Microsoft Security Operations Analyst Associate (SC-200) Certification Guide
()
About this ebook
Detect, Investigate, and Respond to Threats with Microsoft tools
Key Features
● In-depth coverage of Microsoft SC 200 Certification to secure identities, endpoints, and cloud workloads across hybrid environments.
● Hands-on guidance with KQL, threat hunting, and automation to simulate re
Related to Microsoft Security Operations Analyst Associate (SC-200) Certification Guide
Related ebooks
Microsoft Security Operations Analyst Associate (SC-200) Certification Guide: Master Microsoft Security Operations, Threat Response, and Cloud Defense to ace the SC-200 Certification Exam (English Edition) Rating: 0 out of 5 stars0 ratingsMicrosoft Cybersecurity Architect Exam Ref SC-100: Ace the SC-100 exam and develop cutting-edge cybersecurity strategies Rating: 0 out of 5 stars0 ratingsMicrosoft Unified XDR and SIEM Solution Handbook: Modernize and build a unified SOC platform for future-proof security Rating: 0 out of 5 stars0 ratings“Careers in Information Technology: Cloud Security Specialist”: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsCybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Rating: 0 out of 5 stars0 ratingsThe Business Owner's Guide to Cybersecurity: Protecting Your Company from Online Threats Rating: 0 out of 5 stars0 ratingsCloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals Rating: 0 out of 5 stars0 ratingsDevSecOps for Azure: End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud Rating: 0 out of 5 stars0 ratingsAdvanced Security Architecture: Skills and Competencies for Protecting Tomorrow’s Enterprise Rating: 0 out of 5 stars0 ratingsCybersecurity Career Compass Rating: 0 out of 5 stars0 ratingsEnabling World-Class Decisions: The Executive’s Guide to Understanding & Deploying Modern Corporate Performance Management Solutions Rating: 0 out of 5 stars0 ratingsMicrosoft Azure For Dummies Rating: 0 out of 5 stars0 ratingsThreat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks Rating: 0 out of 5 stars0 ratingsResilient Cybersecurity: Reconstruct your defense strategy in an evolving cyber world Rating: 0 out of 5 stars0 ratingsSystem Hardening for Secure Operations: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsCloud Security & Forensics Handbook: Dive Deep Into Azure, AWS, And GCP Rating: 0 out of 5 stars0 ratings
Information Technology For You
CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsCompTIA Network+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Data Analytics for Beginners: Introduction to Data Analytics Rating: 4 out of 5 stars4/5How to Write Effective Emails at Work Rating: 4 out of 5 stars4/5ChatGPT: The Future of Intelligent Conversation Rating: 4 out of 5 stars4/5Design and Build Modern Datacentres, A to Z practical guide Rating: 3 out of 5 stars3/5Practical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Personal Knowledge Graphs: Connected thinking to boost productivity, creativity and discovery Rating: 5 out of 5 stars5/5Excel VBA: A Step-By-Step Tutorial For Beginners To Learn Excel VBA Programming From Scratch: 1 Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsAWS Certified Cloud Practitioner: Study Guide with Practice Questions and Labs Rating: 5 out of 5 stars5/5CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Core 1 Exam 220-1101 Rating: 0 out of 5 stars0 ratingsREMOTE ACCESS VPN- SSL VPN: A deep dive into SSL VPN from basic Rating: 5 out of 5 stars5/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5DevOps Handbook: What is DevOps, Why You Need it and How to Transform Your Business with DevOps Practices Rating: 4 out of 5 stars4/5The Rise of AI Income: Using Artificial Intelligence for Financial Success Rating: 5 out of 5 stars5/5Sage Beginner's Guide Rating: 4 out of 5 stars4/5Cyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsUnlocking the Power of Agentic AI: Transforming Work and Life Rating: 5 out of 5 stars5/5AWS Certified Cloud Practitioner - Practice Paper 1: AWS Certified Cloud Practitioner, #1 Rating: 5 out of 5 stars5/5Health Informatics: Practical Guide Rating: 0 out of 5 stars0 ratingsA Practical Guide for IoT Solution Architects Rating: 5 out of 5 stars5/5Arch Linux: Fast and Light! Rating: 3 out of 5 stars3/5Learning Microsoft Endpoint Manager: Unified Endpoint Management with Intune and the Enterprise Mobility + Security Suite Rating: 0 out of 5 stars0 ratings20 Windows Tools Every SysAdmin Should Know Rating: 4 out of 5 stars4/5The TOGAF® Standard, 10th Edition - A Pocket Guide Rating: 0 out of 5 stars0 ratingsCompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U61 Rating: 5 out of 5 stars5/5
