Skip to content

Commit 87d222d

Browse files
authored
Merge pull request #54062 from ceperezb/CEPEREZB-sc900-describe-sentinel
Ceperezb sc900 describe sentinel
2 parents ca21df5 + 8a72041 commit 87d222d

13 files changed

Lines changed: 210 additions & 131 deletions

learn-pr/wwl-sci/describe-security-capabilities-of-azure-sentinel/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Introduction
44
metadata:
55
title: Introduction
66
description: "Introduction"
7-
ms.date: 08/06/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit

learn-pr/wwl-sci/describe-security-capabilities-of-azure-sentinel/2-define-concepts-of-siem-soar.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Define the concepts of SIEM and SOAR
44
metadata:
55
title: Define the concepts of SIEM and SOAR
66
description: "Define the concepts of SIEM and SOAR"
7-
ms.date: 08/06/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit

learn-pr/wwl-sci/describe-security-capabilities-of-azure-sentinel/3-describe-sentinel-provide-integrated-threat-management.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Describe threat detection and mitigation capabilities in Microsoft Sentin
44
metadata:
55
title: Describe threat detection and mitigation capabilities in Microsoft Sentinel
66
description: "Describe threat detection and mitigation capabilities in Microsoft Sentinel"
7-
ms.date: 08/06/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit

learn-pr/wwl-sci/describe-security-capabilities-of-azure-sentinel/4-describe-security-copilot.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Describe Microsoft Sentinel integration with Microsoft Security Copilot
44
metadata:
55
title: Describe Microsoft Sentinel integration with Microsoft Security Copilot
66
description: "Describe Microsoft Sentinel integration with Microsoft Security Copilot"
7-
ms.date: 08/06/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit

learn-pr/wwl-sci/describe-security-capabilities-of-azure-sentinel/5-knowledge-check.yml

Lines changed: 37 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,9 @@
22
uid: learn.wwl.describe-security-capabilities-of-azure-sentinel.knowledge-check
33
title: Module assessment
44
metadata:
5-
hidden_question_numbers: ["67F3C680_2","67F3C680_22","67F3C680_30","67F3C680_34","67F3C680_59","67F3C680_75","67F3C680_79","67F3C680_83","67F3C680_100","67F3C680_112","67F3C680_124","67F3C680_136","67F3C680_140"]
6-
ai_generated_module_assessment: true
75
title: Module assessment
86
description: "Knowledge check"
9-
ms.date: 08/06/2024
7+
ms.date: 03/31/2026
108
author: wwlpublish
119
ms.author: ceperezb
1210
ms.topic: unit
@@ -23,27 +21,27 @@ quiz:
2321
choices:
2422
- content: "Collect, Detect, Investigate, and Redirect."
2523
isCorrect: false
26-
explanation: "Incorrect. Redirect is not one of the four key aspects of a SIEM/SOAR solution."
24+
explanation: "Incorrect. Redirect isn't one of the four key aspects of a SIEM/SOAR solution."
2725
- content: "Collect, Detect, Investigate, and Respond."
2826
isCorrect: true
29-
explanation: "Correct. A SIEM/SOAR solution uses collect, detect, investigate, and respond to identify and protect your organization's network perimeter."
27+
explanation: "Correct. Microsoft Sentinel uses these four areas to help security teams identify and respond to threats across the entire enterprise."
3028
- content: "Collect, Detect, Investigate, and Repair."
3129
isCorrect: false
32-
explanation: "Incorrect. Repair is not one of the four key aspects of a SIEM/SOAR solution."
30+
explanation: "Incorrect. Repair isn't one of the four key aspects of a SIEM/SOAR solution."
3331

34-
- content: "Your estate has many different data sources where data is stored. Which tool should be used with Microsoft Sentinel to quickly gain insights across your data as soon as a data source is connected?"
32+
- content: "A security analyst suspects that a threat actor is active in the environment but no alert has been triggered yet. Which Microsoft Sentinel capability lets the analyst proactively search for suspicious activity before an alert fires?"
3533
choices:
36-
- content: "Azure Monitor Workbooks."
34+
- content: "Threat hunting."
3735
isCorrect: true
38-
explanation: "Correct. Using the Microsoft Sentinel integration with Azure Monitor Workbooks allows you to monitor data and provides versatility in creating custom workbooks."
39-
- content: "Playbooks."
36+
explanation: "Correct. Threat hunting lets security analysts run queries across Microsoft Sentinel data to search for suspicious activity that hasn't yet triggered an analytics rule. When a query surfaces a significant finding, it can be promoted into a custom analytics rule to generate alerts automatically in the future."
37+
- content: "Automation rules."
4038
isCorrect: false
41-
explanation: "Incorrect. Playbooks allow you to automate your common tasks and simplify security orchestration."
42-
- content: "Microsoft Defender XDR."
39+
explanation: "Incorrect. Automation rules manage how incidents are handled after they're created—for example, assigning or triaging them. They don't search for threats proactively."
40+
- content: "Playbooks."
4341
isCorrect: false
44-
explanation: "Incorrect. Microsoft Defender XDR provides protection for email, client endpoints, enterprise IoT, Identity, Apps, and Cloud apps."
42+
explanation: "Incorrect. Playbooks automate remediation actions in response to incidents that have already been detected. They aren't used to proactively search for unknown threats."
4543

