3.5 Notifications, RBAC, and Exam Relevance
Notification Rules
You should not be checking the incident queue every 5 minutes. Notification rules push alerts to you through email or Teams when specific conditions are met — high-severity incidents, incidents involving VIP users, or incidents from specific products.
Setting up effective notifications
What to notify on:
- All high-severity incidents — these require immediate attention regardless of time of day
- Any incident involving accounts on your VIP watchlist
- Any incident classified as “Active compromise” by attack disruption
What NOT to notify on:
- Every new incident regardless of severity — this creates notification fatigue identical to alert fatigue
- Informational severity alerts — these are awareness items, not action items
- Alerts you have already suppressed — notifications should respect your tuning decisions
Email notifications are for non-urgent awareness. Teams channel notifications are for team coordination. Direct Teams messages or phone calls (via integration with your on-call system) are for true emergencies. Map your notification channels to severity levels so the delivery mechanism itself signals urgency.
RBAC in the Defender Portal
Role-Based Access Control determines what each analyst can see and do. Proper RBAC is not just a security control — it prevents accidents. A Tier 1 analyst who can isolate a production server without approval is a risk to operational stability.
Figure 3.5: RBAC tiers in a typical SOC. Permissions increase with responsibility and experience.
Key Defender XDR roles
| Role | What it can do |
|---|---|
| Security Reader | View incidents, alerts, hunting results. No actions. |
| Security Operator | View + take response actions (isolate, remediate, approve). |
| Security Administrator | All operator permissions + modify rules, manage configuration. |
It is tempting to give every analyst full access to avoid permission issues. This eliminates the safety net that RBAC provides. A Tier 1 analyst with Security Administrator can accidentally delete a detection rule, modify a suppression that hides real attacks, or change a conditional access policy. Least privilege is not bureaucracy — it is protection against honest mistakes.
SC-200 Exam Relevance
The Defender XDR portal navigation is tested extensively in the SC-200 exam under “Manage a security operations environment” (20–25% of the exam). Expect questions about:
- Incident triage and classification
- Alert tuning and suppression rules
- Advanced hunting — when to use it vs the incident queue
- Response actions — which action for which scenario
- RBAC — which role permits which actions
- Attack disruption — when it activates and what it does
Module 3 — Key takeaways
- The Defender XDR portal at security.microsoft.com is the single interface for all SOC operations
- Incidents contain correlated alerts from multiple products — navigate top-down (incident → alert → evidence)
- Triage is a 60-second decision, not a 30-minute investigation. Check title, alert count, entities, time.
- VIP user involvement escalates any severity level to immediate investigation
- Always classify incidents (TP, FP, informational) — this feedback improves detection quality
- Suppression rules must be scoped narrowly to avoid creating blind spots
- Advanced hunting is proactive — it finds things the incident queue never will
- Response actions have blast radius — match containment severity to investigation confidence
- Attack disruption fires only for high-confidence, high-severity scenarios at machine speed
- RBAC follows least privilege — Tier 1 can view, Tier 2 can act, Tier 3/Admin can configure
Module 3 — Final knowledge check
1. You need to query across EmailEvents and SigninLogs simultaneously. Where do you do this?
2. A Security Reader cannot take response actions. A Security Operator can. What is the additional capability of a Security Administrator?
3. When does Attack Disruption activate?
4. You find a recurring false positive that fires 10 times per day. What is the correct tuning action?
5. Which incident page tab should you check first when triaging a new incident?