Reviews for Microsoft Security Operations Analyst Associate (SC-200) Certification Guide
0 ratings0 reviews
Book preview
Microsoft Security Operations Analyst Associate (SC-200) Certification Guide - Aditya Katira
CHAPTER 1
Microsoft Defender Identity Endpoint Cloud and More
Introduction
Microsoft Defender Extended Detection and Response (XDR) offers a comprehensive solution for detecting, investigating, and responding to security threats across endpoints, identities, emails, and cloud applications. Designed to empower Security Operations Centers (SOCs), Defender XDR integrates signals from multiple sources into a unified platform, enabling faster threat detection and remediation. This chapter explores how to effectively leverage Defender XDR’s capabilities, providing essential skills to enhance your organization’s security posture through advanced incident management, automation, and threat response.
Structure
In this chapter, we will discuss the following topics:
Exploring Threat Protection with Microsoft Defender XDR
Strategies for Incident Management and Response Using Microsoft
365 Defender Guarding Identities with Microsoft Entra Identity Protection
Risk Remediation Techniques in Microsoft Defender for Office 365
Defending Your Environment with Microsoft Defender for Identity
Enhancing Cloud App Security with Microsoft Defender for Cloud Apps
Exploring Threat Protection with Microsoft Defender XDR
Microsoft Defender for Endpoint (MDE) plays a critical role in detecting malicious activity across devices. Consider a scenario where a victim receives a malicious payload through an unprotected personal email or a USB drive. When the victim opens the infected attachment, the malware spreads unnoticed by the user. However, MDE identifies this threat, generates an alert, and notifies security operations.
At the same time, Microsoft Intune, connected through MDE, detects the increased risk level on the endpoint. This triggers an Intune Compliance Policy, which marks the device as non-compliant, automatically restricting access to corporate resources through Microsoft Entra ID’s Conditional Access policies. The user’s access to sensitive enterprise applications is blocked while the threat is still active, preventing the attacker from exploiting corporate systems.
Figure 1.1: Detection of Threat
Remediation
Microsoft Defender for Endpoint offers various remediation strategies:
Automated Remediation: Microsoft’s automation capabilities remediate the threat without human intervention.
Manual Investigation: A security analyst can review and manually approve remediation actions based on the detailed threat information provided by MDE.
This remediation process not only contains the threat locally but contributes to a broader network defense. Threat data is shared across Microsoft’s Threat Intelligence system, benefiting other organizations by providing intelligence to detect and block similar attacks across multiple environments.
Figure 1.2: Suspend Access
Share Intelligence and Restore Access
Once the threat is neutralized, MDE signals to Intune that the device is safe again, updating the risk level. Microsoft Entra ID responds by restoring the user’s access to corporate resources through Conditional Access.
Furthermore, the threat intelligence gathered is shared with other tools such as Microsoft Defender for Office 365 (MDO) and Microsoft Defender for Cloud. This intelligence helps detect and remediate similar threats across email, collaboration platforms, and cloud services, reinforcing protection across the organization’s entire attack surface.
Access Restrictions During an Attack: While the device is compromised, access to corporate resources is blocked through Conditional Access, which monitors device risk levels based on MDE notifications. During this period, users can still perform non-sensitive tasks such as browsing the internet, but they cannot access any corporate resources requiring authentication.
