Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel
Implement cloud governance, security posture management, threat protection, and security monitoring automation.
Microsoft Defender for Cloud and Microsoft Sentinel are two powerful Azure security services that work together to provide comprehensive cloud security posture management and threat protection. Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection…
Concepts covered: Azure Policy for security governance, Azure Key Vault network settings, Key Vault access policies and RBAC, Managing certificates, secrets, and keys, Key rotation configuration, Backup and recovery for Key Vault, Security controls for backup protection, Security controls for asset management, Defender for Cloud Secure Score and Inventory, Compliance assessment with security frameworks, Compliance standards management in Defender for Cloud, Custom standards in Microsoft Defender for Cloud, Multi-cloud connections (AWS, GCP) in Defender for Cloud, Microsoft Defender External Attack Surface Management (EASM), Cloud workload protection plans, Microsoft Defender for Servers, Databases, and Storage, Agentless scanning for virtual machines, Microsoft Defender Vulnerability Management, Microsoft Defender for Cloud DevOps Security, Security alerts in Microsoft Defender for Cloud, Workflow automation in Defender for Cloud, Data collection rules (DCRs) in Azure Monitor, Microsoft Sentinel data connectors, Microsoft Sentinel analytics rules, Automation in Microsoft Sentinel
AZ-500 - Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel Example Questions
Test your knowledge of Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel
Question 1
Your logistics company operates 90 Azure Virtual Machines supporting a global supply chain management system across three Azure regions. Microsoft Defender for Cloud has generated a High severity alert titled 'Brute force attack successful - Remote Desktop Protocol' on a VM named 'logistics-hub-vm-12' that manages warehouse inventory systems. The alert shows 450 failed authentication attempts over 20 minutes followed by a successful login from an IP address originating from a country where your organization has no business operations. The MITRE ATT&CK tactics indicate 'Credential Access' and 'Initial Access'. The successful login occurred 8 minutes ago, and the alert shows the attacker account has Administrative privileges on the affected VM. This VM connects to your central SQL database containing real-time inventory data for 200 distribution centers. Your security policy requires all privileged access to use multi-factor authentication, but legacy systems still permit password-only authentication for certain service accounts. The affected VM processes shipment routing decisions that impact delivery commitments to major retail partners. What should be your PRIMARY action to effectively respond to this confirmed security breach?
Question 2
Alpine Ski House operates a multi-cloud environment with critical workloads distributed across Azure, on-premises data centers, and a legacy Oracle Cloud infrastructure that hosts their customer relationship management system. The security operations team has successfully deployed Microsoft Sentinel and established data ingestion from Azure resources and on-premises servers. However, the Oracle Cloud environment generates security logs from their custom CRM application in a proprietary JSON format that includes user authentication events, data access patterns, and API transaction logs. These logs are currently stored in Oracle Object Storage buckets and updated every 10 minutes. The security architect wants to bring this telemetry into Microsoft Sentinel to correlate CRM access anomalies with Azure AD identity signals and create unified security incidents. The organization has budget constraints and prefers solutions that leverage existing Azure services. The compliance team requires that data ingestion occurs within 15 minutes of log generation. What is the most appropriate solution architecture to accomplish this integration?
Question 3
What is the maximum execution timeout limit for a playbook triggered by an automation rule in Microsoft Sentinel?