πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 2
Domain 2 β€” Module 9 of 10 90%
21 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 2: Respond to Security Incidents Premium ⏱ ~11 min read

Endpoint: Evidence & Entity Investigation

Every investigation follows the evidence. Learn how to perform evidence-based investigations, trace entity relationships, and investigate incidents where automatic attack disruption has already acted.

Evidence-based investigation

β˜• Simple explanation

A detective does not arrest someone based on a hunch. They follow evidence β€” fingerprints, CCTV footage, phone records β€” and build a case. Every piece of evidence connects to other evidence until the full picture emerges.

In MDE, evidence includes files, processes, IP addresses, URLs, user accounts, and registry entries that appear in alerts. Entity investigation means tracing how these pieces connect β€” which process created which file, which user ran which command, which device connected to which IP.

Sometimes, automatic attack disruption has already acted before you even start investigating. In those cases, you verify the disruption was correct and complete the investigation.

Evidence and entity investigation in Defender for Endpoint involves analysing the artifacts (files, processes, network indicators, user accounts) associated with security alerts and incidents. Each entity has a dedicated investigation page showing its properties, related alerts, observed activities, and prevalence across the organisation.

When automatic attack disruption fires, it creates a specific incident type with pre-contained entities. The analyst’s role shifts from containment to verification and completion β€” confirming the disruption was appropriate, investigating the remaining attack chain, and remediating any gaps the disruption did not cover.

Entity types in MDE

Each entity type has its own investigation page:

EntityInvestigation Page ShowsKey Questions
FileHash, prevalence, first/last seen, VirusTotal results, related alertsIs this file malicious? How many devices have it?
ProcessCommand line, parent process, child processes, network activityWhat did this process do? Who launched it?
IP AddressGeolocation, ASN, reputation, devices that connected to itIs this a C2 server? Which devices talked to it?
URL/DomainReputation, associated alerts, devices that accessed itIs this a phishing site? How many users visited?
User AccountSign-in history, devices used, alerts involving this accountIs this account compromised? What did it access?
DeviceFull timeline, installed software, vulnerabilities, related alertsWhat happened on this device? Is it compromised?

File entity investigation

When investigating a suspicious file:

  1. Check the file hash β€” look it up in VirusTotal, Microsoft TI, or your internal TI feeds
  2. Check prevalence β€” how many devices in your org have this file? If it is on one device, it is more suspicious than if it is on 1,000 (common software)
  3. Check first/last seen β€” when did this file first appear? Did it arrive via email, download, or USB?
  4. Check related alerts β€” has this file triggered alerts on other devices?
  5. Check behaviour β€” what did the file do when executed? (process tree, network connections, file writes)

Process tree analysis

The process tree shows the parent-child relationship of processes:

explorer.exe
  └── outlook.exe
        └── winword.exe (opened email attachment)
              └── powershell.exe (macro executed)
                    └── update.exe (payload downloaded)
                          └── cmd.exe (lateral movement attempt)

Tracing the process tree reveals the attack chain: which legitimate process was abused, what the attacker executed, and how deep the compromise goes.

πŸ’‘ Scenario: Tyler traces a process tree

Tyler at CipherStack investigates an alert: β€œSuspicious process creation from Office application.”

Process tree:

  • outlook.exe β†’ opened an attachment
  • winword.exe β†’ macro enabled by user
  • powershell.exe β†’ -enc aQBlAHgA... (Base64-encoded command)
  • certutil.exe β†’ downloaded update.exe from external URL (LOLBin technique)
  • update.exe β†’ connected to C2, then spawned cmd.exe for reconnaissance

Tyler identifies:

  • Initial vector: Email attachment with macro
  • Execution technique: PowerShell + certutil (living-off-the-land)
  • Persistence: Not yet β€” Tyler catches it before the attacker establishes persistence
  • Response: Quarantine update.exe, block the C2 domain, purge the email across mailboxes

Investigating attack disruption incidents

When you open an incident that automatic attack disruption handled, you see:

What disruption already did

Disruption ActionWhat It Means for Investigation
Device containedThe device is isolated β€” you can still investigate via timeline and live response
User suspendedThe account is disabled in Entra ID β€” check what the account did before suspension
Attack stoppedThe spreading mechanism (ransomware, BEC) was interrupted

Your role after disruption

  1. Verify the disruption was correct β€” was the right device/user contained? Any false positive?
  2. Complete the investigation β€” disruption stops the immediate threat but does not find the root cause
  3. Check for gaps β€” did the attacker access other systems before disruption? Is there persistence on other devices?
  4. Remediate fully β€” reset passwords, remove persistence, patch vulnerabilities
  5. Release contained entities β€” once investigation is complete, uncontain devices and re-enable accounts
πŸ’‘ Exam tip: disruption does not equal resolution

The exam tests whether you understand that attack disruption is containment, not resolution. After disruption:

  • The incident is still Active (not resolved)
  • Investigation must continue to identify root cause
  • Persistence mechanisms may exist on undisrupted devices
  • The attacker may have exfiltrated data before disruption kicked in

If a question asks β€œwhat should the analyst do after attack disruption contains a device?” β€” the answer is continue investigating, not close the incident.

Question

What six entity types can you investigate in Defender for Endpoint?

Click or press Enter to reveal answer

Answer

1. File (hash, prevalence, related alerts). 2. Process (command line, parent/child, network activity). 3. IP Address (geo, reputation, connected devices). 4. URL/Domain (reputation, accessing devices). 5. User Account (sign-in history, alerts). 6. Device (full timeline, vulnerabilities).

Click to flip back

Question

What does the process tree show and why is it important?

Click or press Enter to reveal answer

Answer

The process tree shows parent-child relationships between processes β€” which process launched which. It reveals the attack chain: a legitimate process (e.g., Word) spawning a suspicious child (e.g., PowerShell) indicates a macro-based attack. Tracing the tree from the initial process to the deepest child maps the full execution chain.

Click to flip back

Question

After automatic attack disruption contains a device, is the incident resolved?

Click or press Enter to reveal answer

Answer

No. Attack disruption is containment, not resolution. The incident remains Active. The analyst must: verify the disruption was correct, continue investigating the root cause, check for gaps (other compromised systems), remediate fully, and only then release contained entities and close the incident.

Click to flip back

Knowledge Check

An investigation package shows that `certutil.exe` was used to download a file from an external URL. What type of attack technique is this?

Knowledge Check

Automatic attack disruption contained a ransomware-infected device at Atlas Bank. Elena opens the incident and sees the device is isolated. What should she do next?

🎬 Video coming soon

Next up: Endpoint investigation complete. The last piece of Domain 2 β€” investigating Microsoft 365 activities using Purview Audit, Content Search, and Graph activity logs.

← Previous

Endpoint: Timeline & Live Response

Next β†’

M365 Investigations: Audit, Search & Graph

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.