πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 1
Domain 1 β€” Module 12 of 12 100%
12 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 1: Manage a Security Operations Environment Premium ⏱ ~10 min read

Detection Engineering: Putting It All Together

Detections, analytics, threat intel, and MITRE coverage β€” here is how they all connect into one unified detection strategy for your SOC.

The detection engineering mindset

β˜• Simple explanation

You have built the entire security alarm system. Cameras are recording (data connectors). Sensors are placed on doors and windows (analytics rules). You know the burglar’s playbook (MITRE ATT&CK). Motion detectors catch unexpected movement (anomaly rules).

But an alarm system is only as good as how it all works together. If the camera in the garage is recording but no sensor is watching it, you have a blind spot. If every sensor triggers the same alarm, your team cannot prioritise.

Detection engineering is the discipline of making all these pieces work as one system β€” no gaps, no redundancy, no noise. This module ties together everything from Domain 1.

Detection engineering is the practice of designing, building, testing, and maintaining threat detections across a security operations platform. In the SC-200 context, it spans both Defender XDR (custom detections) and Sentinel (analytics rules, TI, anomalies).

A mature detection engineering practice includes: a detection catalogue mapped to MITRE ATT&CK, a development lifecycle (write β†’ test β†’ tune β†’ deploy β†’ review), coverage analysis with gap remediation, and continuous improvement based on incident learnings and threat landscape changes.

The unified detection stack

Here is how all the detection components connect:

LayerToolWhat It DoesData Source
Defender XDR custom detectionsAdvanced Hunting queriesDetect endpoint, email, identity, and cloud app threatsDefender tables
Sentinel scheduled rulesKQL queries on scheduleDetect threats across ALL ingested dataAny workspace table
Sentinel NRT rulesFast KQL queriesTime-critical single-table detectionsSingle workspace table
TI matchingAutomatic indicator correlationMatch known-bad IOCs against log dataThreatIntelligenceIndicator + log tables
Anomaly rulesStatistical baseline deviationCatch unknown behavioural anomaliesBehavioural data (logins, access, transfers)
MITRE ATT&CKCoverage analysisIdentify detection gapsAll of the above
SOC optimizationRecommendations engineSuggest improvementsWorkspace configuration

Where each detection type excels

Different threats need different detection methods
Threat TypeBest DetectionWhy
Known malware hashTI matchingAutomatic indicator correlation β€” no query needed
Brute force attackScheduled analytics ruleNeeds aggregation (count failed logins) across a time window
Admin account login from new countryNRT ruleTime-critical, single table, simple logic
PowerShell downloading executablesDefender XDR custom detectionEndpoint-specific, needs DeviceProcessEvents table
Insider using valid creds at unusual hoursAnomaly ruleNo known pattern β€” deviation from learned baseline
Ransomware spreading across networkAutomatic attack disruptionReal-time containment β€” faster than any analytics rule

The detection development lifecycle

Detection engineering is not β€œset and forget.” It follows a lifecycle:

1. Identify the threat

Start with a MITRE technique, a threat intelligence report, or an incident learning.

2. Write the detection

Create a KQL query in Advanced Hunting (for Defender) or the Sentinel query editor.

3. Test against historical data

Run the query against past data to check:

  • Does it catch known incidents? (true positives)
  • Does it fire on normal activity? (false positives)
  • What is the expected alert volume?

4. Deploy in production

Save as a custom detection or analytics rule with appropriate frequency, severity, and entity mapping.

5. Tune continuously

Monitor the rule over 2-4 weeks:

  • Suppress or exclude known false positives
  • Adjust thresholds if too noisy or too quiet
  • Update the query as the threat evolves

6. Review and retire

Periodically review all detections:

  • Are they still relevant? (threats change)
  • Are they generating value? (incidents that analysts act on)
  • Can they be replaced by better detections?
πŸ’‘ Scenario: Anika's monthly detection review

Anika at Sentinel Shield runs a monthly detection engineering review:

  1. MITRE coverage audit β€” check for new gaps (new data sources may have created yellow cells)
  2. Noise review β€” top 10 noisiest rules. Any generating more than 50 alerts/week? Tune or suppress.
  3. Missed detections β€” review incidents discovered by hunting, not by rules. Can a rule be written to catch this next time?
  4. TI health β€” are threat feeds active? Any expired indicators not replaced?
  5. SOC optimization β€” review Sentinel’s recommendations and action the top 3

This monthly cycle ensures detection coverage improves over time rather than degrading.

Domain 1 summary

You have now covered the full scope of Manage a Security Operations Environment (40-45% of the exam):

AreaWhat You LearnedKey Modules
Sentinel workspaceRoles, retention tiers, workbooks, SOC optimizationModule 1
Data ingestionWindows events, Syslog, CEF, Azure activities, custom tablesModules 2-3
Defender for EndpointAdvanced features, rules, ASR, security policiesModules 4-5
Alert managementNotifications, tuning, suppression, correlationModule 6
AutomationAIR, attack disruption, device groups, automation rules, playbooksModules 7-8
Detection engineeringCustom detections, analytics rules, TI, MITRE, anomaliesModules 9-12
πŸ’‘ Exam strategy: Domain 1 key concepts

Domain 1 is the heaviest domain (40-45%). Focus on:

  • Sentinel roles β€” know the hierarchy (Reader β†’ Responder β†’ Contributor)
  • Data retention tiers β€” Analytics vs Data lake vs XDR
  • AMA vs WEF β€” when to use which
  • Automation levels β€” Full, Semi, No automation
  • NRT vs scheduled β€” speed vs complexity trade-off
  • MITRE ATT&CK β€” how to identify and close coverage gaps
  • Suppression vs disabling β€” always suppress, never disable unless the detection is wrong
Question

What is the detection development lifecycle?

Click or press Enter to reveal answer

Answer

1. Identify the threat (MITRE, TI report, incident learning). 2. Write the detection (KQL query). 3. Test against historical data (check true positives, false positives). 4. Deploy in production (save as rule with severity and entities). 5. Tune continuously (suppress FPs, adjust thresholds). 6. Review and retire (periodic relevance check).

Click to flip back

Question

A brute force attack needs aggregation across failed logins. Which detection type handles this best?

Click or press Enter to reveal answer

Answer

A Sentinel scheduled analytics rule. It can use KQL summarize operators to count failed logins per user/IP over a time window and trigger when the threshold is exceeded. NRT rules cannot do this aggregation, and TI matching only works for known-bad indicators.

Click to flip back

Question

An attacker uses valid credentials at unusual hours. No pattern-based rule fires. What detection catches this?

Click or press Enter to reveal answer

Answer

Anomaly detection. Anomaly rules learn baseline behaviour (when a user normally logs in, what resources they access) and flag deviations. Valid-credential attacks bypass pattern-based rules but trigger behavioural anomalies.

Click to flip back

Knowledge Check

James at Pacific Meridian discovers that a new employee accidentally triggered a brute force analytics rule by mistyping their password 15 times. The rule is generating daily false positives for this user. What should he do?

Knowledge Check

Anika's monthly review shows that a Sentinel analytics rule for SSH brute force has not generated a single alert in 6 months. All SSH data connectors are active. What should she do?

🎬 Video coming soon

Next up: Domain 1 is complete. Domain 2 shifts to Respond to Security Incidents β€” from triage to investigation to remediation. We start with the incident lifecycle.

← Previous

MITRE ATT&CK & Anomaly Detection

Next β†’

Incident Triage: From Alert to Verdict

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.