Microsoft Defender and Sentinel Overview

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/76

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards covering key concepts related to Microsoft Defender and Sentinel, including features, functions, and terms pivotal for understanding cybersecurity tools.

Last updated 5:52 PM on 3/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

77 Terms

1
New cards

Microsoft Defender portal

The unified portal used for Microsoft Defender XDR.

2
New cards

Incident Graph

The feature in Defender XDR that visually maps out an attack story across endpoints, identities, and cloud apps.

3
New cards

30 days

The default retention period for Advanced Hunting data in Defender XDR.

4
New cards

Attack Simulation Training

The feature in Defender XDR that allows you to simulate phishing attacks to train employees.

5
New cards

Live Response

The feature in Defender for Endpoint that provides a real-time remote shell to investigate a machine.

6
New cards

Attack Surface Reduction (ASR) rules

Rules designed to block malicious behaviors and scripts commonly used by attackers.

7
New cards

Defender for Identity Sensor

The tool that must be deployed on a Domain Controller to integrate with Microsoft Defender for Identity.

8
New cards

DCSync attack

The alert that indicates an attacker is attempting to extract the NTDS.dit database from a Domain Controller.

9
New cards

Safe Links

The policy in Microsoft Defender for Office 365 that protects users from malicious URLs by scanning them at the time of click.

10
New cards

Safe Attachments

The policy in Microsoft Defender for Office 365 that detonates email attachments in a sandbox before delivery.

11
New cards

Secure Score

The primary metric Defender for Cloud uses to measure your security posture.

12
New cards

Azure Arc

The deployment required to protect and manage multi-cloud resources (AWS, GCP) from Defender for Cloud.

13
New cards

Just-In-Time (JIT) VM Access

The feature in Defender for Cloud that allows you to open management ports on a VM only for a limited time.

14
New cards

Adaptive Application Controls

The feature in Defender for Cloud that learns normal VM behavior and alerts on unexpected applications launching.

15
New cards

Defender for Containers

The Defender for Cloud plan specifically designed to protect Kubernetes clusters.

16
New cards

Cloud Access Security Broker (CASB)

The primary function of Microsoft Defender for Cloud Apps.

17
New cards

App Connectors

The deployment method in Defender for Cloud Apps that uses API integrations with services like Salesforce or AWS.

18
New cards

Session Policies (Conditional Access App Control)

The policy in Defender for Cloud Apps that monitors and controls user sessions in real-time.

19
New cards

Cloud Discovery

The feature that allows Defender for Cloud Apps to parse firewall logs and identify unsanctioned SaaS applications.

20
New cards

Regulatory Compliance Dashboard

The dashboard in Defender for Cloud that maps your resources against standards like ISO 27001 or PCI-DSS.

21
New cards

Log Analytics (Azure Data Explorer)

The underlying database technology powering a Microsoft Sentinel workspace.

22
New cards

Advanced Security Information Model (ASIM)

The built-in Microsoft Sentinel component that allows normalizing logs from multiple vendors into a standard format.

23
New cards

Scheduled Analytics Rule

The type of Sentinel analytics rule that uses KQL to query logs at a specific interval and generate alerts.

24
New cards

Near Real-Time (NRT) Rules

The Sentinel analytics rule type designed to run every minute for immediate threat detection.

25
New cards

Fusion Rules

The feature in Microsoft Sentinel that correlates high-fidelity alerts from multiple sources into a single incident using machine learning.

26
New cards

Azure Logic Apps

The Azure service required to build and run automated Playbooks in Microsoft Sentinel.

27
New cards

Watchlists

The feature that allows importing external data to correlate with Sentinel logs.

28
New cards

Data Connectors

The component that acts as the bridge to ingest data from third-party sources into Sentinel.

29
New cards

Azure Monitor Agent (AMA)

The agent that must be installed to ingest Syslog or CEF data from Linux servers into Sentinel.

30
New cards

Bookmarks

The feature that allows security analysts to preserve KQL query results to attach to an incident for later review.

31
New cards

Investigation Graph

The visual tool in Microsoft Sentinel that maps relationships between alerts, entities, and bookmarks during an investigation.

32
New cards

Workbooks

The feature in Sentinel that provides interactive visual reports and dashboards for your data.

33
New cards

730 days (2 years)

The maximum data retention period for interactive querying in a Log Analytics workspace before archiving.

34
New cards

Automation Rules

The feature in Sentinel that allows you to group and centrally manage automated response actions.

35
New cards

Microsoft Sentinel Responder

The Azure RBAC role required to assign and run playbooks in Sentinel.

36
New cards

Content Hub Solutions

The feature that provides pre-packaged collections of data connectors, analytics rules, and workbooks for specific products.

37
New cards

Data Collection Rules (DCR) / Log Ingestion API

The type of data connector that relies on a REST API to push logs into the Sentinel workspace.

38
New cards

Data Collection Rules (DCR) transformations

The component used to parse and enrich data during ingestion before it is stored in Sentinel.

39
New cards

User and Entity Behavior Analytics (UEBA)

The Sentinel feature that identifies anomalous user activity by establishing a baseline of normal behavior.

40
New cards

Entity mapping

The process in UEBA of mapping log data to standard Sentinel entities.

41
New cards

where

The KQL operator used to filter a table to only show specific rows that match a condition.

42
New cards

summarize

The KQL operator that groups data together and calculates aggregations.

43
New cards

project

The KQL operator used to select specific columns to include in the output.

44
New cards

project-away

The KQL operator that removes specific columns from the query output.

45
New cards

extend

The KQL operator used to create a new custom column or calculate a value based on existing columns.

46
New cards

join

The KQL operator that combines rows from two tables based on a common matching column.

47
New cards

union

The KQL operator that combines two or more tables and returns all rows.

48
New cards

let

The KQL statement that allows assigning a variable name to an expression or subquery.

49
New cards

take (or limit)

The KQL operator used to return a specific number of arbitrary rows.

50
New cards

now()

The KQL function that returns the current date and time.

51
New cards

parse

The KQL operator used to extract data from a string into new columns using regular expressions.

52
New cards

sort by (or order by)

The KQL operator that sorts the rows of the input table by one or more columns.

53
New cards

search

The KQL operator that searches across all columns in a table for a specific string value.

54
New cards

distinct

The KQL operator that removes duplicate rows from a result set based on a specific column.

55
New cards

count

The KQL function that returns the number of rows in a table.

56
New cards

make-series

The KQL operator that generates a series of values, often used to create time charts.

57
New cards

bin()

The KQL function used to bin or group time data into specific intervals.

58
New cards

10,000

The maximum number of records a single query in Defender XDR Advanced Hunting can return.

59
New cards

10 minutes

The execution timeout limit for a single query in Defender XDR Advanced Hunting.

60
New cards

render

The KQL operator that renders the query results into a visual chart.

61
New cards

Device Isolation

The feature in Defender for Endpoint that isolates a compromised device from the network.

62
New cards

Full automation

The level of automation in Defender for Endpoint that investigates and remediates threats automatically.

63
New cards

Action Center

The centralized location in Defender XDR to review and approve pending remediation actions.

64
New cards

Honeytokens

The Defender for Identity feature that simulates a highly privileged fake account to trap attackers.

65
New cards

Diagnostic Settings

The Azure feature that must be configured to forward Azure AD sign-in logs to Microsoft Sentinel.

66
New cards

Add an indicator to block the file hash

The action in Defender XDR that stops a specific malicious executable from running on any enrolled endpoint.

67
New cards

Microsoft Security Copilot

The Microsoft tool that uses generative AI to assist analysts with incident summaries and KQL generation.

68
New cards

Promptbooks

The feature in Security Copilot that allows saving sequences of prompts for repetitive tasks.

69
New cards

Plugins

What must be configured to allow Security Copilot to pull data from third-party security products.

70
New cards

SQL Vulnerability Assessment

The Defender for Cloud feature that identifies vulnerabilities in SQL databases.

71
New cards

Microsoft Purview

The Microsoft tool that provides centralized visibility and governance for data sensitivity and compliance.

72
New cards

Threat Explorer

The feature in Defender for Office 365 that shows the exact delivery path of an email.

73
New cards

Device Discovery

The Defender for Endpoint feature that helps discover unmanaged endpoints, network devices, and IoT devices.

74
New cards

Custom Detection Rules

The Defender XDR feature that allows you to create custom alerts based on Advanced Hunting KQL query results.

75
New cards

The analyst must have the appropriate RBAC permissions and the file must not exceed size limits.

What is required before an analyst can download a file using Live Response in Defender for Endpoint.

76
New cards

Microsoft Defender Threat Intelligence (MDTI)

To provide raw threat intelligence, indicators of compromise (IOCs), and adversary profiles for proactive hunting.

77
New cards

Archived Logs

The feature that should be configured in Sentinel to retain logs for up to 7 years for compliance.

Explore top notes

note
Spanish 1 Body Parts
Updated 1275d ago
0.0(0)
note
Tornadoes and Formation
Updated 1229d ago
0.0(0)
note
Español 3H Repaso vocabulario
Updated 1058d ago
0.0(0)
note
Hinduism and Buddhism
Updated 1056d ago
0.0(0)
note
The Pearl - Summary Notes
Updated 1142d ago
0.0(0)
note
APES 6.2 Global Energy Consumption
Updated 1123d ago
0.0(0)
note
Spanish 1 Body Parts
Updated 1275d ago
0.0(0)
note
Tornadoes and Formation
Updated 1229d ago
0.0(0)
note
Español 3H Repaso vocabulario
Updated 1058d ago
0.0(0)
note
Hinduism and Buddhism
Updated 1056d ago
0.0(0)
note
The Pearl - Summary Notes
Updated 1142d ago
0.0(0)
note
APES 6.2 Global Energy Consumption
Updated 1123d ago
0.0(0)

Explore top flashcards

flashcards
Anatomy Quiz #1
54
Updated 177d ago
0.0(0)
flashcards
Final
223
Updated 97d ago
0.0(0)
flashcards
Unidad 2 Vocabulario 1
27
Updated 65d ago
0.0(0)
flashcards
Unit 10: Glaciers
66
Updated 1012d ago
0.0(0)
flashcards
Adjectifs en Français
137
Updated 738d ago
0.0(0)
flashcards
VSEPR Theory
38
Updated 1145d ago
0.0(0)
flashcards
Anatomy Quiz #1
54
Updated 177d ago
0.0(0)
flashcards
Final
223
Updated 97d ago
0.0(0)
flashcards
Unidad 2 Vocabulario 1
27
Updated 65d ago
0.0(0)
flashcards
Unit 10: Glaciers
66
Updated 1012d ago
0.0(0)
flashcards
Adjectifs en Français
137
Updated 738d ago
0.0(0)
flashcards
VSEPR Theory
38
Updated 1145d ago
0.0(0)