For Linux alert simulation in Defender for Cloud, you first copy /bin/echo to a test file named asc_alerttest_662jfi039n, then execute it with the parameters testing eicar pipe. This sequence generates a benign test alert that validates the Defender for Cloud pipeline. The options using ./alerttest are incorrect file names and won’t trigger the simulation.QUESTION NO: 8
You create an Azure subscription named sub1.
In sub1, you create a Log Analytics workspace named workspace1.
You enable Azure Security Center and configure Security Center to use workspace1.
You need to ensure that Security Center processes events from the Azure virtual machines that report to workspace1.
What should you do?
A.In workspace1, install a solution.
B.In sub1, register a provider.
C.From Security Center, create a Workflow automation.
D.In workspace1, create a workbook.
Answer: A
When configuring Microsoft Defender for Cloud (formerly Azure Security Center) to use a specific Log Analytics workspace, you must ensure the Security solution is installed in that workspace so that security events from VMs reporting to the workspace are processed by Defender for Cloud. Registering a provider, creating workflow automations, or creating a workbook do not enable data processing for recommendations/alerts; installing the solution (now surfaced as the Defender for Cloud agent/solution enablement) does.