🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-200 Domain 3
Domain 3 — Module 4 of 6 67%
26 of 28 overall

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server

SC-200 Study Guide

Domain 1: Manage a Security Operations Environment

  • Sentinel Workspace: Roles & Retention
  • Get Windows Events Into Sentinel
  • Syslog, CEF & Azure Data Ingestion
  • Defender for Endpoint: Core Setup
  • Attack Surface Reduction & Security Policies
  • Defender XDR: Tune Your Alerts
  • Automated Investigation & Attack Disruption
  • Sentinel Automation: Rules & Playbooks
  • Custom Detections in Defender XDR
  • Sentinel Analytics & Threat Intelligence
  • MITRE ATT&CK & Anomaly Detection
  • Detection Engineering: Putting It All Together

Domain 2: Respond to Security Incidents

  • Incident Triage: From Alert to Verdict Free
  • Purview & Defender for Cloud Threats
  • Identity Threats: Entra & Defender for Identity
  • Cloud App Security: Investigate Shadow IT
  • Sentinel Incident Response
  • Copilot for Security: Your AI Analyst
  • Complex Attacks & Lateral Movement
  • Endpoint: Timeline & Live Response
  • Endpoint: Evidence & Entity Investigation
  • M365 Investigations: Audit, Search & Graph

Domain 3: Perform Threat Hunting

  • KQL Foundations for Threat Hunters Free
  • Advanced Hunting in Defender XDR Free
  • Sentinel Hunting: Build & Monitor Queries
  • Threat Analytics & Hunting Graphs
  • Data Lake: KQL Jobs & Summary Rules
  • Notebooks & the Sentinel MCP Server
Domain 3: Perform Threat Hunting Premium ⏱ ~11 min read

Threat Analytics & Hunting Graphs

Understand the threat landscape with threat analytics reports, visualise attack blast radius with hunting graphs, and trace entity relationships using Sentinel Graph.

Understanding the threat landscape

☕ Simple explanation

Hunting without context is like searching for a needle without knowing what a needle looks like.

Threat analytics in Defender XDR gives you that context — Microsoft publishes reports on active campaigns, new vulnerabilities, and nation-state attacks. Each report tells you: what the threat is, whether your org is affected, and what you should do about it.

Hunting graphs go visual — they show you how entities connect and how far an attack has spread (the blast radius). Sentinel Graph adds relationship analysis between entities across your entire dataset.

Threat analytics is Microsoft Defender XDR’s integrated threat intelligence reporting feature. It provides analyst-written reports on active threat campaigns, emerging vulnerabilities, and sophisticated attack groups, with built-in queries and exposure assessment for your specific environment.

Hunting graphs visualise entity relationships during threat hunting, showing blast radius (how many entities an attack touched) and connection patterns. Sentinel Graph is the underlying data model that enables entity relationship queries across the Sentinel workspace, connecting users, devices, IPs, files, and alerts into a queryable graph.

Threat analytics

What a threat analytics report contains

SectionWhat It Shows
OverviewSummary of the threat — what it is, who is behind it, what it targets
Analyst reportDetailed write-up with TTPs, IOCs, and MITRE ATT&CK mapping
Exposure & mitigationsWhether your org has vulnerable devices or missing configurations
Incidents & alertsIncidents in your environment related to this threat
Hunting queriesPre-built KQL queries to hunt for the threat in your data

How to use threat analytics

  1. Review new reports — check the threat analytics dashboard regularly for emerging threats
  2. Assess exposure — does the report show your org has vulnerable devices?
  3. Run hunting queries — use the provided queries to check if you are affected
  4. Apply mitigations — patch vulnerabilities, enable missing protections, update detection rules
  5. Monitor — track related incidents and alerts over time
💡 Scenario: James responds to a new ransomware campaign

A new threat analytics report lands: “Blackcat 3.0 ransomware targeting healthcare and finance.”

James’s response at Pacific Meridian:

  1. Opens the analyst report — Blackcat 3.0 exploits unpatched Exchange servers and uses PsExec for lateral movement
  2. Checks exposure — 3 Exchange servers are missing the latest CU. Report flags them as “exposed.”
  3. Runs hunting queries — one query finds 2 devices with PsExec activity in the last 7 days (both from IT admins — legitimate)
  4. Patches the 3 Exchange servers within 24 hours
  5. Sets up email notifications for future reports matching “ransomware” or “Exchange”

Hunting graphs and blast radius

Hunting graphs visualise the spread of an attack — how entities (users, devices, IPs, files) connect and how far the compromise reached.

Blast radius

The blast radius is the total scope of impact from an attack:

  • Devices touched by the attacker
  • Users whose accounts were compromised or used
  • Data accessed, modified, or exfiltrated
  • Services disrupted or degraded

Hunting graphs make this visible — you start from one compromised entity and expand outward to see everything connected to it.

