You have a Microsoft 365 E5 subscription that uses Microsoft Defender XDR.
The security team at your company detects command and control (C2) agent traffic on the network. Agents communicate once every 50 hours.
You need to create a Microsoft Defender XDR custom detection rule that will identify compromised devices and establish a pattern of communication. The solution must meet the following requirements:
• Identify all the devices that have communicated during the past 14 days.
• Minimize how long it takes to identify the devices.
To what should you set the detection frequency for the rule?
Sekpluz
Highly Voted 11 months, 4 weeks agoOneplusOne
Most Recent 2 weeks, 1 day ago0d0dde7
4 weeks agoOptimizor_IT
2 months agoEdindude
3 months, 4 weeks agoEdindude
3 months, 4 weeks agodejo
5 months, 2 weeks agosapphire
6 months, 4 weeks ago54c341a
3 months ago12369b6
7 months, 1 week agotalosDevbot
8 months agoSparkletoss
7 months, 3 weeks agog_man_rap
9 months, 3 weeks agosmosmo
1 year ago