SC 200 Master Cheat Sheet
SC 200 Master Cheat Sheet
         Defender XDR (Extended Detection and Response): A comprehensive security platform from
          Microsoft that consolidates and analyzes data from various sources like endpoints, cloud
          workloads, identities, and emails. It provides advanced threat detection, investigation, and
          response capabilities.
         Sentinel: A cloud-native security information and event management (SIEM) solution from
          Microsoft that helps you collect, analyze, and respond to security events from across your
          organization.
Purpose:
         Connecting Defender XDR to Sentinel allows you to leverage Sentinel's powerful analytics
          and security orchestration and automation (SOAR) capabilities to enrich and enhance threat
          insights from Defender XDR data.
         This enables you to create more comprehensive threat detection rules, conduct deeper
          investigations, and automate security responses within Sentinel.
General Steps:
    1. Enable Data Collection: Ensure data collection is enabled in Defender XDR for the data
       categories you want to send to Sentinel.
    2. Set Up Connection: In your Sentinel workspace, navigate to the "Data connectors" section
       and search for "Microsoft Defender XDR." Follow the on-screen instructions to establish the
       connection with your Defender XDR environment.
    3. Configure Data Mapping (Optional): If necessary, you can customize how specific data fields
       are mapped between Defender XDR and Sentinel to better align with your needs.
Alerts:
Vulnerabilities:
Purpose:
         Define rules to receive timely notifications about critical security events and identified
          vulnerabilities.
pg. 1
                                            SKILLCERTPRO
General Steps:
   1. Identify Triggers: Determine the events or conditions that should trigger an alert or
      vulnerability notification. This might involve analyzing existing security incidents, reviewing
      compliance requirements, or considering risk assessments.
   2. Define Severity Levels: Assign severity levels to alerts and vulnerabilities based on their
      potential impact and urgency.
   3. Configure Notification Channels: Choose how you want to receive notifications, such as
      email, SMS, or integration with other tools.
   4. Tune and Test: Regularly evaluate, refine, and test your rules to ensure they accurately
      represent your security needs and avoid generating excessive or unhelpful notifications.
Defender for Endpoint: Microsoft's endpoint protection platform (EPP) that provides a range of
features to protect devices from malware, viruses, zero-day attacks, and other threats.
       Endpoint analytics: Provides deep insights into endpoint activity to detect potential threats
        and suspicious behaviors.
       Attack surface reduction rules (ASR): Block or mitigate vulnerabilities by controlling how
        applications interact with the operating system and resources.
Purpose:
       Leverage advanced features within Defender for Endpoint to further strengthen your
        endpoint security posture.
       These features offer more granular control and proactive protection against sophisticated
        threats.
General Approach:
       Carefully review available documentation and resources from Microsoft to understand the
        specific configuration options and potential implications for your environment.
       Only enable and configure features that align with your organization's security posture and
        risk tolerance.
Configuring Endpoint Rules Settings, Including Indicators and Web Content Filtering:
Endpoint Rules:
pg. 2
                                            SKILLCERTPRO
       Policies applied to endpoints that define allowed or blocked behaviors, configurations, and
        activities.
Indicators:
       Specific information about potential threats, such as malicious file hashes, URLs, IP
        addresses, or indicators of compromise (IOCs).
Purpose:
 Use endpoint rules to enforce security policies and control endpoint behavior.
       Implement web content filtering to limit access to potentially harmful content and improve
        user productivity.
General Steps:
    1. Define Allowed and Blocked Activities: Determine which applications, processes, and
       network connections are allowed or blocked on your endpoints.
    2. Create Indicators: Compile a list of known malicious indicators based on threat intelligence
       sources, internal security reports, or collaboration with external partners.
Automated IR: Utilizing tools and workflows to automatically investigate and respond to security
incidents, potentially isolating compromised systems, blocking malicious activity, or remediating
threats.
    1. Defender for Cloud or Sentinel: Utilize built-in automation capabilities or explore integration
       with third-party IR frameworks.
    3. Testing and refinement: Thoroughly test and refine automated IR processes to ensure
       effectiveness and avoid unintended consequences.
Automatic attack disruption: Taking immediate measures to halt ongoing cyberattacks, such as
isolating infected devices, blocking network traffic, or shuingng down processes.
    1. Defender for Cloud or Sentinel: Explore advanced threat protection and response features
       within these platforms.
pg. 3
                                           SKILLCERTPRO
   2. Configuration: Depending on the chosen platform, configure specific seingngs for automatic
      attack disruption based on predefined triggers or threat detection rules.
   3. Testing and refinement: Similar to automated IR, thoroughly test and refine the
      configuration to ensure it disrupts attacks without causing unintended disruptions to
      legitimate operations.
 Device Groups:
 Permissions:
o Define user and group access levels to various Defender for Endpoint functionalities.
           o   Granular control ensures only authorized personnel can perform specific actions like
               isolating compromised devices.
