Manage security threats

Hunt for threats using Microsoft Defender XDR and Microsoft Sentinel, and create workbooks for security monitoring.

Encompasses hunting for threats using Microsoft Defender XDR including identifying threats with Kusto Query Language (KQL), interpreting threat analytics, and creating custom hunting queries. Covers hunting for threats using Microsoft Sentinel through MITRE ATT&CK matrix analysis, threat indicators management, hunt creation and management, hunting query monitoring, hunting bookmarks for data investigations, archived log data retrieval, and search job management. Also includes creating and configuring Microsoft Sentinel workbooks by activating and customizing workbook templates, creating custom workbooks with KQL, and configuring visualizations for security monitoring and reporting.
5 minutes 5 Questions

Managing security threats is a critical responsibility for Microsoft Security Operations Analyst Associates. This involves identifying, analyzing, and responding to potential security incidents across an organization's infrastructure. The process begins with threat detection, where analysts utilize…

Concepts covered: Identify threats using Kusto Query Language (KQL), Interpret threat analytics in the Defender portal, Create custom hunting queries with KQL, Analyze attack vector coverage with MITRE ATT&CK matrix, Manage and use threat indicators in Sentinel, Create and manage hunts in Microsoft Sentinel, Create and monitor hunting queries in Sentinel, Use hunting bookmarks for data investigations, Retrieve and manage archived log data, Create and manage search jobs in Sentinel, Activate and customize workbook templates, Create custom workbooks with KQL, Configure workbook visualizations

Test mode:
SC-200 - Manage security threats Example Questions

Test your knowledge of Manage security threats

Question 1

A security analyst at Fabrikam Manufacturing discovers unusual authentication patterns in their environment. They need to query SigninLogs data from 45 days ago to identify failed login attempts from suspicious geographic locations. The analyst initiates a search job targeting a 60-day timeframe across 800GB of data. After the search job completes successfully, where will the analyst find the retrieved results to perform further KQL analysis and correlation with other security events?

Question 2

A defense contractor operates a Microsoft Sentinel workspace monitoring classified network traffic across 12 secure facilities. The NetworkSecurityGroupFlowLogs table maintains 75 days of data in Analytics tier, with older records automatically archived within the same workspace for a total retention of 5 years. An internal security audit revealed that a senior network engineer with Log Analytics Reader role repeatedly attempts to execute KQL queries against archived flow logs from 8 months ago to analyze historical traffic patterns for a research project. The engineer's queries consistently return empty result sets, even though workspace storage metrics confirm the archived data exists and consumes approximately 320 GB. The workspace Archive tier is properly enabled and the engineer has verified the correct time ranges in the KQL queries. The security operations manager must identify the missing component preventing the engineer from accessing this archived data. What specific Azure RBAC permission must be assigned to the engineer's account to enable creation of data restoration operations for querying the archived network flow logs?

Question 3

Kayla, a Security Operations Analyst at Contoso Healthcare, is examining a threat analytics report in the Microsoft Defender portal about a sophisticated spear-phishing campaign targeting healthcare providers. The report displays multiple metrics including 'Global Prevalence: High', 'Active for: 28 days', and several technical indicators. Within the report, Kayla notices a section showing 'Detection Methods' that lists the various security technologies and signals used to identify this threat across the Microsoft security ecosystem. This section displays items such as 'Email threat protection signals', 'Endpoint behavioral analysis', 'Cloud app anomaly detection', and 'Identity risk signals', each with accompanying detection confidence scores. The section also shows correlation logic explaining how these different signal sources work together to identify the complete attack chain. Kayla's security architecture team is evaluating whether their current Microsoft 365 license tier provides adequate visibility into this type of threat, and they need to understand which detection capabilities are actively contributing to threat identification in their environment. The team lead asks Kayla to determine what the Detection Methods section primarily reveals about their security stack's capabilities. What does this section indicate?

More Manage security threats questions
517 questions (total)