exam questions

Exam MS-500 All Questions

View all questions & answers for the MS-500 exam

Exam MS-500 topic 2 question 51 discussion

Actual exam question from Microsoft's MS-500
Question #: 51
Topic #: 2
[All MS-500 Questions]

You have an Azure Sentinel workspace that has an Azure Active Directory (Azure AD) connector and an Office 365 connector.
From the workspace, you plan to create a scheduled query rule that will use a custom query. The rule will be used to generate alerts when inbound access to
Office 365 from specific user accounts is detected.
You need to ensure that when multiple alerts are generated by the rule, the alerts are consolidated as a single incident per user account.
What should you do?

  • A. From Set rule logic, map the entities.
  • B. From Analytic rule details, configure Severity.
  • C. From Set rule logic, set Suppression to Off.
  • D. From Analytic rule details, configure Tactics.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
Reference:
https://docs.microsoft.com/en-us/azure/sentinel/map-data-fields-to-entities

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
heshmat2022
Highly Voted 2 years, 7 months ago
Entity mapping is an integral part of the configuration of scheduled query analytics rules. It enriches the rules' output (alerts and incidents) with essential information that serves as the building blocks of any investigative processes and remedial actions that follow. The procedure detailed below is part of the analytics rule creation wizard. It's treated here independently to address the scenario of adding or changing entity mappings in an existing analytics rule.
upvoted 8 times
...
KarimaMaf
Most Recent 1 year, 10 months ago
correct answer : You have the flexibility to group alerts into a single incident per the following logic: Grouping alerts into a single incident if all the entities match (recommended) Grouping all alerts triggered by this rule into a single incident Grouping alerts into a single incident if the selected entities match (Account, Host, IP, URL) link to group mapping :https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/what-s-new-reduce-alert-noise-with-incident-settings-and-alert/ba-p/1187940
upvoted 1 times
...
Maxx4
1 year, 10 months ago
Selected Answer: C
I would go for C: confusing If you are creating a scheduled query rule in Azure Sentinel, you should select option A, From Set rule logic, map the entities. This is the more specific and correct answer for this question. Option C, From Set rule logic, set Suppression to Off, is also a correct answer, but it is more general and can be used to consolidate alerts from any type of rule. Once you have mapped the entities, Azure Sentinel will recognize alerts generated by the rule that share the same entity as part of the same incident. This consolidation allows for better management and analysis of the alerts, simplifying incident response and reducing duplication.
upvoted 1 times
...
ChachaChatra
2 years, 3 months ago
Valid on28/01/23
upvoted 3 times
...
Brigg5
2 years, 3 months ago
From the docs, "Entities enrich the rules' output (alerts and incidents) with essential information... They are also the criteria by which you can group alerts together into incidents in the Incident settings tab." 'A' is correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago