What filter should you apply in Microsoft Defender XDR to focus on incidents from phishing attacks?

Disable ads (and more) with a premium pass for a one time $4.99 payment

Enhance your cybersecurity skills with the Microsoft Security Operations Analyst (SC-200) Exam. Explore topics with multiple choice questions and detailed explanations. Prepare effectively and become a certified Security Operations Analyst!

To effectively focus on incidents arising specifically from phishing attacks in Microsoft Defender XDR, applying the correct filters is crucial. The best approach is to filter by the active status of incidents, the relevant service source, and the specific category of the incidents.

Filtering for "Service sources: Microsoft Defender for Office 365" is important because this service directly pertains to email security, which is critical in mitigating phishing threats that often originate from malicious email communications. However, without including the category that specifically denotes incidents related to phishing, such as "Categories: Phishing," the results may encompass other types of incidents that aren't relevant to the user's immediate focus on phishing.

The option that includes both the service source and the category related to phishing will ensure a more refined result, making it easier for analysts to prioritize and respond to actual phishing threats. Thus, B provides a targeted and relevant outcome by ensuring that the resulting incidents are both from the appropriate service and specifically categorized as phishing threats. This level of specificity is necessary in security operations to streamline investigations and remediation efforts effectively.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy