
Welcome to the third section of my SC-200 study guide. First the ones that I didn’t have time to include in the last section but will cover them in different order as in my opinion it makes more sense:
- Configure Microsoft Defender for Cloud Apps to generate alerts and reports to detect threats
- Identify, investigate, and remediate security risks by using Microsoft Defender for Cloud Apps
And then I will go through the following content:
- Manage data retention, alert notification, and advanced features
- Recommend security baselines for devices
- Respond to incidents and alerts
- Manage automated investigations and remediations
- Assess and recommend endpoint configurations to reduce and remediate vulnerabilities by using the Microsoft’s threat and vulnerability management solution
- Manage endpoint threat indicators
Table of Contents
Microsoft Defender for Cloud Apps
Microsoft Defender for Cloud Apps is a Cloud Access Security Broker (CASB) that provides advanced security capabilities to protect cloud-based applications and services. It offers a range of deployment options, including log collection, API connectors, and reverse proxy, to provide comprehensive visibility and control over data movement and security threats.
With its advanced analytics and machine learning capabilities, Microsoft Defender for Cloud Apps can detect and respond to security threats in real-time, helping organizations to prevent data breaches, cyber attacks, and other security incidents.
Click the picture for licensing details of different solutions. It will download and PDF file.

How does Defender for Cloud apps compare?
There is similar capabilities in different products, Microsoft has made some comparisons for you to see the differences.
Defender for Cloud Apps vs Office 365 Cloud App Security

Microsoft Defender for Cloud Apps vs Cloud App Discovery

New home for the portal
First things first, have you seen that Defender for Cloud Apps has been integrated as part of Defender for Office 365? The feature is still in preview and could change before it goes GA but excellent step on consolidating different parts.

You can still open the old portal and do the setup there but you are strongly advised to user Defender for Office 365 portal


Configure Microsoft Defender for Cloud Apps to generate alerts and reports to detect threats
Identity based protection policies has been moved under Global alerts

And you will find them here https://security.microsoft.com/settings/mtp_settings/service_alert_settings

And SMS alerts has been deprecated

But you can enable them with Power Automate flows

Creating policies
To create get alerts, you need to first create an policy

Or you can use predefined templates

You have these policies that you can choose from

Let’s use File policy as an example
When creating file policy, you these templates ready to use

You can choose the sending domain and other filters, you can also preview the results to see what files trigger the policy

You can then send the alerts as email and trigger Power Automate flow like mentioned earlier.

And you can also do some governance based on the policy

Once the policy is create, you will see actions is Alert and you can also view all alerts from the same menu

Privileged user activity
You can also monitor other things, like Privileged user logins, I will make it easy and

And put alerts on

If you want to see what Cloud provider means, you can see open the addresses here

There is an predefined list of public addresses

Once done, you will see the policy ready for action

Alerts
You will see the alerts under old portal and Defender for Office 365 portal

And the new one, you can see the source as Cloud Apps

Will not cover the old portal, only the new one. When you open the alert, you will the details and the already created incident that it’s linked to

When you scroll down in the right side, you will the Application and more information on the account that triggered the alert


And you can mark the alerts

What the three options mean?
- True positive: An alert on a confirmed malicious activity
- Benign: An alert on a suspicious but not malicious activity, such as a penetration test or other authorized suspicious action
- False positive: An alert on a non-malicious activity
Identify, investigate, and remediate security risks by using Microsoft Defender for Cloud Apps
Then to the hunting part, now the we the incident and let’s see what is under it.
Incidents and remediation
When you click the incident link, you will be taken to the familiar Incident page


Under Users you can expand the User information page

From there you will see all the activities the user has done and their status in the organization

Including their location and the activities done in that location, you can start a new query based on the location and see all the activities for all users

From the timeline, you will see all actions done by that specific user

From Incident main page, you can see Evidence and Response activities, in this case all the details of the public IP-address

And you can add it to Cloud apps IP ranges


Or go hunt some more and also investigate Activity logs

Finally you can assign forward, with a reason, classification and comments

See here for the full documentation from Learn

Mitigate endpoint threats by using Microsoft Defender for Endpoint
Getting your trial
Microsoft has good material for the process

In short, just click the following link to get your 90 days 25 seat trial
Another side note is that you can redirect the traffic to Defender for Office 365 also from Defender for Endpoint

Onboarding devices
The table below provides the various tools based on the endpoint that needs to be onboarded.
Microsoft has made an presentation on how and when to use what onboarding model.

How the signals are transferred to Defender from different sources

Call-out | Description |
---|---|
1 | Devices are on-boarded through one of the supported management tools. |
2 | On-boarded devices provide and respond to Microsoft Defender for Endpoint signal data. |
3 | Managed devices are joined and/or enrolled in Azure Active Directory. |
4 | Domain-joined Windows devices are synchronized to Azure Active Directory using Azure Active Directory Connect. |
5 | Microsoft Defender for Endpoint alerts, investigations, and responses are managed in Microsoft 365 Defender. |
This what the script looks like

Once Onboarded you will them under Assets and Devices

Now when that’s done, let’s see how it works
Simulations & tutorials
I will use the simulation templates for generating alerts. You standalone ones under Tutorials

See more here on the evaluation lab itself

Manage data retention, alert notification, and advanced features
Data encryption
The Defender for Endpoint service makes use of cutting-edge data protection solutions built on Microsoft Azure infrastructure.
Our service takes care of a variety of data protection-related issues. One of the most important is encryption, which includes data encryption at rest, encryption in flight, and key management via Key Vault.
In all scenarios, data is encrypted using 256-bit AES encryption at the minimum.
Data retention
At service onboarding
Data from Microsoft Defender for Endpoint is maintained for 180 days after service onboarding and is viewable across the portal. Yet, it is accessible via a query in the advanced hunting research experience for a period of 30 days.
When a contract expires or is terminated
While the license is in grace period or suspended mode, your data will be saved and accessible to you. No later than 180 days after contract termination or expiration, such data will be wiped from Microsoft’s systems, rendering it unrecoverable.
Data on Advanced Hunting
Advanced hunting is a threat-hunting technology that uses queries to search through up to 30 days of raw data.
Alert notification
You can configure the vulnerability events that trigger notifications and add or remove email notification recipients using the notification rules. After vulnerabilities are added, new recipients are notified.
If you use RBAC, receivers will only get notifications based on the device groups specified in the notification rule. Only users with the appropriate authorization can create, update, or delete notifications that are exclusive to their device group management scope. Only users with the Global administrator role have access to the notification rules that are set up for all device groups.
The vulnerability incident is described briefly in the email notification. There are additional links to filtered views on the Defender Vulnerability Management Security suggestions and Weaknesses sections in the portal to help you dig deeper. You may, for example, obtain a list of all affected devices or other information about the vulnerability.


Advanced features
You can access advanced features from here https://security.microsoft.com/preferences2/integration

See more from this Learn documentation

Recommend security baselines for devices
There is couple of ways to work here, Intune baselines and Defender security recommendations. They don’t overtake the other one but they will have duplicates in some cases
Intune Security baseline
Intune has Security baselines for devices and you access them from here https://endpoint.microsoft.com/#view/Microsoft_Intune_Workflows/SecurityManagementMenu/~/securityBaselines


It will suggest the optimal baseline for you



Defender Security recommendations
To get proactive you can use Secure score connector for devices

You can access the recommendations from https://security.microsoft.com/security-recommendations


And you can request a remediation directly from the recommendations

And it will show you what will be done

And more details here

Respond to incidents and alerts
You will the the alerts and can create incidents from them

Or you can Block an app or the complete device and also start hunting

When you open the device you will see what Defender has done, risk levels and the recommendations mentioned earlier

Manage automated investigations and remediations
You can start Automated Investigation and Live Response. With Live response you can run on-demand activities to the devices

When the device is tagged for risks, you can initiate automated investigation






The automated investigation process
An alert generates an event, which can be used to initiate an automated inquiry. Each piece of evidence receives a verdict as a consequence of the automatic investigation. Verdicts can include:
- Malicious
- Suspicious
- No threats found
Remediation actions are identified for harmful or questionable organizations. Examples of corrective interventions include:
- Sending a file to quarantine
- Stopping a process
- Isolating a device
- Blocking a URL
- Other actions

Live response
Analysts can perform the following activities using live response:
- Run basic and advanced commands to do investigative work on a device.
- Download files such as malware samples and outcomes of PowerShell scripts.
- Download files in the background (new!).
- Upload a PowerShell script or executable to the library and run it on a device from a tenant level.
- Take or undo remediation actions.

Assess and recommend endpoint configurations to reduce and remediate vulnerabilities by using the Microsoft’s threat and vulnerability management solution

Built-in and agentless Defender Vulnerability Management scanners continuously monitor and detect risk in your business, even when devices are not connected to the corporate network.
A single inventory with an unified real-time picture of your organization’s software programs, digital certificates, network shares, and browser extensions aids in the discovery and assessment of all assets.
Examine extension permissions and risk levels, find certificates before they expire, detect potential vulnerabilities caused by poor signature methods, and check misconfigurations in internal network shares.

Start your trial here https://security.microsoft.com/tvmPremiumTrial180daySolution

It will take some time, in my setup not 6hrs but be prepared for it

How it will compare to others solutions
Defender Vulnerability Management | Defender Vulnerability Management add-on | Defender Vulnerability Management Standalone |
Core capabilities part of Defender for Endpoint Plan 2 | Additional capabilities for Defender for Endpoint Plan 2 | Full vulnerability Management capabilities |
Device discovery | Security baselines assessment | Device discovery |
Device inventory | Block vulnerable applications | Device inventory |
Vulnerability assessment | Browser extensions | Vulnerability assessment |
Configuration assessment | Digital certificate assessment | Continuous monitoring |
Risk based prioritization | Network share analysis | Risk based prioritization |
Remediation tracking | Remediation tracking | |
Continuous monitoring | Configuration assessment | |
Software assessment | Software assessment | |
Software usages insights | Software usages insights | |
Security baselines assessment | ||
Block vulnerable applications | ||
Browser extensions | ||
Digital certificate assessment | ||
Network share analysis |
Once done you can access TVM here https://security.microsoft.com/tvm_dashboard
You will see those recommendations and your organizational Exposure score

If you drill down deeper, you will be weaknesses and which devices are exposed

And see more information here

Manage endpoint threat indicators
You can create Threat indicators under settings page https://security.microsoft.com/preferences2/custom_ti_indicators
You will see the File hashes, IP’s, URLs / domains and Certificates



Labs and deep dive content
Module | Lab |
---|---|
Learning Path 2 – Mitigate threats using Microsoft Defender for Endpoint | Exercise 1 – Deploy Microsoft Defender for Endpoint |
Learning Path 2 – Mitigate threats using Microsoft Defender for Endpoint | Exercise 2 – Mitigate Attacks with Microsoft Defender for Endpoint |
If you want to have a serious deep dive for Defender for Endpoint, you really should see Jeffreys Appel’s series on it!

Closure
Some things to remember for the test.
Cloud Apps:
- The new portal and how does it look like, remember that redirection!
- What types of different policies there is and how you can trigger them.
- Alerts in different portals
- What action you can take when investigating and remediating
Defender for Endpoint:
- Ways to onboard you device and why to use each one?
- Simulation and how use them
- Data retention and governance with Defender for Endpoint
- How to setup Advanced features, remember that EDR in Block mode!
- Security baselines in Intune and Security recommendations inside Defender portal
- What is Defender threat and vulnerability management solution (TVM) and how it works as an agentless solution?
Hopefully you found this useful, then to the next one with the following topics:
- Identify and remediate security risks related to events for Microsoft Azure Active Directory (Azure AD), part of Microsoft Entra
- Identify and remediate security risks related to Azure AD Identity Protection events
- Identify and remediate security risks related to Azure AD Conditional Access events
- Identify and remediate security risks related to Active Directory Domain Services using Microsoft Defender for Identity
Link to main post
