πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 1
Domain 1 β€” Module 4 of 12 33%
4 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 1: Manage a Security Operations Environment Premium ⏱ ~12 min read

Defender for Endpoint: Core Setup

Microsoft Defender for Endpoint is the eyes and ears on every device. Learn how to configure advanced features, rules settings, and custom data collection to get the most out of MDE.

What is Defender for Endpoint?

β˜• Simple explanation

Think of Defender for Endpoint (MDE) as a bodyguard on every device.

Your laptop, your server, your phone β€” each one has a sensor watching for suspicious behaviour. A weird process running at 3 AM? The bodyguard notices. A script trying to download something from a known-bad website? Blocked.

But a bodyguard needs instructions. You configure advanced features (what the bodyguard is allowed to do), rules settings (when to escalate vs ignore), and custom data collection (what extra intelligence to gather).

MDE is one of the core products in the SC-200 exam. You will see it in detection, investigation, and response questions across all three domains.

Microsoft Defender for Endpoint (MDE) is an enterprise endpoint security platform providing preventive protection, post-breach detection, automated investigation, and response. It integrates into Microsoft Defender XDR as the endpoint detection and response (EDR) component.

For SC-200, you need to understand three configuration areas: advanced features (platform-wide toggles that enable capabilities like automated investigation, live response, and web content filtering), rules settings (indicators, web content filtering categories, automation folder exclusions), and custom data collection (enhanced telemetry and custom indicators for advanced scenarios).

MDE data feeds into Defender XDR and can be forwarded to Sentinel via the XDR connector, creating a unified detection and response pipeline.

Advanced features

Advanced features are platform-wide toggles in the Defender portal that enable or restrict MDE capabilities. Each toggle affects all onboarded devices.

FeatureWhat It DoesDefault
Automated investigationAutomatically investigates alerts and takes remediation actionsEnabled
Live responseOpens a remote shell to investigate devices in real-timeDisabled β€” must enable
Live response unsigned script executionAllows running unsigned PowerShell scripts via live responseDisabled β€” security risk
Web content filteringBlocks access to websites by category (adult, gambling, etc.)Disabled
Device discoveryFinds unmanaged devices on the networkEnabled
Custom network indicatorsBlock/allow specific URLs, domains, and IP addressesDisabled
Tamper protectionPrevents users and malware from disabling DefenderEnabled
Show user detailsDisplays Entra ID user info in alerts and investigationsEnabled
Endpoint DLPEnables data loss prevention on endpointsDisabled β€” requires Purview licence
πŸ’‘ Exam tip: live response is OFF by default

The exam tests whether you know that live response must be explicitly enabled before analysts can use it. If a question describes an analyst unable to start a live response session, check whether the advanced feature is toggled on.

Unsigned script execution is a separate toggle and even more restrictive β€” it is only needed when running custom remediation scripts that are not signed.

Rules settings

Rules settings control how MDE handles specific indicators, web categories, and automation behaviours.

Indicators

Indicators are IOCs (indicators of compromise) that you define to block or allow specific:

  • File hashes (SHA-256, SHA-1, MD5)
  • IP addresses
  • URLs and domains
  • Certificates

When MDE encounters a matching indicator, it takes the configured action: Block, Allow, Alert, or Warn.

πŸ’‘ Scenario: Elena blocks a malicious domain

Elena at Atlas Bank receives threat intelligence that a domain evil-payments.com is being used in a phishing campaign targeting financial institutions.

She creates a URL indicator in MDE:

  • Type: URL
  • Value: evil-payments.com
  • Action: Block and alert
  • Scope: All devices

Any Atlas Bank device that tries to access this domain is immediately blocked, and an alert appears in Defender XDR. Elena also adds the domain as a threat indicator in Sentinel for cross-correlation.

Web content filtering

Web content filtering blocks access to websites by category rather than by specific URL. Categories include: Adult content, High bandwidth (streaming), Legal liability, Leisure, and Uncategorized.

This works alongside indicators β€” indicators are precise (specific URLs), while web content filtering is broad (entire categories).

Automation folder exclusions

Paths that automated investigation should skip during remediation. Used for:

  • Temporary folders used by build systems
  • Folders containing legitimate security tools that trigger false positives
  • Paths used by line-of-business applications

Custom data collection

Beyond standard telemetry, MDE supports additional data collection for advanced scenarios:

  • Custom detection rules β€” save Advanced Hunting queries as automated detections that generate alerts on schedule (covered in detail in Module 9)
  • Device discovery β€” passive scanning finds unmanaged devices on your network
  • Connected apps β€” third-party integrations can send data through the MDE API

For the exam, the key concept is that MDE’s telemetry can be extended beyond its defaults through configuration. The most exam-relevant extension is custom detection rules, which turn hunting queries into always-on monitoring.

πŸ’‘ Scenario: Tyler's custom telemetry

Tyler at CipherStack writes a custom detection that triggers when a developer machine connects to an IP address in a known-bad ASN. Standard MDE telemetry captures the connection, but Tyler wants additional context β€” which process initiated the connection and what command-line arguments it used.

He configures enhanced telemetry on the developer device group to capture extended process creation events, including full command-line logging. This data feeds into the DeviceProcessEvents table in Advanced Hunting.

Question

What is the difference between indicators and web content filtering in MDE?

Click or press Enter to reveal answer

Answer

Indicators are precise β€” they block or allow specific file hashes, IP addresses, URLs, domains, or certificates. Web content filtering is broad β€” it blocks entire website categories (adult, gambling, streaming). Both can coexist; indicators override category-level decisions.

Click to flip back

Question

An analyst cannot start a live response session on a device. What is the most likely cause?

Click or press Enter to reveal answer

Answer

The Live Response advanced feature is disabled by default in MDE. An administrator needs to enable it in the Defender portal under Settings > Endpoints > Advanced features. If the analyst also needs to run unsigned scripts, that is a separate toggle.

Click to flip back

Question

What are the four actions MDE can take when it matches an indicator?

Click or press Enter to reveal answer

Answer

Block (prevent access/execution), Allow (override other blocks), Alert (allow but generate an alert), and Warn (show a warning page that the user can bypass). The action depends on how the indicator is configured.

Click to flip back

Knowledge Check

Elena at Atlas Bank needs to prevent all devices from accessing a known phishing domain. She also wants an alert when any device attempts to reach it. What should she configure?

Knowledge Check

Tyler needs developers at CipherStack to see full command-line arguments in Advanced Hunting queries for process creation events. What should he configure?

🎬 Video coming soon

Next up: MDE is configured. Now let’s harden your endpoints with Attack Surface Reduction rules and security policies β€” the proactive defense layer.

← Previous

Syslog, CEF & Azure Data Ingestion

Next β†’

Attack Surface Reduction & Security Policies

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.