1.2 Mitigate Incidents Using Microsoft Defender XDR

10-14 hours · Module 1 · Free

Mitigate Incidents Using Microsoft Defender XDR

SC-200 Exam Objective

Domain 3 — Manage Incident Response: "Investigate and remediate ransomware and business email compromise incidents identified by automatic attack disruption." Also covers incident classification, assignment, and management across the incident lifecycle.

Introduction

An incident is a collection of correlated alerts that together describe an attack. Managing incidents — from initial triage through investigation to closure — is the core daily workflow of a SOC analyst. This subsection teaches you the complete incident lifecycle in Defender XDR: how incidents are created, how to triage them efficiently, how to investigate the underlying evidence, and how to remediate and close them.

This is not theoretical. Every shift as a SOC analyst starts with the incident queue. You will learn the practical decision framework for: which incident do I look at first? Is this a true positive or a false positive? How far has the attack progressed? What action do I take? When do I escalate?

Here is what this subsection covers:

  • How incidents are created — alert grouping, entity correlation, and automatic attack disruption
  • The incident queue — how to read it, sort it, and prioritize
  • Incident triage — the 5-minute assessment that determines your response
  • Investigation workflow — following evidence from the incident through alerts, entities, and raw data
  • Remediation actions — containing and eliminating the threat
  • Incident classification and closure — documenting the outcome for metrics and learning
INCIDENT LIFECYCLE IN DEFENDER XDRAlert CreatedXDR CorrelatesTriage (5 min)InvestigateRemediateClose

Figure 1.3: The incident lifecycle from initial alert through XDR correlation, analyst triage, investigation, remediation, and closure. Each stage has specific actions and decision criteria covered in this subsection.

How incidents are created

Defender XDR creates an incident when one or more alerts share a common entity. The correlation logic evaluates:

  • Shared user — multiple alerts involving the same UserPrincipalName
  • Shared device — multiple alerts involving the same DeviceId
  • Shared IP address — alerts referencing the same source IP
  • Shared email — alerts tied to the same message or campaign
  • Temporal proximity — alerts occurring within a time window that suggests a connected attack

A single alert can also become an incident if it is high-severity or triggers automated investigation.

Automatic attack disruption

Defender XDR can automatically disrupt attacks in progress without waiting for analyst intervention. When the correlation engine identifies a high-confidence, multi-stage attack (such as ransomware pre-encryption activity or BEC with active mail forwarding), it takes immediate containment actions:

  • Disabling a compromised user account
  • Isolating a compromised device
  • Blocking a malicious OAuth application

These actions appear in the incident timeline with the label “Automatic attack disruption.” They are reversible — you can re-enable the account or release the device if the action was a false positive.

Attack disruption acts within seconds — before you see the incident

By the time you open the incident queue, automatic disruption may have already contained the threat. Your job shifts from "stop the active attack" to "verify the disruption was correct, assess the damage, and eradicate the attacker's access." This is a fundamental change in the SOC workflow — the first response is automated, the analyst validates and completes the response.


The incident queue — your shift start

Navigate to security.microsoft.com → Incidents & alerts → Incidents. This is the queue you will check at the beginning of every shift.

DEFENDER XDR — INCIDENT QUEUESeverityIncident nameStatusCategoriesImpacted assetsLast activityHighMulti-stage attack: phishing → credential theft on j.morrisonNewInitial access, Credential accessj.morrison, DESKTOP-NGE04210 min agoHighSuspicious inbox rule with mail forwarding on s.patelIn progressPersistence, Collections.patel, 3 Mailboxes2 hours agoMediumPassword spray from 198.51.100.0/24 targeting 12 accountsNewCredential access12 Accounts45 min agoMediumMalware detected on LAPTOP-NGE017 — encoded PowerShellNewExecution, Defense evasionm.chen, LAPTOP-NGE0173 hours agoLowImpossible travel: r.williams signed in from GB and US in 30 minResolvedInitial accessr.williams6 hours agoAll data shown uses fictional Northgate Engineering identities for training purposes.
Figure: The Defender XDR incident queue at security.microsoft.com → Incidents & alerts → Incidents. Each row represents a correlated incident with severity, name, status, attack categories, impacted assets, and last activity time. The analyst triages from highest severity and most recent activity first.

Key columns in the incident queue:

ColumnWhat it tells youHow to use it
SeverityHigh / Medium / Low / InformationalTriage high-severity first
Incident nameAuto-generated description of the attack typeProvides initial context before opening
StatusNew / In progress / ResolvedFilter to “New” at shift start
Assigned toWhich analyst owns the investigationFilter to “Unassigned” for new work
CategoriesAttack categories (phishing, malware, credential access, etc.)Helps prioritize by attack type
Alert countNumber of correlated alertsMore alerts = broader attack, may need higher priority
EntitiesUsers, devices, mailboxes, IPs involvedQuick scope assessment without opening the incident
Last activityWhen the most recent alert was generatedRecent activity = potentially still active
Automated investigationWhether AIR is running or completeCheck if automated response has already acted

Effective queue sorting:

  1. Filter Status = “New” (only unworked incidents)
  2. Sort by Severity descending (High first)
  3. Within the same severity, prioritize incidents with recent “Last activity” (potentially still active) over older ones
  4. Check the “Automated investigation” column — if AIR has already remediated a high-severity incident, it may need only verification, not full investigation

Incident triage — the 5-minute assessment

When you open an incident, your first task is not a deep investigation. It is a rapid assessment to determine: is this real? Is it still active? How bad is it? What do I do next?

