In this module
1.3 Remediate Risks with Microsoft Defender for Office 365
Remediate Risks with Microsoft Defender for Office 365
Introduction
Required role: Security Reader (minimum for portal navigation). Security Administrator for configuration changes.
Email is the #1 initial access vector. Over 90% of successful cyberattacks begin with a phishing email, a malicious attachment, or a business email compromise message. Microsoft Defender for Office 365 is the product that stands between these attacks and your users' inboxes.
// KQL equivalent in Advanced Hunting
EmailEvents
| where Timestamp > ago(7d)
| where SenderFromDomain == "northgate-voicemail.com"
| summarize
TotalEmails = count(),
Delivered = countif(DeliveryAction == "Delivered"),
Blocked = countif(DeliveryAction == "Blocked"),
Recipients = dcount(RecipientEmailAddress)
| project TotalEmails, Delivered, Blocked, RecipientsTry it yourself
Threat Explorer and Advanced Hunting query the same underlying data
Threat Explorer and Advanced Hunting query the same underlying data. Explorer provides a visual interface with filtering and bulk actions. Advanced Hunting provides KQL flexibility for custom analysis. During a phishing investigation, use Explorer for campaign scoping and bulk remediation. Use Advanced Hunting when you need to correlate email data with sign-in or endpoint data (the cross-product join from Module 6.3).
NIST CSF: DE.AE-1 (Baseline of operations established), PR.DS-1 (Data-at-rest is protected). ISO 27001: A.8.15 (Logging), A.8.16 (Monitoring activities). SOC 2: CC7.2 (Monitor system components). Every configuration in this subsection contributes to the logging and monitoring controls that auditors verify.
The myth: The Secure Score tells you how secure you are
The reality: Secure Score measures configuration compliance against Microsoft's recommended settings. It does not measure: whether your detection rules catch real attacks, whether your SOC can investigate an incident, whether your users recognize phishing, or whether your IR plan works under pressure. A tenant with a 95% Secure Score and no SOC is less secure than a tenant with a 70% Secure Score and a trained, practiced incident response team. Score is hygiene. Capability is security.
Check your understanding
1. A phishing campaign delivered 19 of 23 emails to inboxes. What is your first remediation action?
This detection capability integrates with the broader NE detection program — each rule contributes to the cumulative ATT&CK coverage that transforms NE from 7.2% baseline to 35%+ target coverage.
You manage NE's M365 security stack. Microsoft releases a new Defender feature in preview. The feature promises to reduce AiTM risk by 80%. Do you enable it immediately?
Not in production. Enable in a test tenant or for a pilot group first. Preview features may: change behavior before GA, have undocumented interactions with existing CA policies, or produce unexpected results in specific tenant configurations. The deployment sequence: (1) enable in a test tenant and validate against NE's CA policy set, (2) enable for a pilot group of 10 users for 2 weeks, (3) monitor for FPs and operational impact, (4) roll out to all users after successful pilot. Microsoft's '80% reduction' claim is based on their telemetry across all tenants — NE's specific configuration may produce different results.
You've set up your M365 tenant and learned the Defender XDR unified portal.
Module 0 got your M365 developer tenant configured with sample data. Module 1 took you through the Defender XDR unified incident queue across endpoint, email, identity, and cloud apps. Now you investigate every major M365 attack type and deploy the detections that catch them next time.
- 15 investigation and configuration modules — Defender for Endpoint, Purview, Defender for Cloud, Security Copilot, Sentinel workspace design, log ingestion, analytics rules, and threat hunting
- 5 named attack investigations — AiTM credential phishing, BEC and financial fraud, consent phishing and OAuth grant abuse, token replay and session hijacking, insider threat
- KQL from fundamentals through advanced hunting — dedicated modules on query language, cross-table joins, statistical analysis, and threat hunting queries
- SC-200 exam objectives fully covered — every module maps to the January 2026 SC-200 update. The certification is the side effect of operational competence, not the goal
- Production artefacts per module — detection rules, investigation playbooks, and hardening checklists you deploy to your own tenant