Learn Configure protections and detections (SC-200) with Interactive Flashcards
Master key concepts in Configure protections and detections through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.
Configure policies for Microsoft Defender for Cloud Apps
Microsoft Defender for Cloud Apps policies are essential components for monitoring and protecting your cloud environment. These policies enable security analysts to detect risky behaviors, violations, and suspicious activities across cloud applications.
To configure policies, navigate to the Microsoft Defender portal and access the Cloud Apps section. There are several policy types available:
**Activity Policies** monitor user activities and trigger alerts based on specific actions. You can create rules that detect unusual login patterns, mass file downloads, or administrative activities from unexpected locations.
**File Policies** scan content across connected cloud apps for sensitive data, malware, or compliance violations. These policies can identify files containing personal information, financial data, or confidential documents shared externally.
**App Discovery Policies** help identify new cloud applications being used within your organization. This shadow IT discovery enables you to track unsanctioned app usage and assess associated risks.
**Session Policies** provide real-time monitoring and control during user sessions. These policies can block downloads, require step-up authentication, or apply protection labels to files during active sessions.
**OAuth App Policies** monitor third-party applications with OAuth permissions to your environment, helping identify potentially malicious or overprivileged apps.
When creating policies, you define filters such as user groups, IP addresses, device types, and specific applications. You also configure governance actions that automatically respond to policy matches, including sending alerts, suspending users, or requiring password resets.
Best practices include starting with built-in policy templates that address common scenarios, then customizing thresholds to reduce false positives. Regular policy review ensures alignment with organizational security requirements. Integration with Microsoft Sentinel enhances investigation capabilities by correlating Cloud Apps alerts with other security data sources.
Proper policy configuration establishes a robust framework for detecting threats and enforcing security controls across your cloud application landscape.
Configure policies for Microsoft Defender for Office 365
Microsoft Defender for Office 365 provides comprehensive protection against email-based threats, phishing attacks, and malicious content. Configuring policies involves several key components that security analysts must understand and implement effectively.
Safe Attachments policies scan email attachments in a sandboxed environment before delivery to recipients. You can configure these policies through the Microsoft 365 Defender portal by navigating to Email & collaboration > Policies & rules > Threat policies. Options include Dynamic Delivery, which delivers emails while attachments are being scanned, and Block mode, which quarantines messages with detected malware.
Safe Links policies protect users from malicious URLs in emails and Office documents. Configuration options include URL scanning at time of click, tracking user clicks, and allowing or blocking specific URLs. You can enable real-time URL scanning and apply policies to internal communications as well.
Anti-phishing policies help detect impersonation attempts and spoofing. You can configure mailbox intelligence, which learns user communication patterns, and set up impersonation protection for specific users and domains. Spoof intelligence allows you to review and manage spoofed senders.
Preset security policies offer Standard and Strict protection levels, providing recommended configurations for organizations wanting quick deployment. These presets apply optimal settings for Safe Attachments, Safe Links, and anti-phishing protection.
Policy priority determines which policy applies when multiple policies could affect a message. Lower priority numbers indicate higher precedence. Custom policies always take priority over default policies.
To configure these policies, navigate to the Security portal, select the appropriate policy type, create or modify policies, define conditions such as recipient domains or groups, and specify actions for detected threats. Regular review of policy effectiveness through reports and alerts ensures optimal protection against evolving threats targeting your organization's email infrastructure.
Configure Defender for Endpoint security policies and ASR rules
Microsoft Defender for Endpoint security policies and Attack Surface Reduction (ASR) rules are essential components for protecting enterprise environments from threats. Security policies in Defender for Endpoint are configured through the Microsoft 365 Defender portal or Microsoft Endpoint Manager (Intune). These policies define how endpoints are protected, monitored, and respond to threats. To configure security policies, administrators navigate to Settings > Endpoints > Configuration Management. Here, you can establish policies for antivirus settings, firewall configurations, and endpoint detection and response (EDR) capabilities. Policies can be applied to device groups based on tags, domains, or other organizational criteria. ASR rules specifically target behaviors commonly exploited by malware and malicious applications. These rules reduce the attack surface by blocking suspicious activities before they execute. Configuration occurs through Group Policy, PowerShell, or Microsoft Endpoint Manager. Key ASR rules include blocking executable content from email clients, preventing Office applications from creating child processes, blocking credential stealing from the Windows local security authority subsystem, and preventing JavaScript or VBScript from launching downloaded executable content. When implementing ASR rules, administrators should start with audit mode to assess potential impact on legitimate business operations. This mode logs events that would have been blocked, allowing teams to identify false positives. After validation, rules can be switched to block mode for active protection. Best practices include deploying ASR rules gradually, monitoring the Microsoft 365 Defender portal for rule triggers, creating exclusions for legitimate business applications that may trigger rules, and regularly reviewing rule effectiveness. Integration with Microsoft Defender for Cloud allows centralized management across hybrid environments. Security teams should correlate ASR events with other security signals in the unified security operations center for comprehensive threat detection and response capabilities.
