In Microsoft Sentinel, Hunting queries are used to proactively search for threats and anomalies across collected security data. The requirement states that HuntingQuery1 must run automatically when the Hunting page of Microsoft Sentinel is accessed. According to Microsoft’s official Sentinel documentation, this behavior is achieved by adding the hunting query to “Favorites.”
When a query is marked as a favorite in the Sentinel Hunting blade, Sentinel automatically runs it every time the Hunting page is opened. This provides updated results without the need for manual execution, ensuring analysts always see the most current data for that query. This configuration also adheres to the organization’s requirement to minimize administrative effort, since it eliminates the need for scheduling, automation, or manual refresh actions.
Other options do not meet this functional requirement:
A. Add to a livestream is used to monitor near-real-time data streams, not to auto-run queries upon accessing the Hunting page.
B. Create a watchlist is used for referencing static external data sets (like IPs, users, or devices) inside KQL queries, not for automating hunting query execution.
C. Create an automation rule applies to incident management workflows, not hunting query execution.
Therefore, as per Microsoft Sentinel’s hunting documentation and best practices, the correct and verified answer is:
D. Add HuntingQuery1 to favorites.
Submit