Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel
Implement cloud governance, security posture management, threat protection, and security monitoring automation.
Microsoft Defender for Cloud and Microsoft Sentinel are two powerful Azure security services that work together to provide comprehensive cloud security posture management and threat protection. Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection…
AZ-500 - Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Example Questions
Test your knowledge of Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel
Question 1
Your logistics company operates 90 Azure Virtual Machines supporting a global supply chain management system across three Azure regions. Microsoft Defender for Cloud has generated a High severity alert titled 'Brute force attack successful - Remote Desktop Protocol' on a VM named 'logistics-hub-vm-12' that manages warehouse inventory systems. The alert shows 450 failed authentication attempts over 20 minutes followed by a successful login from an IP address originating from a country where your organization has no business operations. The MITRE ATT&CK tactics indicate 'Credential Access' and 'Initial Access'. The successful login occurred 8 minutes ago, and the alert shows the attacker account has Administrative privileges on the affected VM. This VM connects to your central SQL database containing real-time inventory data for 200 distribution centers. Your security policy requires all privileged access to use multi-factor authentication, but legacy systems still permit password-only authentication for certain service accounts. The affected VM processes shipment routing decisions that impact delivery commitments to major retail partners. What should be your PRIMARY action to effectively respond to this confirmed security breach?
Question 2
Alpine Ski House operates a multi-cloud environment with critical workloads distributed across Azure, on-premises data centers, and a legacy Oracle Cloud infrastructure that hosts their customer relationship management system. The security operations team has successfully deployed Microsoft Sentinel and established data ingestion from Azure resources and on-premises servers. However, the Oracle Cloud environment generates security logs from their custom CRM application in a proprietary JSON format that includes user authentication events, data access patterns, and API transaction logs. These logs are currently stored in Oracle Object Storage buckets and updated every 10 minutes. The security architect wants to bring this telemetry into Microsoft Sentinel to correlate CRM access anomalies with Azure AD identity signals and create unified security incidents. The organization has budget constraints and prefers solutions that leverage existing Azure services. The compliance team requires that data ingestion occurs within 15 minutes of log generation. What is the most appropriate solution architecture to accomplish this integration?
Question 3
What is the maximum execution timeout limit for a playbook triggered by an automation rule in Microsoft Sentinel?