sc-200 Sample
sc-200 Sample
Microsoft Security
Operations Analyst
Yuri Diogenes
Jake Mowrer
Sarah Young
Exam Ref SC-200 Microsoft Security CREDITS
SPECIAL SALES
For information about buying this title in bulk quantities, or for special sales
opportunities (which may include electronic versions; custom cover designs;
and content particular to your business, training goals, marketing focus,
or branding interests), please contact our corporate sales department at
[email protected] or (800) 382-3419.
For government sales inquiries, please contact [email protected].
For questions about sales outside the U.S., please contact [email protected].
Contents at a glance
Introduction xv
Index 303
Contents
Introduction xv
Organization of this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Microsoft certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
V
Skill 1-3: Detect, investigate, respond, and remediate identity threats . . . . 89
Identifying and responding to Azure Active Directory
identity risks 89
Identifying and responding to Active Directory Domain
Services threats using Microsoft Defender for Identity 95
Using Microsoft Cloud App Security to identify and respond
to threats in Software as a Service 99
Skill 2-2: Plan and implement the use of data connectors for
ingestion of data sources in Azure Defender . . . . . . . . . . . . . . . . . . . . . . . 132
Identify data sources to be ingested for Azure Defender 132
Configure automated onboarding for Azure resources and
data collection 133
Connect on-premises computers 136
Connect AWS cloud resources 140
Connect GCP cloud resources 143
vi CONTENTS
Skill 2-3: Manage Azure Defender alert rules . . . . . . . . . . . . . . . . . . . . . . . . . . 145
alidate alert configuration 146
Set up email notifications 150
Create and manage alert suppression rules 151
Skill 3-2: Plan and implement the use of data connectors for
the ingestion of data sources into Azure Sentinel . . . . . . . . . . . . . . . . . . . 196
Identify data sources to be ingested into Azure Sentinel 196
Identify the prerequisites for a data connector 199
Configure and use Azure Sentinel data connectors 200
CONTENTS VII
Design and configure Syslog and CEF event collections 202
Design and configure Windows Events collections 205
Configure custom threat intelligence connectors 211
Create custom logs in Azure Log Analytics to store
custom data 214
Custom log ingestion via the Azure Monitor HTTP
Data Collector API 215
Custom log ingestion via Azure Logic Apps 215
viii CONTENTS
View and analyze Azure Sentinel data using workbooks 272
Track incident metrics using the security operations
efficiency workbook 274
Skill 3-7: Hunt for threats using the Azure Sentinel portal . . . . . . . . . . . . . . 276
Create custom hunting queries 277
Run hunting queries manually 279
Monitor hunting queries by using Livestream 281
Track query results with bookmarks 284
Use hunting bookmarks for data investigations 288
Convert a hunting query to an analytics rule 292
Perform advanced hunting with notebooks 295
Index 303
CONTENTS IX
Acknowledgments
The authors would like to thank Loretta Yates and the entire Microsoft Press/Pearson team for
their support in this project, and Nicholas DiCola for reviewing the book.
Yuri would also like to thank: My wife and daughters for their endless support; my great
God for giving me strength and guiding my path on each step of the way; and my great friends
and co-authors Sarah Young and Jake Mowrer for this amazing partnership. My manager Re-
becca, for always encouraging me to achieve more and stretch myself to the next level. Thanks
for the support from our learning team, especially Brandon Neeb, for their contribution to this
project. Last but not least, thanks to my parents for working hard to give me an education,
which is the foundation I use every day to keep moving forward in my career.
Sarah would like to thank Grayson, who has sat providing (mostly) silent writing support
every day; Erica for being the greatest friend and security inspiration; and both Yuri and Jake
for being the best co-authors anyone could ever ask for. My many Microsoft colleagues who
have championed and supported me to get me to the role I am in today. There are many, but
in particular, my manager Kara and mentors Pen, Colleen, Shelly, Gary, Hany, Ping, Mark, Harry,
and Hana-San. My most special thanks are saved for my parents and grandparents, who gave
so much for my education, taught me the value of hard work and integrity, and continue to
support me in every way possible.
Jake thanks his wife, Jennifer, and four sons, Ryker, Mikey, Dylan, and Zach, for their love
and encouragement. To Yuri Diogenes: Without his leadership and drive, this book would
not have been possible. A big thank you to the leadership and my colleagues in the Microsoft
Defender Customer Acceleration Team, whose knowledge and mentorship shaped the content
in this book. To Moti, Raviv, and all friends and colleagues in the Israel Research and Develop-
ment Center, Redmond, and India Development Center at Microsoft for constantly innovating
to protect customers. A very special thank you to my parents, who taught me that hard work,
positive attitude, dedication, and kindness would lead to success.
XI
About the authors
Yuri Diogenes, MsC is a Master of science in cybersecurity intelligence and forensics inves-
tigation (UTICA College), and a Principal Program Manager in the Microsoft CxE ASC Team,
where he primarily helps customers onboard and deploy Azure Security Center and Azure
Defender as part of their security operations/incident response. Yuri has been working for
Microsoft since 2006 in different positions. He spent five years as senior support escalation
engineer on the CSS Forefront Edge Team, and from 2011 to 2017, he worked on the content
development team, where he also helped create the Azure Security Center content experience
since its GA launch in 2016. Yuri has published a total of 26 books, mostly covering information
security and Microsoft technologies. Yuri also holds an MBA and many IT/Security industry
certifications, such as CISSP, E C D, E CEH, E CSA, E CHFI, CompTIA Security , CySA , Cloud Es-
sentials Certified, Mobility , etwork , CASP, CyberSec First Responder, MCSE, and MCTS. ou
can follow Yuri on Twitter at @yuridiogenes.
Sarah Young is a senior program manager in the Azure Sentinel CxE team, where she works
with Microsoft customers to remove technical blockers for deployment. Having worked with
Azure Sentinel since it was announced at RSA 2019, Sarah has extensive knowledge of the plat-
form and has helped it develop and grow. Sarah is an experienced public speaker and has pre-
sented on a range of IT security and technology topics at industry events, both nationally and
internationally. She holds numerous industry ualifications, including CISSP, CCSP, CISM, and
Azure Solutions Architect. In 2019, Sarah won the Security Champion award at the Australian
Women in Security Awards. She is an active supporter of both local and international security
and cloud-native communities. You can follow Sarah on Twitter at @_sarahyo.
Jake Mowrer is a Principal Program Manager in the Microsoft 365 Defender Customer
Acceleration Team and a 25-year IT veteran. He helps some of the world’s largest companies
deploy Microsoft Defender for Endpoint and assists security operations teams with integrating
Microsoft 365 Defender into their existing processes. Jake’s deep knowledge in Microsoft De-
fender for Endpoint originated in 2016 when he was trained by Microsoft’s development team
in Herzliya, Israel, and he has since delivered technical sessions for private and public entities,
as well as at technical conferences around the world. In 2020, Jake founded IronSpire Internet
Security, a company focused on protecting homes and small businesses from cyber threats.
You can follow Jake on Twitter at @JakeMowrerMSFT and @IronspireS.
XIII
Introduction
The SC-200 exam deals with technologies that are relevant for Microsoft Security Operations
Analysts who collaborate with organizational stakeholders to secure information technology
systems for the organizations. This exam cover topics that will help to reduce organizational risk
by rapidly remediating active attacks in the environment, advising on improvements to threat
protection practices, and referring violations of organizational policies to appropriate stakehold-
ers. The exam also covers topics such as investigation and response for threats using Microsoft
Azure Sentinel, Azure Defender, Microsoft 365 Defender, and third-party security products.
This book covers every major topic area found on the exam, but it does not cover every
exam question. Only the Microsoft exam team has access to the exam questions, and Micro-
soft regularly adds new uestions to the exam, making it impossible to cover specific ues-
tions. You should consider this book a supplement to your relevant real-world experience and
other study materials. If you encounter a topic in this book that you do not feel completely
comfortable with, use the eed more review links you ll find in the text to find more infor-
mation and take the time to research and study the topic. Great information is available on
docs.microsoft.com, at MS Learn, and in blogs and forums.
XV
We recommend that you augment your exam preparation plan by using a combination of
available study materials and courses. For example, you might use the Exam Ref and another
study guide for your at home preparation and take a Microsoft Official Curriculum course
for the classroom experience. Choose the combination that you think works best for you.
Learn more about available classroom training and find free online courses and live events
at http://microsoft.com/learn. Microsoft Official Practice Tests are available for many exams at
http://aka.ms/practicetests.
Note that this Exam Ref is based on publicly available information about the exam and the
authors’ experience. To safeguard the integrity of the exam, authors do not have access to the
live exam.
