You have an Azure subscription that has Microsoft Defender for Cloud enabled.
You have a virtual machine named Server! that runs Windows Server 2022 and is hosted in Amazon Web Services (AWS).
You need to collect logs and resolve vulnerabilities for Server1 by using Defender for Cloud.
What should you install first on Server1?
You have an Azure subscription that contains a Microsoft Sentinel workspace named Workspace1 and a user named User1.
You need to ensure that User1 can investigate incidents by using Workspace1. The solution must follow the principle of least privilege.
Which role should you assign to User1?
You have the following environment:
Azure Sentinel
A Microsoft 365 subscription
Microsoft Defender for Identity
An Azure Active Directory (Azure AD) tenant
You configure Azure Sentinel to collect security logs from all the Active Directory member servers and domain controllers.
You deploy Microsoft Defender for Identity by using standalone sensors.
You need to ensure that you can detect when sensitive groups are modified in Active Directory.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
You have Linux virtual machines on Amazon Web Services (AWS).
You deploy Azure Defender and enable auto-provisioning.
You need to monitor the virtual machines by using Azure Defender.
Solution: You enable Azure Arc and onboard the virtual machines to Azure Arc.
Does this meet the goal?
You have an Azure subscription that has Azure Defender enabled for all supported resource types.
You need to configure the continuous export of high-severity alerts to enable their retrieval from a third-party security information and event management (SIEM) solution.
To which service should you export the alerts?
Ahmed
3 days agoErnest
11 days agoKristofer
19 days agoOretha
27 days agoArleen
1 month agoVincenza
1 month agoWade
2 months agoBlondell
2 months agoPaola
2 months agoAlba
2 months agoLeota
3 months agoLorrie
3 months agoBok
3 months agoJeannetta
3 months agoLuis
4 months agoAndra
4 months agoLing
4 months agoPenney
4 months agoHerminia
5 months agoJoye
5 months agoNadine
5 months agoFreeman
5 months agoGlennis
6 months agoAhmed
6 months agoRuthann
6 months agoRhea
6 months agoLynda
8 months agoNina
9 months agoGayla
11 months agoAnnabelle
12 months agoRoxane
1 year agoPatrick
1 year agoLettie
1 year agoHorace
1 year agoMacy
1 year agoAlishia
1 year agoAdell
1 year agoJennifer
1 year agoLucina
1 year agoAsha
1 year agoRyan
1 year agoMichal
1 year agoLeigha
1 year agoLinsey
1 year agoDell
2 years agoSantos
2 years agoSabra
2 years agoClaudio
2 years agoMila
2 years agoJoni
2 years agoDella
2 years agoMaryann
2 years agoGerald
2 years agoTenesha
2 years agodarrena
2 years agokalasan
2 years ago