Access Restoration: Once MDE remediates the threat, it updates Intune, which in turn updates Microsoft Entra ID. This triggers the Conditional Access policy to restore the user’s access to corporate systems. The process ensures attackers cannot exploit compromised devices while minimizing business disruption by restoring access as soon as the threat is resolved.
Microsoft Defender XDR in a Security Operations Center (SOC)
In this section, we will discover how Microsoft Defender XDR enhances threat detection and response in a Security Operations Center (SOC).
Figure 1.3: Morden SOC
Security Operations Model: Functions and Tools
Security operations within an organization consist of several distinct but closely connected functions. These include Triage, Automation, Investigation, Incident Management, and Threat Hunting. Each function has a defined focus, but all teams must work collaboratively to ensure efficient threat detection and response.
Figure 1.4: Security Operations Model
Triage and Automation
The Triage and Automation teams are responsible for handling high volumes of well-known incidents using automation and rapid human intervention. Automation helps speed up responses by pre-processing alerts and incidents that do not require human review.
Key aspects include:
High-Quality Alerts: A 90% true positive rate is recommended to minimize the time wasted on false positives.
Alert Ratios: In practice, XDR systems such as Microsoft Defender generate the highest quality alerts, while others, such as user-reported issues or log-based alerts, provide supplementary information.
Automation: Automation reduces the manual burden on analysts, with built-in workflows suggesting remediation actions for rapid approval.
Tool Integration: A unified console for endpoints, email, identity, and cloud applications enables quick detection and response across multiple threat vectors.
By maintaining a narrow focus on user productivity and well-known scenarios, Triage, and Automation teams can resolve incidents faster and more accurately.
Investigation and Incident Management
The Investigation team escalates and manages incidents that require deeper analysis. This team handles sophisticated attacks that involve complex threat behaviors, such as multi-stage or business-critical incidents.
Key responsibilities include:
Escalation: Incidents that cannot be fully resolved by the Triage team are escalated for further investigation and remediation.
Proactive Review: The team periodically reviews the Triage queue to ensure no critical incidents are missed.
Broad Contextual Analysis: Using tools such as Microsoft Sentinel, the team investigates incidents with a broader context, including threats from cloud environments, including Azure.
The Incident Management team oversees the coordination of non-technical aspects of incident response, such as communication with legal, leadership, and other business stakeholders.
Hunting and Advanced Threat Detection
The Hunt team focuses on identifying advanced threats that evade reactive detection. This proactive team leverages Microsoft Defender XDR and other tools to hunt for undetected attacks, providing escalations and advanced forensics.
Hypothesis-Driven Approach: Hunting teams develop hypotheses based on potential threat scenarios and actively search for signs of compromise that have not yet triggered alerts.
Improving Detections: By reviewing closed cases, the Hunt team refines detection methods and automation to better identify emerging threats in the future.
How It All Comes Together
The following is a common incident lifecycle within an XDR environment:
Triage: An analyst claims an alert (for example, malware) and initiates an investigation using the XDR console.
Escalation: If the malware requires advanced remediation, such as device isolation, the incident is escalated to the Investigation team.
Investigation: The Investigation team digs deeper into the incident, performing any necessary remediation.
Hunting: The Hunt team reviews past incidents to identify patterns, refine detections, and improve processes for future threats.
Threat Intelligence
The Threat Intelligence team plays a pivotal role in supporting all SOC functions. They provide technical research for active incidents, proactive intelligence on attacker trends, and strategic insights that inform business decisions and security processes.
Exploring Microsoft Security Graph
Microsoft Graph is a unified API that provides access to a broad range of data and services across Microsoft 365, Windows, and Enterprise Mobility + Security. Using the Microsoft Graph API, developers can create custom applications for security, compliance, identity, and other operational needs by accessing data from these services.
The API uses the endpoint https://graph.microsoft.com, which can be accessed via REST APIs or SDKs. Through this single interface, you can interact with various Microsoft services, making it easier to build integrated solutions that automate and streamline tasks within an organization.
Figure 1.5: Microsoft Graph Security API
Understanding Microsoft Graph
Microsoft Graph exposes a wide variety of services across different Microsoft platforms. These include:
Microsoft 365 Core Services: Access to services such as Bookings, Calendar, Delve, Excel, OneDrive, Outlook/Exchange, SharePoint, Teams, Viva Insights, and more.
Enterprise Mobility + Security: This includes key security tools such as Advanced Threat Analytics, Microsoft Defender services, Microsoft Entra ID (formerly Azure Active Directory), and Intune for device management.
Windows Services: Covers activities, devices, notifications, and Universal Print.
Dynamics 365: Includes Business Central services.
Microsoft Graph Security API
The Microsoft Graph Security API serves as a centralized point for integrating security services and data from multiple Microsoft security providers. It acts as a broker, federating requests to these security providers and aggregating the results into a consistent format. This simplifies the development of solutions that access security alerts and threat intelligence across services.
Key Features of Microsoft Graph Security API:
Security Alert Integration: Pull in security alerts from multiple Microsoft services (for example, Microsoft Defender, Microsoft Sentinel).
Stream Alerts to SIEM: Seamlessly connect and stream security alerts into SIEM systems for centralized monitoring.
Automate Threat Management: Automatically send threat indicators to enable security actions such as alerting, blocking, or allowing based on the threat intelligence.
Contextual Data: Unlock rich context for investigations by correlating security data across services.
Security Automation: Streamline and automate Security Operations (SecOps) tasks, increasing operational efficiency.
Using the Microsoft Graph Security API
There are two versions of the Microsoft Graph Security API available:
Microsoft Graph REST API v1.0: The stable and production-ready version.
Microsoft Graph REST API Beta: The preview version for trying out new or upcoming features. As this is in beta, it may introduce breaking changes without notice.
Both versions of the API support advanced threat hunting through the runHuntingQuery method, which uses Kusto Query Language (KQL) to run security investigations across Microsoft services.
With the runHuntingQuery method, Security Operations Analysts can develop custom queries to search for threats, analyze logs, and investigate suspicious activities across the enterprise. This capability enhances threat detection and allows analysts to perform deep dives into security events and alerts, leading to faster response times and more effective incident management.
Strategies for Incident Management and Response Using Microsoft Defender XDR
As a Security Operations Analyst at an organization that has implemented Microsoft Defender XDR solutions, your primary workspace for managing security operations is the Microsoft Defender portal. This centralized hub (available at https://security.microsoft.com) provides a unified view of threats across your environment, consolidating alerts and incidents from Defender for Endpoint, Defender for Identity, Defender for Cloud Apps, and more. The portal allows you to quickly investigate incidents, understand the full scope of threats, and plan effective responses.
Key Features of the Microsoft Defender Portal:
The Microsoft Defender portal streamlines security operations by integrating multiple threat protection services into a single, user-friendly interface. Here is what it offers:
Unified View of Incidents: The portal pulls together signals from various Microsoft Defender XDR solutions, allowing you to view related alerts as a single incident. This helps you understand how threats entered the environment, what resources they affect, and their overall impact on the organization. With a consolidated view, you can perform root cause analysis and create comprehensive remediation plans.
Role-Based Access Control (RBAC): The portal adapts the information it presents based on the user’s role within the organization. As a security analyst, you will see data and reports that are most relevant to incident detection, investigation, and response, while administrators and other roles see information pertinent to their responsibilities.
Customizable Home Page: The Home page provides an overview of critical metrics and alerts through customizable cards. These give you at-a-glance information on your organization’s security posture, allowing you to stay informed on the latest activities and incidents.
Integration Across Defender Services: The portal brings together a variety of Microsoft Defender solutions, offering a single pane of glass for managing security operations across different domains. These include:
Microsoft Defender for Office 365: Helps protect email and Office 365 resources through prevention, detection, and investigation tools.
