Navigate to the Microsoft Defender Security Center.
  2. Go to the ‘Settings’ section and select ‘Indicators’.
  3. Here, you can add new indicators by specifying the type (IP addresses, URLs/domains, or file hashes) and the action to take when detected (Alert, Alert and Block, or Allow).
  4. Configure the indicator’s expiration date, severity, and category according to your organization’s policies https://learn.microsoft.com/en-us/training/modules/configure-settings-for-alerts-detections-microsoft-defender-for-endpoint/8-summary-resources .

For more information on managing indicators, refer to the official documentation: Manage indicators in Microsoft Defender for Endpoint.

Web Content Filtering

Web content filtering is a feature that allows you to control web access based on categories. This helps prevent users from accessing websites that may pose a security risk or are not compliant with company policies.

To configure web content filtering, follow these steps:

  1. In the Microsoft Defender Security Center, go to ‘Settings’ and select ‘Web content filtering’.
  2. Choose the categories you wish to block or allow. Categories can include adult content, high bandwidth sites, legal liability, and more.
  3. Apply these settings to device groups as needed.
  4. Review and enforce the policies to ensure they are active and functioning as intended.

For additional guidance on web content filtering, visit: Web content filtering in Microsoft Defender for Endpoint.

Additional Considerations

By carefully configuring endpoint rules settings, including indicators and web content filtering, you can significantly enhance your organization’s defense against cyber threats and ensure compliance with internal policies.

Manage a security operations environment (25–30%)

Configure settings in Microsoft Defender XDR

Manage Automated Investigation and Response Capabilities in Microsoft Defender XDR

Automated investigation and response (AIR) capabilities in Microsoft Defender for Endpoint are critical components of the extended detection and response (XDR) strategy. These features enable organizations to streamline their security operations by automating the detection, investigation, and remediation of threats. Below is a detailed explanation of how to manage these capabilities:

Automated Investigation

Automated Investigation is a feature that leverages artificial intelligence to automatically investigate alerts and take immediate action to resolve breaches. This feature can be enabled in the Advanced features page of the Settings/General area within the product https://learn.microsoft.com/en-us/training/modules/configure-manage-automation-microsoft-defender-for-endpoint/2-configure-advanced-features .

Enable EDR in Block Mode

Enabling Endpoint Detection and Response (EDR) in block mode allows Microsoft Defender for Endpoint to use behavioral blocking and containment capabilities. This means that malicious artifacts or behaviors observed through post-breach EDR capabilities can be blocked, enhancing the security posture without altering the detection, alert generation, or incident correlation processes https://learn.microsoft.com/en-us/training/modules/configure-manage-automation-microsoft-defender-for-endpoint/2-configure-advanced-features .

Automatically Resolve Alerts

The Automatically resolve alerts setting is designed to close alerts if the Automated Investigation process finds no threats or has successfully remediated all malicious artifacts. This helps reduce the number of alerts that security analysts need to manually review https://learn.microsoft.com/en-us/training/modules/configure-manage-automation-microsoft-defender-for-endpoint/2-configure-advanced-features .

Allow or Block File

The Allow or block file feature is dependent on having Windows Defender Antivirus active and the cloud-based protection feature enabled. This setting allows security teams to specify files that should always be blocked or allowed, providing a more granular control over the security of the organization’s endpoints https://learn.microsoft.com/en-us/training/modules/configure-manage-automation-microsoft-defender-for-endpoint/2-configure-advanced-features .

File Content Analysis

File Content Analysis is a capability that should be enabled to allow certain files and email attachments to be automatically uploaded to the cloud for further inspection during Automated Investigation. This is configured by specifying the file extension names and email attachment extension names that should trigger the upload https://learn.microsoft.com/en-us/training/modules/configure-manage-automation-microsoft-defender-for-endpoint/3-manage-automation-upload-folder-settings .

Memory Content Analysis

Enabling Memory Content Analysis allows Microsoft Defender for Endpoint to automatically investigate the memory content of processes. This can be particularly useful for identifying and mitigating threats that reside solely in memory and may not be detected through file analysis alone https://learn.microsoft.com/en-us/training/modules/configure-manage-automation-microsoft-defender-for-endpoint/3-manage-automation-upload-folder-settings .

Managing Automation Settings

To effectively manage automation settings in Microsoft Defender for Endpoint, it is important to understand and configure the advanced features appropriately. This includes setting up the automation-related settings to align with the organization’s security policies and operational requirements https://learn.microsoft.com/en-us/training/modules/configure-manage-automation-microsoft-defender-for-endpoint/7-summary-resources .

For additional information on managing automated investigation and response capabilities in Microsoft Defender XDR, you can refer to the following resources: - Configure advanced features in Microsoft Defender for Endpoint - Manage automation settings in Microsoft Defender for Endpoint

By understanding and configuring these settings, security teams can enhance their organization’s ability to automatically detect, investigate, and respond to threats, thereby improving their overall security posture and reducing the workload on security analysts.

Manage a security operations environment (25–30%)

Configure settings in Microsoft Defender XDR

Configure Automatic Attack Disruption in Microsoft Defender XDR

Microsoft Defender XDR (Extended Detection and Response) is a comprehensive security solution that provides an integrated approach to detect, investigate, and respond to advanced threats across various domains. One of the key capabilities of Microsoft Defender XDR is the ability to configure automatic attack disruption to mitigate the impact of cyber threats.

Automatic Analysis and Response Microsoft Defender XDR utilizes the Microsoft 365 security portfolio to automatically analyze threat data across domains. It builds a comprehensive picture of an attack and presents it on a single dashboard https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/2-use-microsoft-security-center-portal . This integrated approach allows for the correlation of security alerts and the automation of responses to complex threats.

Incident Management The incident management team is responsible for the non-technical aspects of managing incidents, including coordination with other teams such as communications, legal, leadership, and business stakeholders https://learn.microsoft.com/en-us/training/modules/introduction-microsoft-365-threat-protection/3-understand-defender-security-operations-center . This team also provides deeper investigation into more complex, often multi-stage attacks conducted by human operators.

Postmortem and Strategy Adjustment After an attack, it is crucial to conduct a postmortem analysis to evaluate the effectiveness of the DDoS response strategy and make necessary adjustments. Considerations include the extent of service disruption, the impact on applications or services, and potential improvements to the response strategy https://learn.microsoft.com/en-us/azure/ddos-protection/ddos-response-strategy .

Integration with Microsoft Sentinel Microsoft security solutions connected to Microsoft Sentinel can be configured to automatically create incidents from all alerts generated in the connected service. This allows for a proactive response to threats, such as alerting when a high-risk user attempts to access corporate resources https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

Defender Plans and Features Microsoft Defender for Servers offers two plans with varying levels of protection. Both plans include automatic onboarding for resources, threat and vulnerability management, and integration with Microsoft Defender for Cloud and Microsoft Defender for Endpoint. Plan 2 adds additional features such as log analytics, vulnerability assessment, threat detections at different levels, adaptive application controls, file integrity monitoring, just-in-time VM access, and adaptive network hardening https://learn.microsoft.com/en-us/training/modules/understand-azure-defender-cloud-workload-protection/2-understand-azure-defender-for-servers .

For more detailed information on configuring automatic attack disruption in Microsoft Defender XDR, you can refer to the following resources: - Microsoft Defender for Cloud - Microsoft Defender for Endpoint - Microsoft Sentinel - Microsoft 365 security

By leveraging these resources and understanding the features of Microsoft Defender XDR, you can effectively configure automatic attack disruption to enhance your organization’s security posture.

Manage a security operations environment (25–30%)

Manage assets and environments

Configure and Manage Device Groups, Permissions, and Automation Levels in Microsoft Defender for Endpoint

Device Groups

Device groups in Microsoft Defender for Endpoint allow administrators to segment the network into different categories based on criteria such as device names, tags, or domains. This segmentation enables tailored policy application and more granular reporting. To manage device groups:

  1. Access the Microsoft Defender portal with an account that has the necessary administrative role.
  2. Navigate to Settings and then select Endpoints.
  3. Under the Permissions category, choose Device Groups.
  4. Use the + Add item option to create a new group or select an existing group to edit.
  5. Define the group by specifying criteria and assigning a name to the group.
  6. Save the changes to create or update the device group https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

Permissions

Permissions in Microsoft Defender for Endpoint are managed through role-based access control (RBAC). RBAC ensures that individuals have access to the appropriate levels of information and can perform actions according to their role within the organization. To configure permissions:

  1. In the Microsoft Defender portal, select Settings and then Endpoints.
  2. Under Permissions, click on Roles.
  3. Enable roles by selecting the Turn on roles button if not already enabled.
  4. Add a new role by selecting + Add item.
  5. Enter the role name, description, and select the permissions to assign to the role.
  6. Proceed to assign the role to a Microsoft Entra Security group.
  7. Save the role configuration https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

Automation Levels

Automation levels in Microsoft Defender for Endpoint determine how automated investigation and remediation actions are applied to devices. To manage automation settings:

  1. Navigate to the Microsoft Defender portal and access the automation configuration options.
  2. Review the available automation levels, which can range from full automation (where actions are taken on devices without human intervention) to semi- or partial automation (where approval is required for certain actions).
  3. Choose the appropriate automation level based on the organization’s policies and risk tolerance.
  4. Apply the selected automation settings to the relevant device groups https://learn.microsoft.com/en-us/training/modules/configure-manage-automation-microsoft-defender-for-endpoint/7-summary-resources .

For additional information on configuring and managing device groups, permissions, and automation levels in Microsoft Defender for Endpoint, you can refer to the following resources:

Please note that the URLs provided are for reference purposes and should be accessed for more detailed guidance on each topic.

Manage a security operations environment (25–30%)

Manage assets and environments

Identify and Remediate Unmanaged Devices in Microsoft Defender for Endpoint

Unmanaged devices in a network pose significant security risks as they may be unpatched, have weak security configurations, or lack security controls altogether. Microsoft Defender for Endpoint provides capabilities to identify and remediate these devices to ensure a secure and managed network environment.

Identifying Unmanaged Devices

Microsoft Defender for Endpoint offers a device discovery feature that helps in identifying unmanaged devices connected to your corporate network. This is achieved without the need for additional hardware or complex process changes. The device discovery process utilizes onboarded endpoints to probe or scan the network, thereby discovering unmanaged devices https://learn.microsoft.com/en-us/training/modules/perform-device-investigations-microsoft-defender-for-endpoints/5-detect-devices-with-device-discovery .

The types of devices that can be discovered include:

Remediation of Unmanaged Devices

Once unmanaged devices are discovered, the following steps can be taken to remediate them:

  1. Onboarding Unmanaged Endpoints: Devices that are not yet managed by Microsoft Defender for Endpoint can be onboarded to the service. This increases the security visibility on these devices and allows for better management and control https://learn.microsoft.com/en-us/training/modules/perform-device-investigations-microsoft-defender-for-endpoints/5-detect-devices-with-device-discovery .

  2. Assessing Vulnerabilities and Configuration Gaps: By identifying and assessing vulnerabilities, as well as detecting configuration gaps, the attack surface can be reduced. This is a critical step in ensuring that the devices do not pose a threat to the network https://learn.microsoft.com/en-us/training/modules/perform-device-investigations-microsoft-defender-for-endpoints/5-detect-devices-with-device-discovery .

  3. Device Discovery Modes: Microsoft Defender for Endpoint provides two modes of discovery:

Device Inventory and Assessment

Devices that have been discovered but not yet onboarded to Microsoft Defender for Endpoint will be listed in the device inventory under the Computers and Mobile tab. To assess these devices, a filter called “Onboarding status” can be used, which includes the following values:

By using the device discovery and management features of Microsoft Defender for Endpoint, organizations can ensure that all devices within their network are identified, managed, and secured, thereby reducing the overall risk to the network.

For additional information on device discovery and onboarding in Microsoft Defender for Endpoint, you can refer to the following resources:

Manage a security operations environment (25–30%)

Manage assets and environments

Manage Resources by Using Azure Arc

Azure Arc is a service that simplifies governance and management across different environments, such as data centers, multiple clouds, and edge locations. It provides a consistent multi-cloud and on-premises management platform, which is particularly useful for organizations that have resources spread across various locations and cloud providers.

Key Features of Azure Arc:

Managing Non-Azure Resources:

Installation and Configuration:

To install the Azure Arc agent on non-Azure Linux machines, you would typically follow these steps:

  1. Generate an installation script from the Azure portal.
  2. Download and install the agent on the server.
  3. Create the Azure Arc-enabled server resource and associate it with the agent https://learn.microsoft.com/en-us/training/modules/connect-syslog-data-sources-to-azure-sentinel/3-collect-data-from-linux-based-sources-using-syslog .

Once installed, you can connect your non-Azure Linux server to Azure Arc using a Bash script that includes the necessary parameters for your environment https://learn.microsoft.com/en-us/training/modules/connect-syslog-data-sources-to-azure-sentinel/3-collect-data-from-linux-based-sources-using-syslog .

Integration with Azure Services:

Prerequisites:

Before using Azure Arc, ensure that the appropriate Azure resource providers are registered, such as Microsoft.HybridCompute and Microsoft.GuestConfiguration. Additionally, create a Service Principal for onboarding at scale if necessary https://learn.microsoft.com/en-us/training/modules/connect-non-azure-machines-to-azure-defender/4-connect-aws-accounts .

For more detailed information and step-by-step guidance on using Azure Arc to manage resources, you can refer to the following resources:

By leveraging Azure Arc, organizations can effectively manage their diverse set of resources, streamline operations, and enforce governance across their entire IT landscape.

Manage a security operations environment (25–30%)

Manage assets and environments

Connect Environments to Microsoft Defender for Cloud (by using multi-cloud account management)

Microsoft Defender for Cloud offers a comprehensive security management and threat protection solution for hybrid and multi-cloud workloads. To enhance the security posture and gain visibility across different cloud environments, it is essential to connect these environments to Microsoft Defender for Cloud. This process involves integrating accounts from various cloud providers, such as Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP), into the Defender for Cloud console.

Connecting Azure Resources

Connecting AWS Resources

Connecting GCP Resources

Connecting Kubernetes Clusters

By connecting various environments to Microsoft Defender for Cloud, organizations can leverage multi-cloud account management to maintain a strong security posture, manage policies, and respond to threats effectively across their entire cloud infrastructure.

For additional information on connecting non-Azure machines to Azure Defender, please refer to the following URLs: - Connect AWS accounts to Microsoft Defender for Cloud - Connect GCP accounts to Microsoft Defender for Cloud - Connect Kubernetes clusters to Microsoft Defender for Cloud

Manage a security operations environment (25–30%)

Manage assets and environments

Discovering and remediating unprotected resources using Microsoft Defender for Cloud involves several steps to ensure the security posture of your Azure resources is robust and vulnerabilities are addressed promptly. Here’s a detailed explanation of the process:

Discover Unprotected Resources

  1. Asset Inventory: Utilize the asset inventory page in Microsoft Defender for Cloud to get a comprehensive view of the security status of your resources https://learn.microsoft.com/en-us/training/modules/connect-azure-assets-to-azure-defender/2-explore-manage-resources-with-asset-inventory .
  2. Security Analysis: Defender for Cloud continuously analyzes the security state of your Azure resources to identify potential security vulnerabilities https://learn.microsoft.com/en-us/training/modules/connect-azure-assets-to-azure-defender/2-explore-manage-resources-with-asset-inventory .
  3. Recommendations: When a resource has outstanding recommendations, they will be listed in the inventory. These recommendations are crucial for identifying unprotected resources https://learn.microsoft.com/en-us/training/modules/connect-azure-assets-to-azure-defender/2-explore-manage-resources-with-asset-inventory .

Remediate Unprotected Resources

  1. Address Recommendations: Follow the recommendations provided by Defender for Cloud to remediate vulnerabilities. This may include deploying missing agents, updating configurations, or patching software https://learn.microsoft.com/en-us/training/modules/connect-azure-assets-to-azure-defender/2-explore-manage-resources-with-asset-inventory .
  2. Vulnerability Assessment: Use the vulnerability assessment service to discover, track, and help remediate potential database vulnerabilities. This service provides an overview of your SQL machines’ security state and details of any security findings https://learn.microsoft.com/en-us/training/modules/understand-azure-defender-cloud-workload-protection/5-understand-azure-defender-for-sql .
  3. Advanced Threat Protection: Enable advanced threat protection services to monitor your SQL servers for threats such as SQL injection, brute-force attacks, and privilege abuse. This service provides detailed security alerts and guidance on how to mitigate threats https://learn.microsoft.com/en-us/training/modules/understand-azure-defender-cloud-workload-protection/5-understand-azure-defender-for-sql .
  4. Automate Responses: Set up automated responses in Defender for Cloud to handle common threats and streamline the remediation process. This helps in reducing the time between the detection of a vulnerability and its remediation https://learn.microsoft.com/en-us/training/modules/remediate-azure-defender-security-alerts/8-summary-resources .

Additional Information

  • For more details on how to use Microsoft Defender for Cloud to discover and remediate unprotected resources, you can refer to the official documentation provided by Microsoft. This includes step-by-step guides and best practices for securing your cloud environment.

By following these steps, you can ensure that your Azure resources are protected against potential threats and vulnerabilities. It’s important to regularly review the security recommendations and automate responses where possible to maintain a strong security posture.

Please note that the URLs for additional information are not included as per the instructions. However, the official Microsoft documentation can be easily found on the Microsoft website under the Defender for Cloud section.

Manage a security operations environment (25–30%)

Manage assets and environments

Identify and Remediate Devices at Risk Using Microsoft Defender Vulnerability Management

Microsoft Defender Vulnerability Management is a comprehensive solution designed to help organizations identify and manage vulnerabilities and misconfigurations in their network devices. Here’s a detailed explanation of how it can be used to identify and remediate devices at risk:

Device Discovery and Inventory

The first step in managing vulnerabilities is to discover all devices within the network and maintain an up-to-date inventory. Microsoft Defender Vulnerability Management provides device discovery capabilities, ensuring that all devices are accounted for and assessed for vulnerabilities https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/3-explore-vulnerabilities-devices .

Vulnerability Assessment

Once devices are discovered, Microsoft Defender Vulnerability Management conducts a thorough vulnerability assessment. This assessment identifies known vulnerabilities and misconfigurations that could be exploited by attackers https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/3-explore-vulnerabilities-devices https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/2-understand-threat-vulnerability-management .

Configuration Assessment

In addition to identifying vulnerabilities, the solution assesses the security configuration of each device. It checks for misconfigurations and provides visibility into the organization’s security posture, reporting issues with actionable security recommendations https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/2-understand-threat-vulnerability-management .

Risk-Based Prioritization

Not all vulnerabilities pose the same level of risk. Microsoft Defender Vulnerability Management prioritizes vulnerabilities based on the risk they pose to the organization, allowing IT teams to focus on the most critical issues first https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/3-explore-vulnerabilities-devices .

Remediation Tracking and Continuous Monitoring

After identifying and prioritizing vulnerabilities, the solution tracks the remediation process. Continuous monitoring ensures that new vulnerabilities are detected promptly, and remediation efforts are updated accordingly https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/3-explore-vulnerabilities-devices .

Security Baselines Assessment

The solution can assess whether devices comply with security industry baselines, providing an additional layer of assurance that devices are configured according to best practices https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/3-explore-vulnerabilities-devices https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

Block Vulnerable Applications

To immediately mitigate risks, Microsoft Defender Vulnerability Management can block vulnerable applications until a proper patch or fix is applied, preventing potential exploitation https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/3-explore-vulnerabilities-devices https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

Remediation Handling

IT teams can submit new remediation requests, create tickets, and manage existing remediation activities. This includes creating exceptions, managing active exceptions, and applying immediate mitigation actions https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

Application Runtime Context

Understanding application usage patterns helps in better prioritization and decision-making. Microsoft Defender Vulnerability Management provides visibility into how applications are used, which is crucial for effective vulnerability management https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/2-understand-threat-vulnerability-management .

Manage Endpoint Threat Indicators

The solution allows for the management of endpoint threat indicators, which helps in identifying devices that may be at risk due to exposure to known threats https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

Live Response Capabilities

For immediate action, Microsoft Defender Vulnerability Management offers live response capabilities. This allows IT teams to start a live response session and perform commands on remote devices to address issues in real-time https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

For additional information on Microsoft Defender Vulnerability Management and its capabilities, you can refer to the following resources: - Microsoft Defender for Endpoint documentation - Threat and Vulnerability Management in Microsoft Defender for Endpoint

By leveraging these features, organizations can effectively identify devices at risk and take the necessary steps to remediate vulnerabilities, thereby enhancing their overall security posture.

Manage a security operations environment (25–30%)

Design and configure a Microsoft Sentinel workspace

Planning a Microsoft Sentinel Workspace

When planning a Microsoft Sentinel workspace, it is essential to consider several key aspects to ensure the workspace is configured optimally for your security needs. Below are the steps and considerations involved in planning a Microsoft Sentinel workspace:

  1. Workspace Configuration:
  2. Roles and Permissions:
  3. Data Storage Design:
  4. Provisioning the Workspace:
  5. Workspace Architecture:
  6. Ongoing Management:
    • Once the workspace is provisioned, it is important to manage it effectively. This includes monitoring the ingestion of data, adjusting configurations as needed, and ensuring that the workspace remains secure and compliant.

For additional information on planning a Microsoft Sentinel workspace, you can refer to the following resources: - Microsoft Sentinel documentation - Configure Microsoft Sentinel roles and permissions - Design and configure data storage and retention

By following these steps and considerations, you can plan a Microsoft Sentinel workspace that is well-suited to your organization’s security posture and operational needs.

Manage a security operations environment (25–30%)

Design and configure a Microsoft Sentinel workspace

Configure Microsoft Sentinel Roles

When configuring Microsoft Sentinel roles, it is essential to understand the role-based access control (RBAC) system that Azure employs to manage permissions. Microsoft Sentinel utilizes Azure RBAC to provide built-in roles that can be assigned to users, groups, and service principals within Azure https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/5-understand-azure-sentinel-permissions-roles .

Understanding Built-in Roles

All built-in roles in Microsoft Sentinel grant read access to the data within the workspace https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/5-understand-azure-sentinel-permissions-roles . These roles are designed to give you fine-grained control over what users can see and do within Microsoft Sentinel. It is important to assign the correct roles to members of your security operations team to ensure they have the appropriate level of access https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/5-understand-azure-sentinel-permissions-roles .

Microsoft Sentinel-specific Azure RBAC Roles

  • Microsoft Sentinel Contributor: Allows users to view, create, and manage all Microsoft Sentinel artifacts, but they cannot manage the workspace or assign roles.
  • Microsoft Sentinel Reader: Grants read-only access to Microsoft Sentinel data and artifacts.
  • Microsoft Sentinel Responder: Permits users to take actions on incidents, such as managing alerts and incidents.

Azure and Log Analytics Roles

In addition to Microsoft Sentinel-specific roles, other Azure and Log Analytics roles can impact access to the Microsoft Sentinel workspace:

  • Azure Roles:
    • Owner: Full access to all Azure resources, including the ability to assign roles.
    • Contributor: Can create and manage all types of Azure resources but cannot grant access to others.
    • Reader: Read-only access across Azure resources.
  • Log Analytics Roles:
    • Log Analytics Contributor: Can manage and configure Log Analytics workspaces.
    • Log Analytics Reader: Read-only access to Log Analytics workspace data.

It is important to note that roles like Azure Contributor can edit data in Microsoft Sentinel, which may not be desirable if you want to restrict permissions solely to Microsoft Sentinel. Therefore, it is crucial to carefully manage and remove any broader permissions that are not needed for Microsoft Sentinel to avoid unintentional access https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/5-understand-azure-sentinel-permissions-roles .

Best Practices for Role Assignments

For optimal security and functionality, assign these roles to the resource group that contains the Microsoft Sentinel workspace. This ensures that the roles apply to all supporting resources for Microsoft Sentinel, provided they are in the same resource group https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/5-understand-azure-sentinel-permissions-roles .

Additional Resources

For more detailed information on configuring Microsoft Sentinel roles, you can refer to the official Microsoft documentation:

Please note that while URLs are provided for additional information, they should be accessed and reviewed to ensure they align with the latest guidelines and practices from Microsoft.

Manage a security operations environment (25–30%)

Design and configure a Microsoft Sentinel workspace

Specify Azure RBAC Roles for Microsoft Sentinel Configuration

When configuring Microsoft Sentinel, it is crucial to understand the role-based access control (RBAC) provided by Azure to ensure proper access management to resources. Azure RBAC is a system that grants access to Azure resources based on the user’s role. Here’s a detailed explanation of how to specify Azure RBAC roles for Microsoft Sentinel:

Understanding Azure RBAC

Azure RBAC is a mechanism that helps you manage who has access to Azure resources, what they can do with those resources, and what areas they have access to. It provides built-in roles that can be assigned to users, groups, service principals, and managed identities within Azure https://learn.microsoft.com/security/benchmark/azure/baselines/content-delivery-network-security-baseline https://learn.microsoft.com/security/benchmark/azure/baselines/azure-app-configuration-security-baseline .

Microsoft Sentinel-specific Azure RBAC Roles

Microsoft Sentinel uses Azure RBAC to control access to its workspace. The roles can be assigned directly within the Microsoft Sentinel workspace or inherited from the subscription or resource group level https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/5-understand-azure-sentinel-permissions-roles . Here are the roles relevant to Microsoft Sentinel:

  • Owner: Full access to Microsoft Sentinel resources, including the ability to delegate access to others.
  • Contributor: Can create and manage all types of Azure resources but cannot grant access to others.
  • Reader: Can view existing Azure resources, including those in Microsoft Sentinel.

Log Analytics Azure RBAC Roles

Since Microsoft Sentinel is built on top of Azure Log Analytics, there are specific roles for Log Analytics that also apply to Microsoft Sentinel:

  • Log Analytics Contributor: Can manage Log Analytics workspaces, which includes the ability to edit or delete them.
  • Log Analytics Reader: Can view Log Analytics workspaces but cannot make any changes.

Best Practices for Role Assignments

When assigning roles, it is important to follow the principle of least privilege, ensuring users have only the access they need to perform their tasks. For example, a user with the Microsoft Sentinel Reader role combined with the Azure Contributor role can edit data in Microsoft Sentinel. To restrict access to Microsoft Sentinel only, you must carefully manage the user’s permissions and remove any broader permissions that are not required https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/5-understand-azure-sentinel-permissions-roles .

Additional Resources

For more information on Azure RBAC and role assignments, you can refer to the following resources:

By understanding and properly implementing Azure RBAC roles, you can ensure that your Microsoft Sentinel environment is secure and that users have appropriate access levels to perform their duties effectively.

Manage a security operations environment (25–30%)

Design and configure a Microsoft Sentinel workspace

When designing and configuring data storage for Microsoft Sentinel, it is important to consider the types of logs that will be collected and how long these logs will be retained. Microsoft Sentinel utilizes a Log Analytics workspace for data storage, and within this workspace, various types of logs can be stored. Here are the key considerations:

Log Types

Microsoft Sentinel categorizes logs into different types, each serving a specific purpose:

  • Analytics Logs: These logs are used for analysis and contain data that is typically queried and used in detections, investigations, and other analytics tasks.
  • Basic Logs: These logs contain less detailed data and are often used for basic monitoring and alerting.
  • Archive Logs: These are logs that are not actively queried but are retained for compliance or historical analysis purposes.

Each type of log has its own characteristics and use cases, and the choice of which log types to use will depend on the specific needs of the organization https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/7-configure-logs .

Log Retention

Log retention policies are crucial for managing the lifecycle of the data stored in Microsoft Sentinel. The retention period for each log type can be configured based on organizational requirements for data availability, compliance, and cost management. Here are the key points to consider:

Additional Considerations

For more detailed information on configuring Microsoft Sentinel data storage and log retention, you can refer to the following resources:

Please note that the URLs provided are for additional information and should be used to supplement the study material.

Manage a security operations environment (25–30%)

Design and configure a Microsoft Sentinel workspace

Manage Multiple Workspaces by Using Workspace Manager and Azure Lighthouse

When managing security operations across multiple Azure environments, it is essential to have tools that allow for centralized management and oversight. Microsoft provides two primary mechanisms for this purpose: Workspace Manager in Microsoft Sentinel and Azure Lighthouse.

Microsoft Sentinel Workspace Manager

Workspace Manager is a feature within Microsoft Sentinel that enables centralized management of multiple Microsoft Sentinel workspaces across one or more Azure tenants. By using Workspace Manager, you can:

  • Consolidate content items such as analytics rules, hunting queries, and workbooks.
  • Publish these items at scale to Member workspaces, ensuring consistency in security operations.
  • Manage workspaces centrally from a single pane of glass, the Central workspace.

To enable Workspace Manager, you need to access the Configuration settings within Microsoft Sentinel and turn on the feature for your Central workspace https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/4-manage-workspaces-across-tenants-using-azure-lighthouse .

Azure Lighthouse

Azure Lighthouse offers a different approach, focusing on cross-tenant management capabilities. It is particularly useful when you need to manage Microsoft Sentinel workspaces that are not within your own tenant. With Azure Lighthouse, you can:

  • Gain access to and manage resources across different Azure tenants.
  • Use a single Azure portal login to manage multiple customers or internal departments with varying levels of responsibilities and access.
  • Onboard Azure Lighthouse to allow the service provider or internal IT team to select all subscriptions containing workspaces they manage using the directory + subscription selector.

Implementing Azure Lighthouse involves onboarding the service, after which you can manage the workspaces from the Azure portal without the need to sign in to each tenant separately https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/2-plan-for-azure-sentinel-workspace https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/4-manage-workspaces-across-tenants-using-azure-lighthouse .

For additional information on managing multiple workspaces and implementing these features, you can refer to the following resources:

By leveraging Workspace Manager and Azure Lighthouse, organizations can streamline their security operations, maintain consistency across workspaces, and efficiently manage resources at scale.

Manage a security operations environment (25–30%)

Ingest data sources in Microsoft Sentinel

Identify Data Sources to be Ingested for Microsoft Sentinel

When configuring Microsoft Sentinel, it is crucial to identify and understand the various data sources that can be ingested into the platform. Microsoft Sentinel is designed to collect, detect, investigate, and respond to security threats across a wide range of data sources. Here is a detailed explanation of the types of data sources that can be integrated with Microsoft Sentinel:

  1. Azure Resources: Utilize Microsoft Sentinel connectors to ingest data from Azure resources. This includes leveraging Azure Policy and diagnostic settings to ensure that relevant security data is collected from your Azure environment https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  2. Microsoft 365 Defender and Defender for Cloud: Configure connectors for Microsoft 365 Defender and Microsoft Defender for Cloud to ingest security data related to your Microsoft 365 and cloud environments. This allows Sentinel to analyze and respond to threats across your Microsoft services https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  3. Syslog and Common Event Format (CEF) Event Collections: Design and configure the collection of Syslog and CEF events. These are standard formats for logging information in many non-Microsoft systems and devices, allowing Sentinel to process and analyze security data from a variety of third-party sources https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  4. Windows Security Event Collections: Configure the collection of Windows security events. This involves gathering logs from Windows-based systems to monitor and respond to activities within your Windows environment https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  5. Threat Intelligence Connectors: Integrate threat intelligence feeds by configuring the appropriate connectors. This enables Sentinel to ingest data about emerging threats and indicators of compromise (IoCs), enhancing its ability to detect and respond to advanced threats https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  6. Custom Log Tables: Create custom log tables in the Microsoft Sentinel workspace to store and manage the ingested data. This allows for the organization and retention of data according to your specific requirements and use cases https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  7. Third-Party Data Sources: Microsoft Sentinel also supports the ingestion of data from selected third-party sources that align with the platform’s threat detection scenarios. This ensures that Sentinel can provide comprehensive security coverage across both Microsoft and non-Microsoft data sources https://learn.microsoft.com/en-us/training/modules/use-entity-behavior-analytics-azure-sentinel/2-understand-user-entity-behavior-analytics .

  8. Watchlists: Utilize Microsoft Sentinel watchlists to collect data from external data sources for correlation with events in your Sentinel environment. Watchlists can be used for rapid import of data such as IP addresses and file hashes, and can be leveraged in various Sentinel features like detection rules and threat hunting https://learn.microsoft.com/en-us/training/modules/use-watchlists-azure-sentinel/2-plan-for-azure-watchlists .

  9. Data Connectors with Workbooks: Many of the data connectors used by Microsoft Sentinel come with their own workbooks, which provide insights into the ingested data through tables and visualizations. These workbooks can be used as-is or customized to fit specific analysis needs https://learn.microsoft.com/en-us/training/modules/query-data-sentinel/5-workbooks .

For additional information on configuring data sources for Microsoft Sentinel, you can refer to the following resources:

By carefully selecting and configuring the appropriate data sources, you can maximize the effectiveness of Microsoft Sentinel in your security operations.

Manage a security operations environment (25–30%)

Ingest data sources in Microsoft Sentinel

Configure and Use Microsoft Connectors for Azure Resources

When configuring and using Microsoft connectors for Azure resources, it is essential to understand the role of Azure Policy and diagnostic settings in the context of Microsoft Sentinel. Microsoft Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution. It delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response.

Azure Policy

Azure Policy helps enforce organizational standards and assess compliance at scale. Through its integration with Microsoft Sentinel, you can ensure that your Azure resources are compliant with the policies you have set. This integration is crucial for maintaining the security posture of your resources and for automating responses to policy violations.

To configure Azure Policy with Microsoft Sentinel:

  1. In the Azure portal, navigate to Microsoft Sentinel > Data connectors.
  2. Select the Azure Policy connector from the list.
  3. On the connector page, follow the instructions provided to configure the Azure Policy settings.
  4. Enable the connector to start ingesting data related to Azure Policy compliance status and policy changes into Microsoft Sentinel.

Diagnostic Settings

Diagnostic settings in Azure allow you to specify the destination for your resource logs and metrics. These settings are vital for monitoring the activities and performance of your Azure resources. By configuring diagnostic settings to send logs to Microsoft Sentinel, you can analyze this data for security insights and potential threats.

To configure diagnostic settings for Microsoft Sentinel:

  1. Navigate to the Azure resource for which you want to enable diagnostic settings.
  2. In the resource menu, select Diagnostic settings.
  3. Click on Add diagnostic setting and provide a name for the setting.
  4. Select the log categories you want to collect and the destination where the logs should be sent. For integration with Microsoft Sentinel, choose the Send to Log Analytics workspace option.
  5. Select the appropriate Log Analytics workspace where Microsoft Sentinel is enabled.
  6. Save the diagnostic setting to start collecting and analyzing resource logs with Microsoft Sentinel.

By configuring both Azure Policy and diagnostic settings to work with Microsoft Sentinel, you can enhance your security operations’ efficiency and effectiveness. These connectors provide a streamlined approach to monitoring compliance and analyzing resource logs for potential security threats.

For additional information on configuring and using Microsoft connectors for Azure resources, you can refer to the following resources:

Please note that the URLs provided are for reference purposes and are part of the study material to help understand the configuration process in greater detail.

Manage a security operations environment (25–30%)

Ingest data sources in Microsoft Sentinel

Configure Bidirectional Synchronization between Microsoft Sentinel and Microsoft Defender XDR

Bidirectional synchronization between Microsoft Sentinel and Microsoft Defender for Endpoint, part of the Microsoft Defender XDR suite, is a crucial process for ensuring that security alerts and incidents are consistently managed across both platforms. This synchronization allows for a seamless flow of information, enabling security analysts to track and respond to threats effectively.

Steps for Configuration:

  1. Access Microsoft Sentinel: Begin by navigating to the Microsoft Sentinel dashboard within the Azure portal.

  2. Open Data Connectors: Locate and select the ‘Data connectors’ tab to view available connectors.

  3. Select Microsoft Defender for Cloud: From the list of connectors, choose ‘Microsoft Defender for Cloud’ to integrate with Microsoft Defender XDR components.

  4. Open Connector Page: Click on the ‘Open connector’ page to proceed with the configuration settings.

  5. Enable the Connect Toggle: Within the connector page, activate the ‘Connect’ toggle for the specific subscription you wish to synchronize.

  6. Choose Bidirectional Sync: Opt for the ‘Bi-directional’ sync option to allow data to flow from Microsoft Sentinel to Microsoft Defender for Endpoint and vice versa.

Considerations:

  • Understand Data Ingestion: It’s important to comprehend how data is ingested by each connector and whether the connector supports bi-directional syncing of incidents.

  • Connector Types: Determine if you need to ingest raw log data for advanced hunting and entity analysis, and then enable the appropriate connectors.

  • Legacy Connectors: Be aware that some connectors, such as Microsoft Defender for Cloud Apps, are now considered legacy connectors and may have different configuration steps or capabilities.

Additional Resources:

For more detailed instructions and information on configuring bidirectional synchronization between Microsoft Sentinel and Microsoft Defender XDR, you can refer to the following resources:

By following these steps and considerations, you can effectively configure bidirectional synchronization between Microsoft Sentinel and Microsoft Defender XDR, enhancing your organization’s security posture and incident response capabilities https://learn.microsoft.com/en-us/training/modules/connect-microsoft-defender-365-to-azure-sentinel/4-connect-microsoft-defender-cloud-connector https://learn.microsoft.com/en-us/training/modules/connect-microsoft-defender-365-to-azure-sentinel/2-plan-for-microsoft-365-defender-connectors .

Manage a security operations environment (25–30%)

Ingest data sources in Microsoft Sentinel

To configure bidirectional synchronization between Microsoft Sentinel and Microsoft Defender for Cloud, follow these steps:

  1. Access Microsoft Sentinel: Begin by navigating to the Microsoft Sentinel dashboard within the Azure portal.

  2. Open Data Connectors: Locate and select the ‘Data connectors’ page in Microsoft Sentinel to view the available connectors.

  3. Select Microsoft Defender for Cloud: Find the Microsoft Defender for Cloud connector from the list and click on it to open the connector’s configuration page.

  4. Open Connector Page: On the preview pane that appears, select the Open connector page to proceed with the setup.

  5. Enable Connection: Within the connector page, you will find a Connect toggle for the subscription you wish to synchronize. Turn this toggle on to initiate the connection.

  6. Choose Bidirectional Sync: Select the Bi-directional sync option to ensure that the synchronization between Microsoft Sentinel and Microsoft Defender for Cloud works both ways. This means that any alerts and incidents detected by Microsoft Defender for Cloud can be streamed into Microsoft Sentinel and vice versa.