The 5-minute triage framework:

Minute 1: Read the incident summary. The incident page shows a narrative summary, the alerts, the affected entities, and a timeline. Read the summary and the alert names — they tell you what Defender XDR thinks happened.

Minute 2: Check the entities. How many users are affected? Which devices? Are any of them high-value (executives, IT admins, domain controllers)? A single-user incident is different from one affecting 50 users.

Minute 3: Check the timeline. When did it start? Is there recent activity? An incident with its last alert 3 hours ago may be dormant. An incident with alerts from 5 minutes ago is potentially active.

Minute 4: Check automated actions. Has automatic attack disruption acted? Has AIR completed? If the user is already disabled and the device isolated, the immediate threat is contained — your focus shifts to verification and eradication.

Minute 5: Classify and decide.

AssessmentClassificationNext action
Clearly a true positive, actively ongoingTrue PositiveEscalate to Tier 2 / begin investigation immediately
Clearly a true positive, disruption already contained itTrue PositiveVerify containment, investigate scope, eradicate
Likely true positive, need more evidenceTrue Positive (Pending)Assign to yourself, begin investigation
Known false positive (recognized pattern)False PositiveClose with documentation
Cannot determine in 5 minutesUnknownAssign, investigate, decide after deeper analysis
Do not spend 30 minutes on triage

Triage is a classification decision, not an investigation. The goal is to determine priority and next action within 5 minutes. If you need more than 5 minutes, classify as "Unknown" and begin the investigation. The longer you spend triaging one incident, the longer other incidents sit unexamined.


Investigation workflow

After triage, the investigation follows the evidence from the incident down through the alerts to the raw data.

Level 1: The incident. Shows the big picture — how many alerts, which entities, what attack categories. This is your map.

Level 2: The alerts. Each alert within the incident tells a specific part of the story. “Suspicious sign-in activity” is one chapter. “Inbox rule with suspicious keywords” is another. Click each alert to see its details, evidence, and recommended actions.

Level 3: The entities. Click on a user to see their complete activity profile: recent sign-ins, devices, email activity, alerts. Click on a device to see its timeline, alerts, and security recommendations. Entities connect the dots between alerts.

Level 4: Advanced Hunting. When the portal investigation reaches its limit — you need to answer a question the alert details do not cover — pivot to Advanced Hunting and write a KQL query. This is where Module 6 pays off.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
// Example: investigate a user flagged in an incident
let targetUser = "j.morrison@northgateeng.com";
let incidentStart = datetime(2026-03-20T08:00:00Z);
let incidentEnd = datetime(2026-03-20T12:00:00Z);
union
    (IdentityLogonEvents | where Timestamp between (incidentStart .. incidentEnd)
        | where AccountUpn == targetUser
        | project Timestamp, ActionType, Application, IPAddress, Type),
    (EmailEvents | where Timestamp between (incidentStart .. incidentEnd)
        | where RecipientEmailAddress == targetUser
        | project Timestamp, ActionType = "EmailReceived", Application = SenderFromDomain,
            IPAddress = SenderIPv4, Type),
    (CloudAppEvents | where Timestamp between (incidentStart .. incidentEnd)
        | where AccountDisplayName has "morrison"
        | project Timestamp, ActionType, Application, IPAddress, Type)
| order by Timestamp asc
Expected Output — Entity Timeline from Advanced Hunting
TimestampActionTypeApplicationIPAddressType
08:02EmailReceivednorthgate-voicemail.com198.51.100.44EmailEvents
08:14LogonSuccessExchange Online198.51.100.44IdentityLogonEvents
08:15InboxRuleCreatedExchange Online198.51.100.44CloudAppEvents
Read this timeline: Phishing email received at 08:02 from an external domain. Successful logon from the same IP at 08:14 (12 minutes later — the user clicked the link and entered credentials on the AiTM proxy). Inbox rule created at 08:15 (attacker establishing persistence). Three events across three Defender products, all connected by the same IP and user. This is the cross-product investigation power of Advanced Hunting.

ACCOUNT CONTAINMENT SEQUENCE — ORDER MATTERS1. Disable2. Revoke3. Reset PW4. Investigate5. Eradicate6. Re-enable

Figure 1.4: The account containment sequence. Each step closes a gap the previous step does not: Disable kills sessions, Revoke invalidates tokens, Reset blocks re-auth with old password. Skipping or reordering leaves windows of continued attacker access.