Building a hunting graph

  1. Start with a known compromised entity (e.g., a user account)
  2. Expand to related entities (devices the user accessed, IPs they connected from)
  3. Expand again from those entities (other users on those devices, other connections from those IPs)
  4. Each expansion layer increases the blast radius view
  5. Stop expanding when you reach entities with no suspicious activity

Sentinel Graph

Sentinel Graph is the entity relationship model underlying Sentinel’s investigation and hunting capabilities.

What Sentinel Graph enables

CapabilityHow It Works
Entity relationship queriesFind all entities connected to a specific user, device, or IP
Graph-based huntingTraverse relationships to discover hidden connections
Attack path analysisTrace how an attacker moved from entry point to target
Anomaly detectionIdentify unusual relationship patterns (new connections, first-time access)

Sentinel Graph vs investigation graph

FeatureInvestigation Graph (incident)Sentinel Graph (hunting)
ScopeSingle incidentEntire workspace
TriggerOpened from an incident pageQueried during hunting
PurposeInvestigate a known incidentDiscover unknown connections
DataAlerts and entities in the incidentAll entity relationships across time

Using Sentinel Graph in practice

Sentinel Graph is the underlying data model that powers entity relationship features across the platform. It surfaces in different ways:

  • Investigation graph (in incidents) — the classic incident-scoped entity map
  • Hunting graph / blast radius (in Defender XDR) — cross-entity relationship discovery during hunting
  • Graphs page (in Sentinel) — custom graph queries against entity relationships in your workspace

Here is a practical workflow using graph-based entity exploration for hunting:

Scenario: Tyler discovers a compromised account. He needs to find all devices and resources the account touched in the last 30 days — not just those in the current incident.

Step 1: Start from the entity Open the user’s entity page. The timeline shows all activities, and the graph view reveals entity relationships powered by Sentinel Graph.

Step 2: Explore connections From the user entity, the graph reveals:

  • Devices the user logged into (5 workstations, 2 servers)
  • IP addresses the user connected from (3 office IPs, 1 unknown IP)
  • Alerts involving this user across all incidents (not just the current one)

Step 3: Follow suspicious branches The unknown IP connects to 2 other user accounts — a possible indicator the attacker used the same infrastructure for multiple compromises.

Step 4: Determine blast radius Tyler now sees the full picture: 1 compromised account → 7 devices → 1 shared attacker IP → 2 additional potentially compromised accounts. The blast radius is larger than the original incident suggested.

Key difference from KQL: Graph-based exploration discovers relationships you might not have thought to query. KQL finds what you specifically ask for; graphs reveal connections you did not know existed.

💡 Exam tip: when to use which investigation tool

The exam tests whether you pick the right tool for the scenario:

NeedTool
Investigate a specific incident’s entitiesInvestigation graph (opened from incident page)
Discover entity relationships across multiple incidentsSentinel Graph capabilities (entity exploration, Graphs page)
Enumerate all affected entities with specific criteriaAdvanced Hunting KQL query
Visualise attack spread in Defender XDRHunting graph (blast radius)
Check if a known threat affects your environmentThreat analytics report

If the question says “discover connections across multiple incidents,” think Sentinel Graph. If it says “visualise how far this specific attack spread,” think hunting graph with blast radius.

Question

What does a threat analytics report contain?

Click or press Enter to reveal answer

Answer

Overview (threat summary), Analyst report (TTPs, IOCs, MITRE mapping), Exposure and mitigations (your org's vulnerable devices and missing protections), Incidents and alerts (related to this threat in your environment), and Hunting queries (pre-built KQL queries to search your data).

Click to flip back

Question

What is blast radius in the context of threat hunting?

Click or press Enter to reveal answer

Answer

The total scope of impact from an attack: devices touched, users compromised, data accessed/exfiltrated, and services disrupted. Hunting graphs visualise this by expanding outward from a compromised entity to all connected entities.

Click to flip back

Question

What is the difference between the investigation graph and Sentinel Graph?

Click or press Enter to reveal answer

Answer

Investigation graph is scoped to a single incident (opened from the incident page). Sentinel Graph covers the entire workspace and is used during hunting to discover unknown connections. Investigation graph investigates known incidents; Sentinel Graph discovers unknown relationships.

Click to flip back

Knowledge Check

A new threat analytics report shows that 3 of Pacific Meridian's Exchange servers are vulnerable to Blackcat 3.0 ransomware. What should James do first?

Knowledge Check

Elena needs to understand how far a compromise spread from one device to other systems at Atlas Bank. She wants a visual representation. What tool should she use?

🎬 Video coming soon

Next up: Two more modules to go. Next: querying archived data with Data Lake KQL jobs and Summary rules.

← Previous

Sentinel Hunting: Build & Monitor Queries

Next →

Data Lake: KQL Jobs & Summary Rules

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.