You are a SOC Analyst employed at a company that has set up cloud workload protection with Azure Defender.
You are in charge for remediating security alerts created by Azure Defender detections.
You get an alert regarding a container; the alert offers information to manually remediate the issue and what you can do in the future to stop further attacks.
You work with the infra team to resolve the issue.
The infrastructure team provides recommendation for making automated remediation tasks for future alerts regarding the same problem.
You are requested to provide a report containing Tools, tactics and procedures your manager.
Which of the following feature will you use to leverage to do the same?
Click on the arrows to vote for the correct answer
A. B. C. D.Correct Answer: B Option B is correct.
The threat intelligence report contains attacker information if available.
Option A, C and D are incorrect as we don't have feasibility to download the report from them.
Reference:
To provide a report containing Tools, tactics, and procedures to your manager, the most appropriate feature to leverage is the Azure Defender Incident feature.
The Incident feature in Azure Defender is used to track, investigate, and manage security alerts. This feature allows you to assign an incident to a specific security analyst, track the status of the incident, and document the actions taken to investigate and remediate the alert. The Incident feature provides a centralized view of all related alerts, as well as the actions taken to address the security incident.
In this scenario, when you receive an alert regarding a container, you can create an incident in Azure Defender to track and manage the investigation and remediation of the alert. You can use the Incident feature to document the manual remediation steps taken to resolve the issue and the infrastructure team's recommendations for making automated remediation tasks for future alerts regarding the same problem.
Furthermore, you can use the Incident feature to document the Tools, Tactics, and Procedures (TTPs) used during the incident response process. This documentation provides a comprehensive record of the actions taken to investigate and remediate the alert, which can be used to improve incident response procedures in the future.
Threat Intelligence is used to gather information on potential threats and vulnerabilities, whereas Secure Score is used to assess the security posture of your organization. Threat Score provides a measure of the potential impact of a threat to your organization. These features are useful for proactively identifying and mitigating potential threats, but they are not designed to track and manage the investigation and remediation of security alerts like the Incident feature.