🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 1
Domain 1 — Module 10 of 12 83%
10 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 1: Manage a Security Operations Environment Premium ⏱ ~14 min read

Sentinel Analytics & Threat Intelligence

Build your detection engine in Sentinel. Learn how scheduled, NRT, threat intelligence, and ML analytics rules work, and how to ingest and use threat indicators for proactive detection.

Analytics rules: the Sentinel detection engine

☕ Simple explanation

Think of analytics rules as tripwires. You set them across doorways, corridors, and windows. When someone crosses one, an alarm sounds.

In Sentinel, analytics rules continuously monitor your ingested data. When a rule’s KQL query matches, it creates an alert which becomes an incident for analysts to investigate. Different rule types run at different speeds — some check every 5 minutes, some react within seconds, and some use machine learning to spot things humans would miss.

Sentinel also lets you ingest threat intelligence — known-bad IP addresses, domains, file hashes — and match them against your data automatically. If someone in your org connects to a known C2 server, Sentinel catches it.

Microsoft Sentinel analytics rules are the primary detection mechanism in the SIEM. They query ingested log data on a schedule, evaluate conditions, and generate alerts/incidents when matches are found. Four rule types exist:

  • Scheduled — KQL queries running at configurable intervals (5 min to 14 days)
  • NRT (Near-Real Time) — simplified KQL queries running every minute with minimal latency
  • Threat Intelligence — automatic matching of ingested indicators against log data
  • Machine Learning (ML) — anomaly detection using Microsoft’s behavioural models

Additionally, threat indicators (IOCs) ingested from STIX/TAXII feeds, Microsoft Defender Threat Intelligence, or manual entry form the basis of indicator-based detection.

The four analytics rule types

Each rule type serves a different detection need — use all four for comprehensive coverage
FeatureScheduledNRTThreat IntelligenceMachine Learning
Query languageFull KQLSimplified KQL (some operators restricted)Automatic (no query needed)Automatic (built-in models)
Frequency5 min to 14 daysEvery ~1 minuteContinuous matchingConfigurable
LatencyMinutes to hoursSeconds to ~1 minuteNear real-timeVaries
CustomisationFull — write any KQL logicLimited — no joins, limited operatorsNone — rule matches indicators against dataTune thresholds and parameters
Best forComplex, multi-table detection logicTime-critical single-table detectionsKnown IOC matching (IPs, domains, hashes)Detecting unknown behavioural anomalies
Entity mappingYes — full controlYes — full controlAutomaticAutomatic

Scheduled rules (most common)

Scheduled rules are the workhorses. You write a KQL query, set the frequency, define the lookback window, and map entities.

Key configuration:

  • Query frequency — how often the rule runs (e.g., every 5 minutes)
  • Lookback period — how far back in time the query searches (e.g., last 5 minutes)
  • Alert threshold — minimum results to trigger (e.g., greater than 0)
  • Entity mapping — connect query columns to Sentinel entities
  • Event grouping — group all events into one alert, or create one alert per result

Example: brute force detection

SigninLogs
| where TimeGenerated > ago(5m)
| where ResultType == "50126"  // Invalid username or password
| summarize FailedAttempts = count() by UserPrincipalName, IPAddress
| where FailedAttempts > 10

NRT rules (near-real time)

NRT rules sacrifice flexibility for speed. They run every minute with almost zero lag.

Restrictions compared to scheduled:

  • No cross-resource queries
  • No joins with other tables
  • Limited operators
  • Only one table per query

Best for: single-table, time-critical detections like “admin account logged in from a new country” or “high-severity alert from a critical server.”

Threat intelligence rules

TI rules automatically match your ingested threat indicators against incoming data. No KQL required — you configure which indicator types to match and which data tables to search.

Machine learning rules

ML rules use Microsoft’s behavioural models to detect anomalies — unusual patterns that rules-based logic might miss. Examples: unusual login times, abnormal data volumes, first-time access to sensitive resources.

