1.9 Module Summary

10-14 hours · Module 1 · Free

Module 1 Summary

What you learned

This module taught you to operate the Microsoft Defender XDR platform — the unified security interface that every SOC analyst uses daily. You learned the four Defender products and their detection domains, the incident lifecycle from triage to closure, investigation techniques for email, endpoint, identity, and cloud app threats, and the operational workflow that ties it all together.

Skills checklist

After completing this module, you should be able to say:

  • I understand the four Defender pillars (Endpoint, Office 365, Identity, Cloud Apps) and what each detects
  • I can navigate the Defender XDR portal and find the incident queue, Advanced Hunting, Threat Explorer, and Action center
  • I can triage an incident in 5 minutes using the assessment framework
  • I understand how XDR correlation groups alerts into incidents
  • I can investigate email threats using Threat Explorer and take remediation actions (soft delete, block)
  • I can read a device timeline and interpret process trees for malware detection
  • I understand Defender for Identity detections (Kerberoasting, pass-the-hash, reconnaissance)
  • I can investigate cloud app threats using CloudAppEvents (inbox rules, OAuth abuse)
  • I know the daily SOC shift-start routine (queue, handover, pipeline health, threat analytics)
  • I can build cross-product KQL queries that trace an attack across email, identity, endpoint, and cloud apps
  • I can document investigation progress in incident comments for handover

SC-200 exam objectives covered

Domain 1 — Manage a SOC Environment:

  • Configure settings in Microsoft Defender XDR (1.1)
  • Manage automated investigation and response (1.2)
  • Configure automatic attack disruption (1.2)

Domain 3 — Manage Incident Response:

  • Investigate and remediate threats by using Defender for Office 365 (1.3)
  • Respond to Defender for Endpoint alerts, device timelines, response actions (1.4)
  • Investigate identity alerts from Defender for Identity (1.5)
  • Investigate cloud app risks from Defender for Cloud Apps (1.6)

Bridge to Module 7

Module 7 (Configure Your Microsoft Sentinel Environment) extends your investigation capabilities beyond the Defender XDR portal. Sentinel ingests data from Defender XDR AND from third-party sources — firewalls, Linux servers, custom applications — giving you a broader view. The KQL skills from Module 6 and the investigation patterns from this module carry directly into the Sentinel environment.