Configure protections and detections

Configure protections in Microsoft Defender security technologies and set up detections in Microsoft Defender XDR and Microsoft Sentinel.

Encompasses configuring protections in Microsoft Defender security technologies including policies for Defender for Cloud Apps, Defender for Office 365, Defender for Endpoint with attack surface reduction (ASR) rules, and cloud workload protections in Defender for Cloud. Covers configuring detections in Microsoft Defender XDR including custom detection rules, alert management, tuning, suppression, correlation, and deception rules. Also includes configuring detections in Microsoft Sentinel through entity classification, analytics rules management, ASIM parsers for data querying, and behavioral analytics implementation.
5 minutes 5 Questions

Configuring protections and detections is a critical responsibility for Microsoft Security Operations Analysts. This process involves setting up and fine-tuning security controls across Microsoft's security ecosystem to identify threats and safeguard organizational assets. In Microsoft Defender fo…

Concepts covered: Configure policies for Microsoft Defender for Cloud Apps, Configure policies for Microsoft Defender for Office 365, Configure Defender for Endpoint security policies and ASR rules, Configure cloud workload protections in Defender for Cloud, Configure and manage custom detection rules, Manage alerts including tuning, suppression, and correlation, Configure deception rules in Microsoft Defender XDR, Classify and analyze data using entities, Configure and manage analytics rules in Sentinel, Query Microsoft Sentinel data using ASIM parsers, Implement behavioral analytics in Sentinel

Test mode:
SC-200 - Configure protections and detections Example Questions

Test your knowledge of Configure protections and detections

Question 1

A Security Operations Analyst at Tailspin Toys is reviewing an alert where an unusual number of Azure Key Vault access attempts occurred during a maintenance window. The logs show that managed identity 'mi-webapp-inventory-prod' associated with Azure Web App 'app-inventory-fe-westus' made 237 secret retrieval calls to Key Vault 'kv-tailspin-secrets-prod' between 23:45 and 01:20, accessing secrets named 'SQLConnectionString', 'APIKey-PaymentGateway', and 'CertificatePassword-SSL'. Normal patterns show this managed identity averages 15-20 secret retrievals per hour during business hours. The analyst must classify these entities to determine whether this activity represents a compromised managed identity, legitimate maintenance automation with expanded scope, or a misconfigured deployment script. To establish the context and identify potential credential harvesting behavior, which entity attribute correlation provides the most comprehensive insight into the deviation from established access patterns?

Question 2

Riverstone Pharmaceuticals has been running Microsoft Sentinel with UEBA enabled for 105 days across their research facility of 4,200 employees. The security team has observed concerning patterns where certain laboratory technicians show elevated investigation priority scores in the BehaviorAnalytics table, with anomaly indicators suggesting unusual data access behaviors. The SOC manager wants to create an automated response workflow that takes specific actions when users reach critical behavioral risk thresholds. Specifically, when any user entity accumulates an investigation priority score of 8.5 or higher AND exhibits at least four distinct anomaly types within a 12-hour window, the system should automatically: disable the user's access to sensitive research databases, notify the user's manager via email, create a high-severity incident with enriched entity context, and post details to the security Teams channel. The solution must evaluate the behavioral analytics data continuously and execute these coordinated response actions as a unified workflow. What should the security analyst implement to achieve this automated behavioral risk-based response capability?

Question 3

Your organization uses Microsoft 365 and various third-party SaaS applications. The compliance team has identified that employees are uploading sensitive financial documents containing credit card numbers to personal cloud storage services during business hours. As the Security Operations Analyst, you need to prevent this data exfiltration while maintaining productivity. The compliance officer specifically requires real-time blocking of file uploads containing payment card information to unsanctioned cloud storage apps, with the ability to provide educational messages to users when their actions are blocked. Which Microsoft Defender for Cloud Apps policy configuration would best address this requirement?

More Configure protections and detections questions
432 questions (total)