List of questions
Related questions
Question 259 - SC-200 discussion
You have an Azure subscription that contains a Microsoft Sentinel workspace named WS1.
You create a hunting query that detects a new attack vector. The attack vector maps to a tactic listed in the MITRE ATT&CK database.
You need to ensure that an incident is created in WS1 when the new attack vector is detected.
What should you configure?
A.
a Fusion rule
B.
a query bookmark
C.
a scheduled query rule
D.
a hunting livestream session
Your answer:
0 comments
Sorted by
Leave a comment first