 Automation Levels:
           o   Utilize features like network discovery and asset inventory tools to locate devices not
               actively reporting to Defender for Endpoint.
o Unmanaged devices pose security risks as they lack protection and monitoring.
o Defender for Endpoint console or PowerShell cmdlets can help identify them.
           o   Employ tools like Group Policy or Intune to deploy the Defender for Endpoint agent
               on unmanaged devices.
pg. 4
                                           SKILLCERTPRO
o Ensure all devices within your network are protected and monitored.
 Azure Arc:
 Resource Management:
           o   Provision, configure, and monitor resources like VMs, Kubernetes clusters, and
               databases using Azure Arc.
Connect Environments to Microsoft Defender for Cloud (by using multi-cloud account
management):
           o   Connect and manage Defender for Cloud across multiple cloud subscriptions and
               accounts, offering consolidated security visibility and control.
 Resource Discovery:
           o   Defender for Cloud automatically discovers resources within your connected cloud
               environments.
           o   This includes Azure resources, as well as workloads running on other cloud providers
               (AWS, GCP, etc.).
           o   Identify resources that lack security configurations or are not actively protected by
               Defender for Cloud.
Identify and Remediate Devices at Risk by Using Microsoft Defender Vulnerability Management:
pg. 5
                                            SKILLCERTPRO
 Risk Identification:
            o   Defender for Endpoint scans devices to detect known vulnerabilities and assess their
                severity.
 Vulnerability Remediation:
o Determine the specific security needs and goals you want to address.
            o   Consider the types of logs you'll collect and analyze (e.g., security events, network
                traffic, identity data).
            o   Establish the geographic location(s) where data will be stored based on compliance
                or data residency requirements.
o Evaluate factors like data volume, ingestion rate, and retention needs.
o Select from tiers like "Free," "Standard," or "Premium" based on your requirements.
            o   Identify the sources of security data you'll collect (e.g., Azure resources, Microsoft
                365, on-premises systems).
o Configure data sources and connectors through Sentinel's user interface or API.
            o   Note: Be mindful of data privacy regulations when collecting and storing sensitive
                information.
pg. 6
                                            SKILLCERTPRO
            o   Sentinel utilizes Azure Active Directory (Azure AD) roles to grant specific permissions
                for workspace access and management.
            o   Roles are assigned to users or groups to control their capabilities within the
                workspace.
o Security Reader: View data and dashboards, but cannot modify configurations.
            o   Security Admin: Manage all aspects of the workspace, including user access and
                configuration changes.
            o   Log Analytics Reader: Access and analyze logs collected in Sentinel using Log
                Analytics workspace.
 Assigning Roles:
            o   Use the Azure portal, Azure PowerShell, or Azure CLI to assign roles at the workspace
                level or to individual users or groups.
            o   Azure Resource Manager (ARM) uses Azure RBAC to control access to Azure
                resources, including Sentinel workspaces.
            o   Log Analytics Contributor: Create and manage Log Analytics workspaces (required
                for Sentinel).
                       For specific data sources like Azure VMs, additional roles like "Virtual
                        Machine Contributor" might be necessary.
            o   Utilize the Azure portal, Azure PowerShell, or Azure CLI to assign RBAC roles to users,
                groups, or service principals.
pg. 7
                                            SKILLCERTPRO
            o   Sentinel works seamlessly with Azure Log Analytics workspaces for storing and
                analyzing collected data.
o Logs are stored in tables that can be queried using Kusto Query Language (KQL).
            o   Define the log types (e.g., security events, network traffic) you want to collect based
                on your security needs.
            o   Designate a retention period for each log type considering compliance requirements,
                storage costs, and analysis needs.
o During workspace creation, specify the desired retention period for each log type.
            o   Tip: It's recommended to retain security event logs for longer durations for security
                analysis and forensic investigations.
 Workspace Manager:
            o   This Azure portal tool facilitates centralized management and monitoring of multiple
                Sentinel workspaces across subscriptions.
o Use it to:
 Azure Lighthouse:
            o   Enables Managed Service Providers (MSPs) or security teams to deliver and manage
                Sentinel workspaces across customer subscriptions.
            o   Provides delegated access and control over workspaces without requiring direct
                subscription ownership.
pg. 8
                                             SKILLCERTPRO
       What are data sources? Data sources are any systems or applications that generate security
        logs, alerts, or other relevant information about your environment. Examples include:
            o   Microsoft products like Microsoft 365 Defender, Azure Security Center, Azure Active
                Directory, and more
o Custom applications
       Why is it important? Identifying the right data sources is critical for comprehensive security
        monitoring. By collecting data from various sources, you gain a broader view of potential
        threats and suspicious activities.
 How to do it?
            o   Identify relevant data: Determine what type of data each source can provide, such
                as security events, alerts, network traffic, and more.
            o   Prioritize based on risk: Focus on gathering data from sources that are most relevant
                to your security posture and risk profile.
       What are connectors? Connectors are pre-built integrations that simplify the process of
        collecting data from various Azure services into Microsoft Sentinel. They automate data
        ingestion and configuration, saving you time and effort.
            o   Azure Policy connector: Provides insights into policy violations and helps you track
                security compliance within your Azure environment.
            o   Once connected, configure the specific data you want to collect and define any
                filtering criteria.
pg. 9
                                            SKILLCERTPRO
         systems have the latest insights and can trigger automated responses based on events
         detected in either platform.
 Specific configurations:
             o   Between Microsoft Sentinel and Microsoft Defender for Cloud: Allows for
                 integrated security management across cloud workloads and Sentinel's centralized
                 event collection and analysis.
        How to configure? The specific steps vary depending on the chosen configuration. Refer to
         Microsoft's official documentation for detailed instructions: https://learn.microsoft.com/en-
         us/credentials/certifications/exams/sc-200/
        What are Syslog and CEF? These are standard protocols for logging and communicating
         security events between devices and security information and event management (SIEM)
         systems like Microsoft Sentinel.
 Planning considerations:
             o   Identify devices and applications that support Syslog or CEF: Determine which
                 systems in your environment generate logs using these protocols.
             o   Define log formats and severity levels: Decide which data fields you need to collect
                 and set the severity level (e.g., informational, warning, critical) for each type of
                 event.
 Configuration steps:
             o   In Microsoft Sentinel, go to Data connectors and search for the relevant connector
                 (e.g., "Syslog").
        What are Windows Security events? Windows operating systems generate various security-
         related events that can be valuable for monitoring and detecting suspicious activities.
 Planning considerations:
             o   Determine the type of events you need: Analyze the potential security risks in your
                 environment and choose the appropriate Windows Security event logs to collect
                 (e.g., security audit logs, system logs).
 Configuration steps:
pg. 10
                                             SKILLCERTPRO
             o   Using Data Collection Rules (DCRs): In Microsoft Sentinel, create a new DCR and
                 select Windows as the data source.
             o   Specify the target group of machines to collect data from and choose the specific
                 event logs you want to include.
o Alternatively, you can use Windows Event Forwarding (WEF): Configure WEF
Threat intelligence (TI) is crucial for security analysts to stay informed about the latest threats and
vulnerabilities. SC-200 covers configuring various connectors to bring external TI feeds into Microsoft
Sentinel, a security information and event management (SIEM) platform. Here are the mentioned
connector types:
        Platform Connectors: These pre-built connectors integrate directly with other Microsoft
         security products like Microsoft Defender for Cloud or Microsoft 365 Defender, allowing you
         to receive relevant threat alerts and indicators from those sources.
        Upload Indicators API: This option allows you to upload custom threat indicators (e.g., IP
         addresses, URLs) directly into Sentinel using an API call.
        MISP (Malware Information Sharing Platform) Connectors: MISP is another platform for
         sharing threat information. This connector allows you to integrate your Sentinel instance
         with MISP to receive and share threat intelligence data.
Sentinel stores ingested data from various sources, including security products, network devices, and
applications. This data is stored in log tables within the workspace. SC-200 emphasizes the ability to
create custom log tables to manage specific data types or tailor data organization for efficient
analysis. Here's what you need to know:
        Schema Definition: You define the structure of the table by specifying the data types (e.g.,
         string, integer) and names of each column.
        Data Mapping: You map incoming data to specific columns in the table, ensuring the data is
         stored and organized appropriately.
        Normalization: You can optimize data storage and improve query performance by
         normalizing the data structure, which involves eliminating redundancy and organizing data
         into related tables.
pg. 11
                                            SKILLCERTPRO
        MCDA protects against cloud application threats by analyzing user activity, detecting
         suspicious behavior, and enforcing access controls.
             o   Detect threats: Set anomaly detection rules to identify unusual user activity or data
                 access attempts.
             o   Prevent data loss: Implement data loss prevention (DLP) policies to restrict sensitive
                 data sharing.
        MDO protects against threats like phishing emails, malware, and malicious attachments in
         Microsoft Office applications.
             o   Filter phishing emails: Block emails with malicious URLs or attachments commonly
                 used in phishing attacks.
        MDE protects devices like laptops and servers against malware, vulnerabilities, and other
         threats.
             o   Configure attack surface reduction (ASR) rules: These rules block specific techniques
                 commonly used by attackers, such as disabling security software or exploiting
                 vulnerabilities.
 MDC protects cloud resources like Azure virtual machines and containers from threats.
pg. 12
                                             SKILLCERTPRO
             o   Monitor and respond to threats: Receive alerts about suspicious activity and take
                 action to mitigate threats.
             o   Enforce security best practices: Implement policies that ensure your cloud resources
                 are configured securely.
