Microsoft Defender XDR
Defender XDR is your security operations centre in a box. It detects threats across email, endpoints, identity, and cloud apps β and connects the dots between them.
What is Defender XDR?
Think of Defender XDR as a team of security guards watching different parts of a building β but they all talk to each other.
One guard watches the mailroom (Defender for Office 365 β catches phishing emails). Another watches the computer lab (Defender for Endpoint β detects malware on devices). A third watches the front desk (Defender for Identity β spots suspicious logins). And a fourth watches the third-party shops in the building (Defender for Cloud Apps β monitors SaaS apps).
What makes XDR special: when one guard spots something suspicious, they automatically alert the others. A phishing email (mailroom) that leads to malware (computer lab) that triggers a suspicious login (front desk) β XDR connects all three into ONE incident.
The Defender XDR family
| Feature | What It Protects | Key Capabilities |
|---|---|---|
| Defender for Office 365 | Email and collaboration (Outlook, Teams, SharePoint) | Anti-phishing, anti-malware, safe attachments, safe links, BEC detection |
| Defender for Endpoint | Devices (Windows, Mac, Linux, mobile) | Endpoint detection and response (EDR), vulnerability management, attack surface reduction |
| Defender for Identity | On-premises Active Directory | Lateral movement detection, compromised credential alerts, reconnaissance activity |
| Defender for Cloud Apps | SaaS applications (M365 + third-party) | Shadow IT discovery, app governance, session controls, anomaly detection |
Key exam concept: The exam tests whether you know which Defender component protects which area. The mnemonic: Office = email, Endpoint = devices, Identity = sign-ins, Cloud Apps = SaaS applications.
How XDR connects the dots
The power of XDR is correlation. A single attack often crosses multiple domains:
- π§ Phishing email arrives (Defender for Office 365 detects it)
- π User clicks the link β malware downloaded (Defender for Endpoint detects it)
- π Malware steals credentials β suspicious login from new location (Entra ID Protection flags impossible travel)
- π€ Attacker uses stolen credentials to access SharePoint (Defender for Cloud Apps detects it)
Without XDR: 4 separate alerts in 4 separate tools. The admin might not connect them. With XDR: 1 correlated incident showing the full attack chain. The admin sees the complete picture.
Scenario: Northwave stops an attack
Jordan (Northwaveβs CISO) gets ONE incident alert in the Defender portal:
Incident: Credential phishing leading to data exfiltration
- π§ Email from βIT Supportβ with a fake password reset link β blocked by Safe Links
- π» 3 users clicked before Safe Links kicked in β Defender for Endpoint quarantined malware
- π 1 userβs credentials were captured β Entra ID Protection flagged impossible travel (login from Auckland then London in 10 minutes)
- π Attacker accessed 5 SharePoint files before being blocked β Defender for Cloud Apps session terminated
XDR automated response: Blocked the attackerβs IP, forced password reset for affected user, quarantined the phishing email from all inboxes.
Total time from first email to full containment: 4 minutes. Without XDR, this could have taken hours with separate tools.
Threat intelligence
Microsoftβs threat intelligence comes from:
- Microsoft Threat Intelligence Center (MSTIC) β tracks nation-state actors
- Trillions of signals daily β from Windows, Azure, M365, Bing, LinkedIn
- Dark web monitoring β checks if your organisationβs credentials appear in breaches
This intelligence feeds into Defender XDR automatically β you donβt configure it, but itβs important to know it exists for the exam.
π¬ Video walkthrough
π¬ Video coming soon
Microsoft Defender XDR β AB-900 Module 8
Microsoft Defender XDR β AB-900 Module 8
~9 minFlashcards
Knowledge Check
A phishing email is sent to 50 Northwave employees. 5 users click the link and download malware. 1 user's credentials are stolen and used to access SharePoint files. Which Defender XDR components are involved in detecting this attack chain?
Next up: Microsoft Entra β the identity and access management hub that controls who gets in and what they can do.