What is exposure management?
Risk-based approach showing attack paths+ priority mitigation
What roles control sentinel access?
Reader, contributor, responder, automation contributor and RBAC roles
What to consider when planning log retention?
Tiering, cost, compliance, searchable archives
What is a data connector?
Method to ingest security data into sentinel
Where are connectors installed?
Microsoft sentinel content hub
Difference between syslog + CEF
Syslog is raw data, CEF is normalized enriched format
What service collects syslog/cef events?
Azure monitor agent (AMA)
What do DCR’S do?
Defines which events are collected and where they go
What is WEF used for?
Forwarding windows event logs from endpoint to collector
Why create custom log tables?
To ingest custom JSON /csv/text logs
How to monitor ingestion health?
Connector pages, errors, and ingestion status queries
What policies does defender for cloud apps support?
Activity, Anatoly, session, o auth governance policies
What protections does MDO provide?
Safe links, safe attachments, anti-phishing, impersonation protection
What are ASR rules used for?
Blocking risky behaviors used by malware
Where configure ASR rules?
Intune, GPS, or Defender portal
What are cloud workload protections?
Threat detection, recommendations + security posture for cloud resources
What is a custom detection rule?
A rule based on advanced hunting queries that triggers alerts
What is alert suppression?
Hiding repetitive alerts based on criteria
What is alert correlation?
Combining related alerts into a unified incident
What are deception rules?
Decoys used to detect lateral movement
What ave sentinel analytics rules?
Rules that detect threats using KQL and create incidents
What are entity based rules?
Rules that enrich with users, devices and IPs
What are ASIM parsers
Functions that normalize logs into consistent schemas
Why use ASIM?
For normalized queues and cross-source compatibility