Valid SC-200 Dumps shared by ExamDiscuss.com for Helping Passing SC-200 Exam! ExamDiscuss.com now offer the newest SC-200 exam dumps, the ExamDiscuss.com SC-200 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com SC-200 dumps with Test Engine here:
Access SC-200 Dumps Premium Version
(370 Q&As Dumps, 35%OFF Special Discount Code: freecram)
Recent Comments (The most recent comments are at the top.)
i think its BC:
In Azure Sentinel, both analytics rules and hunting queries are used to detect and investigate security threats, but they serve different purposes and are used in different ways:
Automated Detection: 1: Analytics rules are automated and run on a schedule or triggered by specific events. These rules are typically set to run at regular intervals, continuously monitoring for threats.
2: Hunting queries are run manually by security analysts to proactively search for threats. In Azure Sentinel, hunting queries can be used with livestream.
In summary, analytics rules are automated and scheduled to detect known threats, while hunting queries are manual and exploratory, used to uncover new and emerging threats.
Important point in the question is that you need to receive an alert
If you pick "Create a hunting query" and "Create a livestream", you will only receive a notification in the Azure portal if events match that query, not an alert.
You could elevate a livestream to an alert but that goes in the territory of "Create an analytics rule"
Livestream: https://learn.microsoft.com/en-us/azure/sentinel/livestream
The correct answer is "Add a data connector" and "Create an analytics rule"
- You need the "Azure Storage account" data connector which enables you to continuously monitor activity in all your Azure storage instances, and detect malicious activity in your organization
- You need to create a NRT analytics rule...