Microsoft certification
Microsoft certifications distinguish you by proving your command of a broad set of skills and
experience with current Microsoft products and technologies. The exams and corresponding
certifications are developed to validate your mastery of critical competencies as you design
and develop, or implement and support, solutions with Microsoft products and technologies
both on-premises and in the cloud. Certification brings a variety of benefits to the individual
and to employers and organizations.
xvi INTRODUCTION
Please note that product support for Microsoft software and hardware is not offered
through the previous addresses. For help with Microsoft software or hardware, go to
http://support.microsoft.com.
Stay in touch
Let’s keep the conversation going! We’re on Twitter: http://twitter.com/MicrosoftPress.
INTRODUCTION XVII
CHAPTER 2
121
Plan and configure Azure Defender settings, including
selecting target subscriptions and workspace
When planning to use Azure Defender, you must understand the requirements for the type of
plan that you want to implement. If you are planning the implementation of Azure Defender
for Servers, Azure Defender for Kubernetes, or Azure Defender for SQL Server on Machines,
you also need to consider the requirement to deploy the Log Analytics (LA) Agent to the
machines. By doing so, you will need to select the workspace to which the agent will send
the information.
Other Azure Defender plans that are based on other Azure Platform as a Service (PaaS)
offerings don t re uire a workspace configuration in the beginning. This includes plans such as
Azure Defender for Key Vault, Azure Defender for App Service, Azure Defender for Resource
Manager, Azure Defender for Storage, Azure Defender for Containers Registries, Azure De-
fender for SQL database, and Azure Defender for D S. ou will only need to configure a work-
space for these Azure Defender plans if you consider utilizing the continuous export capability
in Azure Security Center. This feature is often used in the following scenarios:
■ When the organization wants to store all alerts that are triggered by all Azure Defender
plans in the workspace because. By default, only VM-based alerts are stored in
the workspace.
■ When the organization wants to store all security recommendations or regulatory
compliance information in the workspace.
■ When the organization needs to send the alerts to a security information and event
management (SIEM) via Azure Event Hub.
When you first activate Azure Security Center, the auto-provisioning feature is not enabled.
However, if you want to ensure that all Ms are automatically configured to receive the LA
agent and send the data to the correct workspace, you should enable this option. When auto-
provisioning is enabled, and the Connect Azure VMs To The Default Workspace(s) Created
By Security Center option is selected, Security Center will automatically create and manage a
new workspace. Security Center creates a new resource group and a workspace (called default
workspace) in the same geolocation of the VM and connects the agent to that workspace. The
naming conventions for the default workspace and resource group are shown below:
■ Workspace DefaultWorkspace-[subscription-ID]-[geo]
Canada Canada
Europe Europe
Korea Korea
India India
Japan Japan
China China
Australia Australia
If your organization is already utilizing a Log Analytics workspace and it wants to leverage
the same workspace for Security Center, you should select the Connect Azure VMs To A
Different Workspace option and specify the workspace, which can be any workspace across
all selected subscriptions within the same tenant.
The general best practice for workspace creation is to keep it as minimal as possible, which
is not the case when you configure Security Center to manage the workspaces. When reading
a scenario in the SC-200 exam, take into consideration the business requirements as well as the
technical requirements. These requirements will lead you to select one of these two options:
■ You could use the default workspace, which can create a lot of workspaces according to
the regions where the company’s VMs reside
■ You could take a more centralized approach where all VMs across all subscriptions will
have to send data to a single workspace.
The actual steps to configure auto-provisioning and specify the workspace are provided
later in this chapter.
Skill 2-1 Design and configure an Azure Defender implementation CHAPTER 2 123
Configure Azure Defender roles
Security Center uses Role-Cased Access Control (RBAC) based in Azure. By default, there are
two roles in Security Center: Security Reader and Security Admin. The Security Reader
role should be assigned to all users that need read access only to the dashboard. For example,
Security Operations personnel that needs to monitor, and respond to security alerts, should be
assigned the Security Reader role. It is important to mention that the assignment of this role is
done in the Azure level, under the resource group that Security Center is monitoring, and using
Access Control (IAM), as shown in Figure 2-1.
Workload owners usually need to manage a particular cloud workload and its related
resources. Besides that, the workload owner is responsible for implementing and maintaining
protections in accordance with company security policy. Security Admin role should be
assigned for users that need to manage Security Center configuration.
