Topic: SC-200 topic 1 question 21

You are configuring Microsoft Cloud App Security.
You have a custom threat detection policy based on the IP address ranges of your company's United States-based offices.
You receive many alerts related to impossible travel and sign-ins from risky IP addresses.
You determine that 99% of the alerts are legitimate sign-ins from your corporate offices.
You need to prevent alerts for legitimate sign-ins from known locations.
Which two actions should you perform? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.

A.
Configure automatic data enrichment.
B.
Add the IP addresses to the corporate address range category.
C.
Increase the sensitivity level of the impossible travel anomaly detection policy.
D.
Add the IP addresses to the other address range category and add a tag.
E.
Create an activity policy that has an exclusion for the IP addresses.

Re: SC-200 topic 1 question 21

This answer looks wrong and since there is no reference link to support it I challenge it. To me the correct answer is B,E.

Re: SC-200 topic 1 question 21

For me also BE
add Ip to corporate or exclude IP address from alert

Re: SC-200 topic 1 question 21

I echo your thoughts, I can get a few hints to support your answer at below location:

https://docs.microsoft.com/en-us/cloud-app-security/investigate-anomaly-alerts

Re: SC-200 topic 1 question 21

It is clearly B and E. It is evident here in the Microsoft Learn documentation in the link that you provided AlaReAla. "This detection uses a machine learning algorithm that ignores obvious B-TP conditions, such as when the IP addresses on both sides of the travel are considered safe, the travel is trusted and excluded from triggering the Impossible travel detection. For example, both sides are considered safe if they are tagged as corporate. However, if the IP address of only one side of the travel is considered safe, the detection is triggered as normal." which about 20 percent down on the page under Impossible Travel. I hope this helps.

Re: SC-200 topic 1 question 21

At least B makes sense as the question reads a custom policy based on a custom IP range is in place. So false positive alerts that are generated by activity from the offices would be solved by adding their IP ranges in the custom IP range used in the policy..

Re: SC-200 topic 1 question 21

https://docs.microsoft.com/en-us/cloud-app-security/ip-tags

Re: SC-200 topic 1 question 21

Apologies, the answer provided is correct. I just know checked the site myself and the options exist, you add the IP address range and a tag and then you check to override the data enrichment by providing a location that goes along with that IP range.

So, A & D stand correct.

Re: SC-200 topic 1 question 21

https://docs.microsoft.com/en-us/defender-cloud-apps/api-data-enrichment

Re: SC-200 topic 1 question 21

A - this seems correct, as if you override the automatic detection of location for company IP address ranges, you can prevent the impossible travel alerts.
B - This makes sense as you need to define your corporate address ranges so that they are not seen as risky.
C - Increasing the sensitivity of the impossible travel detection would create more alerts.
D - Why would you set the IP addresses to the "Other" category when there is a "Corporate" category that fits the description?
E - Creating a new policy when there is already an existing one that you need to reduce the alerts from, would not reduce the number of alerts.

Re: SC-200 topic 1 question 21

Best answer IMHO. Stop (it says configure, it should say untick) the enrichment (for the impossible travel) add the addresses of your US offices, part of your company, to the corporate range.

Re: SC-200 topic 1 question 21

This question was in the exam 27/04/2024.

Re: SC-200 topic 1 question 21

Based on the below information published here: https://learn.microsoft.com/en-us/defender-cloud-apps/ip-tags#create-an-ip-address-range

Corporate: These IPs should be all the public IP addresses of your internal network, your branch offices, and your Wi-Fi roaming addresses.

Re: SC-200 topic 1 question 21

correct A and D

Re: SC-200 topic 1 question 21

Only B seems to be the correct option as you can see the explanations of the difference "categories" here:
https://learn.microsoft.com/en-us/defender-cloud-apps/ip-tags#create-an-ip-address-range

Re: SC-200 topic 1 question 21

B & C seem to be the only "available" configuration settings.

C.
Impossible Travel: https://security.microsoft.com/cloudapps/policy/anomaly/60253687a702c5eb0e8d86ca
Apart from increasing or decreasing Sensitivity (or excluding certain users), there is no other filter available. The answer option C should be corrected to "Decrease the sensitivity" and then it is the right answer ;-)

B.
Logon from Risky IP: https://security.microsoft.com/cloudapps/policy/activity/create?template=5b3116e1996fe317b4a1b25e
This looks at "Risky" category IP addresses only, so if the offices IPs are added to "Corporate" category or "Other" category, they go automatically out of scope for this policy. So even option D. can be considered a correct answer.

A. is irrelevant as "User enrichment" is the only "enrichment" related setting found: https://security.microsoft.com/cloudapps/settings?tabid=discovery-userEnrichment
E. is unnecessary as explained in B. above

Re: SC-200 topic 1 question 21

A, B appear to be the best answers.

Re: SC-200 topic 1 question 21

To prevent alerts for legitimate sign-ins from known locations, you need to perform the following two actions:

B. Add the IP addresses to the corporate address range category. This action allows you to define the IP address ranges that belong to your organization and exclude them from anomaly detection policies such as impossible travel or sign-ins from risky IP addresses. You can add the IP addresses of your company’s United States-based offices to the corporate address range category in the Microsoft 365 Defender portal, under Cloud Apps,
E. Create an activity policy that has an exclusion for the IP addresses. This action allows you to create a custom alert based on user activities and apply filters or exclusions to refine the results

Re: SC-200 topic 1 question 21

C: No way to adjust
D: Doesn't make sense
E: Not possible to exclude the IP totally

Re: SC-200 topic 1 question 21

Yes B & E is correct

Re: SC-200 topic 1 question 21

B. Add the IP addresses to the corporate address range category.
E. Create an activity policy that has an exclusion for the IP addresses.

Explanation:

B. Add the IP addresses to the corporate address range category: By adding the IP addresses of your company's United States-based offices to the corporate address range category, you inform Microsoft Cloud App Security that these IP addresses are trusted and belong to your organization. This helps to avoid unnecessary alerts for legitimate sign-ins from these known locations.

E. Create an activity policy that has an exclusion for the IP addresses: By creating an activity policy and excluding the IP addresses of your United States-based offices, you can specify that alerts related to sign-ins from these locations should not be generated. This action ensures that legitimate sign-ins from your corporate offices are not considered as risky or impossible travel, thus reducing the number of unnecessary alerts.

The other options (A, C, and D) are not directly related to preventing alerts for legitimate sign-ins from known locations

Re: SC-200 topic 1 question 21

On exam - 19 June 2023

Re: SC-200 topic 1 question 21

Should be A and E.
B - They already stated that the IP's were added as corporate IP's
C - Would give even more false positives if that should work you should DE-crease the sensitivity
D - Why should you add it to another catagory, we're talking about the corporate which exists

Answered by a Microsoft guy here:
https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/corporate-ip-amp-impossible-travel-issues/m-p/1150332

Re: SC-200 topic 1 question 21

I don't think that's the same question. This question isn't referring to switching back and forth between offices. The MS question and answer is stating that users are switching between the two.

Re: SC-200 topic 1 question 21

Add the IP addresses to the other address range category and add a tag.