exam questions

Exam SC-300 All Questions

View all questions & answers for the SC-300 exam

Exam SC-300 topic 4 question 20 discussion

Actual exam question from Microsoft's SC-300
Question #: 20
Topic #: 4
[All SC-300 Questions]

You have an Azure Active Directory (Azure AD) tenant named contoso.com that has Azure AD Identity Protection policies enforced.
You create an Azure Sentinel instance and configure the Azure Active Directory connector.
You need to ensure that Azure Sentinel can generate incidents based on the risk alerts raised by Azure AD Identity Protection.
What should you do first?

  • A. Add a Microsoft Sentinel data connector.
  • B. Configure the Notify settings in Azure AD Identity Protection.
  • C. Create a Microsoft Sentinel playbook.
  • D. Modify the Diagnostics settings in Azure AD.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
DeepMoon
Highly Voted 2 years, 3 months ago
Add a Microsoft Sentinel Data connector is the wrong answer. Meant to mislead. Because question itself mentions that AAD connector was added. Which seem to cover all AAD functionality including Identity Protection feature. What you are asked to do is generate incidents based on the risk alerts. For that you use playbooks in Sentinel. Which automates tasks that SOC engineers need to such as generte risk alerts. So answer is C.
upvoted 21 times
nils241
1 year, 6 months ago
I agree with you AAD Connector Description (from Sentinal Conectors) The Azure Active Directory solution for Microsoft Sentinel enables you to ingest Azure Active Directory Audit, Sign-in, Provisioning, Risk Events and Risky User/Service Principal logs using Diagnostic Settings into Microsoft Sentinel.
upvoted 2 times
...
Nielll
10 months, 4 weeks ago
reating a Microsoft Sentinel playbook (option C) is not the first step to ensure that Azure Sentinel can generate incidents based on the risk alerts raised by Azure AD Identity Protection. A playbook in Azure Sentinel is a collection of procedures that can be run from Azure Sentinel in response to an alert. While it’s true that playbooks are an important part of automating responses in Azure Sentinel, they are not the first step in setting up Azure Sentinel to generate incidents based on Azure AD Identity Protection alerts. The first step is to establish a connection between Azure Sentinel and Azure AD Identity Protection, which is done by adding a Microsoft Sentinel data connector.
upvoted 3 times
...
ServerBrain
1 year, 5 months ago
some people pay for this
upvoted 5 times
...
Ed2learn
1 year, 3 months ago
This is not the same connector. There is AAD connector AND a AAD Identity Protection connector.
upvoted 3 times
...
...
w00t
Highly Voted 2 years, 5 months ago
Wording is kind of weird. The data connector you're adding in Sentinel is called "Azure Active Directory Identity Protection". So yes, you're adding a data connector within Sentinel.
upvoted 9 times
wooyourdaddy
2 years ago
I agree with this answer. There are distinct Azure Active Directory and Azure Active Directory Identity Protection data connectors. https://learn.microsoft.com/en-us/azure/sentinel/data-connectors-reference#azure-active-directory https://learn.microsoft.com/en-us/azure/sentinel/data-connectors-reference#azure-active-directory-identity-protection
upvoted 3 times
AMZ
1 year, 9 months ago
A. Add a Microsoft Sentinel data connector. - Reason, the connector that has been mentioned in the question is not the correct one for the use case. Logic app is not necessary to create an incident. incidents will show on the Sentinel page as log as the analytical rule is in place. Shitty question and MS is trying to catch us out. - answer A
upvoted 2 times
...
...
...
armid
Most Recent 1 week ago
Selected Answer: A
I think A. First at this date the connectors in question would be "Entra ID" and "Entra ID Protection". Two separate connectors. The question is likely obsolete. However if i see it wit hthe wording of "Entra ID", i will answer A. If I see it with the wording of "Entra ID Protection" then I will go for D. https://learn.microsoft.com/en-us/azure/sentinel/data-connectors/microsoft-entra-id https://learn.microsoft.com/en-us/azure/sentinel/data-connectors/microsoft-entra-id-protection Think the order would be 1. the correct connector 2. diagnostic setting to forward the right logs to sentinel 3. playbook dont think B is used with regards to Sentinel, although maybe it somehow can, but this is more likely for notifying your admins for those not using Senitnel / NOC
upvoted 1 times
...
Oskarma
2 weeks, 4 days ago
Selected Answer: D
Here's what happens when you modify the Diagnostics settings: Enable Log Streaming: You configure Azure AD to send its logs to your Log Analytics workspace. Select Specific Logs: You choose which logs to send—like sign-in logs and risk detections. Continuous Monitoring: Azure Sentinel now continuously pulls in this data, allowing it to detect threats and create incidents.
