Learn Manage security threats (SC-200) with Interactive Flashcards

Master key concepts in Manage security threats through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.

Identify threats using Kusto Query Language (KQL)

Kusto Query Language (KQL) is a powerful query language used in Microsoft Sentinel and Microsoft Defender for identifying and investigating security threats. As a Security Operations Analyst, mastering KQL is essential for effective threat detection and response.

KQL enables analysts to query large datasets stored in Log Analytics workspaces, where security logs from various sources are collected. These sources include Azure Active Directory, Microsoft 365, endpoint devices, firewalls, and custom applications.

To identify threats using KQL, analysts typically start with basic queries that filter security events. For example, querying the SecurityEvent table to find failed login attempts helps detect brute force attacks. The syntax involves specifying the table name, applying filters using the 'where' operator, and selecting relevant columns with 'project'.

Key KQL operators for threat hunting include:
- 'where': Filters data based on conditions
- 'summarize': Aggregates data to identify patterns
- 'join': Combines data from multiple tables
- 'extend': Creates calculated columns
- 'render': Visualizes query results

Analysts can identify suspicious activities by looking for anomalies such as unusual login times, multiple failed authentication attempts, or connections from unexpected geographic locations. Time-based analysis using 'ago()' and 'between()' functions helps establish baselines and detect deviations.

Advanced threat identification involves correlating events across multiple data sources. For instance, combining sign-in logs with endpoint data can reveal compromised accounts being used for lateral movement.

Microsoft Sentinel provides built-in analytics rules that use KQL queries to generate alerts when specific threat patterns are detected. Security analysts can also create custom detection rules tailored to their organization's environment.

Effective KQL queries for threat identification should be optimized for performance, especially when querying large datasets. Using time filters early in queries and limiting result sets improves query execution speed, enabling faster threat response.

Interpret threat analytics in the Defender portal

Threat analytics in the Microsoft Defender portal provides security operations analysts with actionable intelligence about emerging threats, active attack campaigns, and prevalent malware affecting organizations globally. This feature transforms raw threat data into meaningful insights that help analysts understand and respond to security risks effectively.

When interpreting threat analytics, analysts should focus on several key components. The Analyst Report section contains detailed technical analysis written by Microsoft security researchers, covering threat actors, attack techniques, indicators of compromise (IOCs), and recommended mitigations. These reports provide context about how threats operate and their potential impact.

The Impact Assessment shows how a specific threat relates to your organization's environment. It displays exposed devices, vulnerable assets, and whether protective measures are already in place. This helps analysts prioritize their response efforts based on actual organizational risk rather than generic threat severity.

Mitigation Status indicates which recommended security configurations and protections are currently enabled or missing in your environment. Analysts can quickly identify gaps in defenses and take corrective actions to reduce exposure to specific threats.

The Incidents and Alerts section links threat intelligence to active security events in your environment. This correlation helps analysts understand whether a documented threat campaign has potentially affected their organization, enabling faster investigation and response.

Exposure Metrics provide quantitative data about vulnerable endpoints, including patch status, configuration weaknesses, and missing security controls. Analysts can use this information to coordinate remediation efforts with IT teams.

Best practices for interpretation include regularly reviewing new threat reports, correlating analytics with existing incidents, using exposure data to drive vulnerability management priorities, and leveraging recommended mitigations to strengthen security posture. By systematically analyzing these components, security operations analysts can transform threat intelligence into proactive defense measures and informed incident response decisions.

Create custom hunting queries with KQL

Custom hunting queries in Microsoft Sentinel using Kusto Query Language (KQL) enable security analysts to proactively search for threats across their environment. KQL is a powerful query language designed for exploring large datasets and identifying suspicious patterns or anomalies.

To create custom hunting queries, analysts begin by accessing the Hunting section in Microsoft Sentinel. Here, they can write queries that examine data from various sources including security events, sign-in logs, and network traffic.

A basic hunting query structure includes the table name, time range filtering, and specific conditions. For example: SecurityEvent | where TimeGenerated > ago(7d) | where EventID == 4625 | summarize FailedLogins = count() by Account, Computer | where FailedLogins > 10. This query searches for accounts with excessive failed login attempts.

Key KQL operators for hunting include 'where' for filtering data, 'summarize' for aggregating results, 'project' for selecting specific columns, and 'join' for combining data from multiple tables. The 'extend' operator allows analysts to create calculated fields, while 'parse' helps extract specific values from strings.

Effective hunting queries should focus on specific tactics from the MITRE ATT&CK framework. Analysts can search for lateral movement by examining authentication patterns, persistence mechanisms through registry modifications, or data exfiltration through unusual outbound connections.

Best practices include adding metadata to queries such as descriptions, tactics, and techniques for documentation purposes. Analysts should test queries against historical data to validate their effectiveness before deploying them operationally.

Custom queries can be saved as hunting queries or converted to analytics rules for automated detection. When a query identifies potential threats, analysts can promote results to incidents for further investigation. This proactive approach helps organizations detect sophisticated attacks that might evade traditional signature-based detection methods, strengthening overall security posture.

Analyze attack vector coverage with MITRE ATT&CK matrix

The MITRE ATT&CK matrix is a comprehensive knowledge base that categorizes adversary tactics, techniques, and procedures (TTPs) used in cyberattacks. For Microsoft Security Operations Analysts, analyzing attack vector coverage using this framework is essential for identifying security gaps and strengthening defenses.

The ATT&CK matrix organizes attack techniques into tactical categories such as Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, and Impact. Each category contains specific techniques that attackers commonly employ.

To analyze attack vector coverage, security analysts map their existing security controls and detection capabilities against the ATT&CK matrix. Microsoft Sentinel and Microsoft Defender products provide built-in ATT&CK mapping capabilities, allowing analysts to visualize which techniques their current detections cover and where blind spots exist.

The analysis process involves several steps. First, analysts inventory all active detection rules, analytics rules, and security policies across their Microsoft security stack. Next, they correlate these controls with corresponding ATT&CK techniques. Microsoft Sentinel workbooks and hunting queries often include ATT&CK tags that facilitate this mapping.

Once the coverage map is established, analysts can identify gaps where no detections exist for specific techniques. This prioritization helps security teams focus resources on implementing new detection rules or acquiring additional security tools to address uncovered attack vectors.

Microsoft provides threat intelligence integration that highlights which ATT&CK techniques are most relevant to specific industries or threat actors targeting your organization. This context-aware approach enables risk-based prioritization of coverage improvements.

Regular assessment of ATT&CK coverage ensures continuous improvement of the security posture. Analysts should review coverage after deploying new security solutions, updating detection rules, or when new threat intelligence indicates emerging attack patterns. This systematic approach transforms the ATT&CK matrix from a theoretical framework into a practical tool for measuring and enhancing organizational security effectiveness.

Manage and use threat indicators in Sentinel

Threat indicators in Microsoft Sentinel are crucial components for proactive security operations. These indicators, also known as Indicators of Compromise (IoCs), represent known malicious artifacts such as IP addresses, domains, URLs, file hashes, and email addresses that security teams use to detect and respond to threats.

To manage threat indicators in Sentinel, you can access them through the Threat Intelligence blade in the Azure portal. Sentinel supports importing threat indicators from multiple sources including TAXII servers, the Microsoft Graph Security tiIndicators API, and through direct integration with threat intelligence platforms like Microsoft Defender Threat Intelligence.

When working with threat indicators, you can perform several key operations. First, you can manually add indicators by specifying the indicator type, value, confidence level, valid time period, and associated threat types. Second, you can bulk import indicators using data connectors that pull from external threat intelligence feeds. Third, you can tag and organize indicators for better management and filtering.

Threat indicators integrate with Sentinel analytics rules to generate alerts when matches are found in your environment. The built-in TI Map analytics rule templates help correlate threat indicators against various log sources like CommonSecurityLog, Syslog, and Azure AD sign-in logs. When a match occurs, an incident is created for investigation.

You can view and manage all imported indicators in the Threat Intelligence workbook, which provides visibility into indicator volumes, types, and sources. The workbook helps track indicator effectiveness and coverage across your security operations.

Best practices include regularly reviewing and updating indicator validity periods, removing stale indicators, and ensuring confidence scores accurately reflect indicator reliability. Additionally, combining multiple threat intelligence sources enhances detection coverage and reduces false positives. Proper indicator management enables security analysts to leverage actionable intelligence for faster threat detection and response in their Sentinel environment.

Create and manage hunts in Microsoft Sentinel

Microsoft Sentinel provides powerful hunting capabilities that allow security analysts to proactively search for security threats across their organization's data. Creating and managing hunts is essential for identifying suspicious activities that automated detection might miss.

To create a hunt in Microsoft Sentinel, navigate to the Azure portal and access your Sentinel workspace. Under the Threat Management section, select 'Hunting'. Here you can explore built-in hunting queries or create custom ones using Kusto Query Language (KQL).

When creating a new hunting query, you define the query logic, assign a name and description, map it to MITRE ATT&CK tactics and techniques, and specify the required data sources. This helps organize hunts by threat categories and ensures proper data connectivity.

Livestream is a feature that enables real-time hunting sessions. You can start a livestream from any hunting query to monitor results as events occur, which is particularly useful during active investigations or when testing new detection logic.

Bookmarks allow analysts to preserve interesting findings during hunting sessions. When you discover suspicious activities, you can bookmark the results with notes and tags for later investigation. These bookmarks can then be promoted to incidents for formal investigation workflows.

Hunting notebooks powered by Jupyter provide advanced hunting capabilities. These notebooks combine KQL queries with Python code for sophisticated analysis, machine learning models, and custom visualizations.

To manage hunts effectively, organize queries using tags and categories, regularly review and update custom queries based on emerging threats, and track hunting metrics to measure effectiveness. You can also share hunting queries across your team and contribute to the Microsoft Sentinel community.

Best practices include scheduling recurring hunts for persistent threat detection, documenting findings thoroughly, and integrating hunting results with your broader security operations workflows to improve overall threat detection capabilities.

Create and monitor hunting queries in Sentinel

Microsoft Sentinel hunting queries are powerful tools that enable security analysts to proactively search for threats across their environment before alerts are triggered. These queries use Kusto Query Language (KQL) to explore data and identify suspicious activities or potential security incidents.

To create a hunting query in Sentinel, navigate to the Threat Management section and select Hunting. Here you can access built-in queries or create custom ones. When building a custom query, you define the KQL statement that searches through your connected data sources like Azure Active Directory logs, firewall logs, or endpoint data. Each query should include relevant metadata such as name, description, tactics mapped to MITRE ATT&CK framework, and required data sources.

The query structure typically includes filters for specific time ranges, entity types like user accounts or IP addresses, and conditions that indicate anomalous behavior. For example, you might create a query to detect unusual login patterns or data exfiltration attempts.

Monitoring hunting queries involves several key practices. First, run queries regularly to identify new threats. Sentinel allows you to bookmark interesting results for further investigation. These bookmarks can be promoted to incidents when confirmed as genuine threats. Second, track query performance using the results count and last run time displayed in the hunting dashboard.

Livestream functionality enables real-time monitoring of query results, alerting analysts when matches occur. You can also convert successful hunting queries into scheduled analytics rules for automated detection.

Best practices include organizing queries by threat category, documenting findings, and refining queries based on false positive rates. Collaboration features allow teams to share effective queries across the organization. Regular review of hunting query effectiveness ensures your threat detection capabilities evolve alongside emerging attack techniques and changing infrastructure.

Use hunting bookmarks for data investigations

Hunting bookmarks are a powerful feature in Microsoft Sentinel that allow security analysts to preserve and organize important findings during threat hunting investigations. When conducting data investigations, bookmarks serve as markers that help analysts save relevant query results, evidence, and insights for future reference.

To use hunting bookmarks effectively, analysts begin by running hunting queries in Microsoft Sentinel to search for suspicious activities or potential threats across their environment. When a query returns interesting results that warrant further investigation, analysts can select specific rows and add them as bookmarks rather than losing track of these findings.

When creating a bookmark, analysts can add custom tags, notes, and annotations to provide context about why the data is significant. This documentation proves invaluable when collaborating with team members or when returning to an investigation after time has passed. Bookmarks capture the original query, timestamp, and associated entities such as accounts, hosts, IP addresses, and URLs.

The bookmark feature integrates seamlessly with the investigation graph in Microsoft Sentinel. Analysts can promote bookmarks to incidents or add them to existing incidents, creating a clear audit trail of the investigation process. This capability enables teams to build comprehensive cases by linking related evidence together.

