6.8 Module Assessment

75 minutes · Module 6

Module 6 — Final Assessment

Key takeaways

  • Ingestion strategy: connect highest-detection-value sources first, not highest-volume sources
  • Phase your deployment: 2-3 connectors per phase, build detection rules against each before adding more
  • The detection-first principle: every connected data source should have at least one analytics rule using it
  • Azure Activity and Office 365 connectors are free — enable in every workspace, no exceptions
  • OfficeActivity provides MailItemsAccessed (email access audit); CloudAppEvents provides inbox rule creation — you need both
  • CEF format is always preferred over raw Syslog for structured, queryable fields
  • Forwarder sizing: match CPU/RAM/disk to daily volume, with 24 hours of disk buffer minimum
  • Production environments need two forwarders behind a load balancer — test failover
  • DCRs filter data before ingestion — dropped data costs nothing but is irrecoverable
  • A well-tuned firewall DCR reduces volume by 70-80% while retaining all security-relevant events
  • Windows Event Log DCR: the 22-Event-ID filter captures all security-relevant events with ~90% volume reduction
  • Custom tables via Logs Ingestion API extend detection to any application that can POST JSON
  • Connector troubleshooting: start at the source device, work downstream through forwarder to workspace
  • DCR syntax errors silently drop all data — no error messages, no alerts. Version-control your transformations.
  • Run three monitoring queries weekly: connector health, volume anomalies, analytics rule health
  • Data drops are the highest-priority operational issue — fix ingestion gaps before everything else

Final assessment (12 questions)

1. You have budget for 20 GB/day. Which data sources give you the most detection coverage?

M365 Defender (~10 GB) + Entra ID (~2 GB) + Azure Activity (free) + Office 365 audit (free) = ~12 GB billable. Enables the widest range of pre-built and custom detections with 8 GB of headroom.
Firewalls — maximum volume
Windows Event Logs from all servers

2. Your firewall generates 50 GB/day. 80% is permitted traffic. What is the first cost optimization?

A DCR that filters to denied traffic, IDS alerts, and authentication events — dropping ~40 GB/day before ingestion. Monthly savings: ~$6,624.
Move CommonSecurityLog to Basic tier
Reduce retention to 30 days

3. You need MailItemsAccessed data. Which connector?

M365 Defender
Office 365 — OfficeActivity table
Entra ID

4. A DCR drops 40 GB/day of firewall data. An investigation needs the dropped data. Options?

Restore from Sentinel archive
Re-ingest from backup
DCR-dropped data was never ingested. Check the firewall's local log retention (typically 7-30 days). If the event falls within that window, retrieve from the device. If not, the data is permanently gone.

5. Why choose CEF over Syslog format?

CEF provides structured fields (SourceIP, DeviceAction) queryable with standard KQL. Syslog requires parse/extract — more complex, error-prone, and slower at scale.
CEF uses less bandwidth
CEF is more secure

6. CommonSecurityLog shows zero events. Green connector status. First diagnostic step?

SSH to forwarder, run tcpdump on port 514. Packets arriving = problem is Zone 2/3. No packets = problem is the source device.
Recreate the connector
Wait 24 hours

7. A colleague modified a DCR yesterday. Today, zero data in the target table. No errors. What happened?

DCR syntax error silently drops all data. No error messages, no alerts. Revert the transformation and verify data flows.
The table was deleted
The firewall stopped

8. Your forwarder VM disk is 95% full. Root cause and risk?

rsyslog is buffering because AMA cannot send (network, crash, or throttle). At 100%, rsyslog drops events = data loss. Fix the AMA connection; the buffer drains automatically.
Normal behavior — resize the disk
Too many log files

9. Your custom web app can POST JSON. Simplest ingestion approach?

Logs Ingestion API — custom table + DCR + app registration. No forwarder, no Functions, no CCP.
CCP connector
Syslog forwarder

10. Volume anomaly query shows SigninLogs at -85%. Priority?

Highest priority — fix immediately. Every minute without sign-in data means token replay, brute force, and impossible travel detections are blind.
Medium — investigate during the next maintenance window
Low — other tables are still flowing

11. Why run monitoring queries weekly instead of relying on the connector status page?

The connector status page shows "Connected" even when data has stopped flowing (Problem 1 in 6.6). The status indicates the connector configuration exists — not that data is actually arriving. Only table-level queries confirm actual data flow.
The status page updates too slowly
Queries are more accurate for billing

12. What is the detection-first principle and why does it matter for cost management?

Before connecting a data source, identify the specific analytics rules or investigation workflows that will use it. Data without detections is ingestion cost with no security return. This prevents the common failure of ingesting terabytes that no rule ever queries.
Build detections before deploying Sentinel
Only connect free data sources