Career upgrade: Learn practical AI skills for better jobs and higher pay.
Level up
Cheat sheet

Microsoft SC-200 Cheat Sheet

Manage SecOps Environment

40-45%of exam

Automation ConfigSentinel PlatformData ConnectorsDetectionsAnalytics RulesDefender for Endpoint

Respond to Incidents

35-40%of exam

XDR InvestigationEndpoint ActionsCopilot for SecurityDefender WorkloadsM365 ActivitiesCase Management

Perform Threat Hunting

20-25%of exam

KQL OperatorsAdvanced Hunting TablesSentinel GraphHunting QueriesData Lake JobsNotebooks + MCP

Quick Facts

Exam
SC-200
Credential
Security Operations Analyst
Time
100 min
Questions
40-60
Pass
700/1000
Fee
$165 USD
Level
Associate
Blueprint
Apr 16 2026

Analytics Rule Types

Scheduled NRT Security TI ML

Scheduled: KQLNRT: ~1 minSecurity: promoteTI: IOCML: anomaly

Analytics vs Automation Rule

Analytics Rule

  • Detects threats
  • Creates alerts
  • KQL/ML logic

Automation Rule

  • Triggers on incident
  • Assigns/tags/closes
  • Calls playbooks

Detect vs orchestrate

Which Sentinel Rule

  1. Custom KQL logicScheduled rule(Interval)
  2. Lowest latency alertNRT rule(~1 min)
  3. Promote Defender alertsMicrosoft security rule(Built-in)
  4. Match IOC feedThreat intelligence rule(Indicators)
  5. Multi-stage correlationFusion(ML built-in)
  6. Behavior baselineAnomaly rule(ML/UEBA)
  7. Pre-aggregate big dataSummary rule(Data lake)

XDR Automation

AIR
Automated investigation response
Attack disruption
Auto-contain in-progress attack
Automation level
Full vs semi remediation
ASR rules
Block risky behaviors
Email notifications
Incident/threat alerts
Alert tuning
Suppress/correlate alerts
Device groups
Scope automation/RBAC
Live response
Remote device shell

Sentinel Tiers

Analytics -> Data lake -> XDR

Analytics: hotData lake: cheapXDR: Defender tables

Playbook vs Automation Rule

Playbook

  • Logic App workflow
  • External actions
  • Reusable steps

Automation Rule

  • Native conditions
  • Sequences playbooks
  • No-code routing

Workflow vs router

Which Data Connector

  1. Windows security eventsSecurity Events AMA(DCR scoped)
  2. No agent allowedWEF(Event forwarding)
  3. Linux logsSyslog via AMA(RFC syslog)
  4. Firewall/applianceCEF via AMA(Common format)
  5. Azure resource logsDiagnostic settings(Activity)
  6. External IOC feedTI connector(TAXII/API)
  7. Custom app dataCustom log table(Ingestion API)

Sentinel Platform

Workspace
Log Analytics backing
Analytics tier
Hot interactive queries
Data lake tier
Cheap long retention
XDR tier
Defender table retention
Sentinel roles
Reader/Responder/Contributor
Workbooks
Visualization dashboards
SOC optimization
Coverage/cost tuning
Watchlists
Reference enrichment data

Domain Order

Manage 40-45 Respond 35-40 Hunt 20-25

Manage: buildRespond: actHunt: search

Defender XDR vs Sentinel

Defender XDR

  • Microsoft-only signals
  • Native correlation
  • Auto remediation

Sentinel

  • Any source SIEM
  • Custom KQL rules
  • SOAR + workbooks

XDR vs SIEM

Data Connectors

AMA
Azure Monitor Agent
Security Events AMA
Windows security events
WEF
Windows Event Forwarding
Syslog via AMA
Linux/network logs
CEF via AMA
Appliance common format
DCR
Data collection rule
Azure activity
Diagnostic settings
Custom log tables
Bespoke ingestion

NRT vs Scheduled Rule

NRT

  • ~1 min latency
  • One table only
  • No lookback join

Scheduled

  • Interval cadence
  • Complex joins
  • Lookback window

Speed vs flexibility

Analytics Rule Types

Scheduled
KQL on interval
NRT
Near-real-time, ~1 min
Microsoft security
Promote Defender alerts
Threat intelligence
Match IOC indicators
Anomaly
ML baseline deviation
Fusion
Multi-stage correlation
Entity mapping
Tie rows to entities
Incident grouping
Alerts into incident

Threat Intelligence

Indicator (IOC)
IP/URL/hash/domain
TI connector
TAXII or upload API
ThreatIntelligenceIndicator
Sentinel IOC table
TI analytics rule
Match logs to IOC
MITRE ATT&CK
Tactic/technique mapping
Threat analytics
XDR campaign reports
UEBA
Behavior anomaly scoring
Custom detection
Hunting query to rule

Endpoint Actions

Isolate Collect Live Restrict

Isolate: containCollect: forensicsLive: shellRestrict: allowlist

Incident vs Alert

Alert

  • Single detection
  • One signal
  • Rule output

Incident

  • Grouped alerts
  • Full attack story
  • Investigation unit

Signal vs case

Which Defender Product

  1. Endpoint malwareDefender for Endpoint(EDR)
  2. Phishing emailDefender for Office 365(Email)
  3. On-prem AD attackDefender for Identity(Lateral move)
  4. Risky SaaS appDefender for Cloud Apps(CASB)
  5. Risky sign-inEntra ID Protection(Identity risk)
  6. VM/container threatDefender for Cloud(Workload)
  7. Data exfil/auditPurview(Compliance)
  8. Cross-product attackDefender XDR(Correlation)

Defender XDR Products

Defender XDR
Unified portal correlation
Defender Endpoint
Device EDR
Defender Identity
On-prem AD signals
Defender Office 365
Email/collab threats
Defender Cloud Apps
SaaS/CASB control
Entra ID Protection
Risky users/sign-ins
Defender for Cloud
Workload protection
Purview
Data/audit signals

Pick Response Action

  1. Active C2 deviceIsolate device(Contain)
  2. Need forensicsCollect package(Evidence)
  3. Hands-on triageLive response(Remote shell)
  4. Unknown binaryRestrict app exec(Allowlist)
  5. Compromised mailboxDisable user + reset(Identity)
  6. Malicious emailSoft delete(O365 action)
  7. Repetitive triageAutomation rule(SOAR)

Response Actions

Isolate device
Cut network access
Live response
Remote investigation shell
Collect package
Investigation forensic bundle
Restrict app exec
Allow signed only
Soft delete email
Office 365 remediation
Disable user
Block Entra identity
Confirm compromised
Raise user risk
Case management
Track incident lifecycle

Defender for Cloud

Secure score
Posture percentage
Recommendation
Hardening action
Defender plan
Workload protection toggle
Servers plan
VM EDR + alerts
Containers plan
AKS/registry threats
JIT VM access
Time-boxed port open
FIM
File integrity monitoring
Exemption
Waive recommendation

Copilot for Security

Embedded experience
Inside Defender portal
Standalone portal
securitycopilot.microsoft.com
Agentic AI
Autonomous investigation steps
Incident summary
Auto narrative writeup
Promptbook
Reusable prompt sequence
Plugins
Connect data sources
SCU
Security compute unit
SC-5006
Applied Skills credential

KQL Pipeline

Where -> Project -> Summarize -> Join

where: filterproject: columnssummarize: aggregatejoin: combine

Workbook vs Hunting Query

Workbook

  • Visual dashboard
  • Monitor trends
  • Shared view

Hunting Query

  • Proactive search
  • Find unknown threats
  • Bookmark evidence

Visualize vs search

KQL Operators

where
Filter rows
project
Select/rename columns
extend
Add computed column
summarize
Aggregate by group
join
Combine two tables
union
Stack multiple tables
ago()
Relative time window
bin()
Bucket timestamps
evaluate
Plugin (parse, bag)
let
Reusable variable

Analytics vs Data Lake

Analytics tier

  • Hot interactive
  • Real-time rules
  • Higher cost

Data lake tier

  • Cheap retention
  • KQL jobs/batch
  • Long-term hunt

Hot vs cold

Advanced Hunting Tables

DeviceEvents
Endpoint activity
DeviceProcessEvents
Process creation
DeviceNetworkEvents
Endpoint connections
EmailEvents
Office 365 mail flow
IdentityLogonEvents
On-prem AD logons
SigninLogs
Entra ID sign-ins
AlertEvidence
Alert-linked entities
SecurityIncident
Sentinel incidents

Sentinel Hunting

Hunting query
Proactive saved KQL
Bookmark
Save hunt evidence
Livestream
Active query session
Sentinel Graph
Entity relationship map
Blast radius
Impact spread view
KQL jobs
Data lake batch query
Summary rules
Pre-aggregate tables
Notebooks + MCP
Sentinel MCP Server hunt

Common Traps

Detect vs orchestrate

Analytics rule detects Automation rule responds

Workflow vs router

Playbook runs steps Automation rule sequences

Signal vs case

Alert is one signal Incident groups alerts

XDR vs SIEM

XDR Microsoft sources Sentinel any source

Speed vs flexibility

NRT one table Scheduled joins/lookback

Hot vs cold

Analytics interactive Data lake batch jobs

Identity owner

Defender Identity on-prem Entra Protection cloud

Last Minute

  1. 1.Weights: 40-45 / 35-40 / 20-25
  2. 2.Analytics = detect; Automation = respond
  3. 3.Playbook = Logic App workflow
  4. 4.NRT = ~1 min, one table
  5. 5.Alert = signal; Incident = case
  6. 6.XDR = Microsoft; Sentinel = any source
  7. 7.Isolate device = contain C2
  8. 8.Defender Identity = on-prem AD
  9. 9.Data lake = cheap long retention
  10. 10.TI rule matches IOC indicators
  11. 11.Sentinel Graph = entity relationships
  12. 12.Copilot embedded in Defender portal
Same family resources

Explore More Microsoft Certifications

Continue into nearby exams from the same family. Each card keeps practice questions, study guides, flashcards, videos, and articles in one place.