Configure cloud workload protections in Defender for Cloud
Microsoft Defender for Cloud provides comprehensive cloud workload protection capabilities that security analysts must configure to safeguard Azure, hybrid, and multi-cloud environments. Cloud workload protections, formerly known as Azure Defender, offer advanced threat detection and security features for various resource types.
To configure cloud workload protections, navigate to Microsoft Defender for Cloud in the Azure portal and access the Environment settings section. Here, you can enable specific Defender plans for different workload types including servers, storage accounts, SQL databases, containers, App Service, Key Vault, Resource Manager, and DNS.
For Defender for Servers, you can choose between Plan 1 and Plan 2, with Plan 2 offering additional features like vulnerability assessment, just-in-time VM access, and file integrity monitoring. Configuration involves selecting the workspace for log collection and enabling specific features based on organizational requirements.
Defender for Storage protects Azure Storage accounts by detecting unusual access patterns, potential data exfiltration, and malicious content uploads. Enable this by selecting the storage plan and configuring sensitivity settings for your data classification needs.
Defender for SQL covers Azure SQL databases, SQL servers on machines, and open-source relational databases. It provides vulnerability assessments and advanced threat protection identifying SQL injection attempts and anomalous database activities.
Defender for Containers secures Kubernetes environments by providing runtime protection, vulnerability scanning for container images, and security posture management for cluster configurations.
When configuring these protections, consider auto-provisioning settings that automatically deploy required agents and extensions to covered resources. Configure email notifications to ensure security teams receive timely alerts about detected threats.
Pricing varies by plan and resource type, so analysts should evaluate coverage requirements against budget constraints. Regular review of the secure score recommendations helps identify gaps in protection configuration and guides remediation efforts for maintaining robust cloud security posture.
Configure and manage custom detection rules
Custom detection rules in Microsoft 365 Defender allow security analysts to proactively monitor and respond to specific threats tailored to their organization's unique environment. These rules leverage Advanced Hunting queries written in Kusto Query Language (KQL) to identify suspicious activities and automatically generate alerts or take response actions.
To configure custom detection rules, navigate to the Microsoft 365 Defender portal and access the Hunting section. First, create or refine an Advanced Hunting query that identifies the specific behavior or threat pattern you want to detect. The query must return results that include essential columns such as Timestamp, ReportId, and relevant entity identifiers like DeviceId or AccountObjectId.
Once your query is validated and returns meaningful results, you can convert it into a detection rule by selecting 'Create detection rule.' You must specify several parameters including the rule name, frequency of execution (ranging from every 24 hours to continuous), alert severity level, and the MITRE ATT&CK category that best describes the threat.
The rule configuration also requires mapping entities from your query results. This enables correlation with other alerts and proper entity page population. You can configure automated response actions such as isolating devices, collecting investigation packages, running antivirus scans, or disabling user accounts.
Managing custom detection rules involves regular review and optimization. Monitor rule performance through the detection rule management interface, checking for false positives and adjusting query logic as needed. Rules can be enabled, disabled, modified, or deleted based on evolving security requirements.
Best practices include testing queries thoroughly before creating rules, setting appropriate alert thresholds to minimize noise, documenting rule purposes and logic, and periodically reviewing rule effectiveness. Custom detection rules complement built-in detections by addressing organization-specific threats and filling coverage gaps in your security monitoring strategy.
Manage alerts including tuning, suppression, and correlation
Managing alerts in Microsoft security operations involves three critical components: tuning, suppression, and correlation. These practices help analysts reduce noise and focus on genuine threats.
**Alert Tuning** refers to the process of adjusting detection rules and alert thresholds to improve accuracy. Security analysts review alerts that generate false positives and modify the underlying analytics rules in Microsoft Sentinel or Microsoft Defender. This includes adjusting severity levels, modifying query logic, adding exclusions for known benign activities, and refining entity mappings. Proper tuning ensures that alerts reflect actual security concerns rather than normal business operations.
**Alert Suppression** involves temporarily or permanently preventing specific alerts from being generated or displayed. In Microsoft Defender XDR, analysts can create suppression rules based on various criteria such as file hashes, IP addresses, user accounts, or device names. Suppression is useful when dealing with known false positives, planned maintenance activities, or approved security testing. Analysts must document suppression rules and review them periodically to ensure they remain appropriate and do not mask legitimate threats.
