12: Use Cases Flashcards

(17 cards)

1
Q

What’s a common use case for Sentinel in a hybrid environment?

A

Aggregating logs from cloud and on-prem tools (like firewalls, Linux servers, and Active Directory) into one pane of glass for correlation and visibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do customers use Sentinel for identity monitoring?

A

By ingesting Entra ID sign-ins and Defender for Identity alerts to detect suspicious logins, lateral movement, and account compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s a real-world use case for automation/playbooks?

A

Automatically enriching an incident with VirusTotal lookups and tagging it based on risk score, then creating a ticket in ServiceNow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is Sentinel used in Zero Trust initiatives?

A

To monitor failed authentications, detect excessive access to sensitive resources, and track anomalous sign-ins across enclaves or tenants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s a use case for hunting queries?

A

Proactively searching for signs of compromise (e.g., mimikatz artifacts, unusual PowerShell usage) that weren’t caught by rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do workbooks support SOC operations?

A

They provide live dashboards for monitoring alerts by severity, analyst workload, data ingestion volume, or trends over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s a practical use for the MITRE ATT&CK workbook?

A

Mapping alerts to MITRE techniques so SOC managers can identify gaps in coverage and align defenses to known attacker TTPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do customers use custom watchlists?

A

To track known bad IPs, VIP users, or sensitive servers—and use them in analytics rules for prioritized alerting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s a use case for dynamic thresholds in analytics rules?

A

Detecting anomalies like “more than 3x the normal failed login attempts for this host” without setting static thresholds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can Sentinel help during a breach investigation?

A

Use the investigation graph to visualize related alerts, entities, and timeline, speeding up root cause analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is Sentinel used in compliance reporting?

A

Customers build workbooks to monitor control coverage, user access, and audit log activity for frameworks like NIST, PCI, or HIPAA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s a use case for custom logs via AMA?

A

Ingesting logs from air-gapped systems, ICS/OT networks, or niche security tools not covered by a native connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do customers use Sentinel for detection tuning?

A

By cloning built-in analytics rules, adjusting filters to reduce false positives, and tracking hit rates over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What’s a use case for the Content Hub?

A

Quickly deploying full content packages (connectors, rules, workbooks) for vendors like Palo Alto, Zscaler, or AWS—no need to start from scratch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is Sentinel used for executive visibility?

A

Workbooks summarize incidents, top threat types, and high-risk assets—used in weekly or quarterly CISO briefings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why would a customer use the data ingestion cost workbook?

A

To identify high-volume tables (like DNS or Windows events) and optimize ingestion filters to reduce costs.

17
Q

What’s a use case for correlating multiple data sources?

A

Linking identity alerts from Entra ID with endpoint alerts from Defender and firewall logs for a complete attack picture.