Microsoft Azure Security Engineer Associate AZ-500 Practice Question

Your company collects Windows Security events from 200 Azure VMs to a Log Analytics workspace by using the Azure Monitor agent. Analysts want to ingest only event ID 4625 (failed sign-in) from VMs that have the tag Environment=Prod to reduce noise and cost. You create a new data collection rule (DCR). Which DCR configuration meets the requirement?

  • Deploy the DCR to all virtual machines and use a Sentinel analytic rule to discard events that are not event ID 4625.

  • Enable data collection for the Security channel and configure a retention policy that deletes all events except event ID 4625 after 30 days.

  • Create a workbook query that runs every hour against the Security table and deletes any record whose EventID is not 4625.

  • Set the DCR scope to resources that have the tag Environment set to Prod and add a transformKql expression that filters the Security channel for EventID == 4625.

Microsoft Azure Security Engineer Associate AZ-500
Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot