Threat Intelligence

Intelligence lifecycle management, IoC handling via MDE APIs, threat hunting based on CTI feeds, and MITRE ATT&CK mapping procedures.

7 KQL Queries 4 Templates 6 Procedures
Open Playbook

Protective Monitoring

Alert monitoring workflows, Secure Score management, ASR rules monitoring, EDR telemetry baselines, and false positive reduction.

13 KQL Queries 3 Checklists 7 Procedures
Open Playbook

Incident Management

Incident classification (P1-P4), lifecycle management, communication templates, escalation matrices, and RACI framework.

5 Templates 1 RACI Matrix 8 Procedures
Open Playbook

Alert Triage

Severity classification, triage decision trees, initial investigation queries, enrichment workflows, and closure documentation.

8 KQL Queries 1 Decision Tree 6 Procedures
Open Playbook

Incident Response

Full IR lifecycle, MDE response actions, Live Response commands, scenario-based KQL queries, containment strategies, and forensic procedures.

23 KQL Queries 5 Checklists 12 Procedures
Open Playbook

Vulnerability Management

TVM assessment, vulnerability exposure analysis, patch prioritization, risk scoring, remediation tracking, and software inventory management.

9 KQL Queries 1 Decision Tree 8 Procedures
Open Playbook

About This Playbook

This CyberSOC Playbook is a comprehensive operational reference designed for SOC analysts, incident responders, and security engineers working with Microsoft Defender for Endpoint (MDE).

Each playbook provides:

  • Step-by-step procedures for common security operations tasks
  • Ready-to-use KQL queries for MDE Advanced Hunting with descriptions and expected outputs
  • Decision trees for consistent triage and response
  • Interactive checklists with progress tracking (saved locally in your browser)
  • Communication templates and escalation matrices
  • MITRE ATT&CK technique mappings throughout
Keyboard Shortcuts

Ctrl+K / Cmd+K — Focus search bar | Ctrl+P / Cmd+P — Print current page