        Purpose: Create custom detection rules to identify specific security events not covered by
         built-in detections. These rules leverage queries written in Kusto Query Language (KQL) to
         analyze security data and generate alerts.
 Process:
             1. Create the Rule: Use the Microsoft Defender Security Center (MDSC) portal to
                navigate to Hunting > Custom detection rules. Click Create new rule.
             2. Define the Query: Use KQL to define the query that identifies the desired security
                event. KQL allows filtering data based on various criteria like device, user, process,
                file, and registry entries.
             3. Configure Settings: Define the schedule for running the query (e.g., hourly, daily), set
                severity level for generated alerts, and choose the target scope (e.g., specific
                devices, all devices).
             4. Test and Deploy: Test the rule using the Run now option and review the generated
                alerts for accuracy. Once satisfied, deploy the rule to the desired scope.
 Management:
             o   Review and Modify: Monitor triggered alerts and modify the rule's query or seingngs
                 as needed.
pg. 13
                                               SKILLCERTPRO
        Purpose: Reduce alert fatigue and improve the efficiency of security analysts by
         automatically managing specific alerts.
 Process:
1. Access Settings: Navigate to Settings > Rules > Alert tuning in MDSC.
             3. Define Conditions: Specify conditions based on evidence types (e.g., files, processes)
                or entity properties (e.g., device name, user account) to identify the target alerts.
4. Choose Action: Select the desired action for matching alerts. Options include:
 Benefits:
        Purpose: Deploy deceptive resources (e.g., fake files, registry keys) to attract and mislead
         attackers, revealing their presence and intentions.
 Process:
             2. Deploy Decoys: Choose the types of deceptions to deploy, such as folders, files, or
                registry keys.
 Benefits:
o Provides valuable insights into attacker tactics, techniques, and procedures (TTPs).
pg. 14
                                              SKILLCERTPRO
        Entities: These are real-world objects like users, computers, IP addresses, etc., found in
         security data. Sentinel automatically extracts entities from various sources like logs, network
         traffic, and endpoint data.
        Classification: You can categorize entities based on their type, risk level, or other relevant
         factors. This helps you filter and analyze data efficiently. For example, you can filter events
         related to a specific user or device.
        Analysis: Once entities are classified, you can use them to conduct deeper analysis. You can
         create queries that search for specific combinations of entities and events to identify
         potential security incidents.
        Scheduled Query Rules: These are automated queries that run at specific intervals (daily,
         weekly, etc.) and search for security events matching defined criteria.
        Kusto Query Language (KQL): This is a powerful query language used in Sentinel to search
         and analyze data. You can use KQL to filter events based on various criteria, including
         timestamps, entities, event types, etc.
        Configuring Rules: You can define the query logic using KQL within the scheduled rule
         configuration. This allows you to automate data analysis and receive alerts when specific
         events occur.
        NRT Query Rules: These rules are similar to scheduled ones, but they run continuously and
         analyze data in near real-time. This provides faster detection of potential threats.
        Use Case: NRT rules are ideal for monitoring critical security events like suspicious login
         attempts or malware activity. They allow you to identify and respond to threats quickly.
        Configuration: Similar to scheduled rules, you define the KQL-based query logic within the
         NRT rule configuration for real-time analysis.
pg. 15
                                             SKILLCERTPRO
        Content Hub: This is a repository within Sentinel where you can find pre-built queries,
         workbooks, and other security content. These resources can be used to create or modify
         your own analytics rules.
        Analytics Rules: These are broader concepts encompassing both scheduled and NRT rules.
         They define the overall logic for analyzing data and generating alerts.
        Management: The Content Hub allows you to easily import, modify, and manage your entire
         collection of analytics rules from a central location. This streamlines security operations and
         ensures consistency in your threat detection strategy.
Anomaly detection analytics rules are essential for identifying suspicious activities in Microsoft
Sentinel. They leverage data patterns and baselines to spot deviations that might indicate threats.
Here's how to configure them:
        Define the data source: Specify the data table (e.g., security events, network logs) where the
         rule will analyze data.
        Choose the detection logic: Select a pre-built rule or create a custom one using Kusto Query
         Language (KQL). KQL allows you to filter, aggregate, and analyze security data for anomaly
         detection.
        Set sensitivity and thresholds: Define how sensitive the rule should be to anomalies and set
         thresholds to trigger alerts when anomalies exceed a specific level.
        Enable the rule: Once configured, activate the rule to start monitoring data and generate
         alerts for potential threats.
The Fusion rule is a pre-built analytics rule in Sentinel that goes beyond simple anomaly detection. It
correlates security events from various sources, including Microsoft 365 Defender, Azure Defender,
and third-party security products. This correlation helps you connect the dots and gain a broader
understanding of potential attacks. Here's the configuration process:
        Enable the Fusion rule: This can be done through the Sentinel portal by navigating to the
         "Analytics" section and activating the "Fusion" rule.
        Configure specific detections: While the Fusion rule is pre-built, you can customize its
         behavior by defining specific detections you want to focus on. This can involve selecting
         specific data sources or threat categories.
        Tune sensitivity and thresholds: Similar to anomaly detection rules, you can adjust the
         sensitivity and thresholds to control the number of alerts generated by the Fusion rule.
ASIM (Advanced SIEM Information Model) parsers are a standardized format for representing
security events. These parsers allow Sentinel to understand and analyze data from various sources,
even if they follow different log formats. Here's how to query Sentinel data using ASIM parsers:
        Identify the ASIM table: Locate the specific ASIM table containing the data you want to
         query. You can find a list of available tables in Sentinel documentation.
pg. 16
                                             SKILLCERTPRO
        Craft your KQL query: Use the KQL syntax to filter, aggregate, and analyze data within the
         chosen ASIM table.
        Run the query and analyze results: Once your query is written, run it in Sentinel to retrieve
         the desired information. Understand the results in the context of your security investigation.
Threat indicators are specific pieces of information, like IP addresses, URLs, or file hashes, associated
with known or potential threats. Sentinel allows you to manage and use these indicators to enhance
threat detection capabilities. Here's an overview:
        Create and import indicators: You can manually define indicators in Sentinel or import them
         from external sources like threat intelligence feeds.
        Utilize indicators for blocking and enrichment: Sentinel can leverage indicators to block
         suspicious traffic or enrich security events by associating them with known threats.
        This involves understanding how to identify suspicious activities within these collaboration
         platforms. This could include:
             o   Analyzing user access logs for unusual access patterns or unauthorized access
                 attempts.
o Reporting incidents and collaborating with IT teams to address the root cause.
Investigate and remediate threats in email using Microsoft Defender for Office:
        This focuses on using Defender for Office to detect and respond to threats delivered via
         email, including:
             o   Phishing attacks: Identifying emails that attempt to trick users into clicking malicious
                 links or attachments.
pg. 17
                                              SKILLCERTPRO
 Remediation involves:
Investigate and remediate threats like Ransomware and Business Email Compromise (BEC)
identified by automatic attack disruption:
 This covers investigating incidents automatically detected by Microsoft 365 services, such as:
             o   Ransomware: Identifying and responding to attempts to lock down user data and
                 demand ransom for its release.
 Remediation involves:
Investigate and remediate compromised entities identified by Microsoft Purview DLP policies:
        This involves using data loss prevention (DLP) policies configured in Microsoft Purview
         (formerly Microsoft Information Protection) to identify and investigate:
Investigate and remediate threats identified by Microsoft Purview insider risk policies:
        This involves understanding how to leverage insider risk management features within
         Microsoft Purview to investigate suspicious user activities, such as:
pg. 18
                                             SKILLCERTPRO
Investigate and Remediate Alerts and Incidents Identified by Microsoft Defender for Cloud:
        Microsoft Defender for Cloud: A cloud-native security platform that continuously scans and
         analyzes your cloud resources for vulnerabilities, threats, and misconfigurations.
        Investigating Alerts: Analyzing alerts generated by Defender for Cloud to determine their
         severity, potential impact, and source. This may involve reviewing logs, examining security
         events, and understanding the context of the alert.
        Remediation: Taking actions to address the identified issue. This could involve isolating
         affected resources, patching vulnerabilities, or quarantining compromised machines.
Investigate and Remediate Security Risks Identified by Microsoft Defender for Cloud Apps:
        Microsoft Defender for Cloud Apps: A cloud-based security solution that protects your
         organization from threats across various cloud applications, including SaaS, PaaS, and IaaS.
        Investigation: Analyzing alerts and reports generated by Defender for Cloud Apps to identify
         potential risks like suspicious user activities, data leaks, or malware infections.
        Remediation: Taking steps to mitigate the identified risk. This may involve blocking malicious
         activities, revoking user access, or isolating compromised applications.
        Microsoft Entra ID: A comprehensive identity and access management (IAM) solution that
         helps secure user access and identities across various platforms.
        Remediation: Taking actions to secure the compromised identity. This may involve reseingng
         passwords, enforcing multi-factor authentication (MFA), or disabling compromised accounts.
Investigate and Remediate Security Alerts from Microsoft Defender for Identity:
        Microsoft Defender for Identity: An on-premises security solution that detects and responds
         to suspicious activities and potential threats on your identity infrastructure (e.g., Active
         Directory).
        Investigation: Analyzing alerts generated by Defender for Identity to understand the nature
         of the suspicious activity, its potential impact, and the affected identities. This may involve
         reviewing logs, analyzing network traffic, and identifying involved devices.