Only subscription Owners/Contributors and Security Admins can edit a security
policy. Only subscription and resource group Owners and Contributors can apply security
recommendations for a resource. To enable Azure Defender, you need Security Admin or
Subscription Owner privilege. To learn more about Role-Based Access Control (RBAC) in
Azure, visit http://aka.ms/azurerbac.
Custom roles
There will be some scenarios where the organization may want to provide a more granular
privilege for some users instead of granting access to the entire Security Admin access role.
Consider an organization called Contoso that needs to provide privilege to security opera-
tion analysts to simply visualize and create alert-suppression rules. In this case, the Security
Admin role provides more privileges than what is necessary. For scenarios like this, you can
create a custom role in Azure and assign write privilege to this operation: Microsoft.Security/
alertsSuppressionRules/write.
To request access to a VM, you need to assign these actions to the user:
■ On the scope of a subscription or resource group that is associated with the VM:
Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action.
■ On the scope of a subscription or resource group that is associated with the VM:
Microsoft.Security/locations/jitNetworkAccessPolicies/*/read.
On the scope of a subscription, resource group, or VM that you need to read JIT policies, assign
these actions to the user:
■ Microsoft.Security/locations/jitNetworkAccessPolicies/read
■ Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action
■ Microsoft.Security/policies/read
■ Microsoft.Security/pricings/read
■ Microsoft.Compute/virtualMachines/read
■ Microsoft.Network/*/read
Also, if you need to see the JIT NSG policy from the VM—Networking blade, you need to add
the following policies:
■ Microsoft.Network/networkSecurityGroups/read
■ Microsoft.Network/networkSecurityGroups/defaultSecurityRules/read
■ Microsoft.Network/networkSecurityGroups/securityRules/read
While the permissions above can be utilized to apply the principle of least privilege, keep in
mind that you will need to merge some permissions if you are accessing via the Azure portal.
For example, to configure or edit a IT policy for a M, you will need the privileges given and
the privileges to read JIT policies.
Skill 2-1 Design and configure an Azure Defender implementation CHAPTER 2 125
Configure data retention policies
Azure Defender provides 500 MB per node, per day of free allowance for the data allocated in
the Log Analytics workspace against the following subsets of security data types:
■ WindowsEvent
■ SecurityAlert
■ SecurityBaseline
■ SecurityBaselineSummary
■ SecurityDetection
■ SecurityEvent
■ WindowsFirewall
■ MaliciousIPCommunication
■ LinuxAuditLog
■ SysmonEvent
■ ProtectionStatus
Update and UpdateSummary data types can be used when the Update Management solution
is not running on the workspace or when solution targeting is enabled.
If the workspace is in the legacy Per Node pricing tier, the Azure Defender and Log Analytics
allocations are combined and applied ointly to all billable ingested data. When you configure
Azure Defender to utilize a workspace, the data will be stored there is going to be available
for 30 days by default. However, you can configure data retention at the workspace level up
to 730 days (2 years) for all workspaces unless they are using the legacy free tier (for example,
when using Azure Security Center without upgrading to Azure Defender).
Depending on the scenario that you are addressing, you might need to extend the data
retention to more than 30 days. Make sure to always review the business and technical require-
ments of the scenario for hints about data retention. Once you determine the data retention
goal, follow the steps below to configure data retention in Log Analytics workspace
1. Navigate to the Azure portal by opening https://portal.azure.com.
2. In the search bar, type log ana, and under Services, click Log Analytics Workspaces.
3. In the Log Analytics Workspaces dashboard, click the workspace for which you want
to configure data retention.
5. Click the Data Retention button, and the Data Retention blade appears, as shown in
Figure 2-3.
FIGURE 2-3 Configuring data retention for the Log Analytics workspace
Skill 2-1 Design and configure an Azure Defender implementation CHAPTER 2 127
6. You can use the Data Retention (Days) slider to increase the number of days that you
want to retain the data. Once you finish, click the OK button to commit the changes.
ou can also utilize an Azure Resource Manager (ARM) template to configure data reten-
tion by using the retentionInDays parameter. The advantage of using an ARM template for
this operation is that you can apply in scale, and you can also customize other parameters.
For example, if the scenario requires that you set the data retention to 30 days and trigger an
immediate purge of older data, you can do that by using the immediatePurgeDataOn30Days
parameter, which eliminates the grace period. This configuration could also be useful for
compliance-related scenarios where immediate data removal is mandatory.