Microsoft Defender for Endpoint: Provides pre-breach prevention and post-breach detection, as well as automated investigation and remediation for endpoint devices.
Microsoft Defender for Cloud Apps: Protects your cloud applications through visibility, data control, and threat protection across SaaS and PaaS environments.
Microsoft Defender for Identity: Monitors on-premises Active Directory signals to detect and investigate compromised identities and insider threats.
Microsoft Defender Vulnerability Management: Continuously monitors assets for vulnerabilities and misconfigurations, enabling IT and security teams to prioritize remediation.
Simplified Investigation and Incident Management: With a unified view of related alerts and incidents, the portal facilitates detailed root cause investigations. Each incident contains relevant details from across the XDR suite, giving you a complete picture of the threat landscape, including the full attack chain and any impacted resources.
Automation and Remediation: Microsoft Defender XDR automates many aspects of threat detection and response. For example, Microsoft Defender for Endpoint (MDE) can automatically remediate threats or prompt security analysts for approval before initiating remediation. These automated workflows reduce manual effort and allow you to focus on more complex security issues.
More Resources in the Portal
In addition to Microsoft Defender XDR, the More resources section of the portal provides quick access to related Microsoft security tools and portals, including:
Microsoft Purview Compliance Portal: Manage compliance and governance needs.
Microsoft Entra ID: Manage user identities and enforce policies such as multifactor authentication.
Microsoft Defender for Cloud: Secure both Azure and non-Azure cloud workloads.
Azure Information Protection: Classify and protect sensitive information using labels and policies.
Manage Incidents in Microsoft Defender XDR
In Microsoft Defender XDR, incidents provide a cross-domain view of security threats by correlating related alerts across endpoints, identities, and applications. Incidents are automatically grouped into a single investigation to provide security defenders with a comprehensive view of an attack. This correlation helps security teams understand the entire attack chain, what tactics were used, and the impact across devices, users, and mailboxes. By managing incidents in the Microsoft Defender portal, defenders can prioritize their responses and streamline investigations.
Understanding Incidents
An incident in Microsoft Defender XDR represents a collection of related alerts from different sources such as endpoints, email, or identities that together tell the full story of an attack. Instead of analyzing individual alerts in isolation, incidents group these events to provide a broader picture of an attack’s progression.
For example, if a user’s credentials are compromised, this might generate alerts in Microsoft Defender for Identity, Microsoft Defender for Office 365, and Microsoft Defender for Endpoint. Microsoft Defender XDR aggregates these alerts into a single incident, showing the attack’s starting point, tactics used, and how far it has progressed through your network.
Prioritizing Incidents
Prioritizing incidents is critical for effective threat response. Microsoft Defender XDR applies correlation analytics to aggregate related alerts from different security products into one incident, allowing defenders to focus on high-priority threats.
The Incident queue in the Microsoft Defender portal shows incidents from the last 30 days, with the most recent at the top. The queue provides customizable columns to expose different aspects of each incident, such as the severity, source, and number of affected endpoints. This detailed view helps defenders prioritize incidents based on their potential impact.
For clarity, incident names are automatically generated using attributes such as detection sources, affected endpoints, and severity levels. This feature helps analysts quickly grasp the scope of an incident without needing to dig through each alert.
Filters for Incident Management
Microsoft Defender XDR provides several filtering options to help you manage and prioritize incidents effectively. These filters include:
Status: Filter incidents by their current status (Active, Resolved).
Severity: High-severity incidents require immediate attention, while lower-severity ones can be addressed later.
Incident Assignment: Show incidents assigned to you or handled by automation.
Multiple Service Source: Filter incidents involving alerts from multiple Microsoft Defender services (for example, Defender for Endpoint, Defender for Identity).
Categories: Focus on specific types of tactics or attack techniques.
Data Sensitivity: Check if sensitive data was targeted, especially if Microsoft Purview Information Protection is enabled.
Operating System: Filter incidents based on affected OS platforms.
Automated Investigation State: Filter based on the status of automated investigation tasks.