46-
- content: A security analyst is tasked with investigating a specific incident using Microsoft Sentinel. They want to obtain a summary of the incident, related alerts, reputation scores, users, and devices. What functionality should they use?
44+
- content: A security analyst is tasked with investigating a specific incident using Microsoft Sentinel. They want to obtain a summary of the incident, related alerts, reputation scores, users, and devices. What functionality should they use?
4745
choices:
4846
- content: Microsoft Sentinel KQL (Preview) plugin
4947
isCorrect: false
@@ -53,4 +51,28 @@ quiz:
5351
explanation: Correct. The Microsoft Sentinel incident investigation promptbook includes prompts for getting a report about a specific incident, along with related alerts, reputation scores, users, and devices.
5452
- content: Jupyter notebooks
5553
isCorrect: false
56-
explanation: Incorrect. Jupyter notebooks are an open-source web application that allows users to create and share documents containing live code, equations, visualizations, and narrative text.
54+
explanation: Incorrect. Jupyter notebooks are used to create documents with live code, visualizations, and narrative text for extended analytics, not to retrieve structured incident reports.
55+
56+
- content: A security operations team is struggling with alert fatigue—analysts are overwhelmed by the volume of alerts and missing genuine threats. Which capability in a modern SIEM/SOAR solution most directly addresses this problem?
57+
choices:
58+
- content: Generating more alerts from more data sources to improve coverage.
59+
isCorrect: false
60+
explanation: Incorrect. Adding more alerts without prioritization makes alert fatigue worse, not better.
61+
- content: Using AI and machine learning to group related alerts into incidents, assign severity scores, and reduce false positives.
62+
isCorrect: true
63+
explanation: Correct. Modern SIEM/SOAR platforms use AI and ML to correlate related alerts into high-quality incidents, prioritize by severity, and reduce false positives—directly reducing the number of alerts analysts must review.
64+
- content: Disabling alerts from lower-priority data sources to reduce volume.
65+
isCorrect: false
66+
explanation: Incorrect. Disabling alerts reduces visibility and can cause genuine threats to be missed.
67+
68+
- content: What best describes Microsoft Security Copilot?
69+
choices:
70+
- content: A cloud-native SIEM/SOAR platform that collects and analyzes security data to detect and respond to threats.
71+
isCorrect: false
72+
explanation: Incorrect. That description applies to Microsoft Sentinel. Microsoft Security Copilot is an AI-powered assistant, not a SIEM/SOAR platform.
73+
- content: A generative AI-powered security solution that helps defenders investigate threats, summarize incidents, and build KQL queries through natural language.
74+
isCorrect: true
75+
explanation: Correct. Microsoft Security Copilot is a generative AI-powered solution designed to help security professionals work more efficiently across scenarios such as incident investigation, threat hunting, and query building—using natural language.
76+
- content: A data connector that links Microsoft Sentinel to non-Microsoft security tools and automates playbook execution.
77+
isCorrect: false
78+
explanation: Incorrect. Data connectors are components of Microsoft Sentinel that bring in security data. Microsoft Security Copilot is an AI-powered security assistant.

learn-pr/wwl-sci/describe-security-capabilities-of-azure-sentinel/6-summary-resources.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Summary and resources
44
metadata:
55
title: Summary and resources
66
description: "Summary and resources"
7-
ms.date: 08/06/2024
7+
ms.date: 03/31/2026
88
author: wwlpublish
99
ms.author: ceperezb
1010
ms.topic: unit
Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
Every organization, whatever its size, is susceptible to security threats and attacks. Being able to collect data to gain visibility into your digital estate and detect, investigate, and respond to threats is central to any network security strategy.
1+
Every organization, whatever its size, is susceptible to security threats and attacks. The ability to collect data, gain visibility across your digital environment, and detect, investigate, and respond to threats is central to any security strategy.
22

3-
In this module, youll learn about security information and event management (SIEM) and security orchestration automated response (SOAR). You'll explore how Microsoft Sentinel provides a single solution for alert detection, threat visibility, proactive hunting, and threat response. Finally, you'll learn how Microsoft Sentinel integrates with Microsoft Security Copilot.
3+
In this module, you'll learn about security information and event management (SIEM) and security orchestration, automation, and response (SOAR), and how modern AI and machine learning capabilities are reshaping security operations. You'll then explore Microsoft Sentinel—a cloud-native SIEM/SOAR solution—and see how it brings together threat detection, investigation, and response in a single platform. Finally, you'll learn how Microsoft Sentinel integrates with Microsoft Security Copilot, an AI-powered security assistant.
44

5-
After completing this module, youll be able to:
5+
After completing this module, you'll be able to:
66

7-
- Describe the security concepts for SIEM and SOAR.
8-
- Describe how Microsoft Sentinel provides threat detection and mitigation.
9-
- Describe how Microsoft Sentinel integrates with Microsoft Security Copilot.
7+
- Define the concepts of SIEM and SOAR, and describe the role of AI in modern security operations.
8+
- Describe how Microsoft Sentinel provides threat detection and mitigation capabilities.
9+
- Describe Microsoft Security Copilot and how it integrates with Microsoft Sentinel.

0 commit comments

Comments
 (0)