While the extension of the data retention policy for the entire workspace is usually the most
common scenario, there are some situations that you might need to change the data retention
based on a specific data type. Retention settings for individual data types are available from
4 to 730 days (except for workspaces in the legacy free tier). These settings will override the
workspace-level default retention. You will also need to use ARM to change this setting. In the
example below, the data retention for the SecurityEvent data type is being changed to 550 days:
PUT /subscriptions/00000000-0000-0000-0000-00000000000/resourceGroups/
MyResourceGroupName/providers/Microsoft.OperationalInsights/workspaces/MyWorkspaceName/
Tables/SecurityEvent?api-version=2017-04-26-preview
{
"properties":
{
"retentionInDays": 550
}
}
EXAM TIP
When evaluating a scenario in the SC-200 exam, look for business requirements that lead
to cost savings on data. Changing data retention only in certain data types can be used to
reduce overall costs for data retention.
Skill 2-1 Design and configure an Azure Defender implementation CHAPTER 2 129
FIGURE 2-4 Security recommendations in Azure Security Center
During this initial assessment, Azure Security Center will also identify which workloads are
available in the subscription. Also, it will suggest enabling the different Azure Defender plans
for cloud workload protection. All plans will be part of the Azure Defender security control, as
shown in Figure 2-5.
FIGURE 2-6 Pricing page showing the different Azure Defender plans
On this page, you can change the toggle to ON or OFF, where ON means that the Azure De-
fender plan is enabled on the selected subscription. While most of the Azure Defender plans can
only be enabled on the subscription level, there are a couple that can be enabled individually:
■ Azure Defender for SQL (Azure SQL Database)
■ Azure Defender for Storage (Storage)
In both cases, you can toggle these to the OFF setting on this page, and you can go to each
Azure SQL database or each Azure Storage account and enable Azure Defender from there.
You might do this if the business requirement is to save cost by only enabling Azure Defender
for SQL or Azure Defender for Storage on a company’s most critical assets, rather than enabling
them for the entire subscription.
Make sure to analyze the business requirements that will guide you when deciding whether
to disable it at the subscription level and enable it on each resource. If you need to enable
Azure Defender in scale, you can also use ARM Templates or Azure Policy.
Skill 2-1 Design and configure an Azure Defender implementation CHAPTER 2 131
Skill 2-2: Plan and implement the use of data connectors
for ingestion of data sources in Azure Defender
When you upgrade from Azure Security Center to Azure Defender, you can start monitoring
the security posture of different cloud providers, including Amazon Web Service (AWS) and
Google Cloud Platform (GCP). Ingesting data from these platforms is a mandatory step when
you need to have visibility across different workloads located in multiple cloud providers. This
section covers the skills necessary to plan and implement the use of data connectors for inges-
tion of data sources in Azure Defender according to the SC-200 exam outline.
FIGURE 2-7 Security Solutions page with the connected solutions and available data sources
Skill 2-2: Plan and implement the use of data connectors CHAPTER 2 133
FIGURE 2- Auto Provisioning settings in Security Center
6. In the Configuration section for the Log Analytics Agent For Azure VMs, click Edit
Configuration.
7. In the Extension Deployment Configuration blade shown in Figure 2-9, the default
setting, Connect Azure VMs To The Default Workspace(s) Created By Security
Center, allows Security Center to manage the workspace. Use this option if you can
select another workspace to be used by Security Center. This is the preferred option
when you have multiple subscriptions and want to centralize the workspace.
In the Store Additional Raw Data section, you can configure the level of data collection
granularity for Windows systems. Each setting will determine the type of events that will be
collected. If you are using a Group Policy Ob ect (GPO) to configure your servers where the
agent will be installed, we recommended that you enable the Process Creation Event 4688
audit policy and the CommandLine field inside event 4688. Audit Process Creation determines
whether the operating system generates audit events when a process is created (starts). Infor-
mation includes the name of the program or the user who created the process. Following is a
summary of what each option collects:
■ All Events If you select this option, all security events will be stored in your workspace.
■ Common When you select this option, only a subset of events will be stored in your
workspace. Microsoft considers these events—including login and logout events—to
provide sufficient detail to represent a reasonable audit trail. Other events, such as
Kerberos operations, security group changes, and more, are included based on industry
consensus as to what constitutes a full audit trail.
■ Minimal Choosing this setting results in the storage of fewer events than the Com-
mon setting, although we aren’t sure how many fewer events or what types of events
are omitted. Microsoft worked with customers to ensure that this configuration surfaces
enough events that successful breaches are detected and that important low-volume
events are recorded. However, logout events aren’t recorded, so it doesn’t support a
full user audit trail.
■ None This option disables security event storage.
To enable data collection for Adaptive Application Controls, Security Center configures a
local AppLocker policy in Audit mode to allow all applications. This will cause AppLocker to
generate events that are then collected and stored in your workspace. It is important to note
that this policy will not be configured on any machines on which there is already a configured
AppLocker policy. To collect Windows Filtering Platform Event ID 5156, you need to enable
the Audit Filtering Platform Connection: Auditpol /set /subcategory:"Filtering Platform
Connection" /Success:Enable.
Skill 2-2: Plan and implement the use of data connectors CHAPTER 2 135
Connect on-premises computers
As explained previously, VMs that are in Azure will be provisioned automatically, which means
that the monitoring agent will be automatically installed. If you need to onboard on-premises
computers, you will need to install the agent manually. Follow the steps below to onboard
non-Azure computers or VMs:
1. Open Azure portal and sign in with a user who has Security Admin privileges.
2. In the left navigation menu, click Security Center.
3. In the Security Center’s left navigation menu, under General, click the Getting Started
option and click the Get Started tab.
4. Under Add Non-Azure Computers, click the Configure button, as shown in Figure 2-10.
5. In the Add New Non-Azure Computers blade, select the workspace in which you want
to store the data from these computers, and before onboarding any computer, make sure
to click Upgrade to upgrade the Workspace to Azure Defender, as shown in Figure 2-11.
7. Once you click the + Add Servers button, the Agents Management page appears,
as shown in Figure 2-13.
8. On this page, click the appropriate Windows agent (64-bit or 32-bit version). If you are
installing the agent on a Linux operating system, click the Linux Servers tab and follow
the instructions from there. Make sure to copy the Workspace ID and Primary Key
values to the clipboard; you will need those values when installing the agent on the
target system.
Skill 2-2: Plan and implement the use of data connectors CHAPTER 2 137
9. When you finish downloading it, you can close the Security Center dashboard (close
your browser) and copy the agent installation file to a shared network location where
the client can access it.
For this example, the agent installation will be done on an on-premises Windows Server
2016 computer, though the same set of procedures apply to a non-Azure VM located in a
different cloud provider. Log in on the target system and follow the steps below to perform
the installation:
1. Double-click in the MMASetup-AMD64.exe file, and if the Open File—Security Warning
dialog appears, click Run.
2. If the User Access Control dialog appears, click Yes.
3. On the Welcome To The Microsoft Monitoring Agent Setup Wizard page, click Next.
4. Read the Microsoft License Terms and click I Agree.
5. In the Destination Folder page, leave the default selection and click Next. The Agent
Setup Options page appears, as shown in Figure 2-14.
6. Select Connect The Agent To Azure Log Analytics (OMS), as shown in Figure 2-14,
and click Next. The Azure Log Analytics page appears, as shown in Figure 2-15.
7. On this page, you need to enter the Workspace ID and Workspace Key that were
obtained in step 8 of the previous procedure. Notice that the primary key should be
entered in the Workspace Key field. If this computer is behind a proxy server, you need
to click the Advanced button and provide the Proxy URL and authentication if needed.
Once you finish filling in these options, click Next.
8. On the Microsoft Update page, select Use Microsoft Update For Updates
(Recommended) and click Next.
9. On the Ready To Install page, review the summary field and click Install.
10. The Installing The Microsoft Monitoring Agent page appears, and the installation
proceeds.
11. Once the installation is finished, the Microsoft Monitoring Agent Configuration
Completed Successfully page appears. Click Finish.
You can also perform this installation using the command-line interface (CLI). Use the
following code:
MMASetup-AMD64.exe /Q:A /R:N /C:"setup.exe /qn ADD_OPINSIGHTS_WORKSPACE=1 OPINSIGHTS_
WORKSPACE_AZURE_CLOUD_TYPE=0 OPINSIGHTS_WORKSPACE_ID=<yourworkspaceID> OPINSIGHTS_
WORKSPACE_KEY=<yourworkspaceprimarykey> AcceptEndUserLicenseAgreement=1"
Most of the parameters that you saw in the agent installation are self-explanatory. The only
one that isn’t immediately obvious is the OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE parameter,
which is the cloud environment specification. The default is 0, which represents the Azure com-
mercial cloud. You should only use 1 if you are installing the agent in an Azure government cloud.
It can take some time for this new non-Azure computer to appear in Security Center. If you
want to validate the connectivity between this computer and the workspace, you can use the
TestCloudConnection tool. On the target computer, open the command prompt and navi-
gate to the \Program Files\Microsoft Monitoring Agent\Agent folder. From there, execute
the TestCloudConnection.exe command, and if the connectivity is working properly, you
should see all tests followed by this message: Connectivity test passed for all hosts for
workspace id <workspace id>.
Skill 2-2: Plan and implement the use of data connectors CHAPTER 2 139
Connect AWS cloud resources
For Azure Defender to connect with AWS, the target AWS account must have AWS Security
Hub enabled on it. AWS Security Hub has a cost associated to it, which varies according to the
number of accounts and regions where it is enabled.
Once the AWS connector is operational, you will start seeing security recommendations for
AWS appearing in the Security Center Recommendations Dashboard. However, before config-
uring the AWS connector, you will need to: do the following:
1. Configure AWS Security Hub in the target account
■ Enable AWS Config with the console.
■ Enable AWS Security Hub and confirm that there is data flowing to it.
2. Configure AWS authentication, which can be by creating these roles
■ An IAM role for Security Center
■ An AWS user for Security Center
3. Regardless of the authentication method you selected previously, make sure that this
role/user has the following permissions policies:
■ SecurityAudit
■ AmazonSSMAutomationRole
■ AWSSecurityHubReadOnlyAccess
4. When configuring the Account ID in AWS, make sure to use this Microsoft Account ID
158177204117.
With those steps in place, you are ready to configure the Cloud Connector. If you also want
to onboard servers that are in AWS, you will need to ensure that the following three tasks are
done before configuring the cloud connector in Azure Defender
1. Install the AWS Systems Manager on your Servers (EC2 instance) that reside in AWS.
For instructions, see http://aka.ms/ascbookaws.
2. Configure this Server (EC2 Instance) to use Azure Arc. For instructions, see
http://aka.ms/ascbookarc.
3. In Azure, make sure to create a service principal that will be used for Azure Arc. To con-
figure that service principal, follow the steps from this article http://aka.ms/ascbookspn.
ow that all prere uisites are fulfilled, you can follow the steps below to start the configura-
tion of the AWS connector in Security Center:
1. Open Azure portal and sign in with a user who has ownership privileges in the subscription.
2. In the left navigation menu, click Security Center.
4. In the Basics section, type a Display Name for the connector and select the appropri-
ate Subscription from the drop-down menu.
5. In the AWS Authentication section, use the appropriate method (Assume Role if you
created a role or Credentials if you created a user). Assuming that you created a role,
the AWS Role ARN must be provided. This number is located in the summary of the
role you created in AWS. Click the Next: Azure Arc Configuration button, and the
Azure Arc Configuration tab appears, as shown in Figure 2-17.
Skill 2-2: Plan and implement the use of data connectors CHAPTER 2 141
FIGURE 2-17 Configuring Azure Arc settings
At this point, your Azure Arc machines will be discovered, but you still need to install the
Log Analytics agent on those machines. There is a specific recommendation for that, as shown
in Figure 2-20.
FIGURE 2-20 Recommendation to install the Log Analytics agent on the Azure Arc machine
You can leverage the Quick Fix feature to deploy the agent to this Azure Arc machine
uickly. ou ust need to select the server and click the Remediate button. As mentioned in
the freshness interval description, it might take 24 hours for this remediation to take effect.
Skill 2-2: Plan and implement the use of data connectors CHAPTER 2 143
When connecting your GCP accounts to specific Azure subscriptions, you need to take into
consideration the Google Cloud resource hierarchy. Based on this hierarchy, you can
■ Connect your GCP accounts to ASC at the organization level
■ Connect multiple organizations to one Azure subscription
■ Connect multiple organizations to multiple Azure subscriptions
Now that you understand the prerequisites, you will need to prepare the settings on GCP prior
to deploy the GCP Connector in Azure Defender. Perform the following operations in GCP:
■ Configure GCP Security Command Center.
■ Enable Security Health Analytics.
■ Enable GCP Security Command Center API.
■ Create a dedicated service account for the security configuration integration.
■ Create a private key for the dedicated service account.
