SC-200 Tests SOC Operations Judgment in Microsoft Defender and Sentinel
The exam tests incident triage, threat hunting, and response decision-making using Microsoft's security operations stack — not generic SOC theory.
Check Your Readiness →Most candidates understand Microsoft Security Operations Analyst concepts — and still fail. This exam tests how you apply knowledge under pressure.
SC-200 tests SecOps analyst skills across the Microsoft Defender suite and Microsoft Sentinel. Know the specific capabilities of each Defender product and how Sentinel connects and automates across them.
Investigate each alert individually
Use Microsoft Defender XDR's incident correlation — correlated alerts from multiple products are grouped into a single incident; investigate the incident holistically to understand the full attack chain before responding
Disable the rule until it can be refined
Tune the analytics rule by adding entity exclusions, adjusting the threshold, or refining the KQL query — disabling a detection rule creates a blind spot; tuning maintains detection while reducing noise
Run an antivirus scan immediately
Isolate the device first (MDE device isolation) to prevent lateral movement and ransomware spread across the network; then collect investigation package and run scans in the contained state
Sentinel is the enterprise SIEM/SOAR — it ingests data from multiple sources, correlates across them, and orchestrates responses. Defender XDR is the cross-domain threat protection product that feeds signals into Sentinel. They work together but serve different functions.
SC-200 tests the MDE response workflow: Isolate device (contain) → Collect investigation package → Run antivirus scan → Restrict app execution — in that order. Jumping to remediation before containment allows lateral movement.
SC-200 requires basic KQL proficiency for writing Sentinel analytics rules and hunting queries. Candidates who haven't practiced KQL fail questions about building detection logic or interpreting hunting results.
Analytics rules in Sentinel detect threats by generating alerts/incidents. Playbooks automate response actions triggered by those incidents. They're distinct components in the Sentinel workflow — candidates confuse their function.
Defender for Identity monitors on-premises Active Directory for identity-based attacks (Pass-the-Hash, Kerberoasting, reconnaissance). It does not cover cloud identity (Entra ID) — that's Entra ID Protection. Candidates conflate these two identity protection products.
SC-200 tests Microsoft security operations judgment. Test whether you can triage, hunt, and respond effectively.