Modern enterprise security requires an integrated platform where machines detect, AI triages, humans decide, and automation responds. These use cases demonstrate this model in action, showing specific tools, queries, and workflows at each stage.
Each use case is tagged with industry-standard security frameworks. Here is what they mean and why they matter.
Zero Trust is a security strategy that assumes no user, device, or network is trustworthy by default. even inside the corporate network. Instead of trusting anything behind the firewall, every access request is fully authenticated, authorised, and encrypted before granting access. It is built on three core principles:
The NIST Cybersecurity Framework, created by the U.S. National Institute of Standards and Technology, is the most widely adopted framework for organising cybersecurity activities. It defines six core functions. When you see badges like NIST: Detect · Respond on a use case, it tells you which functions that scenario exercises:
| Code | Function | What It Means | Example Activities |
|---|---|---|---|
| GV | Govern | Establish and monitor the organisation’s cybersecurity risk management strategy and policies | Risk assessments, security policies, roles & responsibilities, compliance requirements |
| ID | Identify | Understand your assets, risks, and business context so you know what to protect | Asset inventory, risk assessment, business impact analysis, supply chain risk |
| PR | Protect | Implement safeguards to prevent or limit the impact of a security event | MFA, encryption, endpoint protection, access controls, security training |
| DE | Detect | Discover cybersecurity events in a timely manner using monitoring and analytics | SIEM alerts, XDR correlation, anomaly detection, threat hunting with KQL |
| RS | Respond | Take action when a cybersecurity incident is detected to contain the damage | Incident response, containment, forensics, communication, playbook execution |
| RC | Recover | Restore capabilities and services after an incident, and apply lessons learned | System restoration, backup recovery, post-incident review, process improvements |
STRIDE is a threat classification model developed by Microsoft to help security teams categorise what an attacker is trying to achieve. Each letter represents a category of threat. When you see a badge like STRIDE: Spoofing, it identifies the primary threat types in that scenario:
| Letter | Threat | What the Attacker Does | Example |
|---|---|---|---|
| S | Spoofing | Pretends to be someone or something they are not | Phishing email impersonating a CFO, stolen credentials, forged authentication tokens |
| T | Tampering | Modifies data or code without authorisation | Ransomware encrypting files, modifying firewall rules, altering backup agents |
| R | Repudiation | Denies having performed an action (no audit trail) | Deleting logs to cover tracks, disabling auditing, clearing browser history |
| I | Information Disclosure | Accesses data they should not be able to see | Reading confidential emails, exfiltrating design files, dumping a database |
| D | Denial of Service (DoS) | Makes a system or service unavailable | Ransomware making servers inaccessible, disabling backup services, cryptomining consuming resources |
| E | Elevation of Privilege | Gains higher access than authorised | Exploiting a vulnerability to gain admin rights, Golden Ticket attack, lateral movement to domain controller |
These acronyms appear throughout the use cases. Here is the full name of each product and what it does:
| Acronym | Full Name | What It Does |
|---|---|---|
| XDR | Extended Detection & Response | Unified platform that correlates alerts from all Defender products into single incidents |
| MDE | Microsoft Defender for Endpoint | Protects laptops, desktops, and servers. detects malware, ransomware, and suspicious behaviour |
| MDO | Microsoft Defender for Office 365 | Protects email and collaboration tools. blocks phishing, malicious attachments, and unsafe links |
| MDI | Microsoft Defender for Identity | Monitors Active Directory for identity-based attacks like credential theft and lateral movement |
| MDA | Microsoft Defender for Cloud Apps | Monitors cloud application usage, detects shadow IT, and enforces session-level controls |
| MDC | Microsoft Defender for Cloud | Protects cloud workloads (VMs, containers, databases) across Azure, AWS, and GCP |
| AIR | Automated Investigation & Response | XDR’s built-in automation that investigates alerts and takes remediation actions without human intervention |
| KQL | Kusto Query Language | The query language used in Sentinel and Defender XDR to search and analyse security data |
| SCU | Security Compute Unit | The billing unit for Security Copilot. each SCU provides a fixed amount of AI processing capacity |
| DLP | Data Loss Prevention | Policies that detect and block sensitive data from being shared outside the organisation |
| IRM | Insider Risk Management | Purview feature that detects risky user behaviour such as data theft by departing employees |
| UEBA | User and Entity Behaviour Analytics | Sentinel feature that builds behavioural baselines and detects anomalies for users and devices |
| SOAR | Security Orchestration, Automation & Response | Automated playbooks (Logic Apps) that run response actions when incidents are detected |
A consolidated view of how attacks unfold across all four enterprise scenarios. from initial compromise to full recovery and lessons learned.