A SOC analyst can make a customised detection from one of the below ?
Click on the arrows to vote for the correct answer
A. B. C. D.Correct Answer: C
Advanced hunting gives a choice to save the query as a detection, while Alert and Incident doesn't provide an option to save as a detection.
As a Microsoft Security Operations Analyst, a SOC analyst can create a customized detection from "Advanced Hunting."
Advanced Hunting is a powerful query-based hunting tool that allows a security analyst to search through large amounts of security-related data, such as security events and alerts, using a query language called Kusto Query Language (KQL). This tool provides analysts with the ability to explore and identify new and unknown threats that may not be caught by existing security controls.
By creating a custom detection rule from Advanced Hunting, a SOC analyst can define specific criteria that will trigger an alert if met. This allows the analyst to be proactive in detecting and responding to potential threats that may be unique to their organization.
Alerts are generated when an event meets a specific condition or set of conditions defined by the detection rule. Incidents are created when a collection of alerts indicates a potential security incident. Requests are typically used to request access to resources or services and are not related to security operations.
In summary, a SOC analyst can create a custom detection rule from Advanced Hunting to proactively detect potential threats that may be unique to their organization.