  7. Finalize Configuration: Complete any additional configuration settings as required and save your changes to establish the bidirectional synchronization.

By setting up bidirectional synchronization, you enable a seamless integration where both Microsoft Sentinel and Microsoft Defender for Cloud can share and utilize security alerts and incident data. This integration allows for a more comprehensive security management approach, leveraging the strengths of both services for enhanced threat detection, investigation, and response capabilities https://learn.microsoft.com/en-us/training/modules/connect-microsoft-defender-365-to-azure-sentinel/4-connect-microsoft-defender-cloud-connector .

For additional information on configuring Microsoft Sentinel and Microsoft Defender for Cloud, you can refer to the official Microsoft documentation:

Please note that it is important to use the same workspace for both Microsoft Sentinel and Microsoft Defender for Cloud to ensure that all logs collected by Microsoft Defender for Cloud can also be ingested and used by Microsoft Sentinel https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/2-plan-for-azure-sentinel-workspace . If you are planning to add Microsoft Sentinel to a workspace that is already receiving alerts from Microsoft Defender for Cloud, you must decide whether to leave the Security Events collection as is or disable it in Defender for Cloud and add the Security Events connector in Microsoft Sentinel https://learn.microsoft.com/en-us/training/modules/connect-azure-assets-to-azure-defender/3-configure-auto-provisioning .

Manage a security operations environment (25–30%)

Ingest data sources in Microsoft Sentinel

Plan and Configure Syslog and Common Event Format (CEF) Event Collections

When planning and configuring Syslog and Common Event Format (CEF) event collections, it is essential to understand the roles these protocols play in centralized logging and event management, particularly in the context of Microsoft Sentinel.

Syslog Event Collections

Syslog is a standard protocol used to send system log or event messages to a specific server, called a Syslog server. It is widely used on Linux and Unix systems for logging information:

Common Event Format (CEF) Event Collections

CEF is an extension of the Syslog protocol that provides a standardized syntax for log records. It is used by various security devices to enable interoperability among different systems:

Configuration Steps

  1. Access Data Connectors Page: Navigate to the Data connectors page in Microsoft Sentinel to find and configure the connectors for Syslog and CEF https://learn.microsoft.com/en-us/training/modules/connect-common-event-format-logs-to-azure-sentinel/3-connect-your-external-solution-use-common-event-format-connector .
  2. Open Connector Page: Select the appropriate connector (Syslog or CEF) and open the connector page to begin configuration https://learn.microsoft.com/en-us/training/modules/connect-common-event-format-logs-to-azure-sentinel/3-connect-your-external-solution-use-common-event-format-connector .
  3. Verify Permissions: Ensure that you have the necessary permissions as outlined in the prerequisites section of the connector page https://learn.microsoft.com/en-us/training/modules/connect-common-event-format-logs-to-azure-sentinel/3-connect-your-external-solution-use-common-event-format-connector .
  4. Install and Configure Forwarder: For CEF, use the provided command to install and configure the log forwarder on a dedicated Linux VM https://learn.microsoft.com/en-us/training/modules/connect-common-event-format-logs-to-azure-sentinel/3-connect-your-external-solution-use-common-event-format-connector .
  5. Create Custom Log Tables: In Microsoft Sentinel, create custom log tables to store the ingested data from Syslog and CEF sources https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

Considerations

  • Permissions: Verify that the necessary permissions are in place to configure connectors and forwarders.
  • Event Collection Design: Design the event collection strategy to minimize network traffic and ensure efficient log management.
  • Security: Ensure that the event collection process is secure and that sensitive data is handled appropriately.

For additional information on configuring Syslog and CEF event collections in Microsoft Sentinel, you can refer to the following resources:

By following these guidelines, you can effectively plan and configure Syslog and CEF event collections for centralized logging and event management with Microsoft Sentinel.

Manage a security operations environment (25–30%)

Ingest data sources in Microsoft Sentinel

Plan and Configure Collection of Windows Security Events Using Data Collection Rules

When planning and configuring the collection of Windows Security events, it is essential to understand the different methods and connectors available to stream events to Microsoft Sentinel. Data Collection Rules (DCRs) play a crucial role in this process, allowing for the management of collection settings at scale and the ability to build custom filters for precise event ingestion.

Windows Event Forwarding (WEF)

Windows Event Forwarding (WEF) is a method that involves configuring a Windows Event Collector device to receive events from Windows devices. The collector device then forwards these events to Microsoft Sentinel using the Windows Forwarded Events connector. This approach is beneficial for organizations that prefer not to install agents on each Windows device https://learn.microsoft.com/en-us/training/modules/connect-windows-hosts-to-azure-sentinel/2-plan-for-windows-hosts-security-events-connector .

Data Collection Rules (DCRs)

DCRs define the data to be collected from each agent. They offer two distinct advantages:

  1. Manage Collection Settings at Scale: DCRs are independent of the workspace and the virtual machine, allowing for unique, scoped configurations for subsets of machines. They can be defined once and reused across different machines and environments https://learn.microsoft.com/en-us/training/modules/connect-windows-hosts-to-azure-sentinel/2a-configure-data-collection-rules .

  2. Build Custom Filters: DCRs enable the creation of custom filters to select the exact events to ingest. The Azure Monitor Agent uses these rules to filter data at the source, ensuring that only the desired events are ingested https://learn.microsoft.com/en-us/training/modules/connect-windows-hosts-to-azure-sentinel/2a-configure-data-collection-rules .

Configuring DCRs

To configure DCRs for Windows Security events, follow these steps:

  1. Navigate to Microsoft Sentinel and select ‘Data connectors’.
  2. Choose the ‘Windows Security Events via AMA connector’ and open the connector page.
  3. Ensure you have the necessary permissions as outlined in the prerequisites section.
  4. Under ‘Configuration’, select ‘+Add data collection rule’ to start the wizard.
  5. Provide a rule name and specify the subscription and resource group for the DCR.
  6. Add resources (machines) to which the DCR will apply. This can include Azure virtual machines and Azure Arc-enabled servers.
  7. On the ‘Collect’ tab, choose the type of events to collect: All security events, Common, Minimal, or Custom. Custom collection allows for specifying logs or filtering events using XPath queries.
  8. Review the settings and create the DCR once validation is passed https://learn.microsoft.com/en-us/training/modules/connect-windows-hosts-to-azure-sentinel/2a-configure-data-collection-rules .

Event Collection Options

The following event collection options are available:

Additional Information

For more detailed information on configuring Windows Security Events connectors and DCRs, you can refer to the following resources:

By following these guidelines, you can effectively plan and configure the collection of Windows Security events to enhance your organization’s security posture and operational capabilities within Microsoft Sentinel.

Manage a security operations environment (25–30%)

Ingest data sources in Microsoft Sentinel

Configure Threat Intelligence Connectors

Threat intelligence connectors are essential for enhancing the capabilities of Microsoft Sentinel by allowing it to ingest threat indicators from various sources. These connectors enable security analysts to detect, prioritize, and respond to known threats more effectively. Below is a detailed explanation of how to configure different types of threat intelligence connectors in Microsoft Sentinel.

TAXII Connector

The TAXII connector allows Microsoft Sentinel to integrate with TAXII 2.0 and 2.1 data sources. To configure the TAXII connector:

  1. In the Azure portal, navigate to Microsoft Sentinel > Data connectors.
  2. Select the Threat Intelligence - TAXII connector.
  3. On the preview pane, select Open connector page.
  4. Enter the required information such as Friendly name, API root URL, Collection ID, Username, and Password.
  5. Click Add to establish the connection https://learn.microsoft.com/en-us/training/modules/connect-threat-indicators-to-azure-sentinel/3-connect-threat-intelligence-taxii-connector .

Threat Intelligence Platforms Connector

For integrating Threat Intelligence Platform (TIP) products:

  1. Register an application in Microsoft Entra ID to obtain an application ID, secret, and tenant ID.
  2. Configure API permissions for the application by adding the ThreatIndicators.ReadWrite.OwnedBy permission.
  3. Obtain admin consent for the application from your Microsoft Entra tenant administrator.
  4. Configure your TIP product or app to send indicators to Microsoft Sentinel using the registered application’s credentials.
  5. In the Azure portal, navigate to Microsoft Sentinel > Data connectors and select the Threat Intelligence Platforms (Preview) connector.
  6. Click Open connector page, then Connect to finalize the setup https://learn.microsoft.com/en-us/training/modules/connect-threat-indicators-to-azure-sentinel/4-connect-threat-intelligence-platforms-connector .

Upload Indicators API

To use the Microsoft Graph Security tiIndicators API for direct integration:

  1. Follow the same initial steps as for the TIP connector to register an application and configure API permissions.
  2. Set up your application or TIP product to send indicators directly to Microsoft Sentinel through the API.
  3. Specify the action as “alert” and target the product as Microsoft Sentinel https://learn.microsoft.com/en-us/training/modules/connect-threat-indicators-to-azure-sentinel/4-connect-threat-intelligence-platforms-connector .

MISP Connector

While the retrieved documents do not provide specific steps for configuring a MISP (Malware Information Sharing Platform & Threat Sharing) connector, the general process would involve:

  1. Setting up a MISP instance and obtaining the necessary API credentials.
  2. Configuring Microsoft Sentinel to connect to the MISP instance using the provided credentials.
  3. Mapping the MISP attributes to the corresponding fields in Microsoft Sentinel to ensure proper ingestion of threat indicators.

For additional information on configuring threat intelligence connectors in Microsoft Sentinel, you can refer to the following URLs:

Please note that the URLs provided are for reference and additional information; they should not be included in the study guide.

Manage a security operations environment (25–30%)

Ingest data sources in Microsoft Sentinel

Create Custom Log Tables in the Workspace to Store Ingested Data

When working with Azure Monitor Logs, it’s often necessary to ingest custom data that doesn’t fit into any of the predefined log categories. To accommodate this data, you can create custom log tables in your Log Analytics workspace. These tables allow you to store, manage, and analyze data that is specific to your organization’s needs.

Steps to Create Custom Log Tables:

  1. Identify Data Sources: Determine the sources of the data you wish to ingest. This could be anything from text files to data streams from applications or other cloud services https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  2. Configure Data Collection: Use the Data Collection Rule (DCR)-based custom logs API to configure how data is collected and sent to your Log Analytics workspace. This involves specifying the data source, format, and frequency of data collection https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/7-configure-logs .

  3. Define Table Schema: When creating a custom log table, you need to define the schema that matches the structure of your data. This includes the columns and data types that will be used to store your data in the table https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  4. Ingest Data: After setting up the collection and defining the schema, ingest the data into the custom log table. The data will be stored in the workspace and will be available for querying and analysis https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  5. Query and Analyze Data: Use Kusto Query Language (KQL) to query and analyze the data in your custom log tables. You can create complex queries to gain insights from your data https://learn.microsoft.com/en-us/azure/azure-app-configuration/monitor-app-configuration .

  6. Manage Access and Retention: Configure access controls to manage who can view or modify the data in the custom log tables. Also, set up retention policies to determine how long the data should be kept in the workspace.

Additional Information:

By creating custom log tables, you can extend the capabilities of Azure Monitor Logs to fit your specific monitoring and analysis needs. This flexibility allows for a more tailored approach to managing and understanding the data generated by your applications and services.

For further details on creating and managing custom log tables, as well as writing Kusto queries, you can refer to the following resources:

Configure protections and detections (15–20%)

Configure protections in Microsoft Defender security technologies

Configure Policies for Microsoft Defender for Cloud Apps

Microsoft Defender for Cloud Apps is a Cloud Access Security Broker (CASB) that operates as an intermediary between users and cloud services, allowing organizations to enforce security policies and monitor their cloud environment. To effectively use Microsoft Defender for Cloud Apps, it is essential to configure policies that will help protect against threats and control data in real-time.

Investigating and Remediating Threats

Defender for Cloud Apps provides capabilities to investigate, respond, and remediate threats across various Microsoft services, including Teams, SharePoint Online, OneDrive, and email through Microsoft Defender for Office 365. It also allows for the investigation and response to alerts generated by Data Loss Prevention (DLP) and insider risk policies https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

App Discovery and Management

The platform enables the discovery and management of apps using its capabilities. This is crucial for identifying and mitigating security risks associated with cloud app usage within an organization https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

Anomaly Detection Policies

Anomaly detection policies in Microsoft Defender for Cloud Apps are designed to detect a range of security issues, helping to identify unusual behavior that may indicate a security threat https://learn.microsoft.com/en-us/training/modules/microsoft-cloud-app-security/detect-threats .

Conditional Access App Control

Conditional Access App Control is a feature that integrates with identity providers to protect data and devices with access and session controls. It allows for real-time monitoring and control over user app access and sessions. By setting conditions in Microsoft Entra Conditional Access, organizations can enforce access and session controls selectively based on user identity, cloud apps, and location or network https://learn.microsoft.com/en-us/training/modules/microsoft-cloud-app-security/conditional-access-app-control .

Access and Session Policies

Within the Defender for Cloud Apps portal, access and session policies can be used to refine filters and set actions for user activities. These policies are crucial for maintaining control over how users interact with cloud apps and ensuring that data is protected in accordance with organizational policies https://learn.microsoft.com/en-us/training/modules/microsoft-cloud-app-security/conditional-access-app-control .

Integration with Microsoft Solutions

Microsoft Defender for Cloud Apps is designed to integrate seamlessly with other Microsoft solutions, providing a centralized management experience and innovative automation capabilities. This integration helps in identifying and combating cyberthreats across both Microsoft and third-party cloud services https://learn.microsoft.com/en-us/training/modules/microsoft-cloud-app-security/cloud-app-security-framework .

Integration with Microsoft Defender for Identity

Integrating Microsoft Defender for Cloud Apps with Microsoft Defender for Identity allows for visibility into on-premises activities and provides advanced insights by combining alerts and suspicious activities across cloud and on-premises environments. This integration also enables policies from Microsoft Defender for Identity to appear on the Defender for Cloud Apps policies page https://learn.microsoft.com/en-us/training/modules/m365-threat-safeguard/integrate-microsoft-tools .

For additional information on configuring policies for Microsoft Defender for Cloud Apps, you can refer to the following resources:

By configuring and utilizing these policies, organizations can enhance their security posture and protect against potential threats in their cloud environments.

Configure protections and detections (15–20%)

Configure protections in Microsoft Defender security technologies

Configure Policies for Microsoft Defender for Office 365

Microsoft Defender for Office 365 is a comprehensive solution designed to help organizations protect their enterprise environment from a variety of threats. Configuring policies in Microsoft Defender for Office 365 is a critical step in establishing a robust security posture. Here’s a detailed explanation of how to configure these policies:

1. Accessing the Microsoft 365 Defender Portal

To configure policies for Microsoft Defender for Office 365, security teams should begin by accessing the Microsoft 365 Defender portal. This is the centralized interface where all policy configurations are managed.

2. Defining Protection Policies

Within the portal, security teams can define protection policies that determine the behavior and level of protection against predefined threats. These policies are highly flexible and can be set at various levels, including user, organization, recipient, and domain levels https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/configure-protect-detect .

3. Regular Policy Review

It is important to review these policies regularly to adapt to new threats and challenges that emerge daily. This ensures that the organization’s defenses remain current and effective https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/configure-protect-detect .

4. Anti-Phishing Policies

Microsoft Defender for Office 365 includes anti-phishing policies that check incoming messages for indicators of phishing attempts. These policies utilize multiple machine learning models to analyze messages and take action based on the configured policies. When creating an anti-phishing policy, settings such as user and domain protection, actions for protected users, safety tips, trusted senders, and anti-spoofing settings can be configured https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/configure-protect-detect .

5. Safe Attachments Policy

The Safe Attachments policy in Microsoft Defender for Office 365 protects against unknown malware and viruses by routing messages and attachments without known signatures to a special environment for analysis. Here, various techniques are used to detect malicious intent. If no suspicious activity is found, the message is released for delivery https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/configure-protect-detect .

6. Impacted Assets

It is also crucial to understand how assets are impacted by threats. The Impacted assets tab in the Microsoft Defender portal lists endpoints with unresolved alerts and mailboxes that have received messages triggering alerts. This helps in identifying and responding to threats in a timely manner https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/11-analyze-threat-analytics .

For additional information on configuring policies for Microsoft Defender for Office 365, please refer to the following resources:

By following these guidelines and utilizing the provided resources, organizations can effectively configure policies to protect against a wide range of threats with Microsoft Defender for Office 365.

Configure protections and detections (15–20%)

Configure protections in Microsoft Defender security technologies

Configure Security Policies for Microsoft Defender for Endpoints, including Attack Surface Reduction (ASR) Rules

When configuring security policies for Microsoft Defender for Endpoints, it is crucial to understand the role of Attack Surface Reduction (ASR) rules. ASR rules are designed to prevent actions that malware often abuses to compromise devices and networks. Here’s a step-by-step guide on how to configure these policies:

  1. Access the Microsoft 365 Defender Portal: To begin, you need to access the Microsoft 365 Defender portal. Ensure you have the necessary administrative privileges, such as being a global administrator or security administrator.

  2. Navigate to Endpoint Security: Once in the portal, navigate to the ‘Endpoint security’ section. This is where you can manage various security policies related to Microsoft Defender for Endpoints.

  3. Manage ASR Rules: Within the Endpoint security section, look for the ‘Attack surface reduction’ policy. Here you can manage and configure ASR rules. ASR rules help reduce the attack surface of your applications and services running on the endpoint.

  4. Create or Edit a Policy: You can either create a new policy or edit an existing one. When creating or editing a policy, you will be able to select which ASR rules to enable. Each rule targets specific behaviors malware typically exploits.

  5. Configure ASR Rule Settings: For each ASR rule, you can configure its settings. You can set the rule to ‘Block’, ‘Audit’, or ‘Warn’. ‘Block’ will prevent the behavior, ‘Audit’ will allow the behavior but record it for review, and ‘Warn’ will allow the behavior but notify the user.

  6. Assign the Policy: After configuring the ASR rules, assign the policy to the appropriate device groups within your organization. Ensure that the policy targets the devices that require protection.

  7. Monitor and Review: Regularly monitor the effectiveness of your ASR rules through the security reports in the Microsoft 365 Defender portal. Review the audit data and adjust your policies as needed to ensure optimal protection.

For additional information on configuring security policies and ASR rules in Microsoft Defender for Endpoints, you can refer to the following resources:

By following these steps and utilizing the provided resources, you can effectively configure security policies for Microsoft Defender for Endpoints, including the implementation of ASR rules to enhance your organization’s security posture.

Configure protections and detections (15–20%)

Configure protections in Microsoft Defender security technologies

Configure Cloud Workload Protections in Microsoft Defender for Cloud

When configuring cloud workload protections in Microsoft Defender for Cloud, it is essential to follow a structured approach to ensure that Azure and hybrid cloud workloads are adequately protected. Below are the steps and considerations for setting up workload protections:

  1. Plan and Configure Settings:
  2. Enable Protection Plans:
  3. Automated Onboarding:
  4. Connect Resources with Azure Arc:
  5. Connect Multi-Cloud Resources:
  6. Workload-Specific Protections:
  7. Assess and Recommend:
  8. Monitor and Respond to Threats:
  9. Security Posture Management:
  10. Streamline Security Management:

For additional information on configuring cloud workload protections in Microsoft Defender for Cloud, you can refer to the following resources: - Understand Azure Defender for Cloud Workload Protection - Microsoft Defender for Cloud Documentation

By following these steps, you can ensure that your cloud workloads are protected with Microsoft Defender for Cloud’s advanced security features.

Configure protections and detections (15–20%)

Configure detection in Microsoft Defender XDR

Configure and Manage Custom Detections

Custom detections are a critical component of an organization’s security posture, allowing for the identification of specific threats that are unique to the environment. By configuring and managing custom detections, security teams can tailor the detection rules to their specific needs, enhancing the overall effectiveness of their security operations.

Steps to Configure Custom Detections:

  1. Define the Detection Logic: Utilize the Kusto Query Language (KQL) to create queries that will serve as the basis for your custom detection rules. These queries should be designed to identify the specific behaviors or patterns that indicate a potential security threat https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  2. Create Custom Detection Rules: In the Microsoft 365 Defender portal, navigate to the section for managing custom detections and alerts. Here, you can create new rules by specifying the KQL queries you’ve developed, along with additional parameters such as severity levels and response actions https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  3. Set Alert Details: Configure the alert settings by providing a name, description, and severity for the alert. This information will help security analysts quickly understand the nature of the alert when it is triggered https://learn.microsoft.com/en-us/training/modules/configure-settings-for-alerts-detections-microsoft-defender-for-endpoint/8-summary-resources .

  4. Manage Notifications: Determine how notifications should be sent when an alert is triggered. This could include email notifications, integration with ticketing systems, or other communication channels.

  5. Test and Refine: After configuring the custom detection rule, it is important to test its effectiveness. Monitor the alerts generated and refine the detection logic as necessary to reduce false positives and ensure that real threats are accurately identified.

  6. Review and Update: Security threats are constantly evolving, so it is essential to regularly review and update custom detection rules to adapt to new threat patterns and tactics.

Additional Resources:

For more detailed guidance on configuring custom detections and alerts, you can refer to the following resources:

By following these steps and utilizing the available resources, security teams can effectively configure and manage custom detections to protect their organization from specific and emerging threats.

Configure protections and detections (15–20%)

Configure detection in Microsoft Defender XDR

Configure Alert Tuning

Alert tuning is a critical process in managing the effectiveness and efficiency of a security operations center (SOC). It involves adjusting the settings of alert rules to reduce false positives and ensure that the most critical threats are highlighted. Proper alert tuning helps analysts focus on genuine threats and improves the overall security posture of an organization.

When configuring alert tuning, consider the following steps:

  1. Assess Alert Volume and Validity: Review the current volume of alerts and determine the percentage of false positives. This will help identify which alerts need tuning.

  2. Prioritize Alerts by Severity: Use the severity levels (High, Medium, Low, or Informational) to prioritize alerts. This ensures that the most critical alerts are addressed first https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/5-create-rule-from-templates .

  3. Filter Alerts by Source: Specify the source of the alert, such as Microsoft security services, to focus on alerts relevant to your environment https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/5-create-rule-from-templates .

  4. Include or Exclude Specific Alerts: Add keywords to include or exclude alerts based on specific text in their names. This helps in refining the alerts to those that are most pertinent to your security needs https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/5-create-rule-from-templates .

  5. Utilize Analytics Rules: In Microsoft Sentinel, create and implement analytics rules from existing templates or create new rules and queries using the wizard. This allows for the customization of alert rules to better match the threat landscape and organizational requirements https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/1-introduction .

  6. Regular Review and Update: Continuously monitor the effectiveness of the tuned alerts and make adjustments as necessary. The threat landscape is always evolving, and so should your alert configurations.

For additional information on configuring alert tuning, you can refer to the following resources:

By following these steps and utilizing the available tools and resources, you can effectively tune alerts to enhance your organization’s security operations.

Configure protections and detections (15–20%)

Configure detection in Microsoft Defender XDR

Configure Deception Rules in Microsoft Defender XDR

Deception technology is a defensive mechanism used to detect, analyze, and defend against attacks by creating traps or decoys that mimic legitimate technology assets. In the context of Microsoft Defender for Endpoint, part of the Microsoft Defender XDR (Extended Detection and Response) suite, deception rules can be configured to enhance threat detection capabilities.

To configure deception rules in Microsoft Defender XDR, follow these general steps:

  1. Access Microsoft Defender Security Center: Begin by logging into the Microsoft Defender Security Center portal. This is the centralized management console for Microsoft Defender for Endpoint.

  2. Navigate to Deception Tools: Within the portal, look for the section dedicated to deception tools. This might be found under the advanced features or settings menu.

  3. Create Deception Campaigns: Set up deception campaigns by configuring decoy accounts, credentials, and devices. These decoys should resemble your real assets but are designed to lure attackers.

  4. Customize Deception Configuration: Customize the deception configurations to match your environment’s complexity and operational needs. This includes setting up honey tokens, fake files, and configuring network decoys.

  5. Set Alert Rules: Determine the conditions under which an alert should be triggered when a decoy is interacted with. Configure the alert settings to notify the security team of any suspicious activities.

  6. Deploy Deception on the Network: Once the deception rules are configured, deploy them across the network. Ensure that they are strategically placed to detect lateral movements and other attack behaviors.

  7. Monitor and Respond: Regularly monitor the alerts generated by the deception rules. Analyze the interactions with the decoys to understand the tactics, techniques, and procedures (TTPs) of the attackers.

  8. Update and Maintain: Keep the deception rules and configurations up to date with the changing network environment and evolving threat landscape.

For additional information on configuring deception rules and using Microsoft Defender for Endpoint within the Microsoft Defender XDR framework, you can refer to the official Microsoft documentation:

Please note that the URLs provided are for reference purposes to supplement the study guide material. It is important to consult the latest Microsoft documentation for the most current information and detailed guidance on configuring deception rules in Microsoft Defender XDR.

Configure protections and detections (15–20%)

Configure detections in Microsoft Sentinel

Classify and Analyze Data by Using Entities

Entities are critical components in data classification and analysis, especially in the context of security event management. They represent key pieces of information extracted from data, such as user identities, hostnames, or IP addresses, which can be used to perform in-depth analysis and facilitate a visual investigation of incidents.

Understanding Entities

Entities are derived from query results and can be defined to represent various types of information. For example, in a security event log, entities might include:

  • User Entity: Represents a user involved in an event, which could be identified by a username or account details.
  • Host Entity: Represents a machine or server involved in an event, typically identified by a hostname or a unique identifier.
  • IP Address Entity: Represents the network address involved in an event, which could be crucial for identifying the source or target of network activity.

Entity Mapping

In the Entity mapping section of a query rule, you can define up to five entities from your query results https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/6-create-rule-from-wizard . This mapping is essential for correlating events and understanding the relationships between different data points. For instance, if an alert is triggered, the mapped entities can be used to quickly identify the relevant user or host involved, streamlining the investigation process.

Utilizing Entities for Analysis

Once entities are defined, they can be used to classify and analyze data more effectively. By grouping related events based on entities, analysts can:

  • Visualize patterns of behavior or activity.
  • Identify anomalies or suspicious trends.
  • Investigate incidents with greater context and clarity.

Entities also play a significant role in security orchestration and automated response (SOAR) systems, where they can be used to automate certain actions based on predefined criteria.

Advanced Security Information Model (ASIM) Parsers

The Advanced Security Information Model (ASIM) parsers are used to query Microsoft Sentinel data https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 . ASIM aligns with the Open Source Security Events Metadata (OSSEM) common information model, which standardizes security event logs from various data sources and operating systems https://learn.microsoft.com/en-us/training/modules/data-normalization-microsoft-sentinel/2-understand . This standardization allows for predictable correlation of entities across normalized tables, making it easier for security analysts to query and analyze data.

Practical Example

A practical example of using entities in a query can be seen in Microsoft Sentinel, where a query might look like this:

AzureActivity | where OperationNameValue == "MICROSOFT.COMPUTE/VIRTUALMACHINES/DELETE" | where ActivityStatusValue == 'Success' | extend AccountCustomEntity = Caller | extend IPCustomEntity = CallerIpAddress

This query identifies successful delete operations on virtual machines and extends the results with custom entities for the account and IP address https://learn.microsoft.com/en-us/training/modules/incident-management-sentinel/6-exercise-investigate-incident .

Additional Resources

For more information on how to classify and analyze data by using entities, you can refer to the following resources:

By understanding and utilizing entities, analysts can significantly enhance their ability to classify, analyze, and respond to security events within their environment.

Configure protections and detections (15–20%)

Configure detections in Microsoft Sentinel

Configure Scheduled Query Rules, Including KQL

Scheduled query rules in Microsoft Sentinel are a powerful feature that allows security analysts to create custom alerts based on specific conditions within their security data. These rules are highly customizable and leverage the Kusto Query Language (KQL) to filter and analyze security events. Here’s a detailed explanation of how to configure scheduled query rules, including the use of KQL:

  1. Understanding Scheduled Query Rules: Scheduled query rules run at defined intervals and execute KQL queries against the data in your Log Analytics workspace. They are designed to detect important security events and generate alerts https://learn.microsoft.com/en-us/training/modules/incident-management-sentinel/3-describe-incident-management .

  2. Creating a Scheduled Query Rule:

  3. Set Rule Logic:

  4. Writing KQL Queries:

  5. Customization and Automation:

  6. Additional Resources:

By following these steps, you can effectively configure scheduled query rules in Microsoft Sentinel to monitor your environment for security threats. The use of KQL allows for precise and flexible definitions of what constitutes a security event, enabling you to tailor the rules to the specific needs of your organization.

Configure protections and detections (15–20%)

Configure detections in Microsoft Sentinel

Configure Near-Real-Time (NRT) Analytics Rules, Including KQL

Near-real-time (NRT) analytics rules in Microsoft Sentinel are designed to detect important security events and generate alerts with minimal delay. These rules are essential for responding to potential threats as quickly as possible. To configure NRT analytics rules, you will need to use the Kusto Query Language (KQL) to create queries that will run against your Log Analytics workspaces.

Steps to Configure NRT Analytics Rules:

  1. Access Microsoft Sentinel: Navigate to Microsoft Sentinel in your Azure portal to begin the configuration process.

  2. Create a New Rule: Within Microsoft Sentinel, locate the option to create a new analytics rule. This can typically be found under the “Analytics” section.

  3. Select Rule Type: Choose the NRT analytics rule type. This option is specifically designed for scenarios that require immediate attention and rapid response.

  4. Define Rule Logic with KQL: On the Set rule logic tab, you will define the detection method by specifying a KQL query. This query will filter and analyze the security data to trigger alerts and create incidents based on the criteria you set https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/6-create-rule-from-wizard .

  5. Enter Custom KQL Code: In the Rule query field, input your custom KQL code that targets the specific security events or patterns you wish to monitor. For example, you might create a query to detect an unusual number of resource creations in Azure Activity https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/6-create-rule-from-wizard .

  6. Test Your Query: Utilize the Results simulation (preview) section to simulate the results of your KQL query. This helps ensure that the query is returning the expected results before you finalize the rule https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/6-create-rule-from-wizard .

  7. Finalize and Enable the Rule: After confirming that the query works as intended, save the rule and enable it to start monitoring for the specified events in near-real-time.

Additional Resources:

By following these steps and utilizing the resources provided, you can effectively configure NRT analytics rules using KQL to enhance your organization’s security posture and respond to threats with greater speed and efficiency.

Configure protections and detections (15–20%)

Configure detections in Microsoft Sentinel

Manage Analytics Rules from Content Hub

Managing analytics rules from the Content Hub in Microsoft Sentinel involves several steps that ensure the effective deployment and operation of security analytics within your environment. The Content Hub is a central repository where you can find and deploy various security solutions, including analytics rules, which are essential for detecting potential security threats.

Here is a detailed explanation of how to manage analytics rules from the Content Hub:

  1. Accessing Content Hub:
    • Navigate to the Microsoft Sentinel dashboard.
    • From the navigation menu, under “Content management,” select “Content hub.”
  2. Exploring Available Solutions:
    • The Content Hub page displays a grid of available solutions that can be searched and filtered.
    • You can filter the list by selecting specific values from the filters or by entering part of a solution name or description in the Search field.
  3. Identifying Analytics Rules in Solutions:
  4. Installing Solutions with Analytics Rules:
    • To install a solution, select it from the grid and then choose “Install.”
    • Once installed, the solution’s analytics rules and other content types will be deployed to your Microsoft Sentinel workspace.
  5. Managing Installed Analytics Rules:
    • After installation, you can manage the analytics rules by navigating to the “Analytics” section of Microsoft Sentinel.
    • Here, you can view and modify the rules, adjust their settings, and tailor them to your specific needs.
  6. Utilizing Analytics Rules:
    • Analytics rules can be used to create incidents, trigger alerts, and initiate automated responses to detected threats.
    • They play a crucial role in monitoring your environment for suspicious activities and potential security breaches.
  7. Updating and Customizing Rules:
    • You can customize the rules to better fit your environment by modifying the rule logic, severity, and other parameters.
    • It’s also possible to create new custom analytics rules based on your organization’s unique requirements.

By following these steps, you can effectively manage analytics rules from the Content Hub, enhancing your security posture and ensuring that your environment is protected against threats. For additional information on managing analytics rules and other features within Microsoft Sentinel, you can refer to the official documentation provided by Microsoft:

Remember to regularly review and update your analytics rules to keep up with the evolving threat landscape and to ensure that your security measures remain effective.

Configure protections and detections (15–20%)

Configure detections in Microsoft Sentinel

Configure Anomaly Detection Analytics Rules

Anomaly detection analytics rules are essential for identifying unusual patterns in data that may indicate a security threat. These rules are designed to detect deviations from normal behavior, which can be indicative of a security incident. Here’s a detailed explanation of how to configure anomaly detection analytics rules:

  1. Understanding Anomaly Detection Policies: Anomaly detection policies are used to monitor for atypical increases in cloud application usage, such as spikes in data downloads, uploads, transactions, and user activity. These are compared against a baseline to identify significant deviations that could trigger security alerts https://learn.microsoft.com/en-us/training/modules/microsoft-cloud-app-security/detect-threats .

  2. Setting Up Discovery Anomaly Policies: To configure a discovery anomaly policy, you would typically:

  3. Using Microsoft Sentinel’s Fusion: Microsoft Sentinel employs a Fusion correlation engine that uses machine learning to combine low-fidelity alerts from various sources into high-fidelity incidents. This engine is enabled by default and helps detect complex multistage attacks by correlating events across multiple Microsoft products https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

  4. Configuring Data Connectors: For effective anomaly and fusion detection, it is necessary to configure data connectors for various Microsoft products, such as Microsoft Defender for Cloud, Microsoft 365 Defender, and others. These connectors facilitate the collection of alerts that Fusion can analyze https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

  5. Leveraging Defender for Cloud: Defender for Cloud utilizes anomaly detection to identify threats by applying machine learning to understand normal activities and create rules that highlight outliers, which could indicate a security event https://learn.microsoft.com/en-us/training/modules/remediate-azure-defender-security-alerts/2-understand-security-alerts .

  6. Combining Detection Methods with Defender for Cloud Apps: Defender for Cloud Apps integrates anomaly detection with user entity behavioral analytics (UEBA) and rule-based detections to monitor app usage and detect unusual behavior that could suggest ransomware or other threats https://learn.microsoft.com/en-us/training/modules/microsoft-cloud-app-security/cloud-app-security-framework .

  7. Assessing Anomaly Rule Performance: To evaluate the effectiveness of an anomaly rule, you can review anomalies generated over the last 24 hours. This involves:

For additional information on configuring anomaly detection analytics rules, you can refer to the following resources: - Microsoft Cloud App Security - Microsoft Sentinel

Please note that the URLs provided are for reference purposes to supplement the study guide material.

Configure protections and detections (15–20%)

Configure detections in Microsoft Sentinel

Configure the Fusion Rule

Microsoft Sentinel employs a sophisticated correlation engine known as Fusion, which utilizes scalable machine learning algorithms to detect complex, multistage attacks. Fusion works by correlating numerous low-fidelity alerts and events from a variety of products, synthesizing them into high-fidelity, actionable incidents https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

Key Characteristics of Fusion Rules:

Steps to Configure Fusion Rules:

  1. Verify Data Connectors: Ensure that the necessary data connectors are configured and operational. This includes setting up connectors for Microsoft security products and configuring scheduled analytics rules with the appropriate kill-chain and entity mapping https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

  2. Enable Fusion Rule: Since Fusion is enabled by default, verify that it is active. If it has been disabled, you can re-enable it. However, there is no option to edit the Fusion rule due to its non-customizable nature.

  3. Monitor and Review: Regularly monitor the incidents generated by Fusion and review the detection scenarios that are being updated by Microsoft to ensure that the Fusion rule is effectively identifying threats https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

Additional Information:

For more details on configuring Fusion rules and understanding how they work within Microsoft Sentinel, you can refer to the official Microsoft documentation. This will provide you with the most up-to-date information on Fusion and its capabilities.

Please note that while configuring Fusion rules, it is important to stay informed about the latest updates from Microsoft, as the detection scenarios and requirements may evolve over time.


Note: The URLs for additional information have been omitted as per the instructions provided. However, in a study guide, it would be appropriate to include links to the official Microsoft documentation for Microsoft Sentinel and Fusion rules for readers who wish to explore the topic in greater depth.

Configure protections and detections (15–20%)

Configure detections in Microsoft Sentinel

Querying Microsoft Sentinel Data Using ASIM Parsers

When working with Microsoft Sentinel, one of the key tasks is to effectively query and analyze security data. ASIM parsers play a crucial role in this process. ASIM, or Advanced Security Information Model, is a framework designed to normalize and simplify the querying of diverse security data within Microsoft Sentinel.

Understanding ASIM Parsers

ASIM parsers are KQL (Kusto Query Language) user-defined functions that transform data from various sources into a standardized schema. This normalization allows for consistent querying across different types of data and simplifies the creation of analytics, rules, and visualizations.

How ASIM Parsers Work

Components of ASIM

When to Modify or Develop ASIM Parsers

There are situations where you might need to modify existing parsers or develop new ones:

Additional Resources

For more information on ASIM parsers and how to use them in Microsoft Sentinel, you can refer to the following resources:

By understanding and utilizing ASIM parsers, you can enhance your ability to work with diverse security data in Microsoft Sentinel, leading to more effective security analysis and operations.

Configure protections and detections (15–20%)

Configure detections in Microsoft Sentinel

Manage and Use Threat Indicators

Threat indicators are critical components in cybersecurity, as they provide valuable information about potential security threats. Managing and using threat indicators effectively can enhance an organization’s ability to detect, investigate, and respond to cyber threats.

Managing Threat Indicators

In Microsoft Sentinel, threat indicators can be managed efficiently through the Threat Intelligence area. This feature allows security professionals to:

Using Threat Indicators

Once threat indicators are managed properly, they can be utilized in various ways:

Additional Resources

For those looking to delve deeper into managing and using threat indicators within Microsoft Sentinel, the following resources may be helpful:

By understanding and applying the management and use of threat indicators, security professionals can significantly improve their organization’s security posture and response capabilities.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Investigating and Remediating Threats to Microsoft Teams, SharePoint Online, and OneDrive

When addressing threats to Microsoft Teams, SharePoint Online, and OneDrive, it is crucial to follow a systematic approach to ensure that the threat is properly investigated and remediated. Here is a detailed explanation of the steps involved:

  1. Investigation of Threats:
    • Begin by identifying the nature of the threat. This could involve unauthorized access, suspicious file activities, or potential data breaches.
    • Utilize the security features within Microsoft 365 to monitor and investigate activities. Look for alerts that may have been triggered by these threats.
    • Examine the details provided in the alerts, which include information about the incident that led to the alert and any suspicious activities detected https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .
  2. Responding to Alerts:
    • Alerts generated by Microsoft 365 security tools provide recommendations on how to address the threat. Follow these recommendations carefully.
    • For Microsoft Teams, SharePoint Online, and OneDrive, check for any compromised accounts or permissions that may have been abused.
    • Review data loss prevention (DLP) policy alerts and insider risk policy alerts to determine if sensitive information has been mishandled or if there is a risk of insider threats https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .
  3. Remediation of Threats:
  4. Prevention of Future Threats:
  5. Documentation and Reporting:
  6. Continuous Monitoring:

For additional information on how to investigate and remediate threats to Microsoft Teams, SharePoint Online, and OneDrive, you can refer to the following resources:

Please note that while URLs are provided for further reading, they should not be included in the final study guide material.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Investigating and Remediating Threats in Email with Microsoft Defender for Office 365

Microsoft Defender for Office 365 is a comprehensive solution designed to help organizations protect their enterprise environment from a variety of threats delivered via email. Here’s a detailed explanation of how to investigate and remediate these threats:

Investigation Process

  1. Alerts and Automated Investigation: When a potential threat is detected in an email, Microsoft Defender for Office 365 generates an alert. Security teams can use Automated Investigation and Response (AIR) capabilities to launch security playbooks automatically when an alert is triggered or manually from a view in Explorer https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/automate-investigate-remediate .

  2. Threat Identification: The system identifies malicious emails based on various attributes such as sender, IP, domain, and URL. It also uses Safe Links URL detonation to detect weaponized URLs after delivery https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/automate-investigate-remediate .

  3. Investigation Graph: Clicking on the investigation deep link from the alert opens the Office 365 Threat Intelligence Summary Investigation Graph, which shows all entities—emails, users, activities, and devices—that have been automatically investigated as part of the triggered alert https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/automate-investigate-remediate .

  4. User and Device Anomalies: The investigation may reveal anomalies such as suspicious sign-ins or mass downloads of documents, which could indicate a compromised user or device https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/automate-investigate-remediate .

Remediation Actions

  1. Automated Remediations: Microsoft Defender for Office 365 can take automated remediation actions such as blocking URLs, deleting malicious emails from mailboxes, and initiating password resets and multi-factor authentication (MFA) for compromised users https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/automate-investigate-remediate .

  2. Manual Approval: Some remediation actions, like soft-deleting email messages or blocking URLs, may require approval from the security operations team. These actions can be found in the Actions tab under the selected investigation https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/automate-investigate-remediate .

  3. Threat Trackers and Explorer: Threat trackers provide intelligence on cybersecurity issues, while Threat Explorer (or real-time detections) allows for the identification and analysis of recent threats. These tools enable security teams to anticipate and understand malicious attacks https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/simulate-attacks .

  4. Attack Simulator: This tool allows security teams to run realistic attack scenarios to identify vulnerabilities within the organization, such as spear phishing and password attacks https://learn.microsoft.com/en-us/training/modules/m365-threat-remediate/simulate-attacks .

Additional Resources

By utilizing these tools and processes, organizations can effectively investigate and remediate email threats, ensuring a robust defense against cyberattacks.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

When investigating and remediating ransomware and business email compromise (BEC) incidents identified by automatic attack disruption, it is essential to follow a structured approach. Here is a detailed explanation of the steps involved:

Investigate Ransomware and Business Email Compromise Incidents

  1. Incident Generation and Triage:
  2. Detailed Investigation:
  3. Filtering Sensitive Data:
  4. Multi-Workspace Investigation:

Remediate Threats

  1. Automatic Attack Disruption:
    • Utilize automatic attack disruption features to contain the threat and prevent further damage. This may involve isolating affected systems or blocking malicious communication.
  2. Threat Remediation Recommendations:
  3. Exporting Alerts:
  4. Post-Incident Analysis:
    • After remediating the incident, conduct a post-incident analysis to identify the root cause and improve security measures to prevent similar incidents in the future.

For additional information on investigating and remediating ransomware and BEC incidents, you can refer to the following resources:

By following these steps and utilizing the provided resources, organizations can effectively investigate and remediate ransomware and BEC incidents to minimize their impact and enhance their security posture.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Investigating and Remediating Compromised Entities Identified by Microsoft Purview Data Loss Prevention (DLP) Policies

When dealing with compromised entities identified by Microsoft Purview DLP policies, it is crucial to follow a systematic approach to investigate and remediate the issues effectively. Here is a detailed explanation of the steps involved:

Investigation Process

  1. Accessing DLP Alerts: Begin by accessing the Microsoft Purview compliance portal. Navigate to the “Data loss prevention” section under Solutions and select the “Alerts” tab to view the DLP alerts dashboard https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/3-investigate-data-loss-prevention-alerts-microsoft-365-compliance .

  2. Refining Alerts: Utilize filters to refine the list of alerts and customize columns to display the properties you wish to see. Alerts can be sorted in ascending or descending order based on any column https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/3-investigate-data-loss-prevention-alerts-microsoft-365-compliance .

  3. Alert Details: Click on an individual alert to view its details. This includes the events associated with the alert and the sensitive information types detected in the content, along with their confidence levels and counts https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/3-investigate-data-loss-prevention-alerts-microsoft-365-compliance .

  4. Understanding DLP Policies: It is important to understand the DLP policies that generated the alerts. DLP policies help identify sensitive information across various locations, prevent accidental sharing, and monitor and protect sensitive data in desktop versions of Office applications https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/2-understand-data-loss-prevention-alerts .

  5. Workflow Management: After investigating the alert, you can manage it by changing its status (Active, Investigating, Dismissed, or Resolved), adding comments, and assigning it to someone in your organization. The “Management log” provides a history of workflow management https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/3-investigate-data-loss-prevention-alerts-microsoft-365-compliance .

Remediation Process

  1. Taking Action: Based on the investigation, take the necessary action for the alert. This could involve reaching out to the entity involved, securing the sensitive data, or adjusting the DLP policies to prevent future occurrences https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/3-investigate-data-loss-prevention-alerts-microsoft-365-compliance .

  2. Resolving Alerts: Once the required action is taken, set the status of the alert to “Resolved” to indicate that the issue has been addressed https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/3-investigate-data-loss-prevention-alerts-microsoft-365-compliance .

  3. Recommending Policy Changes: If the investigation reveals gaps in the DLP policies, recommend changes to enhance the protection of sensitive information and prevent similar incidents in the future https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/2-understand-data-loss-prevention-alerts .

  4. Educating Users: Help users understand DLP policies and how to comply with them without interrupting their workflow. Policy tips and email notifications can be used to guide users when they attempt to share documents containing sensitive information https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/2-understand-data-loss-prevention-alerts .

  5. Continuous Monitoring: Ensure continuous monitoring of sensitive information sharing through Office desktop programs and other Microsoft services to maintain compliance and protect against data loss https://learn.microsoft.com/en-us/training/modules/respond-to-data-loss-prevention-alerts-microsoft-365/2-understand-data-loss-prevention-alerts .

For additional information on investigating and remediating compromised entities identified by DLP policies, you can refer to the following resources:

By following these steps and utilizing the provided resources, you can effectively investigate and remediate compromised entities identified by Microsoft Purview DLP policies.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Investigating and Remediating Threats Identified by Microsoft Purview Insider Risk Policies

Microsoft Purview Insider Risk Management is a solution designed to help organizations identify, investigate, and act on risky activities within their business environment. When it comes to investigating and remediating threats identified by insider risk policies, the process involves several key steps:

  1. Identification of Risky Activities: Utilize policy templates with pre-defined conditions to detect potential insider risks. These templates provide comprehensive activity signaling across Microsoft 365 services, offering actionable insights https://learn.microsoft.com/en-us/training/modules/m365-compliance-insider-manage-insider-risk/overview .

  2. Alert Generation: When an insider risk is identified, alerts are generated. These alerts are based on the activities that match the conditions set in the insider risk policies https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  3. Investigation Process: Upon receiving an alert, the investigation process begins. This includes examining the alert details, user activities, and related content to understand the context and severity of the risk.

  4. Evidence Collection: For certain types of alerts, such as those that require forensic evidence, clip capturing is used. This captures all user activity, and specific capturing requests and approvals are necessary. Devices involved must be onboarded with the Microsoft Purview client installed https://learn.microsoft.com/en-us/training/modules/m365-compliance-insider-manage-insider-risk/forensic-evidence .

  5. Alert Triage: Defender for Endpoint can forward security alerts and their triage status to the Microsoft Purview compliance portal. This enhances insider risk management policies by incorporating alerts to remediate internal risks before they escalate https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/8-configure-environment-advanced-features .

  6. Remediation Actions: After investigating, take appropriate actions to contain and mitigate the risk. This could involve reaching out to the user, adjusting policy conditions, or other remedial measures.

  7. Workflow Management: The overall workflow for managing insider risk includes detecting, investigating, and remediating alerts. It is important to follow the established workflow to ensure a consistent approach to insider risk management https://learn.microsoft.com/en-us/training/modules/m365-compliance-insider-manage-insider-risk/overview https://learn.microsoft.com/en-us/training/modules/m365-compliance-insider-manage-insider-risk/forensic-evidence .

  8. Policy Management: Microsoft Purview Insider Risk Management provides built-in, pre-defined policy templates that can be customized to fit the organization’s needs. It is crucial to understand these templates and ensure that all prerequisites are met before creating insider risk policies https://learn.microsoft.com/en-us/training/modules/m365-compliance-insider-manage-insider-risk/summary-knowledge-check .

For additional information on Microsoft Purview Insider Risk Management and its capabilities, you can refer to the following resources:

By following these steps and utilizing the resources provided, organizations can effectively investigate and remediate threats identified by Microsoft Purview insider risk policies, maintaining a secure and compliant environment.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Investigate and Remediate Alerts and Incidents Identified by Microsoft Defender for Cloud

Microsoft Defender for Cloud is an essential tool for security management, designed to detect and respond to threats across Azure, hybrid, and multicloud workloads. When it comes to investigating and remediating alerts and incidents, here’s a detailed explanation of the process:

Investigating Alerts in Microsoft Defender for Cloud

Remediation of Alerts in Microsoft Defender for Cloud

Managing Security Incidents

Additional Resources

For more information on investigating and responding to threats in Microsoft Teams, SharePoint Online, and OneDrive, as well as email threats using Microsoft Defender for Office 365, refer to the following resources:

Integration with Microsoft Sentinel

By following these steps and utilizing the resources provided by Microsoft Defender for Cloud, users can effectively investigate and remediate security alerts and incidents, enhancing their overall security posture.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Investigate and Remediate Security Risks Identified by Microsoft Defender for Cloud Apps

Microsoft Defender for Cloud Apps is a comprehensive solution designed to help organizations monitor and control data travel across their cloud services. When it comes to investigating and remediating security risks, the following steps are typically involved:

  1. Discovery and Investigation:
  2. Alert Management:
  3. Remediation Actions:
    • Depending on the type of alert and the associated risk, take the necessary remediation actions. This could include revoking access to compromised accounts, adjusting permissions, or removing unauthorized apps.
    • Use the information provided by the alerts to implement stronger policies and controls to prevent similar risks in the future.
  4. Continuous Monitoring and Improvement:
    • Regularly review the security posture and adjust Defender for Cloud Apps settings to ensure ongoing protection against new and evolving threats.
    • Stay informed about the latest security trends and best practices to enhance the organization’s cloud security measures.

For additional information on how to manage and respond to alerts within Microsoft Defender for Cloud Apps, please refer to the following resources:

By following these steps, organizations can effectively investigate and remediate security risks identified by Microsoft Defender for Cloud Apps, ensuring the protection of their cloud environments against potential threats.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Investigate and Remediate Compromised Identities in Microsoft Entra ID

When dealing with compromised identities, it is crucial to have a robust process for investigation and remediation to protect an organization’s assets and reputation. Microsoft Entra ID Protection is a service designed to help organizations automatically detect, investigate, and remediate identity-based risks. Here’s a detailed explanation of how to use Microsoft Entra ID Protection for these purposes:

Detecting Risks

Microsoft Entra ID Protection provides advanced detection capabilities that allow you to identify potential identity-based risks. By setting up risk policies, you can monitor for suspicious activities or anomalies that may indicate a compromised identity https://learn.microsoft.com/en-us/training/modules/protect-identities-with-aad-idp/1-introduction .

Investigating Detected Risks

Once a risk is detected, it is essential to investigate to understand the scope and impact. Microsoft Entra ID Protection offers tools to analyze and assess the risk severity, helping you to determine the appropriate response https://learn.microsoft.com/en-us/training/modules/protect-identities-with-aad-idp/1-introduction .

Remediation of Compromised Identities

After investigating, you can take action to remediate the compromised identities. Microsoft Entra ID Protection facilitates the remediation process by providing workflows that can help you resolve the issues. These workflows may include resetting passwords, enforcing multi-factor authentication, or blocking accounts if necessary https://learn.microsoft.com/en-us/training/modules/protect-identities-with-aad-idp/2-azure-ad-idp-overview .

Ensuring Future Protection

To prevent future compromises, Microsoft Entra ID Protection allows your organization to continuously monitor and protect its identities. This proactive stance helps to maintain trustworthiness and compliance with data protection legislation, which is particularly important for retail companies and other organizations that handle sensitive customer information https://learn.microsoft.com/en-us/training/modules/protect-identities-with-aad-idp/5-summary .

For more information on how to create and manage identities within Microsoft Entra, including system-assigned and user-assigned identities, you can refer to the following resources: - Managed identities for Azure resources overview https://learn.microsoft.com/en-us/azure/azure-app-configuration/overview-managed-identity . - Azure CLI command for removing a system-assigned identity https://learn.microsoft.com/en-us/azure/azure-app-configuration/overview-managed-identity .

By following these steps and utilizing the tools provided by Microsoft Entra ID Protection, organizations can effectively safeguard their identities against future risks and maintain their security posture.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Investigate and Remediate Security Alerts from Microsoft Defender for Identity

Microsoft Defender for Identity is a security solution that utilizes your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions. When investigating and remediating security alerts from Microsoft Defender for Identity, the following steps are typically involved:

  1. Alert Notification: Security alerts in Microsoft Defender for Identity are triggered by suspicious activities detected by the Defender for Identity sensors on your network. These alerts are categorized into phases that correspond to the typical stages of a cyber-attack kill chain, such as reconnaissance, compromised credentials, lateral movement, domain dominance, and exfiltration https://learn.microsoft.com/en-us/training/modules/m365-threat-safeguard/review-compromised-accounts .

  2. Alert Investigation: Each alert provides detailed information, including the actors and computers involved in the threat. Alert evidence lists contain direct links to the involved users and computers, facilitating a straightforward investigation process https://learn.microsoft.com/en-us/training/modules/m365-threat-safeguard/review-compromised-accounts .

  3. Integration with Microsoft Defender for Cloud Apps: Microsoft Defender for Identity can be integrated with Microsoft Defender for Cloud Apps to provide visibility into on-premises activities for all users in your organization. This integration allows for a combined analysis of alerts and suspicious activities across both cloud and on-premises environments https://learn.microsoft.com/en-us/training/modules/m365-threat-safeguard/integrate-microsoft-tools .

  4. Integration with Microsoft Defender for Endpoint: For a more comprehensive threat protection solution, Microsoft Defender for Identity can be integrated with Microsoft Defender for Endpoint. This integration provides a single interface for monitoring both domain controllers and endpoints, allowing for a unified response to alerts https://learn.microsoft.com/en-us/training/modules/m365-threat-safeguard/integrate-microsoft-tools .

  5. Remediation Actions: Upon identifying a security alert, analysts can review a timeline of events surrounding the incident, such as a Pass-The-Hash (PtH) attack, and take appropriate remediation actions. These actions may include isolating affected systems, resetting compromised credentials, and applying security patches https://learn.microsoft.com/en-us/training/modules/m365-threat-safeguard/integrate-microsoft-tools .

  6. Automatic Incident Creation: Microsoft security solutions, including Microsoft Defender for Identity, can be configured to automatically create incidents from all generated alerts in services connected to Microsoft Sentinel. This enables organizations to be promptly alerted to high-risk threats and to take swift action https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

  7. Alert Management: Alerts can be filtered by severity and specific text contained in the alert name, allowing security teams to prioritize and manage alerts effectively https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/4-analytics-rules .

  8. Alert Investigation Depth: Clicking on an alert will lead to the relevant alert page, where an in-depth investigation can be conducted. This includes examining the severity, entities involved, the source of the alerts, and the reason they were linked together https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/4-investigate-incidents .

For additional information on Microsoft Defender for Identity and its capabilities, you can refer to the following resources:

By following these steps and utilizing the provided resources, security professionals can effectively investigate and remediate security alerts from Microsoft Defender for Identity, enhancing their organization’s security posture.

Manage incident response (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Manage Actions and Submissions in the Microsoft Defender Portal

Managing actions and submissions in the Microsoft Defender portal is a critical aspect of maintaining organizational security. Here’s a detailed explanation of how to manage these elements effectively:

Submissions Portal

The Submissions portal within the Microsoft Defender portal allows administrators to submit email messages, URLs, and attachments to Microsoft for scanning. This is particularly useful in Microsoft 365 organizations with Exchange Online mailboxes https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/7-use-action-center .

Key Features of the Submissions Portal: - Email Authentication Check: Verifies if the email authentication passed or failed upon delivery https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/7-use-action-center . - Policy Hits: Provides information on any policies that may have influenced the email’s delivery into the tenant, overriding service filter verdicts https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/7-use-action-center . - Payload Reputation/Detonation: Offers an up-to-date examination of URLs and attachments in the message for potential threats https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/7-use-action-center . - Grader Analysis: Involves human graders reviewing submissions to confirm if messages are malicious or not https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/7-use-action-center .

Important Considerations: - Not all tenants will have payload reputation/detonation and grader analysis due to compliance requirements that prevent data from leaving the tenant boundary https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/7-use-action-center . - Submissions are subject to throttling to prevent abuse. For example, there is a maximum of 150 submissions in any 15-minute period and a limit on repeated submissions https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/7-use-action-center .

Managing Actions

In the context of security operations, managing actions involves taking response actions, approving or dismissing pending remediation actions, and managing allowed/blocked lists for automation and indicators https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

Permission Options for Action Management: - View Data: Allows viewing of all security operations data in the portal https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control . - Active Remediation Actions: Enables taking response actions, managing remediation requests, and applying immediate mitigation actions by blocking vulnerable applications https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control . - Alerts Investigation: Involves managing alerts, starting automated investigations, and managing device tags https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control . - Manage Security Settings: Administrators can configure alert suppression settings, manage email notifications, and onboard/offboard devices https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

Automated Investigations

Automated investigations are a part of managing incidents within the Microsoft Defender portal. They provide a user interface to manage and investigate security incidents and alerts across protected resources https://learn.microsoft.com/en-us/training/modules/remediate-azure-defender-security-alerts/8-summary-resources .

Capabilities of Automated Investigations: - Describe Alerts: Understanding the nature of alerts generated by Microsoft Defender for Cloud https://learn.microsoft.com/en-us/training/modules/remediate-azure-defender-security-alerts/8-summary-resources . - Remediate Alerts: Taking necessary actions to address the threats identified by alerts https://learn.microsoft.com/en-us/training/modules/remediate-azure-defender-security-alerts/8-summary-resources . - Automate Responses: Setting up automated responses to common threats to streamline the remediation process https://learn.microsoft.com/en-us/training/modules/remediate-azure-defender-security-alerts/8-summary-resources .

Role Requirements

To submit messages and files to Microsoft for analysis, individuals need to have specific roles assigned, such as Security Administrator or Security Reader in the Microsoft 365 Defender portal https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/7-use-action-center .

For additional information on managing actions and submissions in the Microsoft Defender portal, you can refer to the official Microsoft documentation: - Manage incidents and automated investigations in the Microsoft 365 Defender portal - Manage actions and submissions in the Microsoft 365 Defender portal

Please note that the URLs provided are for reference purposes to supplement the study guide material.

Manage incident response (35–40%)

Respond to alerts and incidents identified by Microsoft Defender for Endpoint

Investigate Timeline of Compromised Devices

When investigating the timeline of compromised devices, it is crucial to understand the sequence of events that led to the compromise and the actions taken afterward. Here’s a detailed explanation of the process:

  1. Event Timeline Analysis: The Event timeline is a critical tool that acts as a risk news feed, allowing you to track how risk is introduced into the organization through new vulnerabilities or exploits. It helps in identifying events that may impact the organization’s risk, such as new vulnerabilities that were introduced, vulnerabilities that became exploitable, and exploits that were added to an exploit kit https://learn.microsoft.com/en-us/training/modules/use-threat-vulnerability-management-microsoft-defender-for-endpoint/3-explore-vulnerabilities-devices .

  2. Action Center and Device Timeline: The Action center displays scan information, and the device timeline includes new events, such as when an application is restricted from running or when a device is isolated from the network. This timeline is essential for understanding the chronological order of actions taken on a compromised device https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/2-understand-device-actions https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/2-understand-device-actions .

  3. Isolation of Compromised Devices: In severe cases, you might need to isolate the device from the network to prevent further malicious activities by the attacker. The device isolation feature disconnects the compromised device from the network while maintaining connectivity to the Defender for Endpoint service, which continues to monitor the device. Notifications are displayed to inform the user that the device is being isolated https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/2-understand-device-actions .

  4. Restricting Application Execution: To contain an attack, you can stop malicious processes and restrict subsequent attempts of potentially malicious programs from running by applying a code integrity policy. This policy allows only files signed by a Microsoft-issued certificate to run, which can prevent an attacker from controlling compromised devices. The restriction can be reversed at any time https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/2-understand-device-actions .

  5. Antivirus Scans: As part of the response process, you can remotely initiate an antivirus scan to help identify and remediate malware on a compromised device. You can choose between a quick or full scan and add comments before confirming the scan. The device timeline will reflect that a scan action was submitted, and any detections will be shown in the Microsoft Defender AV alerts https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/3-run-microsoft-defender-antivirus-scan-on-devices .

  6. Observed in Organization Tab: This tab provides a chronological view of the events and associated alerts observed on the URL. It includes a timeline and a table listing event details, such as the time, device, and a brief description of what happened. This information is crucial for piecing together the timeline of a compromised device https://learn.microsoft.com/en-us/training/modules/perform-evidence-entities-investigations-microsoft-defender-for-endpoint/5-investigate-domain .

For additional information on these features and how to use them, you can refer to the following resources:

By understanding and utilizing these tools and resources, you can effectively investigate the timeline of compromised devices and take appropriate actions to mitigate risks and prevent further damage.

Manage incident response (35–40%)

Respond to alerts and incidents identified by Microsoft Defender for Endpoint

Perform Actions on the Device, Including Live Response and Collecting Investigation Packages

When managing security incidents, it is crucial to have the ability to perform immediate actions on affected devices. Microsoft Defender for Endpoint offers several capabilities that enable security teams to respond to threats effectively.

Live Response

Live response is a feature that provides security operations teams with instant access to a device through a remote shell connection. This capability is essential for in-depth investigations and immediate response actions to contain threats https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/5-initiate-live-response-session .

Basic and Advanced Commands: Security analysts can execute both basic and advanced commands during a live response session. Basic commands allow for read-only access, excluding file copy and execution, while advanced commands enable actions such as downloading files from the device, uploading files to the device, and executing scripts https://learn.microsoft.com/en-us/training/modules/deploy-microsoft-defender-for-endpoints-environment/6-create-manage-roles-for-role-based-access-control .

Remote Shell Access: The live response feature allows for a restricted remote access shell on the device, giving analysts the ability to perform investigative work directly on the device https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/7-summary-resources .

Forensic Data Collection: Analysts can collect forensic data, run scripts, send suspicious entities for analysis, and remediate threats. This proactive approach helps in hunting for emerging threats https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/5-initiate-live-response-session .

Collecting Investigation Packages

As part of the investigation or response process, collecting an investigation package from a device is a critical step. This package helps to identify the current state of the device and understand the tools and techniques used by the attacker https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/4-collect-investigation-package-from-devices .

Initiating Package Collection: To collect an investigation package, select the “Collect investigation package” option from the response actions at the top of the device page. You will need to provide a reason for this action and confirm it. The package will then be downloaded as a zip file https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/4-collect-investigation-package-from-devices .

Accessing the Package: Alternatively, you can access the package through the “Action center” on the device page. In the Action center fly-out, you can select the package available for download https://learn.microsoft.com/en-us/training/modules/perform-actions-device-microsoft-defender-for-endpoint/4-collect-investigation-package-from-devices .

Contents of the Package: The investigation package typically contains various folders with data that can be analyzed to assess the device’s state and the incident’s details.

For additional information on how to use Microsoft Defender for Endpoint for performing actions on devices, including live response and collecting investigation packages, you can refer to the following resources:

Please note that the URLs provided are for reference purposes to supplement the study guide with additional information.

Manage incident response (35–40%)

Respond to alerts and incidents identified by Microsoft Defender for Endpoint

Perform Evidence and Entity Investigation

When conducting an investigation into security incidents, it is crucial to examine both the evidence and the entities involved. Here’s a detailed explanation of the process:

Investigation Details

During and after an automated investigation, investigators can access a wealth of information. By selecting the triggering alert, they can delve into the investigation details, which may include various tabs such as Investigation graph, Alerts, Devices, Evidence, Entities, and Log https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/6-manage-automated-investigations .

Entity Behavior Analysis

The Entity behavior page is a pivotal tool for investigators. It allows them to search for specific entities or to choose from a list of entities that are already displayed. Once an entity is selected, a detailed Entity page appears, showcasing a timeline of alerts and activities related to that entity https://learn.microsoft.com/en-us/training/modules/use-entity-behavior-analytics-azure-sentinel/4-display-entity-behavior-information .

Insights from Investigation Graph

The Incident Investigation Graph is an interactive feature that provides insights. These insights are derived from the Entity behavior data and can significantly aid in understanding the context and scope of an incident https://learn.microsoft.com/en-us/training/modules/use-entity-behavior-analytics-azure-sentinel/4-display-entity-behavior-information .

Automated Investigation Expansion

Automated investigations are dynamic. If additional alerts are generated from the same device, they are incorporated into the ongoing investigation. Similarly, if the same threat is detected on other devices, those devices are also included in the investigation. This expansion is automatic unless it involves ten or more devices, in which case approval is required, and the action is listed under the Pending actions tab https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/6-manage-automated-investigations .

Security Incidents and Incident Management

Learning about security incidents and how to manage them is essential. Microsoft Sentinel, for instance, provides tools to investigate security incidents and manage incident resolution effectively https://learn.microsoft.com/en-us/training/modules/incident-management-sentinel/1-introduction .

Entity Mapping for Visual Investigation

In the Entity mapping section, investigators can define up to five entities from their query results. These entities can then be used for in-depth analysis and are added to the query rule by selecting Add new entity. This facilitates visual investigation as these entities will appear grouped on the Incident tab. Entities often represent users, hosts, or IP addresses, providing a clear picture of the involved components https://learn.microsoft.com/en-us/training/modules/analyze-data-in-sentinel/6-create-rule-from-wizard .

For additional information on these topics, you can refer to the following resources: - Investigation details and automated investigation process - Entity behavior analysis and insights - Microsoft Sentinel incident management and investigation

Please note that the URLs provided are for reference purposes and are part of the study guide content. They should be accessed for a more comprehensive understanding of the investigation process.

Manage incident response (35–40%)

Enrich investigations by using other Microsoft tools

Investigate Threats Using Unified Audit Log

The Unified Audit Log is a critical component in the Microsoft Purview compliance portal that allows organizations to investigate threats by providing a comprehensive view of user and administrator activities across Microsoft 365 services. Here’s a detailed explanation of how to utilize the Unified Audit Log for threat investigation:

Accessing the Unified Audit Log

To begin investigating threats using the Unified Audit Log, you must have the appropriate permissions. The audit log search tool in the Microsoft Purview compliance portal is the primary interface for accessing the Unified Audit Log https://learn.microsoft.com/en-us/training/modules/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/5-search-audit-log .

Performing Threat Hunting

Threat hunting involves proactively searching for security threats that may not be detected by automated security solutions. The Unified Audit Log enables security professionals to perform threat hunting by:

Required Roles and Permissions

To access the Unified Audit Log for threat investigation, certain roles and permissions are required. These roles are defined in the Microsoft 365 Defender portal and are specific to each workload. They include roles such as Security Reader, Security Admin, and Compliance Admin, among others https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/2-use-microsoft-security-center-portal .

Using the Audit Search Tool

The audit search tool in the Microsoft Purview compliance portal is used to search the Unified Audit Log. This tool captures thousands of user and admin operations across Microsoft 365 services, which are searchable by security operations teams and compliance investigators https://learn.microsoft.com/en-us/training/modules/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/9-summary-resources .

Search-UnifiedAuditLog Cmdlet

For those who prefer using PowerShell, the Search-UnifiedAuditLog cmdlet in Exchange Online PowerShell can be used to search for audited activities. This cmdlet is the underlying command for the audit search tool in the compliance portal https://learn.microsoft.com/en-us/training/modules/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/9-summary-resources .

Viewing and Exporting Search Results

After conducting a search, you can view the results within the portal. Additionally, you can export the search results to a CSV file for further analysis using tools like Microsoft Excel. This exported data can be sorted and filtered to aid in the investigation process https://learn.microsoft.com/en-us/training/modules/investigate-threats-using-audit-in-microsoft-365-defender-microsoft-purview-standard/9-summary-resources .

Unified Action Center

The Unified Action Center in the Microsoft 365 Defender portal lists both pending and completed remediation actions, providing a “single pane of glass” experience for managing remediation actions across Defender for Endpoint and Defender for Office 365 https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/7-use-action-center .

Additional Resources

For more information on how to use the Unified Audit Log for investigating threats, you can refer to the following resources:

By leveraging the Unified Audit Log, organizations can enhance their threat investigation capabilities and respond more effectively to potential security incidents.

Manage incident response (35–40%)

Enrich investigations by using other Microsoft tools

Content Search is a tool within Microsoft Purview that allows organizations to search for content across various Microsoft 365 services such as Exchange Online mailboxes, SharePoint Online sites, OneDrive for Business accounts, and Microsoft Teams. It is particularly useful for investigating potential threats by enabling the search and examination of items across an organization’s environment.

To utilize Content Search for threat investigation, follow these steps:

  1. Access Content Search: Navigate to the Microsoft Purview compliance portal and select Content Search from the navigation pane.

  2. Initiate a Search: Choose the content search you wish to perform. You can create a new search or select an existing one to refine or review.

  3. Search Query Statistics: After running a search, you can view statistics about the search query, including the number of estimated items that matched different parts of the search query. This helps in analyzing and refining the search criteria to narrow down the scope https://learn.microsoft.com/en-us/training/modules/investigate-threats-with-content-search-in-microsoft-purview/4-view-search-results .

  4. Exporting Search Results: Prepare the search results for exporting by selecting the “Export results” option. You can choose to export all items, only indexed items, or only unindexed items. There are also options to export content as PST files, either for each mailbox or as a single PST file, and to export individual messages in .msg format https://learn.microsoft.com/en-us/training/modules/investigate-threats-with-content-search-in-microsoft-purview/5-export-search-results .

  5. Export Options: Configure additional export options such as enabling de-duplication for Exchange content, including versions for SharePoint files, and exporting files in a compressed folder https://learn.microsoft.com/en-us/training/modules/investigate-threats-with-content-search-in-microsoft-purview/5-export-search-results .

  6. Download Exported Results: Once the export process is complete, you can download the exported search results from the Azure Storage location provided by Microsoft.

Additional Information

For more detailed instructions and visual aids, you can refer to the following resources:

By following these steps and utilizing the provided resources, you can effectively investigate threats within your organization using Content Search.

Manage incident response (35–40%)

Enrich investigations by using other Microsoft tools

Perform Threat Hunting Using Microsoft Graph Activity Logs

Threat hunting is a proactive security exercise that involves searching through networks to detect and isolate advanced threats that evade existing security solutions. Microsoft Graph activity logs provide a wealth of information that can be utilized for threat hunting. Here’s how you can perform threat hunting using Microsoft Graph activity logs:

  1. Understanding Microsoft Graph Activity Logs: Microsoft Graph activity logs contain a wide array of information about user activities, security alerts, and other events across Microsoft services. These logs are a valuable resource for identifying suspicious activities that could indicate a security threat.

  2. Accessing the Logs: To access Microsoft Graph activity logs, you can use the Microsoft Graph REST API. There are two versions of the API:

  3. Using the API for Threat Hunting:

  4. Using Graph Explorer: Graph Explorer is a tool that allows you to run hunting queries against Microsoft Graph activity logs. It provides a user-friendly interface to execute and test your KQL queries https://learn.microsoft.com/en-us/training/modules/introduction-microsoft-365-threat-protection/4-explore-microsoft-security-graph .

  5. Analyzing the Results: After running a query, you will receive results that can be analyzed to identify potential threats. The results typically include details such as timestamps, file names, and process names, which can help in piecing together the sequence of events related to a security incident.

  6. Integration with Microsoft Sentinel: Microsoft Sentinel can integrate with Microsoft Graph Security API data sources for monitoring, alerting, and hunting using threat intelligence. This integration allows you to send threat indicators to Microsoft Sentinel from various platforms https://learn.microsoft.com/en-us/training/modules/connect-threat-indicators-to-azure-sentinel/4-connect-threat-intelligence-platforms-connector .

  7. Advanced Hunting: Advanced hunting is a feature that allows you to explore up to 30 days of raw data. It supports queries that check a broader data set from various Microsoft Defender solutions. To use advanced hunting, you need to enable Microsoft 365 Defender https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/8-explore-advanced-hunting .

Additional Resources: - For more information on Microsoft Graph Security API, you can visit The Microsoft Graph Security API https://learn.microsoft.com/en-us/training/modules/introduction-microsoft-365-threat-protection/4-explore-microsoft-security-graph . - To learn more about advanced hunting and how to use it, refer to the documentation on Advanced Hunting https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/8-explore-advanced-hunting .

By following these steps and utilizing the provided resources, you can effectively perform threat hunting using Microsoft Graph activity logs to enhance your organization’s security posture.

Manage incident response (35–40%)

Manage incidents in Microsoft Sentinel

Triage Incidents in Microsoft Sentinel

Triage is a critical step in the incident response process where analysts prioritize and categorize incidents based on their severity, impact, and urgency. In Microsoft Sentinel, triage involves several key activities:

  1. Incident Generation: Microsoft Sentinel automatically aggregates alerts into incidents. This helps analysts to see a grouped view of related alerts that may constitute a security threat https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  2. Initial Assessment: The triage process begins with an initial assessment of the incident to determine its nature and scope. This may involve examining the alert details, the entities involved (such as users or IP addresses), and the timeline of events.

  3. Prioritization: Incidents are prioritized based on factors such as the severity of the alert, the sensitivity of the affected assets, and the potential impact on the organization. This ensures that the most critical incidents are addressed first.

  4. Investigation: A Tier 1 analyst may start a preliminary investigation using tools like the Microsoft 365 Defender console to gather more information and context about the incident. This can include looking at related events, user activities, and endpoint behaviors https://learn.microsoft.com/en-us/training/modules/introduction-microsoft-365-threat-protection/3-understand-defender-security-operations-center .

  5. Escalation: If the incident requires advanced remediation or further investigation, it is escalated to a higher-tier analyst or team. The triage team may remain involved to learn from the investigation process, which might use Microsoft Sentinel or another SIEM for broader context https://learn.microsoft.com/en-us/training/modules/introduction-microsoft-365-threat-protection/3-understand-defender-security-operations-center .

  6. Documentation: Throughout the triage process, analysts document their findings and actions. This documentation is crucial for maintaining a record of the incident and can be used for reporting, compliance, and improving the incident response process.

  7. Communication: Effective communication with other teams and stakeholders is essential during triage. Analysts may need to collaborate with business stakeholders, identity administrators, Azure administrators, and endpoint administrators to secure IT systems https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

For additional information on triaging incidents in Microsoft Sentinel, you can refer to the following resources:

By following these steps and utilizing the resources provided, analysts can effectively triage incidents in Microsoft Sentinel, ensuring a swift and organized response to security threats.

Manage incident response (35–40%)

Manage incidents in Microsoft Sentinel

Investigate Incidents in Microsoft Sentinel

When investigating incidents in Microsoft Sentinel, it is essential to understand the process and tools available to effectively manage and resolve security incidents. Microsoft Sentinel provides a comprehensive set of capabilities for incident triage, investigation, and response.

Incident Generation and Triage: An incident in Microsoft Sentinel is generated when an enabled alert is triggered. The triage process involves managing these incidents by changing their status or assigning them to individuals for further investigation https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/3-how-azure-sentinel-works .

Investigation Tools: Microsoft Sentinel offers an investigation graph, which is a visual tool that helps investigators to identify the entities involved in the attack and the relationships between those entities. This graph can be accessed from the Hunting page by selecting Investigate https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/4-bookmarks .

Multi-Workspace Incidents: For incidents that span across multiple workspaces, Microsoft Sentinel provides the capability to investigate these incidents comprehensively, ensuring that no part of the attack is overlooked https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

Timeline Analysis: Investigators can use the timeline feature to map entities across log data and understand the sequence of events leading up to and following the incident. This helps in identifying patterns and correlations between alerts over time https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/3-how-azure-sentinel-works .

Incident Management: Microsoft Sentinel allows standard incident management tasks, such as updating incident details, managing the lifecycle of the incident, and documenting the resolution process https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/3-how-azure-sentinel-works .

Additional Resources: For more detailed guidance on investigating security incidents with Microsoft Sentinel, including a demonstration of Microsoft 365 Defender and Microsoft Sentinel working together, you can refer to the following cloud guide: - Investigate Security Incidents in a Hybrid Environment with Azure Sentinel https://learn.microsoft.com/en-us/training/modules/introduction-microsoft-365-threat-protection/5-investigate-security-incident-defender .

By utilizing these tools and following a structured approach, investigators can effectively manage and resolve incidents within Microsoft Sentinel, ensuring the security and integrity of their environment.

