CertNova
Menu
← Back to PBQ types

Log Analysis PBQs: Exam AZ-500: Microsoft Azure Security Technologies

easy

Question 1 of 3

You are an Azure security engineer who received a Microsoft Sentinel alert indicating a potential brute-force attack against an Azure AD user account. The alert fired about 15 minutes ago. Your team has asked you to review the Azure AD sign-in logs and Defender alerts in your Sentinel workspace to confirm the attack, identify the scope, and recommend a response. Flag all entries related to the brute-force activity and answer the incident questions.

Objectives

  • Review the Azure AD sign-in logs and Defender alerts for suspicious authentication activity
  • Flag all log entries related to the brute-force attack
  • Classify the type of security incident
  • Identify the attacker's source IP address
  • Recommend the most appropriate immediate response action

Security Event Log

FlagTimeSeveritySourceMessage
08:00:00INFOauthSign-in success: user:sarah.chen@contoso.com from 10.0.1.55 -- Azure Portal -- managed device
08:05:00INFOactivity-logMicrosoft.Compute/virtualMachines/read called by sarah.chen@contoso.com -- listing VMs in rg-production
08:10:00WARNauthSign-in failure: user:j.rodriguez@contoso.com from 203.0.113.91 -- error: AADSTS50126 Invalid credentials (attempt 1)
08:10:05WARNauthSign-in failure: user:j.rodriguez@contoso.com from 203.0.113.91 -- error: AADSTS50126 Invalid credentials (attempt 2)
08:10:10WARNauthSign-in failure: user:j.rodriguez@contoso.com from 203.0.113.91 -- error: AADSTS50126 Invalid credentials (attempt 3)
08:10:15WARNauthSign-in failure: user:j.rodriguez@contoso.com from 203.0.113.91 -- error: AADSTS50126 Invalid credentials (attempt 4)
08:10:20ALERTauthSign-in failure: user:j.rodriguez@contoso.com from 203.0.113.91 -- error: AADSTS50126 Invalid credentials (attempt 5)
08:10:25ALERTauthAccount lockout: user:j.rodriguez@contoso.com -- Smart Lockout triggered after 5 failed attempts from 203.0.113.91
08:10:30ALERTdefenderBrute-force attack detected: 5 failed sign-ins in 30s targeting j.rodriguez@contoso.com from IP 203.0.113.91 (location: external)
08:12:00INFOactivity-logMicrosoft.Storage/storageAccounts/listKeys/action called by app:backup-automation -- storage account: stprodbackups
08:15:00INFOauthSign-in success: user:m.kumar@contoso.com from 10.0.2.30 -- Teams client -- managed device
08:18:00INFOactivity-logMicrosoft.KeyVault/vaults/read called by sarah.chen@contoso.com -- vault: kv-prod-secrets
08:20:00INFOactivity-logMicrosoft.Sql/servers/databases/read called by app:monitoring-service -- database: sqldb-analytics

13 total entries. Click a row or use checkboxes to flag suspicious events.

Incident Analysis

Progress

0 of 10 items correct

Flag suspicious entries and answer the incident questions

0 of 3 marked complete