In this module

1.2 Mitigate Incidents Using Microsoft Defender XDR

10-14 hours · Module 1 · Free
Operational Objective
This subsection covers mitigate incidents using microsoft defender xdr — a core operational skill for security teams working in Microsoft 365 environments. Every concept is demonstrated through practical scenarios from the Northgate Engineering environment.
Deliverable: Working proficiency with the techniques and operational patterns covered in this subsection.
Estimated completion: 25 minutes

Mitigate Incidents Using Microsoft Defender XDR

Introduction

Required role: Security Reader (minimum for portal navigation). Security Administrator for configuration changes.

An incident is a collection of correlated alerts that together describe an attack. Managing incidents — from initial triage through investigation to closure — is the core daily workflow of a SOC analyst. This subsection teaches you the complete incident lifecycle in Defender XDR: how incidents are created, how to triage them efficiently, how to investigate the underlying evidence, and how to remediate and close them.

// Example: investigate a user flagged in an incident
let targetUser = "j.morrison@northgateeng.com";
let incidentStart = datetime(2026-03-20T08:00:00Z);
let incidentEnd = datetime(2026-03-20T12:00:00Z);
union
    (IdentityLogonEvents | where Timestamp between (incidentStart .. incidentEnd)
        | where AccountUpn == targetUser
        | project Timestamp, ActionType, Application, IPAddress, Type),
    (EmailEvents | where Timestamp between (incidentStart .. incidentEnd)
        | where RecipientEmailAddress == targetUser
        | project Timestamp, ActionType = "EmailReceived", Application = SenderFromDomain,
            IPAddress = SenderIPv4, Type),
    (CloudAppEvents | where Timestamp between (incidentStart .. incidentEnd)
        | where AccountDisplayName has "morrison"
        | project Timestamp, ActionType, Application, IPAddress, Type)
| order by Timestamp asc
Expand for Deeper Context

This is not theoretical. Every shift as a SOC analyst starts with the incident queue. You will learn the practical decision framework for: which incident do I look at first? Is this a true positive or a false positive? How far has the attack progressed? What action do I take? When do I escalate?

Here is what this subsection covers:

- How incidents are created — alert grouping, entity correlation, and automatic attack disruption - The incident queue — how to read it, sort it, and prioritize - Incident triage — the 5-minute assessment that determines your response - Investigation workflow — following evidence from the incident through alerts, entities, and raw data - Remediation actions — containing and eliminating the threat - Incident classification and closure — documenting the outcome for metrics and learning

INCIDENT LIFECYCLE IN DEFENDER XDR Alert Created XDR Correlates Triage (5 min) Investigate Remediate Close
Figure 1.3: The incident lifecycle from initial alert through XDR correlation, analyst triage, investigation, remediation, and closure. Each stage has specific actions and decision criteria covered in this subsection.

---

How incidents are created

Defender XDR creates an incident when one or more alerts share a common entity. The correlation logic evaluates:

- Shared user — multiple alerts involving the same UserPrincipalName - Shared device — multiple alerts involving the same DeviceId - Shared IP address — alerts referencing the same source IP - Shared email — alerts tied to the same message or campaign - Temporal proximity — alerts occurring within a time window that suggests a connected attack

A single alert can also become an incident if it is high-severity or triggers automated investigation.

Automatic attack disruption

Defender XDR can automatically disrupt attacks in progress without waiting for analyst intervention. When the correlation engine identifies a high-confidence, multi-stage attack (such as ransomware pre-encryption activity or BEC with active mail forwarding), it takes immediate containment actions:

- Disabling a compromised user account - Isolating a compromised device - Blocking a malicious OAuth application

These actions appear in the incident timeline with the label "Automatic attack disruption." They are reversible — you can re-enable the account or release the device if the action was a false positive.

Attack disruption acts within seconds — before you see the incident

By the time you open the incident queue, automatic disruption may have already contained the threat. Your job shifts from "stop the active attack" to "verify the disruption was correct, assess the damage, and eradicate the attacker's access." This is a fundamental change in the SOC workflow — the first response is automated, the analyst validates and completes the response.

---

The incident queue — your shift start

Navigate to security.microsoft.com → Incidents & alerts → Incidents. This is the queue you will check at the beginning of every shift.

DEFENDER XDR — INCIDENT QUEUE Severity Incident name Status Categories Impacted assets Last activity High Multi-stage attack: phishing → credential theft on j.morrison New Initial access, Credential access j.morrison, DESKTOP-NGE042 10 min ago High Suspicious inbox rule with mail forwarding on s.patel In progress Persistence, Collection s.patel, 3 Mailboxes 2 hours ago Medium Password spray from 198.51.100.0/24 targeting 12 accounts New Credential access 12 Accounts 45 min ago Medium Malware detected on LAPTOP-NGE017 — encoded PowerShell New Execution, Defense evasion m.chen, LAPTOP-NGE017 3 hours ago Low Impossible travel: r.williams signed in from GB and US in 30 min Resolved Initial access r.williams 6 hours ago All data shown uses fictional Northgate Engineering identities for training purposes.
Figure: The Defender XDR incident queue at security.microsoft.com → Incidents & alerts → Incidents. Each row represents a correlated incident with severity, name, status, attack categories, impacted assets, and last activity time. The analyst triages from highest severity and most recent activity first.

Key columns in the incident queue:

ColumnWhat it tells youHow to use it
SeverityHigh / Medium / Low / InformationalTriage high-severity first
Incident nameAuto-generated description of the attack typeProvides initial context before opening
StatusNew / In progress / ResolvedFilter to "New" at shift start
Assigned toWhich analyst owns the investigationFilter to "Unassigned" for new work
CategoriesAttack categories (phishing, malware, credential access, etc.)Helps prioritize by attack type
Alert countNumber of correlated alertsMore alerts = broader attack, may need higher priority
EntitiesUsers, devices, mailboxes, IPs involvedQuick scope assessment without opening the incident
Last activityWhen the most recent alert was generatedRecent activity = potentially still active
Automated investigationWhether AIR is running or completeCheck if automated response has already acted

Effective queue sorting:

1. Filter Status = "New" (only unworked incidents) 2. Sort by Severity descending (High first) 3. Within the same severity, prioritize incidents with recent "Last activity" (potentially still active) over older ones 4. Check the "Automated investigation" column — if AIR has already remediated a high-severity incident, it may need only verification, not full investigation

---

Incident triage — the 5-minute assessment

When you open an incident, your first task is not a deep investigation. It is a rapid assessment to determine: is this real? Is it still active? How bad is it? What do I do next?

The 5-minute triage framework:

Minute 1: Read the incident summary. The incident page shows a narrative summary, the alerts, the affected entities, and a timeline. Read the summary and the alert names — they tell you what Defender XDR thinks happened.

Minute 2: Check the entities. How many users are affected? Which devices? Are any of them high-value (executives, IT admins, domain controllers)? A single-user incident is different from one affecting 50 users.

Minute 3: Check the timeline. When did it start? Is there recent activity? An incident with its last alert 3 hours ago may be dormant. An incident with alerts from 5 minutes ago is potentially active.

Minute 4: Check automated actions. Has automatic attack disruption acted? Has AIR completed? If the user is already disabled and the device isolated, the immediate threat is contained — your focus shifts to verification and eradication.

Minute 5: Classify and decide.

AssessmentClassificationNext action
Clearly a true positive, actively ongoingTrue PositiveEscalate to Tier 2 / begin investigation immediately
Clearly a true positive, disruption already contained itTrue PositiveVerify containment, investigate scope, eradicate
Likely true positive, need more evidenceTrue Positive (Pending)Assign to yourself, begin investigation
Known false positive (recognized pattern)False PositiveClose with documentation
Cannot determine in 5 minutesUnknownAssign, investigate, decide after deeper analysis
Do not spend 30 minutes on triage

Triage is a classification decision, not an investigation. The goal is to determine priority and next action within 5 minutes. If you need more than 5 minutes, classify as "Unknown" and begin the investigation. The longer you spend triaging one incident, the longer other incidents sit unexamined.

---

Investigation workflow

After triage, the investigation follows the evidence from the incident down through the alerts to the raw data.

Level 1: The incident. Shows the big picture — how many alerts, which entities, what attack categories. This is your map.

Level 2: The alerts. Each alert within the incident tells a specific part of the story. "Suspicious sign-in activity" is one chapter. "Inbox rule with suspicious keywords" is another. Click each alert to see its details, evidence, and recommended actions.

Level 3: The entities. Click on a user to see their complete activity profile: recent sign-ins, devices, email activity, alerts. Click on a device to see its timeline, alerts, and security recommendations. Entities connect the dots between alerts.

Level 4: Advanced Hunting. When the portal investigation reaches its limit — you need to answer a question the alert details do not cover — pivot to Advanced Hunting and write a KQL query. This is where Module 6 pays off.

Expected Output — Entity Timeline from Advanced Hunting
TimestampActionTypeApplicationIPAddressType
08:02EmailReceivednorthgate-voicemail.com198.51.100.44EmailEvents
08:14LogonSuccessExchange Online198.51.100.44IdentityLogonEvents
08:15InboxRuleCreatedExchange Online198.51.100.44CloudAppEvents
Read this timeline: Phishing email received at 08:02 from an external domain. Successful logon from the same IP at 08:14 (12 minutes later — the user clicked the link and entered credentials on the AiTM proxy). Inbox rule created at 08:15 (attacker establishing persistence). Three events across three Defender products, all connected by the same IP and user. This is the cross-product investigation power of Advanced Hunting.

---

ACCOUNT CONTAINMENT SEQUENCE — ORDER MATTERS 1. Disable 2. Revoke 3. Reset PW 4. Investigate 5. Eradicate 6. Re-enable
Figure 1.4: The account containment sequence. Each step closes a gap the previous step does not: Disable kills sessions, Revoke invalidates tokens, Reset blocks re-auth with old password. Skipping or reordering leaves windows of continued attacker access.

Remediation actions

Once the investigation confirms the threat, take action. Defender XDR provides remediation actions directly from the incident and alert views.

ActionWhere to take itWhen to use it
Disable user accountIncident → User entity → Disable accountConfirmed account compromise — prevents further attacker access
Revoke user sessionsIncident → User entity → Revoke sessionsToken replay — invalidates all active tokens
Reset passwordIncident → User entity → Reset passwordCredential theft — forces new credential
Isolate deviceIncident → Device entity → Isolate deviceConfirmed device compromise — cuts network access
Soft delete emailsThreat Explorer or Alert → RemediatePhishing campaign — removes emails from mailboxes
Block senderAlert → Block senderOngoing campaign — prevents future delivery
Block file (custom indicator)Settings → Indicators → Add file hashMalware — blocks the file across all devices
Disable account before resetting password

If you reset the password without disabling the account first, the attacker's existing token may still be valid until it expires (typically 1 hour). Disable the account (kills all sessions immediately), then reset the password (prevents re-authentication with the old password), then re-enable the account when the user is ready. This sequence is critical for the Module 12 containment playbook.

---

Incident classification and closure

After investigation and remediation, classify and close the incident. This documentation drives SOC metrics and learning.

ClassificationWhen to useWhat it tells leadership
True PositiveThe alert was correct — a real threat was detectedDetection is working. Count these to measure detection value.
False PositiveThe alert was incorrect — no threat existsIndicates a tuning need. Count these to measure detection accuracy.
Benign True PositiveThe alert correctly detected the activity, but it was authorized (e.g., a penetration test)Detection works, but the activity was expected. No action needed.

Add a comment explaining what happened, what actions were taken, and any follow-up needed. This comment becomes the incident record — when your CISO asks "what happened with that high-severity incident last week," the comment is the answer.

Try it yourself

In a lab environment, your incident queue is likely empty or contains ...
Navigate to your Defender XDR incident queue. If there are incidents present (there may be informational-level ones even in a lab), open one and walk through the 5-minute triage framework: read the summary, check entities, check timeline, check automated actions, classify. If no incidents exist, navigate to Advanced Hunting and run the entity timeline query above (substituting your test user) to practice pivoting from an incident to KQL investigation.

In a lab environment, your incident queue is likely empty or contains only low-severity informational alerts. This is expected — no real attacks are occurring. The key learning is the navigation: you know where the queue is, how it is sorted, and what each column means. When a real incident appears (in production or during the Module 12 simulation), you will navigate to it instinctively.

If you ran the Advanced Hunting query and got results, you practiced the most important investigation pivot: from the portal UI to KQL. The portal shows you curated views; KQL shows you the raw data. Both are needed.

Compliance mapping

NIST CSF: DE.AE-1 (Baseline of operations established), PR.DS-1 (Data-at-rest is protected). ISO 27001: A.8.15 (Logging), A.8.16 (Monitoring activities). SOC 2: CC7.2 (Monitor system components). Every configuration in this subsection contributes to the logging and monitoring controls that auditors verify.

Compliance Myth: "Default security settings are sufficient"

The myth: Default security settings are sufficient

The reality: Microsoft's security defaults provide a baseline — MFA for admins, blocking legacy authentication. But defaults do not configure: conditional access policies tailored to your risk profile, Defender for Office 365 anti-phishing policies for your specific impersonation targets, custom detection rules for your environment, or data loss prevention policies for your sensitive data. Defaults prevent the easiest attacks. Custom configuration prevents the attacks targeting YOUR organization.


Check your understanding

1. You open the incident queue at shift start. There are 3 new incidents: High severity from 10 minutes ago, Medium severity from 2 hours ago, High severity from 6 hours ago with "Automatic attack disruption" noted. Which do you triage first?

The High severity from 10 minutes ago. It is the most recent and potentially still active. The other High severity incident (6 hours ago) has already been automatically contained by attack disruption — it needs verification, not emergency response. The Medium severity is lower priority. Sequence: recent-High → disrupted-High → Medium.
The oldest incident first
The one with automatic disruption — it is the most serious
The Medium severity — it has been waiting longest

2. An incident has been auto-disrupted: the user account is disabled and the device is isolated. What is your next step?

Verify the disruption was correct (true positive, not false positive), then investigate the scope: are other accounts affected? Was data exfiltrated? What access did the attacker have before disruption? Then eradicate (reset credentials, remove persistence mechanisms) and restore the user's access when clean. Auto-disruption handles the emergency; you handle the complete response.
Close the incident — the threat is contained
Re-enable the user immediately — they cannot work
Wait for the user to report the issue

3. During investigation, you need to see all sign-in activity for the affected user during a specific 4-hour window. The incident details show some sign-ins but you suspect there are more. Where do you go?

Advanced Hunting. Write a KQL query against IdentityLogonEvents (or union with AADSignInEventsBeta) filtered to the user and time window. The incident view shows curated evidence; Advanced Hunting shows all raw data. The query patterns from Module 6 (entity timeline, time-bounded filter) apply directly here.
The user's profile page in the portal
The Entra ID sign-in logs in the Azure portal
Ask the user what they were doing

4. You confirm an incident is a true positive. You disable the user account and revoke sessions. Your colleague says "just reset the password, that is enough." Why is disable + revoke + reset the correct sequence, not just reset?

Password reset changes the credential but does not invalidate existing tokens. A token stolen via AiTM remains valid until it expires (typically 1 hour). Disabling the account kills all sessions immediately. Revoking sessions invalidates tokens. Then password reset prevents re-authentication with the old credential. The sequence ensures zero window of continued access.
Disabling is not necessary if the password is reset
Revoking sessions is the same as resetting the password
The order does not matter
Decision point

You manage NE's M365 security stack. Microsoft releases a new Defender feature in preview. The feature promises to reduce AiTM risk by 80%. Do you enable it immediately?

Not in production. Enable in a test tenant or for a pilot group first. Preview features may: change behavior before GA, have undocumented interactions with existing CA policies, or produce unexpected results in specific tenant configurations. The deployment sequence: (1) enable in a test tenant and validate against NE's CA policy set, (2) enable for a pilot group of 10 users for 2 weeks, (3) monitor for FPs and operational impact, (4) roll out to all users after successful pilot. Microsoft's '80% reduction' claim is based on their telemetry across all tenants — NE's specific configuration may produce different results.

You've set up your M365 tenant and learned the Defender XDR unified portal.

Module 0 got your M365 developer tenant configured with sample data. Module 1 took you through the Defender XDR unified incident queue across endpoint, email, identity, and cloud apps. Now you investigate every major M365 attack type and deploy the detections that catch them next time.

Unlock the full course with Premium See Full Syllabus
← Previous Next →