The SC-200 study guide just received a major update, with changes in weightings, new topics being added, topics being removed and more, so let’s jump in and take a look at what these changes are.

First of all, it has been reduced to three main sections with the following weightings.

  • Manage a security operations environment (40–45%)
  • Respond to security incidents (35–40%)
  • Perform threat hunting (20–25%)

Previously it was

  • Manage a security operations environment (20–25%)
  • Configure protections and detections (15–20%)
  • Manage incident response (25–30%)
  • Manage security threats (15–20%)

The main things to notice with these changes are the increase in the manage a security operations environment, effectively doubling its weighting, and the removal of configure and protections and detections, but elements of this are incorporated into the other parts of the exam.

A few topics have been consolidated, including Security Copilot being reduced to one item, as well as Sentinel workspace planning being rolled in to other areas. A few specific Sentinel and Defender XDR items have been removed, but it’s better to work on the assumption that these have just become expected base knowledge that the candidate profile addresses. Defender for Cloud workload protections have been deemphasized, but integration into Defender XDR is still present.

In terms of what’s new, we now see that Sentinel additions include data lake, MCP server, summary rules, KQL jobs on data lake, and Sentinel graph as the most prominent. On the Defender side, we see the addition of hunting graph, custom data collection in Microsoft Defender for Endpoint, new case management, and threat analytics as the obvious entries new Configure custom data collection in Microsoft Defender for Endpoint

This is one my favorite exams to recommend for someone who wants to get into Microsoft cybersecurity technologies and exams, due the Defender and Sentinel skills you need to pass the exam. If you’ve already passed MS-500 (now retired) and AZ-500 (soon to be retired and replaced by SC-500), this is an excellent choice as your next exam, because there will be some overlap in the technologies, but expect this exam to go deeper into understanding the Defender family of technologies, and it also goes deeper into Sentinel than you will have seen on previous exams. You will definitely need to spend time with KQL and Log Analytics, not just for the Microsoft Sentinel questions in the exam, but Microsoft Defender XDR as well, especially with the unified SecOps experience, with less of a focus on Defender for Cloud capabilities in the Azure portal.

Manage a security operations environment (40–45%)

Configure automation for Microsoft Defender XDR and Microsoft Sentinel

Configure the Microsoft Sentinel SIEM and platform

Ingest data into the Microsoft Sentinel SIEM and platform

Configure detections

Respond to security incidents (35–40%)

Respond to alerts and incidents in Microsoft Defender XDR

Respond to alerts and incidents in Microsoft Defender for Endpoint

Investigate Microsoft 365 activities to identify threats

Perform threat hunting (20–25%)

Detect threats by using Microsoft Defender XDR

Detect threats by using the Microsoft Sentinel platform