5.10 Module Assessment

90 minutes · Module 5

Module 5 — Final Assessment

Key takeaways

  • Sentinel and Defender XDR are complementary — Sentinel adds third-party data, custom detections, and automation beyond what Defender XDR provides alone
  • Sentinel sits on a Log Analytics workspace: workspace = data store, Sentinel = security intelligence layer
  • Single workspace is correct for most organizations. Multi-workspace only for data residency, tenant boundaries, or access restrictions.
  • Region cannot be changed after workspace creation — verify data residency requirements before deploying
  • Three log tiers: Analytics (full KQL, highest cost), Basic (limited KQL, 65% cheaper), Archive (search jobs only, cheapest)
  • Basic tier does not support join or summarize — do not move tables there if they are referenced by analytics rules
  • Commitment tiers save money only when actual ingestion exceeds the commitment threshold — start on pay-as-you-go
  • Firewall logs are the most common cost overrun — use Data Collection Rules to filter before ingestion
  • The M365 Defender connector brings all Defender data; the Entra ID connector brings identity data. Both are required for full investigation capability.
  • Content Hub solutions install rule templates, not active rules — review and activate manually
  • Monitor ingestion health weekly: connector gaps, volume anomalies, and analytics rule failures

Final assessment (10 questions)

1. When does an organization need Sentinel in addition to Defender XDR?

When they have non-Microsoft data sources, need custom detection rules, have compliance mandates for centralized logging, or need automated response beyond Defender XDR's attack disruption
Always — every organization needs a SIEM
Never — Defender XDR is sufficient

2. You need to store EU employee sign-in data in an EU region. What is the correct architecture?

Single workspace in the US with an EU filter
Move the existing workspace to the EU
Create a second workspace in West Europe for EU data. Use cross-workspace queries for unified hunting. Workspaces cannot be moved between regions.

3. DeviceFileEvents uses 45 GB/month. You have no analytics rules against it. What is the cost-optimized approach?

Move it to Basic tier — saves ~65% while keeping simple query access for ad-hoc investigation. Verify no existing rules reference this table before changing.
Delete the data
Keep it on Analytics

4. Your workspace ingests 70 GB/day. Should you commit to the 100 GB/day tier?

Yes — the per-GB rate is lower
Yes — you will grow into it
No — at 70 GB/day, pay-as-you-go costs less than the 100 GB commitment. The commitment charges for 100 GB whether you use it or not. Wait until you consistently exceed 85+ GB/day.

5. You enabled the M365 Defender connector but did not enable DeviceFileEvents. When would you add it?

When you build a detection rule that requires file-level endpoint data, or when investigating malware that requires file creation/modification analysis. Adding it before you have a specific use case wastes budget.
Immediately — you need all data
Never — device data is not useful

6. What is the critical danger of a silent ingestion failure in SigninLogs?

Every analytics rule that depends on sign-in data becomes blind. Token replay, brute force, and impossible travel detections stop working. Investigation queries return incomplete results, which analysts may misinterpret as "nothing happened" rather than "data is missing."
Users cannot sign in
Dashboard charts show gaps

7. You install a Content Hub solution. The analytics rules start detecting immediately. True or false?

True
False — solutions install rule templates, not active rules. You must manually review, tune, and activate each rule.

8. Why apply a CanNotDelete resource lock to the workspace?

A deleted workspace takes all security data with it. Recovery is limited to 14 days. The lock prevents accidental deletion by any user with Contributor access.
Azure requires it
It improves performance

9. Firewall logs are generating 35 GB/day. What are two actions to reduce cost?

First: deploy a Data Collection Rule to filter at ingestion — keep only denied, IDS, and URL filtering events. Second: move the remaining firewall table to Basic tier if you do not build detection rules against it.
Disconnect the firewall and use Defender XDR instead
Upgrade to a higher commitment tier

10. You configured the Entra ID diagnostic settings to send SigninLogs but forgot NonInteractiveUserSignInLogs. Which detection from Module 13 will fail?

Phishing email detection
Inbox rule detection
Token replay detection — the anti-join pattern queries AADNonInteractiveUserSignInLogs for IPs not in the interactive baseline. Without this table, stolen token activity is invisible.