Manage incident response (35–40%)

Manage incidents in Microsoft Sentinel

Responding to Incidents in Microsoft Sentinel

When dealing with security incidents, an effective response is crucial. Microsoft Sentinel provides a comprehensive approach to incident response, which can be broken down into several key activities:

  1. Incident Triage: The initial step involves triaging incidents to determine their severity and impact. This process helps in prioritizing incidents that require immediate attention https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  2. Investigation: Once an incident is triaged, the next step is to investigate it thoroughly. Microsoft Sentinel offers tools to explore incident evidence and entities, which can be crucial in understanding the scope and the root cause of the incident https://learn.microsoft.com/en-us/training/modules/incident-management-sentinel/1-introduction .

  3. Automated Workflows (Playbooks): For efficiency and speed, Microsoft Sentinel allows the creation of automated workflows, known as playbooks. These can be triggered in response to events and can perform a range of actions from incident management to remediation. This automation is part of the Security Orchestration, Automation, and Response (SOAR) capabilities of Microsoft Sentinel https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/3-how-azure-sentinel-works .

  4. Manual Response: In some cases, a manual response may be necessary. This could involve actions such as adjusting security policies, patching vulnerabilities, or other remediation steps that cannot be automated.

  5. Roles and Permissions: It’s important to understand the roles within Microsoft Sentinel that are allowed to respond to incidents. For example, a Microsoft Sentinel Contributor and Logic App Contributor can create and run playbooks, manage incidents, and have full access to create and edit workbooks and analytic rules https://learn.microsoft.com/en-us/training/modules/create-manage-azure-sentinel-workspaces/5-understand-azure-sentinel-permissions-roles .

For additional information on how to respond to incidents in Microsoft Sentinel, you can refer to the following resources:

By understanding and utilizing these capabilities, security teams can effectively manage and respond to incidents, reducing the potential impact on the organization.

Manage incident response (35–40%)

Configure security orchestration, automation, and response (SOAR) in Microsoft Sentinel

Creating and configuring automation rules in Microsoft Sentinel involves a series of steps that allow you to automate responses to security alerts and incidents. Automation rules can help streamline your security operations by reducing manual tasks and ensuring consistent responses to common threats. Here’s a detailed explanation of how to create and configure automation rules:

Step 1: Access Microsoft Sentinel

To begin, you need to access Microsoft Sentinel in the Azure portal. Microsoft Sentinel is a cloud-native SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) solution that provides intelligent security analytics for your entire enterprise.

Step 2: Navigate to Automation Rules

Within Microsoft Sentinel, navigate to the Automation section. Here you will find options to manage and create automation rules.

Step 3: Create a New Automation Rule

Select the option to Create a new automation rule. You can do this from the Automated response tab of the analytics rule wizard or by selecting Add new in the Incident automation section https://learn.microsoft.com/en-us/training/modules/automation-microsoft-sentinel/3-create-automation-rules .

Step 4: Configure Rule Conditions

When creating a new automation rule, you will need to specify the conditions under which the rule should trigger. This could be based on the severity of an alert, the type of incident, or other criteria relevant to your security policies.

Step 5: Define the Automated Response

After setting the conditions, you will define what automated actions should be taken when the rule triggers. This could include sending notifications, invoking a playbook, or other automated tasks designed to respond to the incident.

Step 6: Apply the Rule to Analytics Rules

Specify which analytics rules the automation rule should apply to. If you are creating the automation rule from within the analytics rule wizard, it will automatically apply to that particular rule. Otherwise, you can select the analytics rules to which the new automation rule should be associated https://learn.microsoft.com/en-us/training/modules/automation-microsoft-sentinel/3-create-automation-rules .

Step 7: Save and Enable the Rule

Once you have configured the automation rule to your satisfaction, save the rule and ensure it is enabled. This will activate the rule so that it can begin automating responses based on the conditions and actions you have defined.

For additional information on creating and configuring automation rules in Microsoft Sentinel, you can refer to the official Microsoft documentation:

By following these steps, you can effectively create and configure automation rules in Microsoft Sentinel to enhance your security posture and reduce the workload on your security operations team.

Manage incident response (35–40%)

Configure security orchestration, automation, and response (SOAR) in Microsoft Sentinel

Create and Configure Microsoft Sentinel Playbooks

Microsoft Sentinel playbooks are automated workflows that help you respond to security incidents. These playbooks are built on Azure Logic Apps, which allows for the creation of complex workflows using a visual designer or JSON code. Here’s a detailed explanation of how to create and configure Microsoft Sentinel playbooks:

  1. Accessing Microsoft Sentinel: To begin, you need to access Microsoft Sentinel in the Azure portal. Ensure you have the necessary permissions to create and manage playbooks.

  2. Creating a New Playbook:

    • Navigate to the Automated Response tab within Microsoft Sentinel.
    • Select the option to create a new playbook. This will open the Azure Logic Apps designer.
    • Use the designer to build your workflow by adding triggers, actions, and conditions that define how the playbook operates.
  3. Configuring Triggers and Actions:

    • Triggers: Define what will initiate the playbook. Common triggers include the creation of an incident or an alert.
    • Actions: Specify the operations to be performed when the playbook is triggered. Actions can range from sending notifications and creating tickets to running scripts and calling external services.
  4. Assigning Permissions:

  5. Testing the Playbook:

    • After configuring the playbook, it’s important to test it to ensure it behaves as expected.
    • You can manually trigger the playbook or use a test incident to verify the workflow.
  6. Connecting to Data Sources:

  7. Using the Repository:

  8. Automation Rules:

For additional information on creating and configuring playbooks in Microsoft Sentinel, you can refer to the following resources: - Threat response with Microsoft Sentinel Playbooks - Automate threat response with playbooks in Microsoft Sentinel

By following these steps, you can effectively create and configure playbooks in Microsoft Sentinel to automate your security operations and response strategies.

Manage incident response (35–40%)

Configure security orchestration, automation, and response (SOAR) in Microsoft Sentinel

Configure Analytic Rules to Trigger Automation

In Microsoft Sentinel, configuring analytic rules to trigger automation is a critical step in streamlining the incident response process. Here’s a detailed explanation of how to set this up:

  1. Create and Configure Automation Rules:
  2. Define Rule Parameters:
  3. Linking Automation Rules to Analytic Rules:
  4. Triggering Playbooks from Analytic Rules:
  5. Additional Resources:

By following these steps, you can effectively configure analytic rules to trigger automation in Microsoft Sentinel, enhancing your security operations’ efficiency and responsiveness.

For additional information and step-by-step guidance, please visit the following URLs: - Create and configure automation rules - Threat response with Microsoft Sentinel Playbooks

Manage incident response (35–40%)

Configure security orchestration, automation, and response (SOAR) in Microsoft Sentinel

Triggering Playbooks Manually from Alerts and Incidents

In Microsoft Sentinel, playbooks are a key component for automating and orchestrating threat response. They are essentially collections of response and remediation actions that can be executed as part of a routine when dealing with security threats. While playbooks can be set to run automatically in response to specific alerts or incidents, they can also be triggered manually. This manual execution is particularly useful when a security analyst needs to respond to alerts or manage incidents on-demand.

How to Trigger Playbooks Manually

To trigger a playbook manually from an alert or incident in Microsoft Sentinel, follow these steps:

  1. Navigate to the Microsoft Sentinel dashboard in the Azure portal.
  2. Under the Threat Management section, choose Alerts or Incidents depending on where you want to trigger the playbook from.
  3. Select the specific alert or incident that you want to manage.
  4. In the alert or incident details pane, look for the Automated response section.
  5. Here, you will see a list of playbooks that are available to run. These playbooks are based on workflows built in Azure Logic Apps, which means they can integrate with various systems and services https://learn.microsoft.com/en-us/training/modules/automation-microsoft-sentinel/2-understand-automation-options .
  6. Click on the playbook you wish to run. This will open the Logic Apps designer where you can review the playbook actions before executing them.
  7. After reviewing, you can manually run the playbook by clicking the Run button within the Logic Apps designer.

Considerations for Manual Playbook Execution

Additional Resources

For more detailed information on creating and configuring playbooks in Microsoft Sentinel, as well as managing automated responses, you can refer to the following resources:

By understanding how to trigger playbooks manually, security analysts can effectively respond to alerts and manage incidents in a timely and controlled manner, leveraging the full capabilities of Microsoft Sentinel and Azure Logic Apps.

Manage incident response (35–40%)

Configure security orchestration, automation, and response (SOAR) in Microsoft Sentinel

Run Playbooks on On-premises Resources

In the realm of security operations, the ability to automate responses to incidents is crucial for enhancing productivity and efficiency. Microsoft Sentinel, a cloud-native SIEM (Security Information and Event Management) system, empowers security teams with the capability to create automated workflows known as playbooks. These playbooks can be executed in response to various events and are a part of the broader security orchestration, automation, and response (SOAR) capabilities https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/3-how-azure-sentinel-works .

Playbooks in Microsoft Sentinel are built using Azure Logic Apps, which allows for the automation of tasks across both cloud and on-premises environments. This integration is particularly beneficial for organizations that operate in a hybrid model, with resources distributed across cloud and on-premises infrastructures https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/3-how-azure-sentinel-works .

When it comes to running playbooks on on-premises resources, the process involves several steps:

  1. Ingest Data: Initially, data from cloud and on-premises environments is ingested into Microsoft Sentinel. This data forms the basis for analytics and detection of security incidents https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/3-how-azure-sentinel-works .

  2. Perform Analytics: Once the data is ingested, Microsoft Sentinel applies its built-in machine learning and threat intelligence to analyze the data and detect potential threats https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/2-what-is-azure-sentinel .

  3. Manage Incidents: If a threat is detected, an incident is created within Microsoft Sentinel. Security analysts can then manage and investigate these incidents https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/3-how-azure-sentinel-works .

  4. Automate Response: For incidents that are identified, playbooks can be triggered to respond automatically. These automated responses can include tasks such as incident management, enrichment, investigation, or remediation https://learn.microsoft.com/en-us/training/modules/intro-to-azure-sentinel/3-how-azure-sentinel-works .

  5. Integration with On-premises Resources: To facilitate the execution of playbooks on on-premises resources, Microsoft Sentinel can be integrated with these resources through secure connections. For instance, a Site-to-Site VPN can be established for secure communication between on-premises resources and Azure services https://learn.microsoft.com/en-us/azure/dedicated-hsm/networking .

By leveraging playbooks, organizations can automate their security responses, which can range from simple notifications to complex remediation actions. This automation helps reduce the time and effort required by security teams to respond to incidents, allowing them to focus on more strategic tasks.

For additional information on creating and managing playbooks in Microsoft Sentinel, you can refer to the following resources: - Automate threat responses with playbooks in Microsoft Sentinel - Create automated workflows with Azure Logic Apps

For guidance on setting up secure connections between Azure services and on-premises resources, the following documentation can be useful: - VPN Gateway planning options - Create a site-to-site connection

By understanding and implementing these playbooks, security teams can significantly enhance their ability to manage and respond to security incidents in a timely and effective manner.

Perform threat hunting (15–20%)

Hunt for threats by using KQL

Identify Threats by Using Kusto Query Language (KQL)

Kusto Query Language (KQL) is a powerful tool used to query large datasets in Microsoft services like Azure and Microsoft 365. When it comes to identifying threats, KQL plays a crucial role in security operations, enabling analysts to sift through vast amounts of data to pinpoint suspicious activities and potential security threats.

Understanding KQL

KQL is a read-only request to process data and return results. The language is based on relational database management principles and includes a rich set of functions, operators, and statements that allow users to compose complex queries to perform advanced data analytics.

Using KQL to Identify Threats

To identify threats using KQL, you would typically:

  1. Access Relevant Data: Connect to the appropriate data source within Microsoft 365 Defender or Microsoft Sentinel that contains the logs and data streams relevant to security.

  2. Formulate Queries: Write KQL queries to filter and analyze the data. This might involve looking for known indicators of compromise, unusual patterns of behavior, or other signs of potential security issues.

  3. Analyze Results: Examine the results returned by the queries to identify potential threats. This could include flagged activities, outlier events, or patterns that match known attack vectors.

  4. Iterate and Refine: As threats evolve, so too should the KQL queries. Regularly update and refine queries to adapt to the changing security landscape and to improve detection accuracy.

Practical Applications of KQL in Threat Detection

Resources for Learning KQL

  • Microsoft KQL Documentation: The official KQL documentation provides a comprehensive guide to the language, including syntax, functions, and best practices.
  • Microsoft Learning Paths: Microsoft offers learning paths and modules that cover how to use KQL in the context of Microsoft Sentinel and other services.

Conclusion

KQL is an essential skill for security analysts involved in threat detection and response. By mastering KQL, analysts can effectively harness the data within Microsoft’s security tools to identify and mitigate threats swiftly.

Please note that while URLs to additional resources are requested, as per the instructions, I am unable to provide direct URLs. However, the official Microsoft documentation and learning paths mentioned above can be found on the Microsoft Learn website and are a valuable resource for anyone looking to deepen their understanding of KQL and its applications in threat detection.

Perform threat hunting (15–20%)

Hunt for threats by using KQL

Interpret Threat Analytics in the Microsoft Defender Portal

Threat Analytics is a feature within the Microsoft Defender portal that provides security analysts with detailed reports on cybersecurity threats. These reports include information about the nature of the threat, the affected systems, and recommended actions to mitigate the risk. Here’s how to interpret Threat Analytics:

  1. Access Threat Analytics: Navigate to the Microsoft 365 Defender portal. In the navigation pane, select “Threat Analytics” to view the reports.

  2. Understand Threat Reports: Each report provides insights into specific threats. It includes an overview, detailed analysis, and impact assessment. The overview gives a summary of the threat, while the detailed analysis offers in-depth information about the threat’s behaviors, tactics, techniques, and procedures (TTPs).

  3. Review Affected Assets: The reports identify which systems are affected or potentially at risk from the threat. This helps prioritize remediation efforts based on the criticality of the affected assets.

  4. Mitigation Recommendations: Threat Analytics provides actionable recommendations to mitigate the threat. These can include configuration changes, updates, or other security measures.

  5. Monitor Threat Evolution: Threat Analytics is continuously updated. Regularly review the reports to stay informed about the latest threat intelligence and evolution of threats.

  6. Custom Notifications: You can configure email notifications for new or updated Threat Analytics reports. This ensures that you are promptly informed about emerging threats and can take timely action https://learn.microsoft.com/en-us/training/modules/mitigate-incidents-microsoft-365-defender/13-configure-microsoft-365-defender-portal .

For additional information on Threat Analytics and how to use it within the Microsoft Defender portal, you can refer to the official Microsoft documentation: Threat Analytics in Microsoft 365 Defender.

Remember, interpreting Threat Analytics is a critical part of maintaining a strong security posture and ensuring that your organization is protected against the latest cybersecurity threats. Regularly engaging with these reports can significantly enhance your ability to respond to and mitigate potential security incidents.

Perform threat hunting (15–20%)

Hunt for threats by using KQL

Create Custom Hunting Queries by Using KQL

Kusto Query Language (KQL) is the foundational language used in Microsoft Sentinel for analyzing and querying data. Custom hunting queries are an essential tool for threat hunting, allowing security analysts to proactively search through data to identify potential threats. Here’s a detailed explanation of how to create custom hunting queries using KQL:

  1. Understand the Basics of KQL: Before creating custom queries, it’s important to have a grasp of KQL syntax and its capabilities. KQL is used for a variety of purposes within Microsoft Sentinel, including analytics, workbooks, and hunting https://learn.microsoft.com/en-us/training/modules/analyze-results-kusto-query-language/7-summary-resources .

  2. Access the Hunting Query Interface: In Microsoft Sentinel, navigate to the hunting section where you can view and manage hunting queries https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  3. Modify Existing Queries: You can start by modifying an existing query. Select a query from the content gallery, adjust it in the details pane, and run it to see the results. This modified query can then be saved for future use https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/3-query-management-creation .

  4. Create a New Custom Query: To create a new hunting query, use the KQL code to specify what you’re looking for in your data. This could involve searching for specific patterns, behaviors, or anomalies that could indicate a security threat https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/3-query-management-creation .

  5. Define Query Parameters: When creating a custom query, you’ll need to provide a name and description for your query. Additionally, you’ll write the KQL hunting query and map entity types to columns from your query result. This mapping enriches your query results with actionable information. You can also specify the tactics that your query is designed to expose, which helps in categorizing and understanding the nature of the threats you’re hunting https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/3-query-management-creation .

  6. Utilize the MSTICPy Library: For more advanced users, the MSTICPy library can be used to execute KQL queries within a Jupyter notebook environment. This allows for the integration of custom Python scripts with KQL queries, providing a powerful way to analyze and visualize data https://learn.microsoft.com/en-us/training/modules/perform-threat-hunting-sentinel-with-notebooks/5-explore-notebook-code https://learn.microsoft.com/en-us/training/modules/perform-threat-hunting-sentinel-with-notebooks/5-explore-notebook-code .

  7. Visualize Query Results: KQL also supports data visualization. After running your query, you can use KQL statements to render visualizations, such as bar graphs or pie charts, to better understand the data and identify patterns https://learn.microsoft.com/en-us/training/modules/analyze-results-kusto-query-language/7-summary-resources .

  8. Save and Manage Queries: Once you have created and tested your custom hunting query, you can save it to your Microsoft Sentinel workspace. Custom queries are listed alongside built-in queries for easy management and reuse https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/3-query-management-creation .

For additional information on creating custom hunting queries using KQL, you can refer to the following resources:

By following these steps and utilizing the resources provided, you can effectively create custom hunting queries in Microsoft Sentinel to enhance your organization’s security posture.

Perform threat hunting (15–20%)

Hunt for threats by using Microsoft Sentinel

Analyze Attack Vector Coverage Using MITRE ATT&CK in Microsoft Sentinel

When analyzing attack vector coverage, it is essential to leverage the MITRE ATT&CK framework within Microsoft Sentinel. This framework is a globally recognized knowledge base of adversary tactics and techniques based on real-world observations. It is instrumental in developing threat models and methodologies to assess and improve an organization’s security posture https://learn.microsoft.com/en-us/training/modules/what-is-threat-hunting-azure-sentinel/3a-explore-mitre-att-ck .

Understanding MITRE ATT&CK in Microsoft Sentinel

Microsoft Sentinel integrates the MITRE ATT&CK framework to help visualize and understand the nature and extent of your organization’s security coverage. This integration allows you to:

Utilizing the MITRE ATT&CK Coverage Matrix

In Microsoft Sentinel, the MITRE ATT&CK coverage matrix is a crucial tool for analyzing your security coverage:

Simulated Coverage

Simulated coverage refers to potential detections that are not currently configured but are available in your Microsoft Sentinel workspace. By viewing simulated coverage, you can gauge the possible security status if all available detections were configured:

Prioritization and Focus

Microsoft Sentinel prioritizes attack vectors and scenarios based on security research aligned with the MITRE ATT&CK framework. This prioritization process identifies entities as victims, perpetrators, or pivot points in the attack chain, focusing on the most valuable logs each data source can provide https://learn.microsoft.com/en-us/training/modules/use-entity-behavior-analytics-azure-sentinel/2-understand-user-entity-behavior-analytics .

Additional Resources

For more information on using the MITRE ATT&CK framework in Microsoft Sentinel, you can refer to the following resources:

By thoroughly understanding and utilizing the MITRE ATT&CK framework within Microsoft Sentinel, security professionals can effectively analyze attack vector coverage and enhance their organization’s security measures.

Perform threat hunting (15–20%)

Hunt for threats by using Microsoft Sentinel

When working with Microsoft Sentinel, one of the key activities is to customize hunting queries to tailor them to the specific needs of your environment. The content gallery in Microsoft Sentinel provides a collection of pre-built queries that can be used as a starting point for hunting threats. Customizing these queries allows you to refine the search criteria and focus on the most relevant data for your security operations.

Steps to Customize Hunting Queries:

  1. Access the Content Gallery: Begin by accessing the content gallery within Microsoft Sentinel. This gallery includes a variety of hunting queries that have been shared by Microsoft and the community.

  2. Select a Hunting Query: Choose a hunting query that closely matches the threat scenario you wish to investigate. This will serve as the foundation for your customization.

  3. Modify the Query: Edit the selected query to suit your specific requirements. This may involve changing the search parameters, adding or removing filters, or incorporating additional data sources.

  4. Test the Query: Run the modified query to ensure it returns the expected results. Pay attention to the accuracy and relevance of the data retrieved.

  5. Save the Custom Query: Once you are satisfied with the modifications, save the custom hunting query for future use. You can also share it with your team or contribute it back to the community.

  6. Monitor Query Performance: Regularly review the performance of your custom hunting queries. Update them as necessary to adapt to evolving threats and changes in your environment.

Best Practices for Customizing Hunting Queries:

  • Understand the Data: Familiarize yourself with the data sources and schemas available in Microsoft Sentinel to write effective queries.

  • Use the Right Operators: Utilize the appropriate Kusto Query Language (KQL) operators to manipulate the data, such as summarize, project, and join.

  • Optimize for Performance: Ensure your queries are optimized for performance to avoid excessive resource consumption and to retrieve results quickly.

  • Collaborate with the Community: Engage with the Microsoft Sentinel community to learn from others’ experiences and to share your own custom queries.

Additional Resources:

For more information on customizing hunting queries and using Microsoft Sentinel, you can refer to the following resources:

By following these guidelines and utilizing the available resources, you can effectively customize content gallery hunting queries to enhance your threat hunting capabilities within Microsoft Sentinel.

Perform threat hunting (15–20%)

Hunt for threats by using Microsoft Sentinel

Use Hunting Bookmarks for Data Investigations

Hunting bookmarks in Microsoft Sentinel are a powerful feature for threat hunting and data investigation. They allow analysts to preserve the results of their queries, including any relevant findings, for future reference. Here’s a detailed explanation of how to use hunting bookmarks for data investigations:

  1. Preservation of Queries and Results: When you run a query and find results that are significant for your investigation, you can save these queries and their results as bookmarks. This ensures that you can easily return to this data at a later time without having to rerun the query https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  2. Adding Contextual Information: Along with saving the query, you can add notes and tags to your bookmarks. This contextual information can be crucial when revisiting the bookmark or when sharing it with team members, as it provides insights into why the data was bookmarked https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/4-bookmarks .

  3. Collaboration: Bookmarks are not just personal; they are visible to your entire team. This facilitates collaboration, as team members can see each other’s bookmarks, notes, and tags, which can be instrumental in a collective investigation effort https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/4-bookmarks https://learn.microsoft.com/en-us/training/modules/incident-management-sentinel/4-understand-evidence-entities .

  4. Accessing Bookmarked Data: To access your bookmarked data, you can go to the Bookmarks tab on the Hunting page. Here, you can use filters and search options to find specific bookmarks relevant to your current investigation. Additionally, bookmarked data can be reviewed directly in the HuntingBookmark table in your Log Analytics workspace https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/4-bookmarks .

  5. Creating a Bookmark: To create a bookmark, select the checkbox beside an event in the Results section of the Logs page, and then select Add bookmark. In the Add bookmark pane, you can then select Create to save the bookmark https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/6-exercise-hunt-for-threats .

  6. Investigating Bookmarked Data: Once you have created a bookmark, you can select it from the list of bookmarks to view more details. If you wish to investigate further, you can select Investigate on the details page to observe the incident and related entities in greater depth https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/6-exercise-hunt-for-threats .

  7. Use in Incident Investigation: Bookmarks can be particularly useful when investigating incidents. By marking events as bookmarks, you can track specific activities or anomalies that may be part of a larger security threat. This helps in building a comprehensive picture of the incident.

  8. Documentation of Investigation Process: By using bookmarks to document the steps taken during an investigation, you create a record that can be used for reporting, auditing, or educating new team members on threat-hunting processes https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/6-exercise-hunt-for-threats .

For additional information on using hunting bookmarks in Microsoft Sentinel, you can refer to the official Microsoft documentation: - Use bookmarks in Microsoft Sentinel for threat hunting and investigation

Remember, bookmarks are a key part of the threat-hunting toolkit in Microsoft Sentinel, enabling you to effectively manage and revisit important findings during data investigations.

Perform threat hunting (15–20%)

Hunt for threats by using Microsoft Sentinel

Monitor Hunting Queries by Using Livestream

Livestream in Microsoft Sentinel is a feature that allows security analysts to monitor hunting queries in real-time. It provides an interactive session that notifies the analyst when Sentinel finds matching events for a query. This is particularly useful for testing new queries against live events and generating notifications for potential threats.

To effectively use Livestream for monitoring hunting queries, follow these steps:

  1. Initiate a Livestream Session: From the Hunting page in Microsoft Sentinel, navigate to the Livestream tab and select “New livestream” to start a session https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/5-livestream .

  2. Craft a Query: Develop a query that targets the specific events or behaviors you are interested in. Since Livestream queries run continuously against live data, it is important to note that time parameters cannot be used in a Livestream query https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/5-livestream .

  3. Receive Notifications: Once the Livestream is running, it will refresh every 30 seconds. If the query finds new results, Azure notifications will be generated to alert the analyst https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/5-livestream .

  4. Investigate and Respond: Use the notifications to quickly launch investigations into the detected events. This allows for a proactive response to potential threats https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/5-livestream .

  5. Continuous Observation: Livestream sessions enable continuous observation of threats over time, helping analysts to stay vigilant and responsive to emerging threats https://learn.microsoft.com/en-us/training/modules/hunt-threats-sentinel/1-introduction .

For additional information on how to use Livestream in Microsoft Sentinel, please refer to the following URL: Hunt threats with Microsoft Sentinel.

By utilizing Livestream, security teams can enhance their threat hunting capabilities, ensuring that they can detect and respond to threats in a timely manner.

Perform threat hunting (15–20%)

Hunt for threats by using Microsoft Sentinel

Retrieve and Manage Archived Log Data

Archived log data management is a crucial aspect of maintaining a secure and efficient environment in Microsoft Sentinel. It involves the process of handling older, less frequently accessed data that has been stored over time. Here’s a detailed explanation of how to retrieve and manage archived log data:

Archiving Logs

Retrieving Archived Data

Managing Archived Data

Additional Information

For more details on managing log data in Microsoft Sentinel, including archiving and retrieval processes, you can refer to the following resources:

By understanding and utilizing these features, you can effectively manage your archived log data in Microsoft Sentinel, ensuring that your environment remains secure while optimizing costs.

Perform threat hunting (15–20%)

Hunt for threats by using Microsoft Sentinel

Create and Manage Search Jobs

Search jobs in Microsoft Sentinel are a powerful feature that allows security teams to conduct thorough investigations by searching for specific events within logs over a given time frame. Here’s a detailed explanation of how to create and manage search jobs:

Creating a Search Job

  1. Initiate a Search Job: When starting an investigation, you can use a search job to locate particular events in your logs. This is done by specifying your search criteria and the time frame you’re interested in https://learn.microsoft.com/en-us/training/modules/use-search-jobs-microsoft-sentinel/2-hunt-search-job .

  2. Asynchronous Queries: Search jobs operate asynchronously, meaning they fetch records without impacting the performance or availability of your workspace. They are designed to handle parallel processing, which is particularly useful for searching across extensive time spans and large datasets https://learn.microsoft.com/en-us/training/modules/use-search-jobs-microsoft-sentinel/2-hunt-search-job .

  3. Search Results Table: Once a search job is initiated, the results are returned to a search table created in your Log Analytics workspace. This table will have a suffix ***_SRCH**, indicating it contains the results of your search job https://learn.microsoft.com/en-us/training/modules/use-search-jobs-microsoft-sentinel/2-hunt-search-job .

Managing Search Jobs

  1. Monitoring Search Jobs: You can monitor the progress of your search jobs using features like Livestream, which provides real-time updates on the queries being executed https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  2. Retrieving and Managing Log Data: It’s possible to retrieve and manage archived log data as part of your search jobs. This is particularly useful when you need to investigate historical data https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  3. Viewing Search Jobs: After creating a search job, you can view its status and results within Microsoft Sentinel. This allows you to assess the effectiveness of your search criteria and make adjustments as necessary https://learn.microsoft.com/en-us/training/modules/use-search-jobs-microsoft-sentinel/5-summary-resources .

  4. Restoring Archived Logs: If your investigation requires a deep dive into archived data, you can restore this data into the hot cache. This enables you to run high-performance queries and analytics on the data that is no longer actively stored in your workspace https://learn.microsoft.com/en-us/training/modules/use-search-jobs-microsoft-sentinel/2-hunt-search-job .

Best Practices

By following these steps and best practices, you can effectively create and manage search jobs within Microsoft Sentinel, aiding in comprehensive security investigations and data analysis.

For additional information on creating and managing search jobs, you can refer to the following resources: - Search in Microsoft Sentinel - Investigate threats with content search in Microsoft Purview

Perform threat hunting (15–20%)

Analyze and interpret data by using workbooks

Activate and Customize Microsoft Sentinel Workbook Templates

Microsoft Sentinel offers a range of workbook templates that can be activated and customized to visualize and analyze security data effectively. Here is a detailed explanation of how to activate and customize these templates:

Activation of Workbook Templates

  1. Accessing Workbook Templates: Navigate to the Workbooks page within Microsoft Sentinel from the navigation pane. This is where you can manage and review your workbooks and the available templates https://learn.microsoft.com/en-us/training/modules/query-data-sentinel/5-workbooks .

  2. Selecting a Template: On the Templates tab, you can browse through the existing workbook templates. These templates are designed to provide a starting point for various security data visualizations and analyses https://learn.microsoft.com/en-us/training/modules/query-data-sentinel/5-workbooks .

  3. Reviewing Template Details: Before activating a template, you can select it to view additional information in the details pane. This includes the required data types and data connectors that must be connected to Microsoft Sentinel for the workbook to function properly https://learn.microsoft.com/en-us/training/modules/query-data-sentinel/5-workbooks .

  4. Activating a Template: Once you have selected a template that suits your needs, you can activate it for use. This typically involves connecting the necessary data connectors and ensuring that the relevant data is being ingested into Microsoft Sentinel https://learn.microsoft.com/en-us/training/modules/query-data-sentinel/5-workbooks .

Customization of Workbook Templates

  1. Modifying Templates: After activating a template, you can customize it to better fit your specific requirements. Microsoft Sentinel allows you to modify the existing visualizations or add new ones https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  2. Advanced Visualizations: Configure advanced visualizations to gain deeper insights into your security data. This may include creating bar charts, pie charts, and other graphical representations to make the data more accessible and understandable https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 https://learn.microsoft.com/en-us/training/modules/query-data-sentinel/5-workbooks .

  3. Saving Custom Workbooks: Once you have customized a workbook, you can save it for quick access. Customized workbooks can be found under the My workbooks tab for future reference and use https://learn.microsoft.com/en-us/training/modules/query-data-sentinel/5-workbooks .

  4. Creating Workbooks from Scratch: If the existing templates do not meet your needs, you have the option to create your own workbooks from scratch. This allows for complete control over the data visualizations and the layout of the workbook https://learn.microsoft.com/en-us/training/modules/query-data-sentinel/5-workbooks .

For additional information on working with Microsoft Sentinel workbook templates, you can refer to the official Microsoft documentation: Work with Microsoft Sentinel workbooks.

By following these steps, you can effectively activate and customize Microsoft Sentinel workbook templates to create tailored visualizations of your security data, enhancing your ability to monitor and respond to threats.

Perform threat hunting (15–20%)

Analyze and interpret data by using workbooks

Create Custom Workbooks that Include KQL

When creating custom workbooks in Microsoft Sentinel, one of the key features is the ability to incorporate Kusto Query Language (KQL) to analyze and visualize data. KQL is a powerful language used to query large datasets, particularly in Azure services like Microsoft Sentinel. Here’s a step-by-step guide on how to create custom workbooks with KQL:

  1. Activate Workbook Templates: Start by exploring the available Microsoft Sentinel workbook templates. These templates provide a starting point for creating custom workbooks tailored to specific needs https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  2. Customize Workbook Templates: Customize the selected template by adding new visualizations or modifying existing ones. This customization can be done to better suit the data analysis requirements of your environment https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  3. Create Custom Workbooks: To create a custom workbook from scratch, navigate to the Microsoft Sentinel dashboard, select ‘Workbooks’, and then ‘Add workbook’. Here, you can design your workbook by adding text, links, and KQL-based visualizations https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  4. Write KQL Statements: Use KQL to summarize and render data within the workbook. KQL allows you to create complex queries to extract and display data in a meaningful way. You can summarize data using KQL statements and render visualizations based on the results https://learn.microsoft.com/en-us/training/modules/analyze-results-kusto-query-language/7-summary-resources .

  5. Advanced Visualizations: Configure advanced visualizations in your workbook by using KQL to create more sophisticated data representations. This could include time charts, pie charts, and other graphical elements that make the data easier to understand at a glance https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  6. Data Correlation with KQL: Correlate data from different tables within Microsoft Sentinel using KQL. This is essential for building detections and understanding the relationships between various data points. Use the union operator to combine results from multiple tables, and the join operator to merge two tables https://learn.microsoft.com/en-us/training/modules/build-multi-table-statements-kusto-query-language/5-summary-resources .

  7. Extract Data Using KQL: Learn to extract data from both unstructured and structured string fields using KQL. This skill is crucial for parsing logs and other data sources that may not be in a readily analyzable format https://learn.microsoft.com/en-us/training/modules/work-with-data-kusto-query-language/7-summary-resources .

  8. Create Functions with KQL: Simplify complex queries by creating functions in KQL. Functions can encapsulate common query patterns and can be reused across different workbooks and queries https://learn.microsoft.com/en-us/training/modules/work-with-data-kusto-query-language/7-summary-resources .

For additional information and resources on KQL and workbook creation, you can refer to the following URLs:

By following these steps and utilizing the resources provided, you can create custom workbooks in Microsoft Sentinel that effectively leverage KQL for data analysis and visualization.

Perform threat hunting (15–20%)

Analyze and interpret data by using workbooks

Configure Visualizations

Visualizations are a critical component in monitoring and analyzing security data. They enable security operations analysts to quickly identify trends, detect anomalies, and understand the overall security posture of their organization. When configuring visualizations, analysts can leverage tools such as Microsoft Sentinel workbook templates and create custom workbooks to display data in a meaningful way.

Activate and Customize Microsoft Sentinel Workbook Templates

Microsoft Sentinel provides a range of workbook templates that can be activated and customized to suit specific organizational needs. These templates are pre-designed with queries, visualizations, and insights that help analysts to start quickly.

  1. Activation: To activate a workbook template in Microsoft Sentinel, navigate to the ‘Workbooks’ section within the Sentinel dashboard. Here, you can find a gallery of templates that Microsoft provides. Select a template that aligns with your monitoring objectives and activate it with a single click.

  2. Customization: After activation, you can customize the workbook to reflect the specific data points and metrics relevant to your organization. This may involve modifying the existing queries or adding new ones, changing visualization types (e.g., from bar charts to line graphs), and adjusting the layout to enhance readability and insight extraction.

Create Custom Workbooks

In addition to using templates, Microsoft Sentinel allows the creation of custom workbooks from scratch. This is particularly useful when you need to tailor the visualizations to unique scenarios that are not covered by the standard templates.

  1. Designing Workbooks: Start by defining the objectives of your workbook. What questions do you need to answer? What data will you need to visualize? Once you have a clear understanding, you can begin designing your workbook by adding text, queries, and visualizations.

  2. Utilizing Kusto Query Language (KQL): Microsoft Sentinel uses KQL for data querying. You’ll need to write KQL statements to retrieve the data you want to visualize. KQL is powerful and flexible, allowing for complex data manipulation and aggregation.

  3. Configuring Advanced Visualizations: Custom workbooks can include advanced visualizations such as time charts, pie charts, maps, and more. These visualizations can be configured to display dynamic data, update in real-time, and provide interactive capabilities to the user.

Additional Resources

For more detailed guidance on configuring visualizations in Microsoft Sentinel, refer to the following resources:

  • Microsoft Sentinel Workbooks Documentation: This resource provides comprehensive information on how to use and customize workbooks within Microsoft Sentinel. Learn more about Microsoft Sentinel Workbooks.

  • Kusto Query Language (KQL) Documentation: To write effective queries for your visualizations, consult the KQL documentation. It offers a deep dive into the syntax, operators, and functions available in KQL. Explore Kusto Query Language (KQL).

  • Microsoft Sentinel GitHub Repository: The GitHub repository contains community-contributed workbook templates and other resources that can be used as a starting point for custom visualizations. Visit the Microsoft Sentinel GitHub Repository.

By effectively configuring visualizations, security operations analysts can enhance their ability to monitor, investigate, and respond to threats in a timely and informed manner.

Perform threat hunting (15–20%)

Analyze and interpret data by using workbooks

Configure Visualizations

When configuring visualizations, it is essential to understand that they are a critical component for monitoring, analyzing, and interpreting data within security operations. Visualizations help in transforming raw data into a more understandable and actionable format. Here are the steps and considerations for configuring visualizations:

  1. Selecting the Right Visualization Type: Depending on the nature of the data and the insights you wish to derive, choose an appropriate visualization type. Common types include line charts for trends over time, bar charts for comparisons, pie charts for proportions, and heatmaps for density.

  2. Data Source Configuration: Ensure that the data source is correctly configured to provide the necessary data for the visualization. This may involve setting up data connectors or ensuring that the correct logs are being ingested.

  3. Customization: Customize the visualization to highlight the most important data points. This can include setting thresholds, configuring colors to represent different values, and choosing which data to display.

  4. Using Templates: Utilize pre-built templates where available. For instance, Microsoft Sentinel provides workbook templates that can be activated and customized to suit specific needs.

  5. Creating Custom Workbooks: For more tailored insights, create custom workbooks. This involves defining the layout, adding multiple visualizations, and configuring each to display the desired data https://learn.microsoft.com/en-us/credentials/certifications/resources/study-guides/sc-200 .

  6. Advanced Visualizations: For complex datasets or to uncover deeper insights, configure advanced visualizations. This may involve using Kusto Query Language (KQL) for custom queries or integrating with other analytics tools.

  7. Interactivity: Add interactivity to your visualizations, such as drill-downs or filters, to allow users to explore the data in more depth.

  8. Sharing and Collaboration: Configure the sharing settings to enable collaboration with other team members or stakeholders. Ensure that the visualizations are accessible to those who need them.

  9. Continuous Improvement: Regularly review and update the visualizations to ensure they remain relevant and useful as the data and organizational needs change.

For additional information on configuring visualizations and to access workbook templates, you can refer to the following resources:

Remember, the goal of configuring visualizations is to make the data work for you, providing clear and actionable insights that can drive security operations decisions.