exam questions

Exam SC-200 All Questions

View all questions & answers for the SC-200 exam

Exam SC-200 topic 1 question 19 discussion

Actual exam question from Microsoft's SC-200
Question #: 19
Topic #: 1
[All SC-200 Questions]

HOTSPOT -
You purchase a Microsoft 365 subscription.
You plan to configure Microsoft Cloud App Security.
You need to create a custom template-based policy that detects connections to Microsoft 365 apps that originate from a botnet network.
What should you use? To answer, select the appropriate options in the answer area.
NOTE: Each correct selection is worth one point.
Hot Area:

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Efficia
Highly Voted 3 years, 6 months ago
Policy template type: Activity Policy Filter based on: IP address tag Tested on the MCAS portal. When you select Activity policy only you get to filter from IP address.
upvoted 65 times
Nikki0222
7 months, 1 week ago
This is correct
upvoted 2 times
...
AnonymousJhb
3 years, 2 months ago
its NOT Activity Policy, as per https://docs.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy anomaly-detection-policy: Activity from suspicious IP addresses: This detection identifies that users were active from an IP address identified as risky by Microsoft Threat Intelligence. These IP addresses are involved in malicious activities, such as performing password spray, Botnet C&C, and may indicate compromised account. This detection uses a machine-learning algorithm that reduces "false positives", such as mis-tagged IP addresses that are widely used by users in the organization.
upvoted 7 times
MNC
2 years, 9 months ago
anomaly detection policy doesn't exists
upvoted 6 times
Metasploit
2 years, 7 months ago
It actually does, it is called cloud discovery anomaly detection policy; but not suitable for this question as you cannot filter by any of the mentioned filters in the question.
upvoted 8 times
Holii
2 years, 1 month ago
There are Anomaly Detection Policies as pre-built templates to use UEBA specifically for suspicious IP Address behavior (Botnet C&C) BUT it does not have a filter, only a source. So, correct. A custom policy with a filter would have to come from an Activity Policy, albeit redundant.
upvoted 6 times
...
...
...
...
Metasploit
2 years, 7 months ago
Agreeing with this answer, just tested it as well. Activity Policy Type. Filter: IP address> Tag >equals >Botnet Access Policy: Does not seem to have a filter section. Cloud Discovery Anomaly Detection Policy: Does not meet any of the options to filter here.
upvoted 11 times
...
...
stromnessian
Highly Voted 3 years, 3 months ago
Control -> Templates -> Logon from a risky IP address -> Create (activity) policy -> Activities matching any of the following -> IP address | Category | equals | Risky. Answer is Activity policy, IP address. For anyone who thinks it's "Anomaly detection policy", state the exact steps please and say why the steps above are wrong.
upvoted 16 times
vijeet
3 years, 2 months ago
Activity from suspicious IP addresses This detection identifies that users were active from an IP address identified as risky by Microsoft Threat Intelligence. These IP addresses are involved in malicious activities, such as performing password spray, Botnet C&C, and may indicate compromised account. This detection uses a machine-learning algorithm that reduces "false positives", such as mis-tagged IP addresses that are widely used by users in the organization
upvoted 1 times
...
...
7d801bf
Most Recent 11 months ago
Anomaly detection policy and Ip address Tag
upvoted 1 times
...
smanzana
1 year, 6 months ago
Policy template type: Activity Policy Filter based on: IP address tag
upvoted 1 times
...
prkhrkmr
1 year, 8 months ago
IP Address Tag is available in both Access and Activity policies. Check it out: https://security.microsoft.com/cloudapps/policy/activity/create https://security.microsoft.com/cloudapps/policy/access/create There are no customizable policies under "Anomaly Detection Policy" to narrow down just to Botnet IPs. The built-in Anomaly Detection Policy called "Activity from suspicious IP addresses" is not customizable.
upvoted 2 times
...
donathon
1 year, 9 months ago
So I physically tested and I found the filter only in activity policy template
upvoted 2 times
...
Big_Billy_Gates
1 year, 10 months ago
Why are so many people saying Activity Policy? It's wrong. 'Anomaly detection policy' and 'IP address tag' *are* the correct answers. The question asks for a policy to detect connections from a Botnet related IP address, this is done using the 'Activity from suspicious IP addresses' anomaly detection policy. The list of available anomaly detection policies can be found here: https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
upvoted 2 times
danlo
1 year, 6 months ago
You can't filter on "Activity from suspicious IP addresses" that's the problem
upvoted 1 times
...
...
TiredofTesting
2 years, 5 months ago
Looks like it is leaning more for 1) Activity Policy and 2) IP address tag. While I want to say Anomaly detection policy for the 1st answer, when I tested it in the lab, it came back with no templates under that category. While Activity Policy came back with a bunch related to logins from risky IP, potential ransomware activity, etc.
upvoted 5 times
...
Apocalypse03
2 years, 5 months ago
Policy template type: Activity Policy Filter based on: IP address tag Activity policies in Cloud App Security are designed to detect specific types of activity in the cloud apps that are being monitored. The "Botnet Network Activity" policy template is a pre-defined policy that is designed to detect and alert on suspicious activity from botnet networks. This policy uses a combination of machine learning and threat intelligence to identify botnet network activity, such as attempts to compromise accounts or access sensitive data. "Access Policy," is a type of policy that is used to control access to specific cloud apps or resources based on specified conditions, such as the location of the user or the type of device being used. "Anomaly detection policy," is a type of policy that is used to detect anomalies in the activity of specific cloud apps or resources based on specified conditions, such as the number of times a resource is accessed or the type of activity that is being performed. Neither of these options is suitable for detecting connections to Microsoft 365 apps that originate from a botnet network.
upvoted 8 times
Holii
2 years, 1 month ago
There is no "Botnet Network Activity" pre-defined policy template default... and "This policy uses a combination of machine learning and threat intelligence to identify botnet network activity" sounds like Anomaly Detection Policy... Anomaly Detection Policy uses UEBA to conduct machine learning on user analytics to predict whether IP addresses are being conducted suspiciously or coming from a potential Botnet C&C. Source: https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy Now, the question strictly asks for a FILTER to be applied to "IP Addresses" Cloud Discovery Anomaly Detection Policies "Apply to" IP addresses or Users, they do not "Filter" for them...so due to the nature of the grammar of this question I would say Activity Policy, since they are more open to creating a CUSTOM policy based on a TEMPLATE and capable of applying a FILTER for IP addresses. But if you're asking which one is the 'technically' correct one now that UEBA is fleshed out in the Microsoft ecosystem, it is 100% Anomaly Detection Policy.
upvoted 1 times
...
...
Ahmed_Root
2 years, 5 months ago
https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy it is anomaly detection policy and the other "suspicious ip address" actually which is not here. but you can find the response in the link. " Activity from suspicious IP addresses: These IP addresses are involved in malicious activities, such as performing password spray, Botnet C&C, and may indicate compromised account... "
upvoted 1 times
...
Atun23
2 years, 7 months ago
I'm really confused on this one For anomaly detections says "such as mis-tagged IP addresses" so it doesn't use IPs tagged as malicious, and the filter used according to scenario in filter can only be IP address tag. If we were to choose anomaly detections, the filter should be source, as it originates from a botnet. Activity from suspicious IP addresses This detection identifies that users were active from an IP address identified as risky by Microsoft Threat Intelligence. These IP addresses are involved in malicious activities, such as performing password spray, Botnet C&C, and may indicate compromised account. This detection uses a machine-learning algorithm that reduces "false positives", such as mis-tagged IP addresses that are widely used by users in the organization. https://docs.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
upvoted 1 times
...
amsioso
2 years, 8 months ago
https://docs.microsoft.com/en-us/defender-cloud-apps/control-cloud-apps-with-policies
upvoted 3 times
Ahmed_Root
2 years, 5 months ago
yes this link is helpful also this one https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy it is clear that the first response is "anomaly detection policy" but there is not "ip add tag" filter in it" there is "risky ip address" and such filters.
upvoted 2 times
...
...
de_cs_bacsi
2 years, 9 months ago
There is an exact filter type what is needed under the creation of "Activity policy": "Select a filter --> IP Address --> Select a filter --> Tag --> Select IP address tag --> Botnet" And there is no "Anomaly policy" after pushing the "Create policy" button so all the Anomaly Policies are built-in and not custom ones. Thus: Policy template type: Activity Policy Filter based on: IP address tag
upvoted 6 times
...
Whatsamattr81
2 years, 9 months ago
Also, when creating a policy based on the anomaly template, none of the options in the second part of the question are valid options.
upvoted 1 times
...
Whatsamattr81
2 years, 9 months ago
I think the answer is in the word 'custom'... The anomaly policies are just built in pols that have no actions associated. An activity policy can be used to the same effect, IP Tag and IP Category can be used. You also need to scope the policy to M365 apps - can you do that on anomaly detection ?
upvoted 2 times
danb67
1 year, 7 months ago
Thank you I thought I was going mad. Custom is the word everyone is missing here. Activity Policies allow you to choose 'No Template' which is a custom template. You do not get the option to choose or customise ' a template' in an access policy. You choose a category. It is asking us to detect the activity. Activity Policy is the correct answer.
upvoted 2 times
...
...
LotusBeta
2 years, 9 months ago
The question says "You need to create a custom template-based policy"...only Anomaly detection policy has template with which we can create policy. Answer "Anomaly detection policy" and "IP address tag" are correct.
upvoted 3 times
yoton
2 years, 4 months ago
Activity Policy can also create custom templates. https://learn.microsoft.com/en-us/microsoft-365/security/defender/advanced-hunting-query-emails-devices?view=o365-worldwide#review-logon-attempts-after-receipt-of-malicious-emails
upvoted 1 times
...
...
Joshing
2 years, 10 months ago
The correct answer has to be the following. Policy template type: Activity Policy Filter based on: IP address tag Reason being that you cannot create an anomaly detection policy as it's a built-in policy. Also, you cannot filter the policy based on IP address tags either. Activity Policy and IP address tag has to be the correct selection. If it asked for you to ensure that activity from Botnets were alerted on and it was to be filtered for specific users then yes this policy could be edited to suit that but currently as it stands you cannot create this policy or filter by IP tags.
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...