**Alert Correlation** combines multiple related alerts into a single incident for streamlined investigation. Microsoft Sentinel and Microsoft Defender XDR automatically correlate alerts based on shared entities like users, devices, IP addresses, and timestamps. Correlation rules can be customized to group alerts that indicate a coordinated attack campaign. This process reduces alert fatigue by presenting related security events as unified incidents, enabling analysts to understand the full scope of an attack rather than investigating individual alerts separately.
Effective alert management requires ongoing maintenance. Analysts should regularly review alert metrics, identify patterns in false positives, update tuning rules accordingly, and ensure correlation logic captures evolving threat scenarios. This continuous improvement cycle enhances the overall efficiency of the security operations center and reduces mean time to detect and respond to genuine security incidents.
Configure deception rules in Microsoft Defender XDR
Microsoft Defender XDR deception rules are a powerful security feature that allows organizations to create decoy assets and lure potential attackers into revealing their presence. This proactive approach helps security analysts detect threats earlier in the attack chain.
To configure deception rules in Microsoft Defender XDR, navigate to the Microsoft 365 Defender portal and access Settings, then select Endpoints. Under the Rules section, you will find the Deception option where you can manage your deception capabilities.
Deception rules work by deploying fake assets such as decoy user accounts, honeytokens, and lure files across your environment. When attackers interact with these decoys, alerts are generated, providing early warning of malicious activity. The key components include:
**Decoy Accounts**: These are fake user accounts that appear legitimate but serve as tripwires. Any authentication attempt using these credentials triggers an alert.
**Lures**: These are planted files or credentials strategically placed on endpoints. When accessed or used, they signal potential compromise.
**Honeytokens**: Fake data elements embedded in your environment that attract attackers and reveal their tactics.
When configuring deception rules, you should define the scope of deployment, selecting which devices or device groups receive the decoys. You can customize the decoy properties to make them blend naturally with your actual environment, increasing their effectiveness.
Best practices include distributing decoys across high-value targets and network segments where attackers might pivot. Regular review and rotation of deception assets prevents attackers from identifying patterns.
The alerts generated by deception rules integrate with the broader Microsoft Defender XDR incident correlation, allowing security analysts to investigate and respond efficiently. These high-fidelity alerts typically indicate genuine malicious activity since legitimate users have no reason to interact with decoy assets.
Deception technology complements traditional detection methods by adding an active defense layer that catches attackers who have bypassed other security controls.
Classify and analyze data using entities
In Microsoft Sentinel, entities are fundamental components that help security analysts classify and analyze data effectively during threat detection and investigation. Entities represent identifiable objects within your security data, such as user accounts, IP addresses, hosts, files, URLs, and processes. Understanding how to work with entities is crucial for the Security Operations Analyst role.
Entity classification involves categorizing security events based on the type of objects involved. Microsoft Sentinel automatically extracts and maps entities from ingested data using entity mapping in analytics rules. When you create or modify an analytics rule, you define which fields in your data correspond to specific entity types. For example, you might map a username field to an Account entity or an IP address field to an IP entity.
Once entities are properly classified, analysis becomes more powerful. Entity behavior analytics (UEBA) in Microsoft Sentinel builds behavioral profiles for entities across time and peer groups. This allows the system to identify anomalous activities that might indicate compromise. For instance, if a user account suddenly accesses resources at unusual hours or from unexpected locations, UEBA can flag this deviation.
Entities also enable investigation capabilities through the entity pages and investigation graph. When an incident occurs, analysts can click on any entity to view its complete activity history, related alerts, and timeline of events. The investigation graph visually displays relationships between entities, helping analysts understand attack chains and lateral movement patterns.
Additionally, entities support threat intelligence matching. When you import threat indicators, Sentinel automatically correlates them against entity data in your environment, generating alerts when matches occur. Watchlists can also be created to monitor specific entities of interest, such as high-value assets or terminated employee accounts. Proper entity classification ensures accurate correlation and reduces false positives in your security operations workflow.
Configure and manage analytics rules in Sentinel
Azure Sentinel analytics rules are essential components for detecting threats and generating alerts in your security operations environment. These rules analyze data ingested into Sentinel to identify suspicious activities and potential security incidents.
There are several types of analytics rules you can configure:
1. **Scheduled Rules**: These run at defined intervals, querying log data using Kusto Query Language (KQL). You can customize the frequency, lookback period, and alert threshold to match your security requirements.
2. **Microsoft Security Rules**: These automatically create incidents from alerts generated by other Microsoft security solutions like Microsoft Defender for Cloud, Microsoft Defender for Identity, and Microsoft 365 Defender.
