Ms-102 Implement Threat Intelligence in Microsoft Defender Flashcards

(31 cards)

1
Q

To get to the Alerts Queue in Defender

A

In the navigation pane, you must select the Incidents & alerts group to expand it, and then select Alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The manage alert pane allows you to

A

view or specify:

The alert status (New, Resolved, In progress).

The user account which Microsoft Defender XDR assigned to the alert.

The alert’s classification:

Not set. This option is the default setting.

True positive. Use this classification for alerts that accurately indicate a real threat. Specifying the threat type helps your security team see threat patterns and act to defend your organization from them.

Informational, expected activity. Use the options in this category to classify alerts. For example, for security tests, red team activity, and expected unusual behavior from trusted apps and users.

False positive. Use this classification for the type of alerts related to nonmalicious activity. Classifying alerts as false positive helps Microsoft Defender XDR improve its detection quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(AIR)

A

Automated investigation and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

to select an item in the Action center

A

Go to the Microsoft Defender portal and sign in.
In the navigation pane, select Actions & submissions, and then select Action center.
On the Action center pane, the Pending tab is displayed by default. Select either the Pending or History tab and then select an item. The system displays a detail pane for the selected item.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which of the following items triggers the start of an automated investigation?

A

An incident, in turn, can start an automated investigation. The automated investigation results in a verdict for each piece of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many days of raw data can you explore up to in an advanced threat hunting query?

A

30 days of raw data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To access Threat Analytics

A

Threat Intelligence –> Threat Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Microsoft Defender for Cloud Apps (formerly Microsoft Cloud App Security)

A

identifies and combats cyberthreats across all your Microsoft and third-party cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud Discovery

A

uses an organization’s traffic logs to dynamically discover and analyze the cloud apps that it’s using.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cloud app catalog

A

growing catalog of over 25,000 cloud apps. Microsoft ranked and scored the apps based on industry standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

App connectors

A

facilitate the integration between the Cloud App Security service and cloud applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Policy control

A

detect risky behavior, violations, or suspicious data points and activities in an organization’s cloud environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access the Defender for Cloud Apps portal

A

in the Microsoft Defender portal, the Cloud Apps section in the left-hand navigation pane provides links to the Microsoft Defender for Cloud Apps features. Select Settings to navigate to the Settings page.

On the Settings page, select Cloud Apps to navigate to the Settings page for Cloud Apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Create a new file policy

A

On the Microsoft Defender for Cloud Apps portal, select Control in the navigation pane, and then select Policies.

On the Policies page, the All policies tab is displayed by default. Select the Information protection tab.

In the Information protection tab, select +Create policy on the menu bar. In the drop-down menu that appears, select File policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Monitor alerts

A

n the Microsoft Defender portal, in the left-hand navigation pane, select Incidents & alerts to expand the group, and then select Alerts.
On the Alerts page, select Add filter on the menu bar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Microsoft Defender for Endpoint

A

enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.

Use: Endpoint behavioral sensors, Cloud security analytics, Threat intelligence

17
Q

Attack surface reduction.

A

attack surface reduction capabilities can resist attacks and exploitation. The capabilities also include network protection and web protection. These features regulate access to malicious IP addresses, domains, and URLs.

18
Q

Microsoft Defender for Endpoint Plan 1

A

Next-generation protection

Attack surface reduction

Manual response actions

Centralized management

Security reports

APIs

19
Q

Microsoft Defender for Endpoint Plan 2

A

Microsoft Defender for Endpoint Plan 1, plus:

Device discovery

Vulnerability management

Threat Analytics

Automated investigation and response

Advanced hunting

Endpoint detection and response

Microsoft Threat Experts

20
Q

Which Microsoft Defender for Endpoint capability provides the frontline of defense in the stack?

A

he attack surface reduction set of capabilities provides the frontline of defense in the stack.

21
Q

Microsoft Defender for endpoint works for what OS’s:

A

Android
iOS/iPadOS
Windows 10/11

22
Q

Enable Microsoft Defender for Endpoint in Intune

A

In the Microsoft Intune admin center, select Endpoint security in the navigation pane.

On the Endpoint security | Overview page, under the Setup section in the middle pane, select Microsoft Defender for Endpoint.

On the Endpoint security | Microsoft Defender for Endpoint page, scroll down to the Shared settings section and select Open the Microsoft Defender Security Center. This step opens the Microsoft Defender portal.

In the Microsoft Defender portal, in the left-hand navigation pane, select Settings, then Endpoints, and then Advanced features.

Set the toggle switch for the Microsoft Intune connection setting to On.

23
Q

Create the device configuration profile to onboard Windows devices

A

In the Microsoft Intune admin center, select Endpoint security in the left-hand navigation pane.

In the Endpoint security | Overview page, under the Manage section in the middle pane, select Endpoint detection and response.

In the Endpoint security | Endpoint detection and response page, select +Create Policy on the menu bar.

In the Create a profile pane that appears, select Windows 10 and Later in the Platform field.

In the Profile field, select Endpoint detection and response.

Select Create. Doing so initiates the Create profile wizard.

In the Create profile wizard, on the Basics tab, enter a Name and Description (optional) for the profile, and then select Next.

24
Q

configuring Microsoft Defender for Endpoint as part of a compliance policy:

A

In the Microsoft Intune admin center, select Devices in the left-hand navigation pane.

On the Devices | Overview page, under the Policy section in the middle pane, select Compliance policies.

On the Compliance policies | Policies page, select +Create profile on the menu bar.

In the Create a policy pane that appears, select in the Platform field and then select one of the platforms from the drop-down menu that appears. Select Create. Doing so initiates the [selected platform] compliance policy wizard.

In the [selected platform] compliance policy wizard, on the Basics tab, enter a policy Name and Description (optional). Select Next.

25
Microsoft Defender Vulnerability Management
rapidly and continuously prioritizes the biggest vulnerabilities on an organization's most critical assets. It also provides security recommendations to mitigate risk.
26
Complete the following steps to set up device discovery:
Navigate to the Microsoft Defender portal. In the navigation pane in the Microsoft Defender portal, select Settings, and then select Device discovery. If you want to configure Basic as the discovery mode to use on your onboarded devices, select Basic, and then select Save. If you selected the option to use Standard discovery, select one of the following options to determine which devices to use for active probing: All devices A subset of devices by specifying their device tags
27
To view and use Threat Trackers
o to the Microsoft Defender portal, and then under the Email and collaboration section in the navigation pane, select Threat tracker.
28
Threat Trackers
informative widgets and views that provide organizations with intelligence on different cybersecurity issues
29
To access Attack simulation training,
navigate to the Microsoft Defender portal and select Email and collaboration > Attack simulation training.
30
prerequisites to run Attack simulation training:
The organization must have either a Microsoft 365 E5 subscription, or Microsoft Defender for Office 365 Plan 2. The user running the attack simulation training must have one of the following Microsoft 365 roles: Global Administrator Security Administrator Either of the following roles designed specifically for Attack simulation training: Attack Simulator Administrators. Create and manage all aspects of attack simulation campaigns. Attack Simulator Payload Authors. Create attack payloads that an admin can start later.
31