🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 1
Domain 1 — Module 7 of 12 58%
7 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 1: Manage a Security Operations Environment Premium ⏱ ~13 min read

Automated Investigation & Attack Disruption

Let the machines do the heavy lifting. Learn how Automated Investigation and Response (AIR) works, configure automatic attack disruption, and manage device groups with proper automation levels.

Why automate investigation?

☕ Simple explanation

Imagine a hospital emergency room with 200 patients arriving every hour. Doctors cannot examine every patient individually — they need triage nurses to handle the obvious cases and escalate only the complex ones.

Automated Investigation and Response (AIR) is your triage nurse. When an alert fires, AIR automatically investigates — checks the evidence, determines the scope, and either remediates the threat or escalates to an analyst for approval. It handles the repetitive work so your SOC team focuses on the hard stuff.

Automatic attack disruption goes further — it does not wait for investigation to complete. If Defender XDR detects an active attack in progress (ransomware spreading, business email compromise), it immediately contains the threat by isolating devices or disabling compromised accounts.

Automated Investigation and Response (AIR) in Microsoft Defender XDR automatically analyses alerts by examining entities (files, processes, URLs, users, devices), correlating evidence, and recommending or executing remediation actions. AIR uses Microsoft’s threat intelligence and behavioural models to determine verdicts.

Automatic attack disruption is a real-time containment capability that activates when Defender XDR’s AI identifies a high-confidence active attack. It takes immediate containment actions — device isolation, user account suspension — without waiting for human approval. This is critical for fast-moving attacks like human-operated ransomware and BEC.

Both capabilities are governed by automation levels set per device group, and pending actions require analyst approval depending on the configured level.

How AIR works

When an alert triggers, AIR runs an automated investigation playbook:

  1. Alert triggers → AIR starts automatically (for supported alert types)
  2. Evidence collection → examines files, processes, registry keys, network connections, user activities
  3. Verdict determination → classifies each entity as Malicious, Suspicious, Clean, or No threats found
  4. Remediation actions → proposes or executes actions based on the automation level

Common AIR remediation actions

ActionWhat It DoesRequires Approval?
Quarantine fileMoves a malicious file to quarantineDepends on automation level
Stop processTerminates a running malicious processDepends on automation level
Remove registry keyDeletes a malicious persistence mechanismDepends on automation level
Isolate deviceCuts network access (keeps Defender connection)Depends on automation level
Block URL/IPAdds a network indicator to block accessDepends on automation level
Disable user accountTemporarily disables a compromised Entra ID accountDepends on automation level

Automation levels

Automation levels control how much freedom AIR has to act without human approval. You set these per device group.

Microsoft defines five automation levels, not just “auto or manual”:

LevelWhat HappensBest For
Full — remediate threats automaticallyAll remediation actions execute without approvalProduction endpoints, well-tuned environments
Semi — require approval for all foldersAll file/folder remediation needs analyst approvalNew deployments, testing phase
Semi — require approval for core foldersRemediation in OS-critical folders (e.g., \Windows\, \Program Files\) needs approval; other folders auto-remediateBalanced — protect OS folders, auto-handle user directories
Semi — require approval for non-temp foldersOnly temp folder remediation is automatic; everything else needs approvalConservative — minimal auto-remediation
No automated responseNo automated investigation runs at all — fully manualHigh-sensitivity devices (domain controllers, executive laptops)

Key distinction: The “core folders” and “non-temp folders” levels refer to file path locations, not action types. “Core folders” means Windows system directories.

💡 Exam tip: default is Full automation

New Microsoft 365 tenants default to Full automation. The exam may ask what happens if no automation level is configured — the answer is that remediation actions execute automatically.

If a question describes wanting to review actions before execution, the answer is one of the Semi levels. Pay attention to whether the question specifies OS folders, all folders, or non-temp folders — each maps to a different Semi level.

Also note: No automated response means the investigation itself does not run — not just that remediation is skipped.

Device groups

Device groups organise endpoints into logical collections for targeted policies. Each group gets its own automation level, access permissions, and priority.

