Microsoft Azure Security Engineer Associate AZ-500 Practice Question

You need to create an analytics rule in Microsoft Sentinel that must generate an incident every time the KQL query returns at least one result without waiting for the next evaluation cycle. While configuring the rule, which setting must you explicitly enable to meet the requirement?

  • Add a playbook automation rule triggered on alert creation

  • Enable the rule in "disabled" mode for tuning

  • Turn on the option "Create incidents from alerts"

  • Configure an alert grouping threshold of 1

Microsoft Azure Security Engineer Associate AZ-500
Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot