Microsoft SC200 Certification - Microsoft Endpoint & eXtended Detection Response (EDR/XDR) Part 2D - Microsoft Defender for Cloud Apps (MDCA)
- brencronin
- 6 days ago
- 4 min read
Microsoft Defender for Cloud Apps (MDA)
Microsoft Defender for Cloud Apps (MDA) primarily focuses on discovering and assessing the applications used within your environment. It includes a risk rating system that evaluates app risk levels, enabling you to establish policies that restrict or allow the use of specific applications.
MDA also monitors for suspicious app behavior. For instance, consider an app like AZCopy, a Linux-based tool for transferring data from Azure. If an administrator were to use this tool to transfer unusually large amounts of data, MDA would flag this activity as an anomaly and generate an alert.
MDA also monitors the suspicious ways the apps are accessed and with premium the has the following sign-in risk detections that were covered in the discussion on Microsoft Entre ID protections.
Anonymous IP Address Usage
Impossible Travel
Mass Access to Sensitive Files
New Country
Suspicious inbox forwarding
Suspicious inbox manipulation rules
Additionally, MDA provides file monitoring capabilities to detect malicious content within cloud-based systems such as SharePoint, enhancing your organization's overall security posture.
Microsoft Defender for Cloud Apps (MDCA) Review Questions
Question 1
You want to receive an alert when a user signs in from a location they do not normally use. Which MDCA activity should you monitor?
A. Activity from risky IP
B. Activity from infrequent country
C. Impossible travel
D. Unusual file download
Correct Answer: B
Explanation: Activity from infrequent country detects sign-ins from locations not commonly associated with the user.
Question 2
You have a remote office and want to enforce MFA for all remote users using Conditional Access. What must you include in your solution?
A. A user risk policy
B. An activity policy
C. A named location
D. A session policy
Correct Answer: C
Explanation: Named locations are required to scope Conditional Access policies based on trusted or untrusted locations.
Question 3
You created a custom MDCA activity detection policy based on your organization’s IP address range. You receive frequent Impossible Travel alerts, but 99% are legitimate corporate traffic. Which two actions should you take to reduce false positives?
(Select two.)
A. Disable the policy
B. Configure automatic data enrichment
C. Create an activity policy exclusion for the corporate IP range
D. Tag the app as unsanctioned
Correct Answers: B and C
Explanation: Automatic data enrichment improves IP context, and IP exclusions prevent alerts from known corporate locations.
Question 4
You need MDCA to alert when confidential files are shared. Which actions should you perform in the Defender for Cloud Apps portal?
(Select two.)
A. Enable file monitoring
B. Enable automatic scanning for Azure Information Protection (AIP) labels
C. Create an anomaly detection policy
D. Configure a session policy
Correct Answers: A and B
Explanation: File monitoring and AIP integration are required to inspect files and detect sensitive content.
Question 5
You need to create a custom policy that detects connections to Microsoft 365 apps originating from botnet networks. Which configuration should you use?
A. Activity policy filtered by user agent
B. Anomaly detection policy filtered by IP address tag
C. File policy filtered by app type
D. Session policy with Conditional Access
Correct Answer: B
Explanation: Anomaly detection policies support filtering based on IP tags such as botnet networks.
Question 6
You do not have Microsoft Defender for Endpoint (MDE) but want to remediate risk from an unsanctioned app discovered in MDCA. What steps should you take?
(Select all that apply.)
A. Select the app in MDCA
B. Tag the app as unsanctioned
C. Generate a block script
D. Run the script on the network appliance
Correct Answers: A, B, C, and D
Explanation: Without MDE, blocking is enforced by deploying the generated script on the source appliance.
Question 7
You need to create an MDCA policy that generates alerts based on a trainable classifier. Which type of policy should you create?
A. Activity policy
B. Session policy
C. File policy
D. Anomaly detection policy
Correct Answer: C
Explanation: File policies support trainable classifiers and content inspection for sensitive data.
Question 8
You need to be notified when a user signs in from a risky IP address, and the user must also be notified. Which policy type should you create?
A. File policy
B. Session policy
C. Activity policy
D. App discovery policy
Correct Answer: C
Explanation: Activity policies generate alerts and support user and admin notifications.
Question 9
You plan to use an Azure Logic App to remediate risks detected in Microsoft Defender for Cloud (Azure Security Center). How do you test the solution?
(Select two.)
A. Configure the Logic App trigger for Defender for Cloud recommendations
B. Manually trigger the Logic App from workflow automation
C. Enable continuous export
D. Configure diagnostic settings
Correct Answers: A and B
Explanation: Defender for Cloud triggers and workflow automation are used to test Logic App remediation.
Question 10
You need Defender for Cloud to generate alerts for suspicious sign-ins. Which three steps are required?
(Select three.)
A. Enable Azure Defender for the subscription
B. Deploy the ASC alert test executable
C. Rename the executable to asc_alerttest_662jfi039n
D. Run the executable with the appropriate arguments
E. Enable regulatory compliance
Correct Answers: A, C, and D
Explanation: Enabling Defender and executing the alert test validates alert generation.
Question 11
The SecOps team reports they are not receiving alert notification emails from Defender for Cloud. What should you configure?
A. Workflow automation
B. Pricing and settings
C. Continuous export
D. Security policies
Correct Answer: B
Explanation: Email notifications are configured under Pricing and settings in Defender for Cloud.
Question 12
You receive an alert in Defender for Cloud. To review remediation recommendations, you open Regulatory compliance and download a report. Does this meet the goal?
A. Yes
B. No
Correct Answer: B
Explanation: Regulatory compliance reports do not provide alert-specific remediation guidance.
Question 13
You receive an alert in Defender for Cloud. You select Take action and expand the Mitigate the threat section to view remediation steps. Does this meet the goal?
A. Yes
B. No
Correct Answer: A
Question 14
Which MDCA policy types should you use for the following requirements?
Detect unusual activity
Scan cloud apps for specific data
Search and log unusual occurrences across cloud apps
Correct Answer:
Detect unusual activity → Anomaly detection policy
Scan for specific data → File policy
Log and search cloud app usage → App discovery policy
References:
Defender for Cloud Apps:

Comments