7: Threat Hunting Flashcards

(16 cards)

1
Q

What is threat hunting in Microsoft Sentinel?

A

It’s the process of proactively searching your log data for suspicious activity before alerts are triggered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where do you access hunting features in Sentinel?

A

Microsoft Sentinel > Threat Management > Hunting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are hunting queries?

A

Prewritten KQL queries designed to help analysts look for known attack patterns, anomalies, or suspicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who uses hunting queries?

A

Analysts, detection engineers, and threat hunters looking to explore data and uncover hidden threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kinds of activity can hunting queries detect?

A

Suspicious logons, rare processes, encoded commands, signs of persistence, lateral movement, or exfiltration attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are hunting queries organized in Sentinel?

A

By MITRE ATT&CK tactics (e.g., Persistence, Privilege Escalation, Defense Evasion).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can you do with the results of a hunting query?

A

Bookmark them, convert them into incidents, or use them to trigger automation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can you create your own hunting queries?

A

Yes, you can write or modify KQL queries based on your environment and threat model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the benefit of using built-in hunting queries?

A

They save time and provide vetted detection logic mapped to known threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is hunting important if you already have analytics rules?

A

Hunting catches threats that slip past automated detections and helps analysts stay ahead of attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are hunting queries the same as analytics rules?

A

No—analytics rules generate alerts automatically; hunting queries are run manually for proactive investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can I modify built-in hunting queries?

A

Yes, they’re fully editable and can be customized for your environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can I schedule hunting queries to run automatically?

A

Not directly—but you can turn hunting logic into analytics rules to schedule it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Can hunting queries use bookmarks or be linked to incidents?

A

Yes, results can be bookmarked, enriched, or used to create incidents manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Do hunting queries require special permissions?

A

You need permissions to view and run KQL queries in the workspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Can hunting be used in air-gapped or disconnected environments?

A

Yes, as long as the logs are ingested into the Sentinel workspace, you can run hunting queries.