πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 2
Domain 2 β€” Module 1 of 10 10%
13 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 2: Respond to Security Incidents Free ⏱ ~14 min read

Incident Triage: From Alert to Verdict

The first minutes of incident response define the outcome. Learn how to triage incidents in Defender XDR, investigate Office 365 threats, understand automatic attack disruption, and manage the incident lifecycle with case management.

What happens when an incident lands?

β˜• Simple explanation

Imagine you are an emergency room doctor. Ambulances keep arriving. You cannot treat every patient identically β€” a broken finger and a heart attack need very different responses. The first job is triage: assess severity, assign priority, route to the right team.

SOC incident triage works the same way. When Defender XDR creates an incident, someone needs to quickly determine: Is this real? How bad is it? Who handles it?

This module walks through the full incident lifecycle β€” from the moment an alert fires to the final verdict. You will learn how Defender for Office 365 handles email threats, how automatic attack disruption stops attacks in real-time, and how case management keeps everything organised.

Incident triage in Microsoft Defender XDR involves evaluating incoming incidents to determine their legitimacy, severity, scope, and required response. The unified incident queue aggregates alerts from Defender for Endpoint, Defender for Office 365, Defender for Identity, Defender for Cloud Apps, and Microsoft Sentinel.

Key triage activities include: reviewing the incident summary and alert evidence, classifying the incident (true positive, false positive, benign true positive), assigning to an analyst, and determining whether automatic attack disruption has already contained the threat. Case management provides the workflow structure for tracking incidents from detection through resolution.

The incident lifecycle

Every incident follows this flow:

StageWhat HappensWho Does It
1. DetectionAnalytics rule, custom detection, or product alert firesAutomated
2. TriageAssess severity, check if real, assign to analystTier 1 analyst
3. InvestigationExamine evidence, trace the attack chain, identify scopeTier 1-2 analyst
4. ContainmentStop the attack from spreading (isolate, block, disable)Analyst or automated
5. RemediationRemove the threat (quarantine files, reset passwords, clean devices)Analyst or automated
6. ClassificationMark as True Positive, False Positive, or Benign True PositiveAnalyst
7. ClosureDocument findings, close the incident, update detectionsAnalyst

Defender for Office 365: email threats

Email is the number one attack vector. Defender for Office 365 (MDO) detects phishing, malware, business email compromise (BEC), and spam.

Common email threats

ThreatWhat It IsMDO Detection
PhishingFake email tricking users into revealing credentialsURL detonation, impersonation detection, sender intelligence
MalwareEmail with malicious attachmentSafe Attachments sandboxing, file detonation
BECAttacker impersonating CEO/CFO to request wire transfersDisplay name impersonation, mailbox intelligence
SpamUnwanted bulk emailContent filtering, sender reputation

Investigation workflow for email threats

  1. Review the alert β€” what triggered it? (Phishing URL, malicious attachment, impersonation)
  2. Check the email β€” sender, recipients, subject, URLs, attachments
  3. Trace delivery β€” was the email delivered, quarantined, or blocked?
  4. Check user actions β€” did anyone click the URL? Did anyone open the attachment?
  5. Remediate β€” soft delete from mailboxes, block sender, purge the email across the org
  6. Hunt β€” search for related emails from the same campaign
πŸ’‘ Scenario: James triages a phishing campaign

James at Pacific Meridian receives a High-severity incident: β€œMulti-stage phishing detected β€” 47 users targeted.”

Triage (2 minutes):

  • Incident shows 47 emails from hr-updates@pacificmeridian-careers.com (impersonating the real HR domain)
  • 12 users clicked the link; 3 submitted credentials on the fake login page
  • Attack disruption automatically disabled the 3 compromised accounts

Investigation (15 minutes):

  • Email headers show the sender IP is from a known phishing infrastructure
  • The URL redirects to a credential harvesting site (verified via URL detonation)
  • The 3 compromised accounts show sign-in activity from the attacker’s IP

Remediation:

  • Soft delete all 47 emails across all mailboxes
  • Reset passwords for the 3 compromised accounts
  • Revoke all active sessions
  • Block the sender domain and URL as indicators

Classification: True Positive β€” Phishing

Post-incident: James creates an analytics rule to detect future emails from similar impersonation domains.

Case management

Case management in Defender XDR provides the workflow structure for managing incidents from detection to closure.

Key case management features

FeatureWhat It Does
Assign ownerRoute incident to a specific analyst
Set statusActive, In Progress, Resolved
ClassificationTrue Positive, False Positive, Benign True Positive (informational)
DeterminationSubcategory: Phishing, Malware, Compromised Account, etc.
TagsCustom labels for tracking (e.g., β€œVIP”, β€œCompliance”, β€œCampaign-2026-04”)
CommentsAnalyst notes documenting investigation steps and findings
Linked incidentsConnect related incidents across time
πŸ’‘ Exam tip: classification vs determination

The exam tests whether you know the difference:

  • Classification = Is the incident real? (True Positive, False Positive, Benign True Positive)
  • Determination = What type of threat? (Phishing, Malware, Unwanted Software, Line-of-Business Application, etc.)

Both are set when closing an incident. Getting them wrong skews your SOC metrics.

Benign True Positive means the detection was technically correct (something suspicious happened), but it was expected or authorised (e.g., a penetration test triggering alerts).

Automatic attack disruption in action

You learned about attack disruption in Module 7. Here is how it appears during triage:

When you open an incident that was disrupted, you see:

  • Yellow banner β€” β€œAttack disruption actions have been taken”
  • Contained entities β€” which devices were isolated, which users were suspended
  • Timeline β€” when the disruption fired relative to the original alert

As a responder, your job is to verify the disruption was appropriate and continue the investigation. Disruption buys time; it does not complete the investigation.

Question

What are the three incident classifications in Defender XDR?

Click or press Enter to reveal answer

Answer

1. True Positive β€” a real security threat that requires remediation. 2. False Positive β€” the detection was incorrect; no actual threat exists. 3. Benign True Positive (Informational) β€” the detection was technically correct, but the activity was expected or authorised.

Click to flip back

Question

When you find 3 compromised accounts from a phishing campaign, what are the immediate remediation steps?

Click or press Enter to reveal answer

Answer

1. Reset passwords for all compromised accounts. 2. Revoke all active sessions and tokens. 3. Soft delete the phishing emails from all mailboxes. 4. Block the phishing URL and sender domain as indicators. 5. Check for mailbox forwarding rules the attacker may have created.

Click to flip back

Question

What does the yellow banner 'Attack disruption actions have been taken' mean during triage?

Click or press Enter to reveal answer

Answer

Defender XDR's automatic attack disruption has already contained the threat β€” devices may be isolated, user accounts suspended. The analyst's job is to verify the disruption was appropriate and continue the investigation. Disruption buys time but does not complete the response.

Click to flip back

Knowledge Check

James finds that Defender XDR disabled 3 user accounts during a BEC incident. One of the accounts belongs to the CFO, who cannot access email during a board meeting. What should James do?

Knowledge Check

A penetration testing team triggers alerts in Defender XDR during an authorised test. How should the SOC classify these incidents?

🎬 Video coming soon

Next up: Email threats are handled. Now let’s investigate threats from Microsoft Purview and Defender for Cloud β€” data breaches and cloud workload attacks.

← Previous

Detection Engineering: Putting It All Together

Next β†’

Purview & Defender for Cloud Threats

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.