🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 1
Domain 1 — Module 5 of 12 42%
5 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 1: Manage a Security Operations Environment Premium ⏱ ~11 min read

Attack Surface Reduction & Security Policies

Reduce the attack surface before threats arrive. Learn how to configure ASR rules, security policies, and endpoint hardening in Microsoft Defender for Endpoint.

What is attack surface reduction?

☕ Simple explanation

Think of your house. You have a front door, a back door, 12 windows, a garage, and a dog flap. Each one is a way someone could get in.

Attack Surface Reduction (ASR) is like locking the windows you never open, sealing the dog flap you don’t use, and putting a deadbolt on the back door. You reduce the number of ways an attacker can get in — without bricking the front door that everyone uses.

In MDE, ASR rules block specific behaviours that attackers commonly exploit: Office apps spawning child processes, scripts downloading executables, credential theft from LSASS. Each rule targets a known attack technique and can be set to Block, Audit, or Warn.

Attack Surface Reduction (ASR) rules are a set of configurable policies in Microsoft Defender for Endpoint that prevent common attack techniques at the endpoint level. They operate at the OS level, intercepting specific behaviours before they execute.

ASR rules are deployed via Microsoft Intune, Group Policy, or PowerShell, and each rule can be set to one of four modes: Block (prevent the action), Audit (log the action but allow it), Warn (show a warning the user can bypass), or Not configured (disabled).

For SC-200, you need to understand which ASR rules protect against which attack vectors, how to deploy them, and how to use audit mode for safe rollout.

Common ASR rules

Microsoft provides dozens of ASR rules. Here are the most commonly tested:

ASR RuleWhat It BlocksAttack It Prevents
Block Office apps from creating child processesWord, Excel, PowerPoint spawning cmd.exe, PowerShell, etc.Macro-based malware delivery
Block Office apps from injecting code into other processesOffice using CreateRemoteThread or similar injectionProcess hollowing, code injection
Block executable content from email client and webmailRunning .exe, .dll, .scr from Outlook or browser-based emailEmail-delivered malware
Block credential stealing from LSASSAccessing the LSASS process memoryCredential dumping (Mimikatz)
Block JavaScript or VBScript from launching downloaded contentScripts executing payloads they downloadedDrive-by downloads, script-based attacks
Block persistence through WMI event subscriptionWMI-based persistence mechanismsFileless malware persistence
Block process creations from PSExec and WMI commandsRemote execution via PsExec or WMICLateral movement
Use advanced protection against ransomwareHeuristic checks on file behaviourRansomware encryption
💡 Exam tip: audit mode first

Never deploy ASR rules in Block mode without testing. The recommended rollout is:

  1. Audit mode — rules log events but do not block (2-4 weeks minimum)
  2. Review audit data — identify false positives (legitimate apps being flagged)
  3. Create exclusions for line-of-business apps that trigger false positives
  4. Switch to Block — rules actively prevent the behaviour

The exam may ask “what should you do before enforcing ASR rules?” The answer is always: deploy in audit mode first and review the data.

ASR deployment methods

Intune is preferred for cloud-managed environments; Group Policy for on-premises
MethodMicrosoft IntuneGroup PolicyPowerShell
Best forCloud-managed devices (Entra joined)Domain-joined on-prem devicesTesting, scripting, quick changes
ManagementEndpoint security policies in Intune portalComputer Configuration > Admin Templates > Windows Components > Microsoft Defender AntivirusSet-MpPreference cmdlet
TargetingDevice groups, Entra groups, filtersOUs, security groups via GPO linkingPer-machine or via script deployment
ReportingDefender XDR reports, Intune complianceEvent Viewer + Defender XDREvent Viewer + manual collection

Security policies beyond ASR

ASR rules are part of a broader set of security policies you configure in MDE:

Endpoint detection and response (EDR) settings

  • Sample submission — whether MDE sends suspicious files to Microsoft for analysis
  • Telemetry level — how much data the MDE sensor collects
  • Block at first sight — cloud protection blocks new threats immediately while analysis completes

Firewall policies

  • Windows Defender Firewall rules deployed via Intune
  • Inbound/outbound rules applied per network profile (Domain, Private, Public)

Antivirus policies

  • Cloud-delivered protection — real-time lookup against Microsoft’s cloud
  • Potentially unwanted application (PUA) protection — blocks adware and bundled software
  • Scan schedules — full scan, quick scan, custom schedules
💡 Scenario: James deploys ASR across Pacific Meridian

James at Pacific Meridian needs to deploy ASR rules across 10,000 devices. His approach:

Phase 1 (Week 1-2): Deploy all ASR rules in Audit mode via Intune endpoint security policies. Target: All devices.

Phase 2 (Week 3-4): Review ASR audit data in Defender XDR reports. Findings:

  • Finance team’s macro-heavy Excel workbooks trigger “Block Office from creating child processes” — adds exclusion for the specific workbook path
  • Dev team’s build tools trigger “Block process creations from PSExec” — adds exclusion for the build server IP range

Phase 3 (Week 5): Switch to Block mode for all rules except the two with exclusions. Those stay in Warn mode while the teams migrate to safer alternatives.

Ongoing: Monthly review of ASR telemetry for new false positives and new rules from Microsoft.

Question

What are the four modes for ASR rules?

Click or press Enter to reveal answer

Answer

1. Block — prevents the action entirely. 2. Audit — logs the action but allows it (for testing). 3. Warn — shows a warning the user can bypass. 4. Not configured — rule is disabled. Always start with Audit before moving to Block.

Click to flip back

Question

Which ASR rule prevents credential dumping tools like Mimikatz?

Click or press Enter to reveal answer

Answer

'Block credential stealing from the Windows local security authority subsystem (LSASS).' This rule prevents processes from reading the LSASS memory, which stores cached credentials.

Click to flip back

Question

What is the recommended deployment method for ASR rules on cloud-managed devices?

Click or press Enter to reveal answer

Answer

Microsoft Intune endpoint security policies. Intune allows targeting by device groups, Entra groups, and filters, with built-in reporting through Defender XDR and Intune compliance dashboards.

Click to flip back

Knowledge Check

James is deploying ASR rules at Pacific Meridian. The finance team reports that their critical Excel workbooks with macros stopped working after ASR rules were applied. What is the best approach?

Knowledge Check

An analyst at Sentinel Shield notices that a new ASR rule 'Block persistence through WMI event subscription' is available. How should Anika deploy it?

🎬 Video coming soon

Next up: Endpoints are hardened. Now let’s tune the alerts — configure email notifications and alert suppression so your SOC focuses on what matters.

← Previous

Defender for Endpoint: Core Setup

Next →

Defender XDR: Tune Your Alerts

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.