Defender XDR handles automated correlation across 9 security products. Sentinel extends this with custom KQL analytics, third-party data, and Logic App playbook automation. Security Copilot provides AI-powered investigation, natural language queries, and automated reporting.
Each scenario is tagged with industry-standard security frameworks. Here is what they mean and why they matter.
Zero Trust is a security strategy that assumes no user, device, or network is trustworthy by default. even inside the corporate network. Every access request is fully authenticated, authorised, and encrypted. It is built on three principles:
Created by the U.S. National Institute of Standards and Technology, the NIST CSF is the most widely adopted framework for organising cybersecurity activities. When you see badges like NIST: Detect · Respond, they identify which NIST functions a scenario exercises:
| Code | Function | What It Means | Example Activities |
|---|---|---|---|
| GV | Govern | Establish and monitor cybersecurity risk management strategy and policies | Risk assessments, security policies, compliance requirements |
| ID | Identify | Understand your assets, risks, and business context | Asset inventory, risk assessment, supply chain risk |
| PR | Protect | Implement safeguards to prevent or limit impact | MFA, encryption, endpoint protection, access controls |
| DE | Detect | Discover cybersecurity events using monitoring and analytics | SIEM alerts, XDR correlation, anomaly detection, KQL hunting |
| RS | Respond | Take action to contain the damage when an incident is detected | Containment, forensics, communication, playbook execution |
| RC | Recover | Restore services after an incident and apply lessons learned | System restoration, backup recovery, post-incident review |
These acronyms appear throughout the scenarios:
| Acronym | Full Name | What It Does |
|---|---|---|
| XDR | Extended Detection & Response | Unified platform correlating alerts from all Defender products into single incidents |
| MDE | Microsoft Defender for Endpoint | Protects endpoints. detects malware, ransomware, and suspicious behaviour |
| MDO | Microsoft Defender for Office 365 | Protects email. blocks phishing, malicious attachments, and unsafe links |
| MDI | Microsoft Defender for Identity | Monitors Active Directory for identity-based attacks and lateral movement |
| MDA | Microsoft Defender for Cloud Apps | Monitors cloud app usage, detects shadow IT, enforces session controls |
| MDC | Microsoft Defender for Cloud | Protects cloud workloads across Azure, AWS, and GCP |
| AIR | Automated Investigation & Response | XDR automation that investigates and remediates without human intervention |
| KQL | Kusto Query Language | Query language used in Sentinel and Defender XDR to search security data |
| SCU | Security Compute Unit | Billing unit for Security Copilot AI processing capacity |
| UEBA | User and Entity Behaviour Analytics | Sentinel feature building behavioural baselines and detecting anomalies |
| SOAR | Security Orchestration, Automation & Response | Automated playbooks (Logic Apps) for incident response |
| APT | Advanced Persistent Threat | A prolonged, targeted cyberattack where an intruder gains access and remains undetected |
| IOC | Indicator of Compromise | Evidence (IP addresses, file hashes, domains) that a system has been breached |
| C2 | Command and Control | Server or channel an attacker uses to communicate with compromised systems |
Full kill chain timelines showing how sophisticated threat actors operate. and how Defender XDR, Sentinel, and Security Copilot detect and respond at each stage.