Advanced hunting Flashcards
1
Q
How can we use threat hunting quries for atuomated detection?
A
Threat-hunting rules can be used to create detection rules to autmatically check for and the respond to suspected breach activity, misconfigured machines and other findings.
2
Q
what data sources can be checked by advanced hunting queries?
A
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Cloud Apps
Microsoft Defender for Identity
3
Q
What are two types of advanced hunting query data?
A
Event or activity data
data from alerts, security events, system events, routine assessments.
Entity data
information about users and devices.
static and dynamic sources, AD, event logs.
4
Q
A