💡 Exam tip: NRT vs scheduled

The exam tests whether you know when to use NRT vs scheduled:

  • “Detect X within minutes” → NRT (if the logic is simple and single-table)
  • “Correlate events across multiple tables” → Scheduled (NRT does not support joins)
  • “Detect anomalous behaviour” → ML rules
  • “Match known IOCs” → Threat intelligence rules

Threat intelligence ingestion

Before TI rules can detect anything, you need threat indicators in Sentinel.

Ingestion methods

MethodSourceWhat It Provides
Microsoft Defender Threat Intelligence (MDTI)Microsoft’s own TIHigh-fidelity indicators from Microsoft’s security research
STIX/TAXII feedsIndustry threat intel sharing (ISACs, open-source feeds)IP addresses, domains, file hashes, URLs from community sources
Threat Intelligence Platforms (TIPs)Commercial TI (Recorded Future, Anomali, MISP)Enriched indicators with context and confidence scores
Threat Intelligence Upload Indicators APIManual or scripted uploadCustom indicators from your own research
Manual indicatorsSentinel TI bladeIndividual indicators added by analysts

Indicator lifecycle

Every indicator has:

  • Type — IP, domain, URL, file hash, email address
  • Confidence — how reliable the indicator is (0-100)
  • Valid from/to — time window the indicator is active
  • Threat type — malware, C2, phishing, botnet, etc.
  • Source — where the indicator came from
💡 Scenario: Anika's TI setup for Sentinel Shield

Anika configures threat intelligence for her MSSP clients:

  • MDTI connector — enabled for all workspaces (high-quality Microsoft indicators)
  • STIX/TAXII feed from the Financial Services ISAC (FS-ISAC) — for financial clients only
  • Custom indicators — Anika’s team adds IOCs from their own incident investigations via the Upload API
  • TI analytics rule — matches all ingested indicators against CommonSecurityLog (firewall), Syslog, and SigninLogs

When a client’s firewall logs show a connection to a known C2 IP from the FS-ISAC feed, an incident is automatically created.

Question

What are the four types of Sentinel analytics rules?

Click or press Enter to reveal answer

Answer

1. Scheduled — KQL queries on a configurable schedule. 2. NRT (Near-Real Time) — simplified queries running every minute. 3. Threat Intelligence — automatic IOC matching against log data. 4. Machine Learning — behavioural anomaly detection using Microsoft's models.

Click to flip back

Question

Why would you choose an NRT rule over a scheduled rule?

Click or press Enter to reveal answer

Answer

NRT rules run every ~1 minute with minimal latency, making them ideal for time-critical detections. However, they cannot use joins, cross-resource queries, or some KQL operators. Choose NRT when speed matters more than query complexity.

Click to flip back

Question

What are three ways to ingest threat indicators into Sentinel?

Click or press Enter to reveal answer

Answer

1. Microsoft Defender Threat Intelligence (MDTI) connector — Microsoft's own TI. 2. STIX/TAXII feeds — industry and open-source threat intel. 3. Threat Intelligence Upload Indicators API — custom/manual indicators from your own research.

Click to flip back

Knowledge Check

Anika needs a detection that alerts within 60 seconds when an admin account logs in from a new country. The logic only involves the SigninLogs table. What rule type should she use?

Knowledge Check

James wants to detect when any device in Pacific Meridian connects to a known command-and-control IP address from a threat intelligence feed. What should he configure?

Knowledge Check

Anika has an NRT rule detecting admin logins from new countries. It fires 15 times per week — 13 are legitimate VPN connections from travelling executives. She wants to reduce noise without losing detection for real attacks. What is the BEST approach?

🎬 Video coming soon

Next up: Your detections are running. But how do you know if they actually cover the threats that matter? Let’s map your coverage against the MITRE ATT&CK framework.

← Previous

Custom Detections in Defender XDR

Next →

MITRE ATT&CK & Anomaly Detection

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.