Microsoft Security Operations Analyst Associate SC-200 Practice Question
Your SOC ingests multiple open-source threat intelligence feeds into Microsoft Sentinel by using the Threat intelligence (TI) TAXII data connector. You want Sentinel to raise an incident automatically whenever any newly ingested IP address indicator is later observed in the AzureActivity or AzureDiagnostics tables. Which Sentinel configuration should you create to meet the requirement without writing a custom KQL query?
Deploy a scheduled analytics rule based on the built-in TI map (Match threat intelligence indicators to data) template.
Enable User and entity behavior analytics (UEBA) and configure anomaly policies for IP entities.
Add all IP indicators to a Sentinel watchlist and create alert rules from the watchlist.
Rely on the Fusion built-in ML rule to correlate the indicators with Azure platform logs.
Microsoft Sentinel does not generate incidents from threat indicators unless you create an analytics rule that automatically compares the indicator tables against your normalized security logs. The built-in TI map (also called Match threat intelligence indicators to data or TI Matching) scheduled analytics rule template performs this correlation for you. After you deploy the rule and select the target log tables (such as AzureActivity and AzureDiagnostics), Sentinel continually joins new and existing indicators with incoming events and raises incidents when a match is found.
Enabling UEBA, creating a watchlist, or relying on Fusion alone will not evaluate threat indicators against the specified log sources, so these options would not generate the required incidents.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the Threat Intelligence (TI) TAXII data connector in Microsoft Sentinel?
Open an interactive chat with Bash
What is the 'TI map' rule in Microsoft Sentinel?
Open an interactive chat with Bash
How does the Fusion ML rule differ from the TI map rule in Sentinel?
Open an interactive chat with Bash
Microsoft Security Operations Analyst Associate SC-200
Manage security threats
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .