1: Core Concepts Flashcards

(14 cards)

1
Q

What is Microsoft Sentinel?

A

A cloud-native SIEM and SOAR solution that collects, detects, investigates, and responds to threats across your environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Sentinel do with data once it’s ingested?

A

It stores it in Log Analytics, where it can be queried, visualized, and used for detection, investigation, and automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is KQL?

A

Kusto Query Language—used to query log data in Sentinel (and other Azure services). Similar to SQL but optimized for time-series and log data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an analytics rule?

A

A scheduled query that looks for suspicious patterns in your logs and generates alerts when conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an incident?

A

A collection of related alerts grouped together by Sentinel to help analysts investigate and respond to a full attack story.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the difference between an alert and an incident?

A

An alert is one detection firing. An incident groups alerts together—based on timing, entities, or correlation rules—for a higher-level investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the investigation graph?

A

A visual tool that maps entities and alerts related to an incident, helping analysts understand relationships and attack progression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the value of Sentinel if I already have Defender XDR?

A

Defender XDR protects Microsoft 365 data sources. Sentinel brings in everything else—from firewalls to Linux—and gives you centralized visibility, long-term retention, and custom detections across your full environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where is Sentinel data stored?

A

In an Azure Log Analytics workspace. Each Sentinel instance is tied to one workspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the pricing model for Sentinel?

A

Based on data ingestion (per GB) and optional features like long-term retention or automation. Some Microsoft data sources (like M365) are free to ingest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does Sentinel support scaling across complex environments?

A

You can see what’s happening across separate workspaces or tenants (with Lighthouse) without needing to move all that data into one place. You can also use RBAC to keep access controls isolated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do I search logs in Sentinel?

A

Use KQL queries in the Logs blade to filter, explore, and visualize raw log data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a workbook?

A

An interactive dashboard built on KQL that visualizes data—used for monitoring, investigation, or reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why should I care about the difference between alerts and incidents?

A

Incidents help reduce alert fatigue by grouping related alerts into a coherent investigation—less noise, more signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly