In this module
1.2 Mitigate Incidents Using Microsoft Defender XDR
Mitigate Incidents Using Microsoft Defender XDR
Introduction
Required role: Security Reader (minimum for portal navigation). Security Administrator for configuration changes.
An incident is a collection of correlated alerts that together describe an attack. Managing incidents — from initial triage through investigation to closure — is the core daily workflow of a SOC analyst. This subsection teaches you the complete incident lifecycle in Defender XDR: how incidents are created, how to triage them efficiently, how to investigate the underlying evidence, and how to remediate and close them.
// Example: investigate a user flagged in an incident
let targetUser = "j.morrison@northgateeng.com";
let incidentStart = datetime(2026-03-20T08:00:00Z);
let incidentEnd = datetime(2026-03-20T12:00:00Z);
union
(IdentityLogonEvents | where Timestamp between (incidentStart .. incidentEnd)
| where AccountUpn == targetUser
| project Timestamp, ActionType, Application, IPAddress, Type),
(EmailEvents | where Timestamp between (incidentStart .. incidentEnd)
| where RecipientEmailAddress == targetUser
| project Timestamp, ActionType = "EmailReceived", Application = SenderFromDomain,
IPAddress = SenderIPv4, Type),
(CloudAppEvents | where Timestamp between (incidentStart .. incidentEnd)
| where AccountDisplayName has "morrison"
| project Timestamp, ActionType, Application, IPAddress, Type)
| order by Timestamp ascTry it yourself
In a lab environment, your incident queue is likely empty or contains ...
In a lab environment, your incident queue is likely empty or contains only low-severity informational alerts. This is expected — no real attacks are occurring. The key learning is the navigation: you know where the queue is, how it is sorted, and what each column means. When a real incident appears (in production or during the Module 12 simulation), you will navigate to it instinctively.
If you ran the Advanced Hunting query and got results, you practiced the most important investigation pivot: from the portal UI to KQL. The portal shows you curated views; KQL shows you the raw data. Both are needed.
NIST CSF: DE.AE-1 (Baseline of operations established), PR.DS-1 (Data-at-rest is protected). ISO 27001: A.8.15 (Logging), A.8.16 (Monitoring activities). SOC 2: CC7.2 (Monitor system components). Every configuration in this subsection contributes to the logging and monitoring controls that auditors verify.
The myth: Default security settings are sufficient
The reality: Microsoft's security defaults provide a baseline — MFA for admins, blocking legacy authentication. But defaults do not configure: conditional access policies tailored to your risk profile, Defender for Office 365 anti-phishing policies for your specific impersonation targets, custom detection rules for your environment, or data loss prevention policies for your sensitive data. Defaults prevent the easiest attacks. Custom configuration prevents the attacks targeting YOUR organization.
Check your understanding
1. You open the incident queue at shift start. There are 3 new incidents: High severity from 10 minutes ago, Medium severity from 2 hours ago, High severity from 6 hours ago with "Automatic attack disruption" noted. Which do you triage first?
2. An incident has been auto-disrupted: the user account is disabled and the device is isolated. What is your next step?
3. During investigation, you need to see all sign-in activity for the affected user during a specific 4-hour window. The incident details show some sign-ins but you suspect there are more. Where do you go?
4. You confirm an incident is a true positive. You disable the user account and revoke sessions. Your colleague says "just reset the password, that is enough." Why is disable + revoke + reset the correct sequence, not just reset?
You manage NE's M365 security stack. Microsoft releases a new Defender feature in preview. The feature promises to reduce AiTM risk by 80%. Do you enable it immediately?
Not in production. Enable in a test tenant or for a pilot group first. Preview features may: change behavior before GA, have undocumented interactions with existing CA policies, or produce unexpected results in specific tenant configurations. The deployment sequence: (1) enable in a test tenant and validate against NE's CA policy set, (2) enable for a pilot group of 10 users for 2 weeks, (3) monitor for FPs and operational impact, (4) roll out to all users after successful pilot. Microsoft's '80% reduction' claim is based on their telemetry across all tenants — NE's specific configuration may produce different results.
You've set up your M365 tenant and learned the Defender XDR unified portal.
Module 0 got your M365 developer tenant configured with sample data. Module 1 took you through the Defender XDR unified incident queue across endpoint, email, identity, and cloud apps. Now you investigate every major M365 attack type and deploy the detections that catch them next time.
- 15 investigation and configuration modules — Defender for Endpoint, Purview, Defender for Cloud, Security Copilot, Sentinel workspace design, log ingestion, analytics rules, and threat hunting
- 5 named attack investigations — AiTM credential phishing, BEC and financial fraud, consent phishing and OAuth grant abuse, token replay and session hijacking, insider threat
- KQL from fundamentals through advanced hunting — dedicated modules on query language, cross-table joins, statistical analysis, and threat hunting queries
- SC-200 exam objectives fully covered — every module maps to the January 2026 SC-200 update. The certification is the side effect of operational competence, not the goal
- Production artefacts per module — detection rules, investigation playbooks, and hardening checklists you deploy to your own tenant