πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 1
Domain 1 β€” Module 1 of 12 8%
1 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 1: Manage a Security Operations Environment Premium ⏱ ~14 min read

Sentinel Workspace: Roles & Retention

Before you can detect threats, you need a workspace. Learn how to configure Microsoft Sentinel roles, manage data retention across Analytics, Data lake, and XDR tiers, build workbooks, and optimise your SOC with built-in recommendations.

What is a Microsoft Sentinel workspace?

β˜• Simple explanation

Think of a security operations centre (SOC) as a command room.

Before analysts can monitor screens, you need to build the room. You need desks, monitors, badge access for different team members, and a filing system that decides how long you keep surveillance footage before archiving or deleting it.

A Microsoft Sentinel workspace is that command room. It sits on top of a Log Analytics workspace in Azure. You configure who can access it (roles), how long data is kept (retention tiers), what dashboards are on the screens (workbooks), and how to keep the room running efficiently (SOC optimization).

Get the workspace wrong, and everything downstream β€” connectors, analytics rules, hunting β€” suffers.

Microsoft Sentinel is a cloud-native SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) platform built on Azure. Every Sentinel deployment starts with a Log Analytics workspace β€” the underlying data store where all ingested security logs land.

Configuration includes: RBAC roles (who can read, write, or manage), data retention policies across three tiers (Analytics for hot queries, Data lake for long-term cost-effective storage, XDR tier for Defender data), workbooks for visualization and reporting, and SOC optimization recommendations that analyse your configuration and suggest improvements.

A well-configured workspace directly impacts detection coverage, query performance, cost management, and compliance. Multi-workspace architectures are common in MSSPs and regulated environments.

Microsoft Sentinel roles

Not everyone in a SOC needs the same access. Sentinel uses Azure RBAC (role-based access control) to separate duties.

RoleWhat They Can DoWho Gets It
Microsoft Sentinel ReaderView incidents, workbooks, hunting queries, and data β€” but cannot change anythingJunior analysts, auditors, stakeholders
Microsoft Sentinel ResponderEverything a Reader can do, plus manage incidents (assign, change status, add comments)Tier 1 and Tier 2 analysts
Microsoft Sentinel ContributorEverything a Responder can do, plus create/edit workbooks, analytics rules, and automationSenior analysts, detection engineers
Microsoft Sentinel Playbook OperatorRun playbooks manually on incidentsAnalysts who need to trigger automation
Logic App ContributorCreate and edit playbooks (Logic Apps)Automation engineers
πŸ’‘ Scenario: Anika's MSSP role structure

Anika Singh manages Sentinel for 40+ clients at Sentinel Shield (MSSP). She cannot give every client’s analysts Contributor access β€” they might accidentally edit another client’s analytics rules.

Her role design:

  • Client analysts β†’ Sentinel Responder (manage their own incidents, cannot edit rules)
  • Sentinel Shield Tier 2 β†’ Sentinel Contributor (edit analytics rules across workspaces)
  • Automation team (Dev) β†’ Logic App Contributor + Playbook Operator (build and test playbooks)
  • Client CISOs β†’ Sentinel Reader (dashboards and reports only)

Each client workspace uses resource-level RBAC so analysts only see their own data.

πŸ’‘ Exam tip: role hierarchy

The exam loves testing whether you know the hierarchy: Reader β†’ Responder β†’ Contributor. Each level includes everything below it.

Key distinction: Responder can manage incidents but cannot create analytics rules. If a question says β€œan analyst needs to create a scheduled rule,” the answer is Contributor, not Responder.

Also remember: Playbook Operator is separate from the main hierarchy. A Responder cannot run playbooks unless they also have Playbook Operator.

Data retention: Analytics, Data lake, and XDR tiers

Where your data lives determines how fast you can query it and how much it costs.

Choose the right tier based on how often you query the data and how long you need to keep it
FeatureAnalytics TierData Lake TierXDR Tier
PurposeHot data for active investigation and detectionLong-term, cost-effective storage for compliance and huntingMicrosoft Defender XDR data at no extra Sentinel cost
Query speedFastest β€” optimised for KQLSlower β€” designed for occasional queriesFast β€” pre-ingested by Defender
CostHighest per GBSignificantly cheaperIncluded with Defender XDR licence
RetentionDefault 30 days (Sentinel solution tables get free extension to 90 days), configurable up to 2 yearsUp to 12 yearsDefault 30 days in Defender, extends with Sentinel
Use caseActive alerts, real-time detection, incident investigationAudit logs, historical hunting, compliance requirementsDefender incidents, alerts, device events
Analytics rulesYes β€” scheduled, NRT, ML all workLimited β€” summary rules for aggregated queriesYes β€” included in unified Sentinel experience

