You have a Microsoft 365 subscription that uses Microsoft Defender XDR. You need to implement deception rules. The solution must ensure that you can limit the scope of the rules.
The answer is clearly B - device tags. I mean, come on, who doesn't love a good tagging party? Just be careful you don't end up with a bunch of 'Device: Sneaky Hacker' tags, am I right?
Device groups, device tags, honeytoken entity tags... They're all like a buffet of deception options. But I think D is the way to go. Sensitive entity tags will really add that extra layer of spice to your traps. Just don't want anyone to get too 'sensitive' about it, if you know what I mean.
C, all the way! Honeytoken entity tags are where it's at. I bet you can make some real juicy lures with those. Just don't let the bad guys get too sticky-fingered, am I right?
Ah, gotta go with B on this one. Device tags are the way to go. You can get super specific with your deception traps that way. Although, I do wonder if they have a 'honey-flavored' option.
Hmm, device groups seem like the logical choice here. I mean, how else are you going to limit the scope of those deception rules? It's like trying to catch a fly with a baseball bat.
Reita
17 days agoAileen
18 days agoRashad
3 days agoLorrie
20 days agoVallie
22 days agoLilli
1 months agoTarra
9 days agoJeanice
20 days agoMy
2 months agoGail
2 months agoJaclyn
2 months ago