Microsoft • SC-200
Validates expertise in investigating, responding to, and mitigating threats using Microsoft Sentinel, Microsoft Defender XDR, and Microsoft Defender for Cloud.
Questions
599
Duration
100 minutes
Passing Score
700/1000
Difficulty
AssociateLast Updated
Jan 2026
The Microsoft Certified: Security Operations Analyst Associate (SC-200) validates a practitioner's ability to reduce organizational risk by investigating, responding to, and hunting for threats across cloud and on-premises environments. The certification covers the full Microsoft security operations stack, including Microsoft Defender XDR, Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft Security Copilot, and third-party security integrations. Candidates demonstrate competency in performing triage, responding to incidents, executing threat hunts with Kusto Query Language (KQL), and mitigating risk through exposure management.
Last updated on January 22, 2026, the exam reflects current platform capabilities including automatic attack disruption, Microsoft Purview data loss prevention integration, Microsoft Entra ID identity investigations, and Security Copilot promptbook creation. The certification spans both reactive security operations—such as remediating ransomware and business email compromise—and proactive practices including behavioral analytics, MITRE ATT&CK coverage analysis, and custom detection rule authoring in Microsoft Sentinel.
This certification is designed for security operations analysts working in Security Operations Centers (SOC) who are responsible for monitoring, triaging, and remediating threats using Microsoft's security platform. It suits professionals in roles such as SOC Analyst (Tier 1–3), Threat Hunter, Incident Responder, and Cloud Security Analyst who operate day-to-day within Microsoft Defender and Sentinel environments.
Candidates typically have hands-on experience with Microsoft 365 and Azure services, and are comfortable working across Windows, Linux, and mobile operating systems. IT administrators and security engineers who manage Microsoft security tooling and are looking to validate their operational skills—as well as experienced professionals transitioning into dedicated security roles—will find this certification directly aligned with their work.
Microsoft does not enforce formal prerequisites for SC-200, but recommends that candidates have working familiarity with Microsoft 365, Azure cloud services, and common operating systems (Windows, Linux, mobile). Practical exposure to at least one of the core platform tools—Microsoft Sentinel, Microsoft Defender XDR, or Microsoft Defender for Cloud—is strongly advisable before sitting the exam.
Candidates with no prior security background should consider starting with SC-900 (Microsoft Security, Compliance, and Identity Fundamentals) to build foundational knowledge. Approximately one year of hands-on experience in security monitoring or incident response, combined with working knowledge of KQL for log querying, is the realistic baseline for passing the exam without excessive remedial study.
SC-200 is a proctored exam delivered through Pearson VUE, available online or at a testing center. Candidates are allotted 100 minutes to complete the assessment. The exam may include a variety of question types: multiple choice, multi-select, drag-and-drop, and interactive lab-style components that simulate real tasks within Microsoft security portals. A passing score of 700 out of 1000 is required.
The exam is available in English, Japanese, Chinese (Simplified and Traditional), Korean, French, German, Spanish, Portuguese (Brazil), and Italian. Candidates taking a non-English version may request an additional 30 minutes. The certification is valid for 12 months and can be renewed at no cost by passing a free online renewal assessment on Microsoft Learn.
SC-200 certified professionals are positioned for roles including SOC Analyst, Threat Intelligence Analyst, Cloud Security Engineer, and Incident Responder at organizations running Microsoft's security stack—a category that includes the majority of enterprise environments globally. In the United States, security operations analysts with this certification typically earn between $107,000 and $145,000 annually, with variation based on seniority, industry, and geographic location. The credential is recognized by the U.S. Department of Defense COOL program and is aligned with roles requiring hands-on SIEM and XDR competency.
Compared to vendor-neutral alternatives such as CompTIA CySA+ or EC-Council CND, SC-200 offers deeper platform-specific validation that is directly applicable when an employer's security stack is Microsoft-centric. The certification is renewable annually at no cost via Microsoft Learn, keeping credential holders current as the platform evolves. With Microsoft Sentinel and Defender XDR adoption continuing to grow across enterprise and government sectors, demand for SC-200 certified analysts remains strong.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 599 questions.
1. ThreatIntel Corp needs to enhance their Microsoft Sentinel deployment with threat intelligence feeds to improve threat detection and investigation capabilities. They want to integrate indicators of compromise (IoCs) to enrich their security analysis. What primary benefit does threat intelligence integration provide?
Explanation
Provides contextual threat information to enrich security events and improve detection accuracy is the correct answer. Threat intelligence integration enhances security analysis by providing context about known threats, indicators of compromise, and threat actor information that helps analysts understand and prioritize security events. It doesn't replace other data connectors but enhances them, supports multiple intelligence sources beyond Microsoft, and augments rather than replaces human analysis capabilities.
2. HuntingMaturity Corp's security team has basic reactive capabilities and wants to evolve toward advanced proactive threat hunting. They need to understand the maturity progression for threat hunting programs. Which progression best describes threat hunting maturity evolution?
Explanation
Beginning with reactive alerts, progressing to hypothesis-driven hunting, then advanced analytics and automation is the correct answer. Threat hunting maturity typically evolves from basic reactive incident response through structured hypothesis-driven hunting to advanced analytics and automated hunting capabilities. This progression allows organizations to build skills and capabilities incrementally. Starting with advanced capabilities ignores foundational needs, simultaneous implementation often leads to failure, and external-only focus misses internal capability development requirements.
3. When a user downloads a software update from a vendor's website, their operating system is able to confirm that the update was in fact created by the legitimate vendor and that it has not been modified since it was created. What cryptographic mechanism makes this verification possible?
Explanation
This is achieved using a Digital Signature. The vendor uses their private key to sign a hash of the software file. This signature is attached to the file. The user's operating system, which has the vendor's public key, can then verify the signature. This process confirms both authenticity (only the vendor's private key could have created the signature) and integrity (if the file was changed, the hash would not match the signature). Symmetric encryption is for confidentiality. Password hashing is for storing passwords.
4. A security analyst needs to review the overall security health of their hybrid cloud environment, including their Secure Score, the number of active alerts, and a summary of the most critical security recommendations. Which dashboard in the cloud security portal is designed to provide this integrated, high-level overview?
Explanation
The main overview dashboard of a cloud security platform is designed to be the central starting point for a security analyst. It provides a consolidated, at-a-glance view of the most important security metrics, such as the overall Secure Score, a summary of active alerts and recommendations, and the protection status of workloads. This helps the analyst quickly assess the situation and decide where to focus their attention.
5. FinanceSecure Corp needs to implement Microsoft Sentinel data connectors for their financial services environment. They must consider licensing costs, data volume limits, and compliance requirements. Which factor should significantly influence their data connector selection and configuration strategy?
Explanation
Understanding data ingestion costs and retention requirements for compliance is the correct answer. In financial services, both cost management and regulatory compliance are critical factors that should drive connector selection. Different data types have different ingestion costs, and compliance requirements may mandate specific retention periods and data handling approaches. Focusing only on latency, avoiding configuration, or seeking complexity don't address the business and regulatory realities that financial services organizations must navigate.
One-time access to this exam