You need to be alerted when Microsoft 365 Defender detects high-severity incidents.
What should you use?
A. a threat policy
B. a custom detection rule
C. an alert policy
D. a notification rule
Correct Answer: C
Explanation:
Alert policy settings
An alert policy consists of a set of rules and conditions that define the user or admin activity that generates an alert, a list of users who trigger the alert if they perform the activity, and a threshold that defines how many times the activity has to
occur before an alert is triggered. You also categorize the policy and assign it a severity level.
Note:
You can also define user tags as a condition of an alert policy. This results in the alerts triggered by the policy to include the context of the impacted user. You can use system user tags or custom user tags.
*
When the alert is triggered.
*
Alert category.
*
Alert severity. Similar to the alert category, you assign a severity attribute (Low, Medium, High, or Informational) to alert policies.
You have a Microsoft 365 E5 subscription that uses Microsoft Defender for Office 365.
You have the policies shown in the following table.
All the policies are configured to send malicious email messages to quarantine. Which policies support a customized quarantine retention period?
A. Policy1 and Policy3 only
B. Policy2 and Policy4 only
C. Policy1 and Policy2 only
D. Policy3 and Policy4 only
Correct Answer: C
Explanation:
Quarantined email messages in EOP and Defender for Office 365
How long quarantined messages are held in quarantine before they expire varies based on why the message was quarantined. The features that quarantine messages and their corresponding retention periods are described in the following
table:
*
Messages quarantined by anti-phishing policies. Customizable retention period: Yes
*
Messages quarantined by anti-spam policies Customizable retention period: Yes
*
Messages quarantined by anti-malware policies (malware messages). Customizable retention period: No
*
Messages quarantined by Safe Attachments policies in Defender for Office 365 (malware messages). Customizable retention period: No
You plan to manage incidents in the tenant by using the Microsoft 365 Defender.
Which Microsoft service source will appear on the Incidents page of the Microsoft 365 Defender portal?
A. Azure Information Protection
B. Azure Arc
C. Microsoft Sentinel
D. Microsoft Defender for Identity
Correct Answer: D
Explanation:
Microsoft 365 Defender incidents include all their alerts, entities, and other relevant information, and they group together, and are enriched by, alerts from Microsoft 365 Defender's component services Microsoft Defender for Endpoint,
Microsoft Defender for Identity, Microsoft Defender for Office 365, and Microsoft Defender for Cloud Apps, as well as alerts from other services such as Microsoft Purview Data Loss Prevention (DLP).
Incorrect:
Not B: Azure Arc simplifies governance and management by delivering a consistent multi-cloud and on-premises management platform.
Not C: Microsoft Sentinel's Microsoft 365 Defender connector with incident integration allows you to stream all Microsoft 365 Defender incidents and alerts into Microsoft Sentinel, and keeps the incidents synchronized between both portals.
Microsoft 365 Defender incidents include all their alerts, entities, and other relevant information, and they group together, and are enriched by, alerts from Microsoft 365 Defender's component services Microsoft Defender for Endpoint,
Microsoft Defender for Identity, Microsoft Defender for Office 365, and Microsoft Defender for Cloud Apps, as well as alerts from other services such as Microsoft Purview Data Loss Prevention (DLP).
The connector also lets you stream advanced hunting events from all of the above components into Microsoft Sentinel, allowing you to copy those Defender components' advanced hunting queries into Microsoft Sentinel, enrich Sentinel alerts
with the Defender components' raw event data to provide additional insights, and store the logs with increased retention in Log Analytics.
You need to create a policy that will trigger an alert when unusual Microsoft Office 365 usage patterns are detected.
What should you use to create the policy?
A. the Microsoft 365 admin center
B. the Microsoft 365 compliance center
C. the Microsoft Defender for Cloud Apps portal
D. the Microsoft Apps admin center
Correct Answer: B
Explanation:
Real-Time Alerting with Microsoft 365 Alert Policies
Microsoft 365 suite comes with a large set of apps and services, with most of them having a user-friendly interface. However, Microsoft 365 suite is very vast and includes an extensive list of audit logs of all actions performed in an
organization. Thus, it has become difficult and time-consuming for the administrators to monitor the suspicious activities and unauthorized actions that are taking place. This is where Microsoft 365 Alert Policies come in.
Using the Alert Policies feature available in the Compliance Center and Microsoft 365 Defender/Security admin center, you can combat this problem. With the help of alert policies, you can monitor user activities and security incidents, such as
phishing, unusual external user activities, suspicious massive file or folder deletions, and more.
You have a Microsoft 365 E5 tenant that contains two groups named Group1 and Group2.
You need to prevent the members of Group1 from communicating with the members of Group2 by using Microsoft Teams. The solution must comply with regulatory requirements and must not affect other users in the tenant.
What should you use?
A. administrative units in Azure Active Directory (Azure AD)
B. information barriers
C. moderated distribution groups
D. communication compliance policies
Correct Answer: B
Explanation:
Microsoft Purview Information Barriers (IBs) are policies that an admin can configure to prevent individuals or groups from communicating with each other.
You discover that some external users accessed content on a Microsoft SharePoint site. You modify the SharePoint sharing policy to prevent sharing outside your organization.
You need to be notified if the SharePoint sharing policy is modified in the future.
Solution: From Microsoft 365 Defender, you create a Threat policy.
Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Explanation:
From the Security and Compliance admin center, Alerts, you create a new alert policy.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MS-101 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.