Bookmarks also support entity mapping, allowing analysts to extract and tag key entities from the saved data. These mapped entities can then be explored further using entity behavior analytics and other investigation tools within Sentinel.

For effective data investigations, analysts should establish consistent naming conventions and tagging strategies for bookmarks. This organization facilitates quick retrieval and helps teams maintain situational awareness during complex investigations. The livestream feature can also be combined with bookmarks, enabling real-time monitoring while preserving significant events for detailed analysis. By leveraging hunting bookmarks strategically, security teams enhance their investigation efficiency and maintain thorough documentation throughout the threat hunting lifecycle.

Retrieve and manage archived log data

Archived log data management is a critical skill for Microsoft Security Operations Analysts when investigating security threats that occurred beyond the standard retention period. Azure Sentinel and Microsoft Defender provide mechanisms to store and retrieve historical data for compliance and forensic analysis purposes.

When logs exceed the active retention period, they can be moved to archive storage tiers in Log Analytics workspaces. This archived data remains searchable but requires specific retrieval methods. To access archived logs, analysts use the search feature in Log Analytics, which allows querying data across both active and archived tiers.

The restoration process involves creating a search job that specifies the time range and tables containing the needed data. Search jobs run asynchronously and create a new table with the restored results. Analysts can initiate these jobs through the Azure portal, PowerShell, or REST API. The restored data becomes available in a temporary table that remains accessible for a configurable period.

Key considerations for managing archived logs include understanding cost implications, as restoration incurs charges based on data volume scanned and restored. Planning retention policies appropriately helps balance storage costs with compliance requirements. Organizations should define clear procedures for when archived data retrieval is necessary, such as during incident investigations or audit requests.

Best practices include documenting retention schedules for different log types, establishing approval workflows for archive restoration requests, and regularly testing restoration procedures to ensure data accessibility when needed. Security analysts should also understand the time delays associated with archive retrieval, as search jobs may take considerable time depending on data volume.

Using Azure Resource Graph and Azure Policy helps maintain governance over archived data across multiple workspaces. Proper tagging and organization of archived logs ensures efficient retrieval during time-sensitive security investigations, enabling analysts to reconstruct attack timelines and identify threat patterns from historical data.

Create and manage search jobs in Sentinel

Search jobs in Microsoft Sentinel are powerful tools that allow security analysts to perform large-scale historical searches across archived log data. Unlike standard queries that search hot cache data, search jobs can scan through long-term retention storage, making them essential for threat hunting and forensic investigations.

To create a search job, navigate to the Microsoft Sentinel workspace in the Azure portal. Go to the Search section under the General menu. Here you can define your search criteria using Kusto Query Language (KQL). Specify the time range for your search, which can extend back months or even years depending on your data retention settings.

When configuring a search job, you must provide a descriptive name and select the target table containing the data you want to analyze. The system will estimate the amount of data to be scanned and provide cost approximations before execution. This helps analysts make informed decisions about resource utilization.

Once submitted, the search job runs asynchronously in the background, allowing analysts to continue other tasks. The job processes data and stores results in a new table with the naming convention SearchName_SRCH. These results remain available for querying according to your configured retention period.

To manage existing search jobs, use the Search Jobs tab where you can monitor progress, view status updates, and access completed results. You can cancel running jobs if necessary or delete completed job results when they are no longer needed.

Best practices include using specific time ranges to minimize costs, writing efficient KQL queries to filter relevant data, and scheduling resource-intensive searches during off-peak hours. Search jobs are particularly valuable when investigating potential breaches that occurred in the past or when compliance requirements demand historical data analysis. Understanding these capabilities enhances an analyst's ability to respond to security incidents effectively.

Activate and customize workbook templates

Workbook templates in Microsoft Sentinel provide pre-built visualizations and analytics that help security analysts monitor and investigate threats effectively. These templates serve as starting points for creating customizable dashboards tailored to your organization's specific security needs.

To activate workbook templates, navigate to Microsoft Sentinel in the Azure portal and select 'Workbooks' from the left menu under Threat Management. You will see a gallery of available templates organized by categories such as identity, network, and endpoint security. Each template corresponds to specific data connectors and provides insights relevant to that data source.