Remediation actions

Once the investigation confirms the threat, take action. Defender XDR provides remediation actions directly from the incident and alert views.

ActionWhere to take itWhen to use it
Disable user accountIncident → User entity → Disable accountConfirmed account compromise — prevents further attacker access
Revoke user sessionsIncident → User entity → Revoke sessionsToken replay — invalidates all active tokens
Reset passwordIncident → User entity → Reset passwordCredential theft — forces new credential
Isolate deviceIncident → Device entity → Isolate deviceConfirmed device compromise — cuts network access
Soft delete emailsThreat Explorer or Alert → RemediatePhishing campaign — removes emails from mailboxes
Block senderAlert → Block senderOngoing campaign — prevents future delivery
Block file (custom indicator)Settings → Indicators → Add file hashMalware — blocks the file across all devices
Disable account before resetting password

If you reset the password without disabling the account first, the attacker's existing token may still be valid until it expires (typically 1 hour). Disable the account (kills all sessions immediately), then reset the password (prevents re-authentication with the old password), then re-enable the account when the user is ready. This sequence is critical for the Module 11 containment playbook.


Incident classification and closure

After investigation and remediation, classify and close the incident. This documentation drives SOC metrics and learning.

ClassificationWhen to useWhat it tells leadership
True PositiveThe alert was correct — a real threat was detectedDetection is working. Count these to measure detection value.
False PositiveThe alert was incorrect — no threat existsIndicates a tuning need. Count these to measure detection accuracy.
Benign True PositiveThe alert correctly detected the activity, but it was authorized (e.g., a penetration test)Detection works, but the activity was expected. No action needed.

Add a comment explaining what happened, what actions were taken, and any follow-up needed. This comment becomes the incident record — when your CISO asks “what happened with that high-severity incident last week,” the comment is the answer.

Try it yourself

Navigate to your Defender XDR incident queue. If there are incidents present (there may be informational-level ones even in a lab), open one and walk through the 5-minute triage framework: read the summary, check entities, check timeline, check automated actions, classify. If no incidents exist, navigate to Advanced Hunting and run the entity timeline query above (substituting your test user) to practice pivoting from an incident to KQL investigation.

In a lab environment, your incident queue is likely empty or contains only low-severity informational alerts. This is expected — no real attacks are occurring. The key learning is the navigation: you know where the queue is, how it is sorted, and what each column means. When a real incident appears (in production or during the Module 11 simulation), you will navigate to it instinctively.

If you ran the Advanced Hunting query and got results, you practiced the most important investigation pivot: from the portal UI to KQL. The portal shows you curated views; KQL shows you the raw data. Both are needed.

Check your understanding

1. You open the incident queue at shift start. There are 3 new incidents: High severity from 10 minutes ago, Medium severity from 2 hours ago, High severity from 6 hours ago with "Automatic attack disruption" noted. Which do you triage first?

The High severity from 10 minutes ago. It is the most recent and potentially still active. The other High severity incident (6 hours ago) has already been automatically contained by attack disruption — it needs verification, not emergency response. The Medium severity is lower priority. Sequence: recent-High → disrupted-High → Medium.
The oldest incident first
The one with automatic disruption — it is the most serious
The Medium severity — it has been waiting longest

2. An incident has been auto-disrupted: the user account is disabled and the device is isolated. What is your next step?

Verify the disruption was correct (true positive, not false positive), then investigate the scope: are other accounts affected? Was data exfiltrated? What access did the attacker have before disruption? Then eradicate (reset credentials, remove persistence mechanisms) and restore the user's access when clean. Auto-disruption handles the emergency; you handle the complete response.
Close the incident — the threat is contained
Re-enable the user immediately — they cannot work
Wait for the user to report the issue

3. During investigation, you need to see all sign-in activity for the affected user during a specific 4-hour window. The incident details show some sign-ins but you suspect there are more. Where do you go?

Advanced Hunting. Write a KQL query against IdentityLogonEvents (or union with AADSignInEventsBeta) filtered to the user and time window. The incident view shows curated evidence; Advanced Hunting shows all raw data. The query patterns from Module 6 (entity timeline, time-bounded filter) apply directly here.
The user's profile page in the portal
The Entra ID sign-in logs in the Azure portal
Ask the user what they were doing

4. You confirm an incident is a true positive. You disable the user account and revoke sessions. Your colleague says "just reset the password, that is enough." Why is disable + revoke + reset the correct sequence, not just reset?

Password reset changes the credential but does not invalidate existing tokens. A token stolen via AiTM remains valid until it expires (typically 1 hour). Disabling the account kills all sessions immediately. Revoking sessions invalidates tokens. Then password reset prevents re-authentication with the old credential. The sequence ensures zero window of continued access.
Disabling is not necessary if the password is reset
Revoking sessions is the same as resetting the password
The order does not matter