Device group configuration

SettingPurpose
NameDescriptive label (e.g., “Finance Servers”, “Executive Devices”)
Automation levelFull, Semi (approve any/core), or No automation
MembersDynamic membership based on device tags, OS, domain, or name patterns
PriorityWhen a device matches multiple groups, highest priority wins
User accessWhich Defender XDR user groups can view/manage devices in this group
💡 Scenario: James structures device groups at Pacific Meridian

James creates five device groups:

  1. Domain Controllers — No automation (too critical for auto-remediation). Only senior analysts can access. Priority: 1 (highest)
  2. Executive Devices — Semi (approve core). James and Sarah review actions. Priority: 2
  3. Finance Servers — Semi (approve any). Compliance requires audit trail of all actions. Priority: 3
  4. Standard Workstations — Full automation. 8,000 devices, handled automatically. Priority: 4
  5. BYOD — Full automation. Less trust, more aggressive auto-remediation. Priority: 5

When a device matches multiple groups (e.g., an executive’s laptop that is also a standard workstation), priority determines the winner — Executive Devices (priority 2) wins.

Automatic attack disruption

Attack disruption is different from AIR — it acts in real-time during an active attack, not after investigation.

What triggers disruption

Defender XDR’s AI engine identifies high-confidence attack patterns:

  • Human-operated ransomware — encryption spreading across devices
  • Business email compromise (BEC) — attacker using a compromised mailbox
  • Adversary-in-the-middle (AiTM) — session token theft and replay

Disruption actions

ActionWhen It Fires
Contain deviceDevice is actively spreading ransomware or lateral movement
Contain userCompromised account being used for BEC or credential abuse
Disable user in Entra IDHigh-confidence account compromise with active abuse

These actions happen within minutes of detection — before most SOC teams could even triage the alert.

💡 Exam tip: disruption vs AIR

Attack disruption and AIR are related but different:

  • AIR = post-alert investigation and remediation (minutes to hours)
  • Attack disruption = real-time containment of active attacks (seconds to minutes)

Attack disruption does NOT wait for an investigation to complete. It is designed for time-critical scenarios where delay means damage.

The exam may describe an active ransomware attack and ask “what stops the spread fastest?” — the answer is automatic attack disruption, not AIR.

Question

What is the default automation level for new Microsoft 365 tenants?

Click or press Enter to reveal answer

Answer

Full — remediate threats automatically. All AIR remediation actions execute without analyst approval. To require approval, change the device group to one of the three Semi levels (all folders, core folders, or non-temp folders). 'No automated response' disables the investigation entirely.

Click to flip back

Question

What is the difference between AIR and automatic attack disruption?

Click or press Enter to reveal answer

Answer

AIR investigates alerts after they fire and remediates based on findings (minutes to hours). Attack disruption detects active attacks in real-time and immediately contains the threat — isolating devices or disabling accounts — within seconds to minutes, without waiting for investigation.

Click to flip back

Question

If a device matches two device groups with different automation levels, which one applies?

Click or press Enter to reveal answer

Answer

The device group with the highest priority (lowest number) wins. Priority determines which group's automation level, access permissions, and policies apply when there is overlap.

Click to flip back

Knowledge Check

Pacific Meridian experiences a ransomware attack spreading across workstations. Within 3 minutes, Defender XDR automatically isolates the affected devices. What feature stopped the attack?

Knowledge Check

James wants domain controllers at Pacific Meridian to require manual analyst review for ALL remediation actions. Which automation level should he configure for the Domain Controllers device group?

Knowledge Check

Pacific Meridian experiences a BEC attack. Attack disruption disables the compromised CFO account and isolates 2 devices. James finds that the attacker also created an OAuth app with Mail.ReadWrite permissions 6 hours before disruption fired. The app is still active. What should James prioritise FIRST?

🎬 Video coming soon

Next up: Investigation is automated. Now let’s automate the response — Sentinel automation rules and playbooks take action when incidents match your criteria.

← Previous

Defender XDR: Tune Your Alerts

Next →

Sentinel Automation: Rules & Playbooks

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.