3. **Fusion Rules**: These use machine learning to correlate low-fidelity alerts across multiple products into high-confidence incidents, helping reduce alert fatigue.
4. **Machine Learning Behavioral Analytics**: Built-in ML rules detect anomalous behaviors such as unusual sign-in patterns or suspicious resource access.
5. **Threat Intelligence Rules**: These match your log data against threat intelligence indicators to identify known malicious entities.
When configuring analytics rules, you should define the rule logic using KQL queries, set appropriate severity levels, map alerts to MITRE ATT&CK tactics and techniques, and configure entity mapping to enrich incidents with relevant context.
Management best practices include regularly reviewing rule effectiveness, tuning thresholds to minimize false positives, enabling rule templates from the content hub, and creating custom rules tailored to your organizations specific threat landscape.
You can also configure automated responses through automation rules that trigger playbooks when specific conditions are met, enabling rapid incident response and remediation.
Rule health monitoring is crucial for maintaining detection capabilities. Sentinel provides insights into rule execution status, helping you identify and troubleshoot any rules that may be failing or underperforming. Regular maintenance ensures your detection coverage remains comprehensive and effective against evolving threats.
Query Microsoft Sentinel data using ASIM parsers
Advanced Security Information Model (ASIM) parsers in Microsoft Sentinel provide a unified way to query security data across multiple data sources using normalized schemas. ASIM parsers translate vendor-specific data into a common format, enabling analysts to write queries that work consistently regardless of the underlying data source.
ASIM parsers are built on Kusto Query Language (KQL) functions that normalize raw log data into standardized schemas. Microsoft Sentinel includes built-in parsers for common security scenarios including network sessions, DNS events, authentication events, process events, and file activity.
To use ASIM parsers effectively, you call the parser function in your KQL query rather than querying raw tables. For example, instead of querying the Syslog table for DNS data, you would use _Im_Dns() which returns normalized DNS events from all configured sources. The underscore prefix indicates an ASIM parser, and 'Im' stands for Information Model.
ASIM parsers support filtering parameters to optimize query performance. You can pass parameters like starttime, endtime, srcipaddr, or domain_has_any to filter data at the parser level, reducing the amount of data processed. For instance: _Im_NetworkSession(starttime=ago(1d), dstportnumber=443) returns network sessions from the last day targeting port 443.
There are two types of ASIM parsers: unifying parsers that combine data from multiple sources, and source-specific parsers that normalize data from a single source. Unifying parsers are preferable for most detection rules and hunting queries because they provide comprehensive coverage.
Benefits of using ASIM parsers include simplified query writing, cross-source correlation, future-proof detection rules that automatically incorporate new data sources, and consistent field naming across different security products. When building custom analytics rules or workbooks, leveraging ASIM parsers ensures your content remains functional as your data sources evolve.
Implement behavioral analytics in Sentinel
Implementing behavioral analytics in Microsoft Sentinel involves leveraging User and Entity Behavior Analytics (UEBA) to detect threats based on anomalous activities rather than relying solely on predefined rules. This approach establishes baseline behaviors for users, hosts, IP addresses, and other entities, then identifies deviations that may indicate compromises or insider threats.
To enable UEBA in Sentinel, navigate to Settings within your Sentinel workspace and locate the Entity behavior analytics section. Here you can activate the feature and select which data sources to analyze. Sentinel supports various log types including Azure Active Directory sign-in logs, Azure activity logs, Windows security events, and authentication logs from connected sources.
Once enabled, Sentinel processes historical data to build behavioral profiles. The system analyzes patterns such as typical login times, accessed resources, geographic locations, and peer group activities. Machine learning algorithms continuously evaluate new events against these established baselines to calculate risk scores for entities.
The Entity behavior page provides visibility into suspicious activities. You can view entity pages showing timeline activities, anomalies detected, and investigation insights. Each anomaly receives a severity rating based on how significantly it deviates from normal behavior.
Behavioral analytics integrates with Sentinel's broader detection capabilities. You can create analytics rules that incorporate UEBA insights, combining behavioral anomalies with other indicators to reduce false positives. The system also supports hunting queries that leverage behavioral data for proactive threat hunting.
For effective implementation, ensure sufficient data retention periods to establish accurate baselines. Configure appropriate data connectors to provide comprehensive visibility across your environment. Consider tuning sensitivity settings based on your organization's risk tolerance and operational requirements.
Regularly review the insights dashboard to understand detected anomalies and refine your security posture. UEBA complements traditional rule-based detection by identifying unknown threats and sophisticated attacks that evade signature-based methods.