How to decide which tier

  1. High-frequency data you query daily (security events, sign-in logs, firewall logs) β†’ Analytics tier
  2. Compliance or audit data you rarely query (Azure activity logs older than 90 days, historical DNS) β†’ Data lake tier
  3. Defender XDR data (incidents, alerts, device events from MDE/MDO/MDI/MDCA) β†’ XDR tier (already there)
πŸ’‘ Scenario: James optimises Pacific Meridian's costs

James Mwangi at Pacific Meridian (10,000 staff) was spending $45,000/month on Sentinel ingestion. His team ran a cost analysis:

  • 70% of queries hit the last 30 days of data
  • Compliance requirement: keep Azure AD sign-in logs for 7 years
  • Defender XDR data was being double-ingested into Analytics tier

James moved:

  • Historical sign-in logs β†’ Data lake (7-year retention, much cheaper)
  • Defender data β†’ XDR tier (already included, stopped duplicate ingestion)
  • Kept active security events in Analytics (30-day default retention, extended to 90 days for Sentinel solution tables)

Result: 38% cost reduction while meeting compliance requirements.

Workbooks: your SOC dashboards

Workbooks are interactive dashboards in Sentinel that visualise your security data. They combine KQL queries, charts, tables, and parameters into reusable reports.

Common workbook types:

  • Incident overview β€” open incidents by severity, mean time to resolve, analyst workload
  • Data connector health β€” which connectors are active, which have stopped sending data
  • Threat intelligence β€” indicator counts, types, sources, expiration dates
  • Investigation β€” entity timelines, related alerts, geographic maps

You can use built-in workbook templates from the Content Hub or create custom workbooks from scratch.

πŸ’‘ Exam tip: workbooks vs analytics rules

Workbooks visualise data. Analytics rules detect threats. The exam may describe a scenario where someone wants a β€œdashboard showing failed sign-ins” β€” that’s a workbook. If they want an β€œalert when failed sign-ins exceed 50 in 5 minutes” β€” that’s an analytics rule.

SOC optimization

Microsoft Sentinel includes SOC optimization recommendations β€” built-in analysis of your workspace configuration that suggests improvements.

SOC optimization checks for:

  • Coverage gaps β€” MITRE ATT&CK techniques not covered by your analytics rules
  • Data value β€” tables ingesting data that no analytics rule or workbook references
  • Cost efficiency β€” tables that could move to a cheaper tier without impacting detection
  • Threat intelligence β€” whether your TI feeds are active and being used in detections

Think of it as a health check for your SOC β€” it tells you what you are missing, what you are wasting money on, and where to focus next.

Question

What are the three data retention tiers in Microsoft Sentinel?

Click or press Enter to reveal answer

Answer

1. Analytics tier β€” hot data for active detection and investigation (fastest, most expensive, default 30 days β€” Sentinel solution tables get free extension to 90 days). 2. Data lake tier β€” long-term, cost-effective storage for compliance and historical hunting (up to 12 years). 3. XDR tier β€” Defender XDR data included at no extra Sentinel cost.

Click to flip back

Question

A Sentinel Responder wants to create a new scheduled analytics rule. Can they?

Click or press Enter to reveal answer

Answer

No. Sentinel Responder can manage incidents (assign, change status, comment) but cannot create or edit analytics rules. They need the Sentinel Contributor role for that.

Click to flip back

Question

What does SOC optimization in Microsoft Sentinel analyse?

Click or press Enter to reveal answer

Answer

SOC optimization checks for: coverage gaps (MITRE ATT&CK techniques without detection rules), data value (tables not referenced by rules or workbooks), cost efficiency (tables that could move to cheaper tiers), and threat intelligence health (whether TI feeds are active and used).

Click to flip back

Knowledge Check

Anika at Sentinel Shield needs a client's junior analyst to view incidents and dashboards but not change anything. Which role should she assign?

Knowledge Check

James at Pacific Meridian needs to keep Entra ID sign-in logs for 7 years to meet compliance. Which Sentinel data tier should he use for the historical data?

Knowledge Check

Pacific Meridian's SOC optimization recommends moving SecurityEvent data to the Data lake tier. James checks: no analytics rules reference SecurityEvent, but his threat hunter Tyler uses it daily for KQL hunting. What should James do?

🎬 Video coming soon

Next up: Now that the workspace is ready, it’s time to get data flowing in. We’ll start with the most common source β€” Windows security events.

Next β†’

Get Windows Events Into Sentinel

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.