        Remediation: Taking necessary actions to address the threat. This could involve isolating
         compromised devices, reseingng user passwords, or implementing access controls to prevent
         further attacks.
        Microsoft Defender portal: A central hub for managing all your Microsoft security solutions,
         including Defender for Cloud, Defender for Cloud Apps, Defender for Identity, and others.
pg. 19
                                             SKILLCERTPRO
This task involves understanding the sequence of events related to a potentially compromised
device. The goal is to determine when and how the compromise occurred, what actions the attacker
took, and the extent of the damage.
        Analyzing security logs: This includes reviewing logs from various sources like the operating
         system, applications, and security tools. You'll look for suspicious activities like unexpected
         login attempts, file modifications, or network connections.
        Utilizing endpoint detection and response (EDR) tools: Microsoft 365 Defender and
         Defender for Cloud are relevant tools in this context. These tools provide detailed
         information about events on the device, including timestamps and associated processes.
        Correlating data from different sources: Combine information from logs, EDR tools, network
         activity monitoring (NAM) systems, and other security tools to build a complete picture of
         the timeline.
        Identifying the initial compromise vector: This involves understanding how the attacker
         gained access to the device, such as through phishing emails, malware downloads, or
         vulnerabilities exploited.
Perform Actions on the Device (Live Response and Collecting Investigation Packages):
Once you have a better understanding of the compromise, you can take specific actions on the
device to:
        Contain the threat: This might involve isolating the device from the network, disabling user
         accounts, or stopping malicious processes.
        Collect evidence: Use live response tools to gather data from the device's memory, running
         processes, and registry. This evidence can be used for further analysis and forensic
         investigation.
        Remediate the issue: Depending on the severity of the compromise, actions like removing
         malware, patching vulnerabilities, or restoring the system from a backup might be necessary.
This involves analyzing the collected evidence to identify the scope and impact of the compromise. It
also helps in understanding the attacker's motivations and techniques.
pg. 20
                                              SKILLCERTPRO
        Analyzing collected data: This might involve examining memory dumps, network traffic
         captures, and registry entries for suspicious activity indicators (SAIs) or indicators of
         compromise (IOCs).
        Identifying compromised entities: This includes users, machines, and data that were
         potentially affected by the attack.
        Reconstructing the attack flow: Based on the evidence, recreate the sequence of steps the
         attacker took to compromise the system.
        The Unified Audit Log (UAL) is a centralized location in Microsoft 365 that collects audit data
         from various Microsoft services like Azure AD, Microsoft Exchange, and SharePoint Online.
        Security analysts use UAL to investigate suspicious activities, identify potential security
         incidents, and understand user actions within the environment.
        Content Search is another key tool in Microsoft 365 for investigating threats. It allows
         searching across various content sources like mailboxes, OneDrive storage, SharePoint sites,
         and Teams chats.
pg. 21
                                              SKILLCERTPRO
             o   Identify documents containing sensitive information that might have been leaked
                 accidentally or through malicious intent.
             o   Locate specific files based on their properties, like creation date or modification
                 time, potentially linked to suspicious activity.
        By using advanced search queries and filters, analysts can narrow down their search scope
         and efficiently pinpoint relevant information related to a potential security threat.
        Microsoft Graph provides a programmatic interface to access data from various Microsoft
         services, including Azure AD, Exchange Online, and OneDrive.
        Activity logs within Microsoft Graph capture details about user and application activities
         within these services.
        Security analysts can leverage Microsoft Graph APIs to query activity logs and hunt for
         threats proactively. This involves creating custom scripts or using tools like Microsoft Sentinel
         to:
             o   Identify anomalous user behavior patterns, for example, unusual login attempts from
                 unexpected locations.
             o   Monitor for specific events that might indicate potential security incidents, such as
                 data deletion or file modification attempts.
By mastering these skills in investigating threats using UAL, Content Search, and Microsoft Graph,
security analysts can be more effective in detecting, analyzing, and responding to security threats
within their Microsoft 365 environment.
Triage is the initial assessment of an incident to determine its severity and priority. This involves:
 Navigating the Incidents tab: Locate the incident list within the Microsoft Sentinel portal.
 Selecting the incident: Choose the specific incident you want to triage.
        Assigning a severity level: Utilize the "Severity" dropdown menu to assign a level (e.g., low,
         medium, high, critical) based on the potential impact and urgency.
 Saving the changes: Ensure the chosen severity level is applied to the incident.
Microsoft Sentinel also offers an incident triage dashboard providing a high-level overview of:
 Incident status: Track the number of open, assigned, and closed incidents.
 Performance metrics: Monitor key indicators like time to resolution and analyst workload.
Investigate Incidents:
pg. 22
                                             SKILLCERTPRO
Investigation involves further analysis to understand the incident's scope, root cause, and potential
consequences. This entails:
        Gathering data: Utilize various sources within Sentinel, including logs, alerts, and threat
         intelligence.
        Analyzing data: Employ techniques like entity enrichment, threat hunting queries, and
         timeline analysis to identify patterns and connections.
        Correlating events: Combine data points from different sources to establish a comprehensive
         picture of the incident.
        Documenting findings: Record key observations, steps taken, and potential outcomes for
         future reference and collaboration.
        Incident details page: View all relevant information about the incident in a centralized
         location.
        Query capabilities: Leverage Kusto Query Language (KQL) to search and analyze data
         efficiently.
        Entity graph: Visualize relationships between entities involved in the incident, aiding in
         understanding the attack flow.
Respond to Incidents:
Responding involves taking necessary actions to contain, eradicate, and recover from the incident.
This may include:
        Remediating threats: Apply appropriate actions to neutralize the identified threat, such as
         removing malware or patching vulnerabilities.
        Reporting the incident: Notify relevant stakeholders and authorities as per your
         organization's incident response plan.
        Automation rules: Trigger automated actions based on specific criteria, expediting response
         times.
        Integration with third-party tools: Connect Sentinel with other security tools to share
         information and orchestrate responses across platforms.
pg. 23
                                             SKILLCERTPRO
 Tools: Microsoft Defender for Cloud, Microsoft 365 Defender, Microsoft Sentinel
 Steps:
             1. Define conditions: Specify the criteria that must be met for the rule to activate, such
                as specific alerts, severity levels, or threat indicators.
             2. Select actions: Choose the automated response that the rule will execute, such as
                isolating compromised machines, blocking suspicious IP addresses, or quarantining
                files.
             3. Test and refine: Thoroughly test the rule in a non-production environment to ensure
                it functions as intended and doesn't introduce unintended consequences.
 Purpose: Orchestrate complex security workflows involving multiple tasks and tools.
 Steps:
             1. Plan the playbook: Design the sequence of actions and decision points that the
                playbook will execute.
             2. Build the playbook: Use Sentinel's visual designer or code-based approach (KQL) to
                create tasks within the playbook, such as running hunting queries, invoking
                automation rules, or sending notifications.
             3. Test and fine-tune: Verify the playbook's functionality and make adjustments as
                needed.
 Purpose: Use automation rules to respond to security events detected by analytic rules.
 Tools: Microsoft Defender for Cloud, Microsoft 365 Defender, Microsoft Sentinel
 Steps:
             1. Create an analytic rule: Define the conditions that will trigger the rule, typically
                based on security logs, network traffic, or endpoint activity.
             2. Link the rule to an automation rule: Specify which automation rule should be
                executed when the analytic rule detects an event that meets its criteria.
             3. Verify the connection: Ensure the analytic rule can successfully trigger the
                associated automation rule.
pg. 24
                                              SKILLCERTPRO
 Steps:
             1. Open the alert or incident details: Navigate to the alert or incident in Microsoft
                Sentinel.
             2. Locate the "Run playbook" option: This option might be presented within the alert
                or incident context menu or details.
             3. Select the desired playbook: Choose the appropriate playbook to address the
                specific situation.
             4. Review and confirm: Verify the execution and monitor the playbook's actions to
                ensure it achieves the intended outcome.
        Purpose: Extend the reach of Sentinel playbooks to on-premises devices and systems beyond
         cloud environments.
 Requirements:
             o    On-premises agents: Install and configure relevant security agents or tools on on-
                  premises machines to provide telemetry and allow for remote operations execution.
 Steps:
1.     Establish connectivity: Set up the necessary infrastructure to bridge Sentinel and on-
premises systems.
2.     Prepare on-premises resources: Deploy security agents or configure tools that can receive
and execute commands from Sentinel playbooks.
3.      Design playbooks: Incorporate tasks that leverage on-premises agents or tools for actions
like running scripts, collecting data, or taking specific actions on devices.
        KQL: It's a query language specifically designed for analyzing data stored in Azure Data
         Explorer and Microsoft Sentinel.
        Identifying Threats: Security analysts use KQL to write queries that search for suspicious
         activities or events within security logs. These queries can help identify potential threats like:
pg. 25
                                             SKILLCERTPRO
o Malware activity.
        Example: You can write a KQL query to find all login attempts from a specific IP address
         within a certain timeframe. If you suspect malicious activity from that IP, this query can
         reveal relevant login attempts for further investigation.
        Microsoft Defender Portal: This is a unified platform for managing and analyzing security
         data across various Microsoft security solutions like Microsoft 365 Defender, Azure Defender,
         and Microsoft Defender for Endpoint.
        Threat Analytics: The portal provides various tools and visualizations to help analysts
         understand the security posture of their environment. These include:
o Attack timelines: Showing the sequence of events associated with a potential attack.
        Interpretation: Security analysts need to interpret the information presented in the portal to
         understand the nature and severity of potential threats. This involves:
             o   Analyzing attack timelines to identify the initial point of compromise and the
                 attacker's actions.
        Hunting Queries: These are proactive queries written in KQL to search for specific indicators
         of compromise (IOCs) or suspicious patterns within security data.
        Customizing Queries: While the Defender Portal offers pre-built queries, analysts often need
         to create custom queries tailored to their specific needs. This allows them to search for:
        Benefits: Creating custom hunting queries empowers analysts to be more proactive in threat
         hunting and potentially identify threats before they cause significant damage.
Further Resources:
pg. 26
                                             SKILLCERTPRO
        MITRE ATT&CK: This is a globally recognized knowledge base for cyber adversary tactics,
         techniques, and procedures (TTPs).
        Using MITRE ATT&CK in Microsoft Sentinel: Sentinel integrates with ATT&CK, allowing you
         to:
             o   Map detected security events to specific ATT&CK techniques. This helps identify
                 potential gaps in your security posture and prioritize threat hunting efforts.
             o   Utilize pre-built queries and hunting scenarios based on ATT&CK techniques. This
                 streamlines the process of searching for malicious activity related to known attack
                 methods.
        Content Gallery: This is a repository within Microsoft Sentinel that contains pre-built hunting
         queries for various purposes, such as detecting specific threats or investigating suspicious
         activities.
        Customizing Hunting Queries: You can modify existing queries from the content gallery to
         tailor them to your specific needs and environment. This allows you to:
o Adjust the logic of the query to match your unique detection requirements.
        Hunting Bookmarks: These are temporary markers you can set within a hunting query to
         capture specific points of interest during an investigation.
o Save time and effort by quickly revisiting relevant sections of your investigation.
o Share bookmarks with other analysts to collaborate and share findings efficiently.
        Livestream: This is a feature in Microsoft Sentinel that provides real-time results of a running
         hunting query.
 Benefits of Livestream:
             o   Gain immediate insights into the ongoing investigation and identify potential
                 threats as they emerge.
pg. 27
                                             SKILLCERTPRO
o Quickly react to security incidents without waiting for the query to complete.
        Archived Log Data: Security-related events are often stored in Sentinel's archive for historical
         analysis and compliance purposes.
             o   You can retrieve specific archived logs for further investigation or compliance
                 reporting.
             o   Sentinel offers tools to manage the archive storage size and retention policies for
                 archived data.
        Search Jobs: These are longer-running queries that can be scheduled to scan large datasets
         within Sentinel.
o Schedule regular searches for routine security checks or threat hunting activities.
        Activating templates: Sentinel provides built-in templates for common security scenarios,
         such as investigating suspicious activities or monitoring specific vulnerabilities. You can
         activate these templates to create a pre-defined workbook with relevant data visualizations
         and queries.
        Customizing templates: Once activated, you can customize these templates to fit your
         specific needs. This might involve:
             o   Adding or removing data sources: You can add data from additional sources
                 available in Sentinel to gain a broader perspective.
             o   Modifying queries: You can adjust the KQL (Kusto Query Language) queries within
                 the template to filter data and display information most relevant to your
                 investigation.
             o   Editing visualizations: You can change the type of visualizations used (e.g., bar chart,
                 pie chart) or customize their appearance to improve clarity.
        Building from scratch: Instead of using templates, you can create custom workbooks entirely
         on your own. This allows for complete control over the layout, data sources, and
         visualizations.
pg. 28
                                             SKILLCERTPRO
        Integrating KQL: KQL is a powerful query language used in Sentinel to filter and analyze
         security data. You can embed KQL queries within your custom workbooks to:
             o   Filter specific events: You can narrow down the data displayed in the workbook
                 based on specific criteria (e.g., device ID, user name, time frame).
             o   Aggregate data: You can perform calculations on the data (e.g., count occurrences,
                 calculate averages) to gain insights from trends and patterns.
             o   Join data from different sources: You can combine data from multiple tables within
                 Sentinel to create a more comprehensive view of security events.
Configure visualizations:
        Choosing visualization types: Sentinel offers various visualizations, each suitable for
         displaying different types of data. Understanding the strengths and weaknesses of each type
         (e.g., bar charts for comparisons, pie charts for proportions) allows you to effectively
         communicate insights.
        Arranging visualizations: The way you arrange visualizations within the workbook can
         significantly impact its effectiveness. Grouping related information and using clear titles can
         guide viewers through the story you're trying to tell with the data.
Disclaimer: All data and information provided on this site is for informational
purposes only. This site makes no representations as to accuracy, completeness,
correctness, suitability, or validity of any information on this site & will not be
liable for any errors, omissions, or delays in this information or any losses,
injuries, or damages arising from its display or use. All information is provided on
an as-is basis.
pg. 29