These filters allow for a focused approach, ensuring that incidents with the most significant potential impact are addressed first.
Managing Incidents
Managing incidents in Microsoft Defender XDR involves various tasks, including editing incident names, assigning incidents to analysts, and classifying alerts. Here are some key features of incident management:
Edit Incident Name: Incident names are automatically generated based on alert attributes, making it easier for analysts to understand the scope of the incident. However, security teams can rename incidents to align with internal naming conventions or add clarity for future investigations.
Assign Incidents: Unassigned incidents can be assigned to individual analysts by selecting the Assign to me option. This feature ensures ownership over the incident and any associated alerts, allowing analysts to manage the investigation from start to finish.
Set Status and Classification: You can update an incident’s status as it progresses, marking it as Active or Resolved. Once an incident is resolved, all associated alerts are automatically closed, ensuring that no alerts remain open unnecessarily.
Classification helps the team learn from previous incidents. By marking incidents as True Alerts or False Alerts, teams can identify patterns in the data and fine-tune their detection capabilities.
Add Comments and Incident Tags: Analysts can add comments to an incident to record investigation details, such as steps taken or observations made during the process. This collaboration helps team members stay updated on the investigation’s progress and see the historical changes made to an incident.
Adding incident tags is another way to manage incidents. Tags can be used to group incidents with similar characteristics, making it easier to filter and review incidents during future investigations.
Preview Incidents: The Microsoft Defender portal provides preview information for incidents, allowing quick access to essential details without leaving the queue. This preview includes three main areas:
Circle: Clicking the circle icon opens a detailed window on the right side, providing an incident overview.
Greater than symbol: Clicking the symbol shows related records for the selected incident.
Link: Selecting the link navigates to the full incident details page.
Investigating Incidents in Microsoft Defender XDR
In Microsoft Defender XDR, the Incident page is your central hub for investigating security incidents, offering detailed insights into the attack’s scope, progression, and remediation efforts. By grouping correlated alerts from various security sources, such as Microsoft Defender for Identity, Microsoft Defender for Endpoint, and Microsoft Defender for Office 365, you gain a comprehensive view of the incident, making it easier to assess, prioritize, and respond to threats.
Incident Overview
The Overview page provides a quick snapshot of the key details about the incident, which is essential for an initial triage. It helps you quickly understand how the attack unfolded, what assets were impacted, and what steps need to be taken.
Attack Categories: Aligned with the MITRE ATT&CK™ framework, this section visually displays the stage of the attack within the kill chain. This allows you to see how advanced the attack has progressed across various tactics and techniques.
Scope Section: Lists the top impacted assets, including devices and users. You can also view key details such as risk level, investigation priority, and tags associated with these assets, providing additional context.
Alerts Timeline: Displays a chronological timeline of the alerts that were generated, showing how the attack unfolded and why specific alerts are linked together. This can help you quickly understand the sequence of events.
Evidence Section: Summarizes the various artifacts involved in the incident, including files, processes, and emails. It also provides their remediation status, helping you identify if any actions are pending or need your attention.
The overview offers a clear, high-level view of the incident’s critical components, assisting in rapid decision-making and prioritization.
Alerts
The Alerts tab shows all the alerts associated with the incident, including severity, affected entities (devices, users, mailboxes), and the security product (for example, Defender for Identity, Defender for Endpoint) that triggered the alert.
Alerts are ordered chronologically by default, allowing you to see how the attack unfolded over time.
Clicking on an alert takes you to the alert detailspage, where you can conduct a deeper investigation into that specific alert and determine its role within the broader incident.
Devices
The Devices tab lists all the endpoints involved in the incident.
By selecting the device name, you can navigate to the Devicepage, where you can view all the alerts and events associated with that specific device. This helps focus on the role each endpoint played in the attack and allows for targeted investigation and remediation.
Users
The Users tab shows all users linked to the incident.
Clicking a user’s name navigates you to their Microsoft Defender for Cloud Appspage. This page offers a deeper investigation into that user’s activity, helping identify if their account was compromised or involved in malicious actions.
Mailboxes
The Mailboxes tab lists all email accounts involved in the incident. You can investigate how email might have been used in the attack—whether as a point of entry through phishing or as a method for lateral movement or data exfiltration.
Apps
The Apps tab allows you to investigate applications that were involved in the incident, giving insight into any potential vulnerabilities or misconfigurations in cloud or on-premises applications.
Investigations
In the Investigations tab, you can see all the automated investigations that were triggered by alerts in the incident.
Each investigation details whether remediation actions were automatically performed or if any steps are pending analyst approval.
By selecting an investigation, you can view the Investigation detailspage, where you can track the progress and status of automated responses. Pending actions will appear under the Pending actions tab, allowing you to approve or reject further remediation steps.
Evidence and Responses
Microsoft Defender XDR provides automated investigation and remediation for supported events, presenting you with actionable insights on important files, processes, services, emails, and more. Each entity involved in the incident is assigned a verdict (for example, Malicious, Suspicious, Clean) and a remediation status (for example, Remediated, Pending).
This helps you quickly assess which parts of the incident still require attention and what remediation actions have already been completed. You can take further actions to ensure the incident is fully addressed.
Graph
The Graph provides a visual representation of the cybersecurity attack, showing how various components of the incident are linked together. It helps you understand the entry point, where and how the attack spread, and which indicators of compromise were observed.
You can click on nodes within the graph to drill down into specific details, such as a malicious file’s detection history, the devices it impacted, and whether it has been observed within your organization or elsewhere globally.
This visualization is particularly helpful in identifying patterns and correlations across different data points, giving you a more complete view of the attack’s progression.
Managing and Investigating Alerts in Microsoft Defender XDR
Managing and investigating alerts is a key responsibility for Security Operations Analysts using Microsoft Defender XDR. The Alert Management pane provides tools to categorize, prioritize, and track alerts, ensuring efficient response to potential threats. Here is a comprehensive guide to managing and investigating alerts in Defender XDR.
Alert Management Overview
You can manage alerts from the Alerts queue or the Alerts tab of a device page in Microsoft Defender XDR. Selecting an alert brings up the Alert Management pane, where you can view alert details, set metadata, assign alerts, and take action.
Severity Levels
Severity levels indicate the potential risk associated with an alert and help prioritize investigation efforts:
High (Red): Alerts related to advanced persistent threats (APTs) or malicious activities that pose a significant risk to the organization. Examples include credential theft tools, ransomware, or tampering with security sensors.
Medium (Orange): Alerts from endpoint detection and response that indicate suspicious post-breach behaviors, such as registry changes or execution of suspicious files.
Low (Yellow): Alerts associated with prevalent malware or non-malware hacking tools that may not pose an immediate threat to the organization.
Informational (Grey): Alerts that are not harmful but provide insights that can improve organizational security awareness.
Note: The severity of alerts in Microsoft Defender Antivirus (AV) and Defender for Endpoint differs. Microsoft Defender AV severity reflects the risk to an individual device, while Defender for Endpoint focuses on the broader organizational risk.
Categories
Alert categories are aligned with the MITRE ATT&CK framework, providing context about the tactics and techniques used in the attack. Categories include:
Collection: Data gathering for exfiltration.
Command and Control: Establishing communication with attacker-controlled infrastructure.
Credential Access: Stealing valid credentials.
Defense Evasion: Avoiding security detection and controls.
Discovery: Gathering information about the target network.
Execution: Launching attacker tools and malicious code.
Exfiltration: Transferring data out of the organization.
Exploit: Using exploit code to compromise systems.
Initial Access: Gaining entry to the network.
Lateral Movement: Moving across the network to access critical systems.
Malware: Backdoors, trojans, and other malicious software.
Persistence: Maintaining access to compromised systems.
Privilege Escalation: Gaining higher-level permissions.
Ransomware: Encrypting files and demanding payment for decryption.
Suspicious Activity: Unusual behaviors that may be indicative of an attack.
Unwanted Software: Potentially unwanted applications (PUAs) that degrade productivity or security.
Link to Another Incident
You can create a new incident from the alert or link it to an existing incident to streamline investigation efforts. Linking alerts allows analysts to correlate related activities and better understand the attack.
Assign Alerts
If an alert isn’t assigned, you can select Assign to me to take ownership. This helps ensure accountability and structured workflows within your security team.
Suppress Alerts
In some cases, you might need to suppress alerts that are known to be harmless (such as tools used for internal security testing). You can create suppression rules to prevent such alerts from appearing in the queue:
Suppress Alert on This Device: Suppresses alerts from a specific device.
Suppress Alert in My Organization: Suppresses alerts organization-wide for a specific tool or process.
These rules only apply to future alerts and won’t affect alerts already in the queue.
Change Alert Status
Alerts can be categorized as New, In Progress, or Resolved to help track their investigation progress:
New: Unreviewed alerts that require triage.
In Progress: Alerts under active investigation.
Resolved: Alerts that have been investigated and closed.
This status helps analysts and team leaders manage alert workflows and prioritize responses.
Alert Classification
You can classify alerts as true positive or false positive:
TruePositive: Confirmed as legitimate security incidents.
FalsePositive: Non-malicious activity incorrectly flagged as a threat.
Providing accurate classifications helps improve the quality of future alerts and reduce false positives.
Add Comments and View Alert History
The Comments and History section allows you to document investigation progress and see previous changes. Comments can be added in real-time and help maintain a clear audit trail of actions taken during the alert’s lifecycle.
Alert Investigation and Automated Response in Microsoft Defender XDR
Investigating alerts is a critical step in understanding security incidents and determining the appropriate response. Microsoft Defender XDR integrates automated investigation and remediation capabilities to efficiently manage security threats and alleviate the burden on security operations teams.
Alert Page Overview
When investigating alerts in Microsoft Defender XDR, start by selecting an alert from the Alerts queue. The Alert page displays essential details, including the alert title, affected assets, and the Alert story tree view. The Details pane provides additional information about the selected entities, and all related events and entities are listed in the Alert story.
Affected Assets: Displays the devices, users, mailboxes, and applications involved in the alert.
Alert Story: A timeline of events showing why the alert was triggered, related events, and other involved entities. Each entity is clickable and provides additional details for deeper investigation.
Investigate Using the Alert Story
The Alert story offers a comprehensive view of the incident by detailing the events before and after the alert and showing related entities such as devices, users, and mailboxes. Each entity in the Alert story is expandable, and selecting an entity shifts the focus of the Details pane to show more context about that entity.
Taking Action from the Details Pane
Once you select an entity, the Details pane updates to provide relevant historical information and actions specific to that entity. You can manage the entity directly from the Alert page, taking actions such as quarantining a file, isolating a device, or marking the alert as resolved.
Mark Alerts as Resolved
After completing your investigation, you can update the alert’s status. Mark it as Resolved, and classify it as either a True alert or a False alert. You can also add Suppress rules to avoid similar false alerts in the future.
True Alert: If the alert is legitimate, you can further classify it with a determination (for example, phishing, malware, and more).
False Alert: Suppression rules can be applied to prevent the alert type from appearing again if it is a known harmless event.
Manage Automated Investigations
Microsoft Defender XDR helps streamline security operations by utilizing Automated Investigation and Remediation (AIR) capabilities. These automated investigations allow your team to address threats efficiently while focusing on high-value tasks.
How Automated Investigations Start
When an alert is triggered (for example, detecting a malicious file on a device), a security playbook is activated, which launches an automated investigation. The investigation checks if the threat is present on other devices in the network and determines the severity of the threat.
Details of an Automated Investigation
During and after an investigation, you can access detailed information about its findings, such as the severity of threats and remediation actions. These details are organized under several tabs:
Alerts: Lists the alerts that initiated the