upvoted 1 times
...
Matt19
4 months, 3 weeks ago
Selected Answer: C
=> C - Create a MS Sentinel Playbook Azure Ad connector was already configured so next would be to create a playbook imo.
upvoted 1 times
...
hml_2024
5 months, 3 weeks ago
The correct option is: **A. Add a Microsoft Sentinel data connector.** Explanation: - In order for **Azure Sentinel** (now Microsoft Sentinel) to generate incidents based on the risk alerts from **Azure AD Identity Protection**, you first need to ensure that the data from Azure AD Identity Protection flows into Sentinel. - Adding a **Microsoft Sentinel data connector** for **Azure Active Directory Identity Protection** enables Sentinel to collect and analyze the risk alerts and other security data, so incidents can be created based on that data.
upvoted 1 times
...
jim85
8 months, 1 week ago
Selected Answer: A
Clearly states Sentinel Data collector - https://learn.microsoft.com/en-us/azure/sentinel/create-incidents-from-alerts
upvoted 3 times
jim85
8 months, 1 week ago
*connector
upvoted 1 times
jim85
7 months, 3 weeks ago
Ahhh, didn't see connector is configured .. my bad, answer is C)
upvoted 1 times
...
...
...
RemmyT
8 months, 2 weeks ago
Selected Answer: A
Add a Microsoft Sentinel data connector. You create an Azure Sentinel instance and configure the Azure Active Directory connector. (Microsoft Entra ID connector) You need to ensure that Azure Sentinel can generate incidents based on the risk alerts raised by Azure AD Identity Protection We need : Microsoft Entra ID Protection (a different type connector) Microsoft Sentinel | Data connectors | Content hub - Microsoft Entra ID (we suppose is already enabled) - add Microsoft Entra ID Protection Description Note: Please refer to the following before installing the solution: • Review the solution Release Notes The Microsoft Entra ID Protection solution for Microsoft Sentinel allows you to ingest Security alerts reported in Microsoft Entra ID Protection for risky users and events in Microsoft Entra ID. Data Connectors: 1, Analytic Rules: 1, Playbooks: 5
upvoted 2 times
...
JuanZ
10 months ago
Selected Answer: A
https://learn.microsoft.com/en-us/azure/sentinel/overview To on-board Microsoft Sentinel, you first need to connect to your data sources.
upvoted 2 times
...
NICKTON81
10 months ago
Selected Answer: D
D - is correct. The correct answer is D. Modify the Diagnostics settings in Azure AD. According to the Microsoft Entra article on Connect Azure Active Directory data to Microsoft Sentinel1, you need to enable the Diagnostics settings in Azure AD to stream the sign-in logs, audit logs, and provisioning logs to a Log Analytics workspace. This is a prerequisite for connecting the Azure Active Directory data connector to Microsoft Sentinel. https://learn.microsoft.com/en-us/azure/sentinel/connect-services-diagnostic-setting-based
upvoted 2 times
...
klayytech
10 months, 2 weeks ago
Selected Answer: C
To ensure that Azure Sentinel can generate incidents based on the risk alerts raised by Azure AD Identity Protection, you should first Create a Microsoft Sentinel Incident Creation Rule1. This rule will allow Azure Sentinel to automatically create incidents every time an alert is triggered in a connected Microsoft security solution2. You can easily configure this by navigating to Analytics in Azure Sentinel and choosing Create > Microsoft Incident Creation Rule. Then, select Azure Active Directory Identity Protection as the security service1. So, the correct answer is: C. Create a Microsoft Sentinel playbook.
upvoted 1 times
...
Sorrynotsorry
1 year, 3 months ago
Selected Answer: A
AAD Identity Connector is a separate Connector, plus it has been changed now and added into the Defender 365 Data Connector
upvoted 2 times
...
shuhaidawahab
1 year, 4 months ago
The correct answer is D. Modify the Diagnostics settings in Azure AD. According to the Microsoft Entra article on Connect Azure Active Directory data to Microsoft Sentinel1, you need to enable the Diagnostics settings in Azure AD to stream the sign-in logs, audit logs, and provisioning logs to a Log Analytics workspace. This is a prerequisite for connecting the Azure Active Directory data connector to Microsoft Sentinel.
upvoted 3 times
...
ACSC
1 year, 4 months ago
Selected Answer: C
Use playbook to generate incidents in Sentinel
upvoted 1 times
...
ServerBrain
1 year, 5 months ago
Selected Answer: C
The only way to generate incidents is by playbook
upvoted 1 times
...
prabhjot
1 year, 6 months ago
Playbook comes Post Incident ( it job is SOAR and not incident management). I feel A and if you feel Data conenctor are already in place then the Ans Could be D ( that is config the Sign in log or user logs ) configuration part
upvoted 1 times
...
dule27
1 year, 7 months ago
Selected Answer: C
C. Create a Microsoft Sentinel playbook.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago