SC-200 Exam QuestionsBrowse all questions from this exam

SC-200 Exam - Question 256


You have an Azure subscription that contains a user named User1 and a Microsoft Sentinel workspace named WS1. WS1 uses Microsoft Defender for Cloud.

You have the Microsoft security analytics rules shown in the following table.

User1 performs an action that matches Rule1, Rule2, Rule3, and Rule4.

How many incidents will be created in WS1?

Show Answer
Correct Answer: A

When an action matches multiple security analytics rules in Microsoft Sentinel, the rules are evaluated based on the incident creation settings within Sentinel. To avoid duplication and unnecessary noise, Microsoft Sentinel typically consolidates these matches into a single incident whenever the severity, service, and action are the same across multiple rules. Since all the rules in this case specify the same service (Defender for Cloud), severity (High), and action (Create incident), only one incident will be created.

Discussion

3 comments
Sign in to comment
RedZtopicsOption: D
May 5, 2024

D for me

Peachy7Option: D
May 1, 2024

Answer: D https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-email-notifications

jacobtriestechOption: D
Jul 3, 2024

https://learn.microsoft.com/en-us/azure/defender-for-cloud/configure-email-notifications

Studytime2023
Jul 14, 2024

I'm not sure if this question has anything to do with email alerts? It only asked how many incidents will be created. Maybe this link will provide some insight. https://learn.microsoft.com/en-us/azure/sentinel/create-analytics-rules?tabs=azure-portal#configure-the-incident-creation-settings