When activating a template, first ensure the required data connector is configured and collecting data. Select the desired template and click 'View template' to preview its contents. If the visualization meets your requirements, click 'Save' to create an instance of the workbook in your workspace. You can choose to save it to a resource group for team access.

Customization allows you to modify workbooks to align with organizational requirements. After saving, click 'Edit' to enter editing mode. You can add new components including queries, parameters, text boxes, and various visualization types such as charts, grids, and maps. Modify existing queries using Kusto Query Language (KQL) to filter data based on specific criteria like time ranges, severity levels, or particular assets.

Parameters enable dynamic filtering, allowing analysts to adjust views based on dropdown selections or time pickers. You can add conditional visibility to show or hide sections based on data availability. Custom metrics and thresholds help highlight anomalies or critical events.

After customization, save your changes and consider sharing the workbook with your security team through Azure role-based access control. Regular updates ensure workbooks remain relevant as your security landscape evolves and new threats emerge. Version control helps track modifications over time.

Create custom workbooks with KQL

Custom workbooks in Microsoft Sentinel provide powerful visualization and reporting capabilities that allow security analysts to create interactive dashboards using Kusto Query Language (KQL). These workbooks enable analysts to monitor, investigate, and respond to security threats more effectively by presenting data in meaningful visual formats.

To create a custom workbook, navigate to Microsoft Sentinel and select Workbooks from the Threat Management section. Click Add workbook to start with a blank template or modify an existing one. The workbook editor allows you to add various elements including text, queries, parameters, and visualizations.

KQL queries form the foundation of workbook data. For example, a simple query to display security events might look like: SecurityEvent | where TimeGenerated > ago(24h) | summarize count() by EventID | top 10 by count_. This query retrieves security events from the last 24 hours, groups them by EventID, and shows the top 10 most frequent events.

Workbooks support multiple visualization types including tables, charts, grids, tiles, and time charts. Each visualization can be customized with specific KQL queries tailored to your security monitoring needs. Parameters add interactivity, allowing users to filter data by time range, subscription, or custom values.

Best practices for creating effective security workbooks include organizing content logically, using appropriate time ranges to avoid performance issues, implementing error handling in queries, and adding descriptive text to guide users. Consider creating workbooks for specific use cases such as incident investigation, threat hunting, or compliance reporting.

Analysts can share workbooks across the organization by saving them as shared workbooks in the Azure portal. This promotes collaboration and ensures consistent security monitoring practices. Regular updates to workbook queries help maintain relevance as new threat patterns emerge and organizational security requirements evolve.

Configure workbook visualizations

Configuring workbook visualizations in Microsoft Sentinel is a crucial skill for Security Operations Analysts to effectively monitor and analyze security data. Workbooks provide interactive reports that combine text, analytics queries, Azure Metrics, and parameters into rich visual reports.

To configure workbook visualizations, start by navigating to Microsoft Sentinel and selecting Workbooks from the Threat Management section. You can create a new workbook or edit existing templates. When adding visualizations, you have several options including charts, grids, tiles, and graphs.

For chart configurations, select the query step and choose visualization types such as bar charts, pie charts, line graphs, or area charts. Each visualization type serves different purposes - line charts excel at showing trends over time, while pie charts effectively display proportional data distribution.

Grid visualizations display tabular data and can be customized with conditional formatting to highlight critical security events. You can configure column renderers to show icons, thresholds, or sparklines that make data interpretation more intuitive for analysts.

Tiles provide summary statistics and key metrics at a glance. Configure tiles to show counts of active incidents, alert severity distributions, or mean time to resolution metrics.

Advanced configurations include setting time range parameters, creating interactive filters, and linking visualizations so selecting data in one chart filters others. This interactivity enables analysts to drill down into specific security events or patterns.

Color schemes and thresholds help distinguish between normal operations and anomalies requiring attention. Configure warning and critical thresholds to visually alert analysts when metrics exceed acceptable ranges.

You can also export and share workbooks with your security team or save them as templates for consistent reporting across your organization. Properly configured workbook visualizations transform raw security data into actionable intelligence, enabling faster threat detection and response capabilities for your security operations center.

More Manage security threats questions
520 questions (total)