Advanced hunting Flashcards

1
Q

How can we use threat hunting quries for atuomated detection?

A

Threat-hunting rules can be used to create detection rules to autmatically check for and the respond to suspected breach activity, misconfigured machines and other findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what data sources can be checked by advanced hunting queries?

A

Microsoft Defender for Endpoint

Microsoft Defender for Office 365

Microsoft Defender for Cloud Apps

Microsoft Defender for Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are two types of advanced hunting query data?

A

Event or activity data
data from alerts, security events, system events, routine assessments.

Entity data
information about users and devices.
static and dynamic sources, AD, event logs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly