SC-200 Notes
SC-200 Notes
covers:
• iot
• office 365
• entra id protection
• cloud apps
• endpoints
• identity
• insider risk
DLP
DLP consists of:
defender products:
• Microsoft Defender for Office 365
• Microsoft Defender for Endpoint
• Microsoft 365 Defender
• Microsoft Defender for Cloud Apps
• Microsoft Defender for Identity
• Microsoft Defender Vulnerability Management
The More resources option in the portal provides a list of these related portals:
• Purview
• AzAD
• AAD ID Protection
• AZ Information Protection
• MS Defender for cloud
Auto investigation
• Alerts
• Devices
• Evidence
• Entities
• Log
• Pending actions The Action Center brings investigations and other components
together to be acted on.
• actionable insights = correlated signals for a security incident, and actions that
can be deployed
safe attachments
Under the Action for unknown malware in Attachments: - Off Attachments won't be
scanned - Monitor Continues delivering the message after malware is detected
- Block Blocks the current and future emails and attachments with detected malware.
- Replace Blocks malware but delivers message body. - Dynamic delivery delivers the
message body without attachments and reattaches attachments after scanning
Safe links
protects your users from malicious URLs Safe Links is available in the following apps:
Other
• Defender for Office 365 also has anti phishing policies.
• You can also simulate attacks
info:
Deploying DfE
1. Go to (https://security.microsoft.com)
2. Select Settings.
3. Select Endpoints.
Device discovery
RBAC setup:
1. Access 365 Defender portal with Security administrator or Global administrator
role
2. Settings > Endpoints. Under the Permissions category, select Roles.
3. Select the Turn on roles button.
4. Select + Add item.
5. Enter the role name, description, and permissions
6. Select Next to assign the role to an Azure AD Security group
7. Use filter to select the Azure AD group that you would like to add this role to.
8. Select Save.
Device groups
1. Settings > Endpoints and then under Permissions select Device groups.
2. Select + Add device group.
3. Enter the group name and automation settings, specify the matching rule that
determines which devices belong to the group
4. review devices that match against the rule
5. Assign the user groups that can access the device group you created
6. Select Close. The configuration changes are applied
Security enhancements:
• ASR rules (attack surface reductiion)
• Hardware-based isolation
• Application control
• Exploit protection
• Network protection
• Web protection
• Controlled folder access
• Device control
Investigations
• Devices list
• Alerts queue
• Security operations dashboard
• Any individual alert
• Any individual file details view
• Any IP address or domain details view
• Device details
• Response actions
• Cards (active alerts, logged on users, security assessment)
Response actions:
• Manage tags
• Isolate device
• Restrict app execution
• Run antivirus scan
• Collect investigation package
• Initiate Live Response Session
• Initiate automated investigation
• Consult a threat expert
• Action center
Automation
Automate on folder exclusions:
Configure:
1. Create an instance on Microsoft Defender for Identity management portal
2. Specify an on-premises AD service account in Defender for Identity portal
3. Download and install the sensor package
4. Install the Microsoft Defender for Identity sensor on all domain controllers
5. Exclude the sensitive accounts you've listed during the design process
6. Configure the required permissions for the sensor to make SAM-R calls
7. Configure integration with Microsoft Defender for Cloud Apps
8. Configure integration with Microsoft 365 Defender
connecting resources
asset inventory uses Azure Resource Graph
• Defender for Cloud's sidebar, select Inventory.
• Filter by name to display a specific resource, or use filters as described below:
• Select the relevant options in the filters
• To use the Security findings contain filter
DLP
• DLP alerts are available in MCAS
• File policy is used for DLP in MCAS
• DLP policy is used to protect locations such as sharepoint
Detect threats:
you can detect anomalies based on the following risk factors:
• Risky IP address
• Login failures
• Admin activity
• Inactive accounts
• Location
• Impossible travel
• Device and user agent
• Activity rate
Anomaly policies
you can create your own polocies but most popular security issues to generate polocies
around are:
• Impossible travel
• Activity from infrequent country
• Malware detection
• Ransomware activity
• Activity from suspicious IP addresses
• Suspicious inbox forwarding
• Unusual multiple file download activities
• Unusual administrative activities
Secure Score
Products included in Secure Score:
Threat analytics:
shows:
categorises as:
• Latest threats
• High-impact threats
• Highest exposure
Azure AD ID Protection
helps you to automatically detect, remediate, and investigate identity-based risks for
your organization.
• Self Remediation
o when risk is detected, get user to reset password
• Admin remediation
o when risk detected, notify admin to investigate and take action
• configure a policy
• investigate using a report
• remediate
configure policy:
• Sign-in risk policy
o The users this policy should target
o The conditions that must be met, such as how high a score triggers the
policy
o How you want to respond
o review
• User risk policy
o users
o conditions
o controlls (require password change)
o review
• Self-remediation
• Reset passwords manually
• dismiss risk
• close detection
• unblock users which may have been blocked due to user or signin risk
Scenarios:
everything else is just about policies and insider risk policies (boring)
Audit solutions:
Standard:
• enabled by default
• thousands of audited events
• 90 day retention
• accessed by GUI, cmdlet and API setup:
• verity subscription and user licensing
• assign permissions to audit log
• search audit log
Premium:
• longer retention
• custom retention polocies
• high value crucial events
• higher bandwith access to API Setup:
• setup audit for users
o ms 365 admin center
o active users page
o licenses and apps
o licenses section verify E5 licenses for all users
o expand apps section, verify MS 365 advanced auditing
Content search
Allows search across:
• Exchange Online
• OneDrive for Business
• SharePoint Online
• Microsoft Teams
• Microsoft 365 Groups
• Yammer teams
works in 3 ways:
• content search
o search content
o keyword queries
o export search results
o Role based permissions
• eDiscovery
o search and export
o case management
o legal hold
• eDisco - Premium
o custodian management (manage external parties access to data)
o legal hold
o advanced indexing
o review set filtering
o tagging
o analytics
o coding models
o more...
for preview items, must have a max of 1k randomly selected items available for
optimisation, disable antivirus when downloading large data sets from search results
Sentinel
Its a SIEM. You ingest all log sources to it for correlating incidents across tables
setting up sentinel
• tenant
o subsciption
▪ resource group
▪ workspace
▪ sentinel
Automation rules
Automation rules used like ACL's, they are triggered when specific conditions are met.
They also have a priority list for running sequentially. they need to be enabled and in the
correct order under active automation tab. an example for order might be that you want
specific suppressions for defender related rule to suppress entities mapped to incidents,
and then run connection playbook to bring the incident in the form of a ticket into your
ITSM platform.
Playbooks
Playbooks are essentially linked logic apps. These can be triggered via automation rules
when conditions are met on incidents. Playbooks essentially provide your SOAR
capability. to action incidents and enrich data from other sources such as TI or other
third party services such as Virus Total or ChatGPT.
Workbooks
Workbooks are dashboards. You can set them up to correlate data into a single place to
review KPI/activity etc...
Behavioural analytics
A lot of bark, no bite. all ML algorithms unknown to the public, so they can raise
incidents without clear indicators as of to why. Only way to tune is to suppress or mark
as false positive and hope the L in ML actually does its job.
Data Normalisation
This is the process of mapping entities across tables. E.G: table1 marks IP address as
'IP_Address' table2 marks IP address as 'IpAddress'
normalisation is the process of mapping the two entities to be seen as the same
(IP_Address == IpAddress)
ASIM
Advanced Security Information Model (ASIM) is a layer that helps normalise logs from
multiple sources.
I didnt want to share images in this file, but this image explains it the best:
Managing content
• Data connectors provide log ingestion from different sources
• Parsers provide log formatting/transformation into ASIM format
• Workbooks dashboards
• Analytics rules in sentinel as oppose to defender etc...
• Hunting queries used to query environment for potential bad items
• Notebooks allows extensive advanced lookups and querying with Jupyter
Notebooks
• Watchlists Lists you can use to suppress items against rules (whitelist of users /
IP's)
• Playbooks Logic Apps for automated investigations, remediations, and response
scenarios
Content Hub
content hub is a market place where you can download items related to an app. E.G
Azure Activity:
• 14 analytics rules
• 12 hunting queries
• 1 connector
• 4 playbooks
Sentinel Repos
Use this to bring a CI/CD workspace into Sentinel allowing you to revert rule changes,
push rule changes across multi tenant deployments, automatically have tuned rules for
new customers in an MSSP environment etc...
Notebooks
Notebooks are really cool. mainly because you can now use python on a Microsoft
platform instead of el cancer powershell
• Kqlmagic
• msticpy
KQL
works like sql, but backwards, select the table and then filter options, where in sql you
select options and then specify which table you want to query, and do calculations on
data afterwards. NOTE this area is my speciality so i have made quick notes, but i would
recommend going through this section to understand KQL and especally joins / unions
and join types better: https://learn.microsoft.com/en-us/training/modules/build-multi-
table-statements-kusto-query-language/3-use-join-operator remember:
SigninLogs
| join kind = inner (AADNonInteractiveUserSignInLogs
) on UserPrincipalName
common statmenets:
• where
• let
• join
• extend
• summarize
• project
• order
• distinct
• render
• count()
• date()
• bin()
• externaldata()
• not()
• has_any()
• arg_max()/arg_min()
• make_list()
• todynamic()
• tostring()
• extract()
• datatable()
• split()
SigninLogs
| extend dynProperties = todynamic(extendedproperties)
| extend IPAddress = dynProperties[0].IPAddress
| project tostring(IPAddress)
understand how to expand nested arrays to return all data:
SigninLogs
| extend dynProperties = todynamic(extendedproperties)
| mv-expand dynProperties
| extend IPAddress = dynProperties.IPAddress
| project tostring(IPAddress)
understand how to split string data:
SigninLogs
| extend Domain = split(emailAddress, "@")[-1]
| project tostring(Domain)