Jackie Ramsey March 14, 2026 0

When an alert hits your Microsoft 365 tenant, you don’t need a “plan.” You need a CMMC incident response runbook you can follow under stress.

I built the runbook below for a CMMC Level 2 environment where Microsoft Defender XDR and Microsoft Purview are the daily tools. It’s written for real-world Small Business IT teams, not a big SOC with unlimited staff. If you want a Business Technology Partner who can run this with you, this is also exactly how I deliver Cybersecurity Services as part of Managed IT for Small Business.

What kicks off CMMC incident response (scope, triggers, and decision points)

CMMC Level 2 expects you to prove you can prepare, detect, respond, recover, and learn. It also expects documentation and timely reporting, especially when CUI is involved. For extra context on the lifecycle and expectations, I like this plain-language breakdown of the CMMC incident response lifecycle.

Triggers (start the clock)

Start this runbook when any of these happen:

  • Defender XDR creates an incident with “High” severity.
  • Entra ID sign-in logs show impossible travel, unfamiliar country, or repeated MFA failures for a privileged user.
  • Purview Audit shows mass file access, downloads, or sharing changes in SharePoint or OneDrive.
  • A user reports “I sent wires” or “my inbox rules changed.”
  • Defender for Endpoint detects ransomware behavior or hands out an isolation recommendation.

If CUI might be involved, I start a 72-hour reporting timer immediately and treat evidence handling like it will be reviewed by an assessor.

Severity and decision points

Use this table to decide who to wake up and what to shut down first.

| Decision point | Low | Medium | High | |—|—|—| | Likely CUI touched? | No | Unknown | Yes or likely | | Privileged account involved? | No | Maybe | Yes | | Lateral movement indicators? | No | Unknown | Yes | | Business impact | Minor | Work slowed | Work stopped or data risk | | Action | Document and monitor | Contain within 1 hour | Contain within 15 minutes, notify leadership |

Minimum notifications I send for High: business owner, IT lead, compliance lead, and legal or contract contact (as defined by your IT Strategy for SMBs and Business Continuity & Security plan).

Two IT security analysts in a modern office review incident alerts on dual monitors showing Microsoft Defender XDR dashboard, one pointing at the screen with focused expressions, illustrating team collaboration during initial triage.

The response timeline in Microsoft 365 (first 15 minutes, 1 hour, 24 hours)

This timeline assumes you already have Secure Cloud Architecture basics in place (MFA, Conditional Access, audit logging). It also assumes you’re using Cloud Management practices like least privilege and named admin accounts.

Realistic photo of a whiteboard in a conference room showing a simple flowchart of incident response phases: detect (15 min), contain (1 hour), eradicate (24 hours), recover, with clock icons and phase names in simple font.

First 15 minutes (confirm, scope, preserve)

Use this checklist table as written.

TaskWhere in Microsoft 365Done
Open incident, capture incident ID, severity, and involved entitiesMicrosoft Defender portal > Incidents & alerts > Incidents
Stop the bleeding fast (choose one)Decision: identity compromise, endpoint compromise, or email-only
Snapshot key evidence (screenshots or PDF)Defender XDR incident timeline and alert details
Start an evidence log with timestampsTicket system + local incident worksheet
Confirm audit logging is available for the time windowMicrosoft Purview portal > Audit

Fast decision: if you can’t explain the alert in 5 minutes, contain first, then analyze.

First hour (contain across identity, email, endpoint, data)

Containment should match the suspected entry point, but I usually do these in parallel.

Containment actionConsole pathNotes
Disable user and block sign-inEntra admin center > Users > select user > Block sign-inFor admins, do this immediately
Revoke sessionsEntra admin center > Users > select user > Revoke sessionsForces token refresh
Reset MFA methodsEntra admin center > Users > Authentication methodsRemove unknown methods, re-register
Isolate a deviceMicrosoft Defender portal > Devices > select device > IsolateEndpoint Security priority
Quarantine suspicious emailMicrosoft Defender portal > Email & collaboration > ExplorerMove messages to quarantine
Block sender/domain/URLMicrosoft Defender portal > Email & collaboration > Policies & rulesUse Tenant Allow/Block List

For Microsoft’s incident workflow concepts, this guide on managing and responding to incidents in Defender XDR aligns well with how I run triage.

First 24 hours (eradicate, recover, report)

This phase is where CMMC evidence quality is won or lost.

TaskWhereOutput
Remove persistence (rules, forwarding, OAuth apps)Exchange admin center and Entra admin centerProof of removal
Validate Device Hardening baselinesIntune admin center > Devices > Compliance/ConfigurationExported settings and compliance
Restore clean accessReset passwords, reissue devices if neededRecovery notes
Confirm no continued accessEntra sign-in logs + Defender advanced huntingQuery results saved
Prepare required reporting packageInternal template + counsel/contract contact72-hour ready packet

Preserving evidence for CMMC (Purview, Defender XDR, and chain of custody)

Evidence should be usable later, even if staff changes. That’s why I treat it like “Data Center Technology rules” applied to cloud logs: consistent timestamps, controlled storage, and tracked access.

Close-up of hands exporting logs from Microsoft Purview console on an angled laptop screen, with a secure chain of custody folder and notepad on a professional desk under neutral lighting.

Before you export, confirm you know how Purview auditing works and what’s searchable. Microsoft’s Purview auditing overview is the reference I keep bookmarked.

Evidence collection table (what I capture every time)

Evidence itemSourceHow I preserve it
Incident timeline and alertsDefender XDR incident pageExport or PDF, hash file, store read-only
Unified Audit Log resultsPurview portal > Audit > SearchExport CSV, note search parameters
Entra ID sign-in detailsEntra admin center > Monitoring > Sign-in logsExport JSON/CSV, capture filters
Email artifacts (message ID, headers)Defender ExplorerExport results, keep original headers
Endpoint investigation packageDefender for Endpoint device pageDownload package where available

Copy/paste friendly paths and queries

Use these when you need answers fast.

  • Unified Audit Log search: Microsoft Purview portal > Audit > Search. Reference steps in Microsoft’s audit log search guide.
  • Entra sign-in log filter: Entra admin center > Sign-in logs, filter on User, Application, Result, Location, Device.
  • Defender Advanced Hunting (KQL examples):
    • Suspicious sign-ins: SigninLogs | where ResultType != 0 | where UserPrincipalName =~ "user@domain.com" | sort by TimeGenerated desc
    • Mass downloads from SharePoint/OneDrive (Defender XDR): CloudAppEvents | where ActionType has_any ("FileDownloaded","FileSyncDownloadedFull") | summarize dcount(ObjectId) by AccountDisplayName, bin(Timestamp, 1h)
    • OAuth consent activity (audit-based): CloudAppEvents | where ActionType has "Consent" or ActionType has "OAuth" | sort by Timestamp desc

Incident-type playbooks (quick actions by scenario)

These mini playbooks are designed for Infrastructure Optimization: act fast, reduce blast radius, then prove what happened.

Business email compromise (BEC)

TriggerContain nowKey checks
Inbox rules, forwarders, wire fraud email, unusual sign-insBlock sign-in, revoke sessions, reset password and MFAPurview Audit for New-InboxRule, Defender Explorer for similar messages

Ransomware on an endpoint

TriggerContain nowKey checks
Defender detects encryption behavior, files renamedIsolate device, stop sync client, disable user temporarilyDefender device timeline, then follow Microsoft’s ransomware response playbook

Malicious OAuth app or consent grant

TriggerContain nowKey checks
New enterprise app with broad mail/file scopesDisable app, remove permissions, revoke sessions for consenting userEntra admin center > Enterprise applications > Permissions; review consent events in hunting

Data exfiltration from SharePoint or OneDrive

TriggerContain nowKey checks
Spike in downloads, new anonymous linksDisable external sharing temporarily, remove links, block compromised accountsPurview Audit searches for sharing and download activity, verify DLP alerts if enabled

Lost or stolen mobile device

TriggerContain nowKey checks
Phone missing, user reports theftIntune remote wipe, revoke sessions, reset passwordIntune admin center > Devices > select device > Wipe; Entra sign-in logs for new access

Malicious email campaign (phish or QR phish)

TriggerContain nowKey checks
Many users report same emailQuarantine, block sender/domain/URL, search and purgeDefender Explorer: identify message, then remediate across mailboxes

After the incident: lessons learned and CMMC assessment artifacts

I wrap up every event the same way because assessors don’t certify “intent.” They certify proof. This is also where Digital Transformation becomes real: security becomes part of daily operations, not a once-a-year scramble.

Here’s what I produce for CMMC Level 2 readiness:

ArtifactWhat it must showWhere I store it
Incident reporttimeline, scope, CUI impact decision, actions takenControlled IR folder, access logged
Evidence bundleexports, hashes, chain of custody, screenshotsRead-only repository
Corrective action planfixes, owners, due dates, validation methodTicketing system + SSP/POA&M
Tabletop or retest recordthe runbook works under pressureTraining and compliance folder

This is also the moment to check adjacent systems. If you support Restaurant POS Support and Kitchen Technology Solutions, confirm those endpoints and networks weren’t a side door. If your environment includes Cloud Infrastructure outside Microsoft 365, confirm cloud logs and access paths too. Finally, if this happened during an Office 365 Migration, document tenant configuration changes carefully because they affect root cause.

Conclusion

A strong CMMC incident response runbook is simple, timed, and evidence-first. In Microsoft 365, Defender XDR handles the threat story, while Purview proves what users and data did. If you want this to hold up in a CMMC Level 2 assessment, practice it, document it, then practice it again. When you’re ready, I can help as your Business Technology Partner with Tailored Technology Services that fit how your team actually works.


Discover more from Guide to Technology

Subscribe to get the latest posts sent to your email.

Category: 

Leave a Reply