With all prere uisites fulfilled, you can follow the steps below to start the configuration of
the GCP connector in Azure Defender:
1. Open Azure portal and sign in with a user who has ownership privileges in the
subscription.
2. In the left navigation menu, click Security Center.
3. In the Security Center’s left navigation menu, under Management, click the Cloud
Connectors option and click the Add AWS account button. The Connect AWS
Account page appears, as shown in Figure 2-21.
At this point, the onboarding process for VMs located in GCP is similar to AWS. The only dif-
ference is that in AWS, the auto-discovery of Ms happens as part of the connector s configu-
ration (Arc parameters); in GCP, you will have to onboard manually (install Azure Arc on each
VM and the LA agent).
EXAM TIP
When studying for the SC-200 exam, make sure you know the exact order of operations that
must be done in AWS and CP before going to Azure Defender to configure the connectors.
A creating, 231
cross-workspace, 257
Action Center, 39
customizing and optimizing, 225, 241–242
Active Directory (AD). See Azure Active Directory
versus hunting queries, 277
(AD)
Microsoft security, 227–229
Active Directory Domain Services threats, 95–99
triage incidents, 254
AD (Active Directory). See Azure Active
Directory (AD) Anomaly rules, Azure Sentinel, 221
AML (Azure Machine Learning) workspace, ARM (Azure Resource Manager) template,
298–299 163–164
Analytics Rule Wizard, 293, 295 configuring in Azure Security Center, 154–156
converting hunting queries to, 292–295 AWS (Amazon Web Service), 132, 140–143
303
Azure Active Directory (AD)
304
Azure Sentinel
Azure Defender alert rules Azure Sentinel. See also SOAR (security
setting up email notifications, 150–151 orchestration, automation, and response)
Azure Defender for Azure Kubernetes (AKS), alerting and remediation, 237
165–166 Analytic Templates, 230
Azure Defender for Servers analytics rules, 220–227, 231
Kubernetes, 165–166 automation scenarios, 236–237
Linux, 165 and Azure Lighthouse, 187–188
Windows, 164–165 CEF and Syslog event collections, 202–205
Azure Lighthouse, 187–188 charts, 270
Azure Log Analytics, custom logs, 214–215 commitment tiers, 189
Azure Logic Apps connector-provided scheduled queries,
automation, 157–161 229–230
Azure Monitor HTTP Data Collector API, 215 data sources, 195–199
305
Azure Sentinel
306
EPS (events per second), Azure Sentinel
307
event ID, collection for Windows
308
Microsoft 365 Defender Security portal
J queries, 71
workspace, 189, 194
JIT (just-in-time) access feature, Azure
Logic Apps
Defender, 181
automation, 157–161
JSON Request Body format, Playbooks, 219
connector list, 236
custom log ingestion, 215–220
K security incident remediation, 242–243
Key Vault, Azure Defender for, 170–171, 179–180 signing in to Azure Sentinel, 239
309
Microsoft Defender
310
security information and event management (SIEM)
R
O RBAC (Role–Based Access Control), 124
remediating
Office 365 roles, 4
incidents, 161–163
OfficeActivity table, 233
threats, 242–243
OMS agent, installing, 203–204
remediation, activities, and exceptions, 83–89, 237
Outlook account, signing into, 240
risk domains, 104
risk management, 34–35, 81–89. See also insider
P risk; security recommendations; vulnerability
management
PaaS-related resources, Azure, 133
role groups, 24
phishing thresholds, 15
Role–Based Access Control (RBAC), 124
Playbooks
Microsoft Defender for Endpoint, 43–51
across Microsoft Defender solutions, 244–249
roles, Office 365, 4
attaching to analytics rules, 242
Azure Defender, 156–161
Azure Sentinel, 195 S
email alert, 237–241 Saas (Software as a Service), 99–104
GitHub repository, 243 Safe Attachments policy, 9–14
JSON Request Body format, 219 Safe Links policy, configuring, 3–9
managing incidents, 243–244 Scheduled queries, Azure Sentinel, 221
remediating threats, 242–243 Secure Hash Algorithm 1 (SHA1), 63
running against alerts, 256 Security Events connector, Azure Sentinel, 205
running in Logic App Designer, 218 security incident flow diagram, 105
templates, 245–248 security information and event management
testing, 219, 241 (SIEM), 185, 235
Project operator, KQL, 233
311
security operations center (SOC)
312
Workbooks gallery
313