Skip to content

Commit d951da4

Browse files
authored
Merge pull request #53375 from ceperezb/CEPEREZB-sc100-secure-server-client-endpoints
update module
2 parents 01e3e29 + e32731e commit d951da4

20 files changed

Lines changed: 853 additions & 732 deletions

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/1-introduction-endpoint-security.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ uid: learn.wwl.design-solutions-securing-server-client-endpoints.introduction-en
33
title: Introduction to endpoint security
44
metadata:
55
title: Introduction to endpoint security
6-
description: "SC-100 preparatory unit on the topic: introduction to endpoint security."
7-
ms.date: 09/26/2024
6+
description: Learn about designing security solutions for server and client endpoints, including servers, mobile devices, IoT systems, and operational technology.
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 10
11+
durationInMinutes: 3
1212
content: |
1313
[!include[](includes/1-introduction-endpoint-security.md)]
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-securing-server-client-endpoints.summary
3-
title: Summary - Design solutions for securing server and client endpoints
3+
title: Summary
44
metadata:
5-
title: Summary - Design solutions for securing server and client endpoints
6-
description: "Summary of the module on the topic: design solutions for securing server and client endpoints."
7-
ms.date: 09/26/2024
5+
title: Summary
6+
description: "Summary of Design Solutions for Securing Server and Client Endpoints."
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 10
11+
durationInMinutes: 2
1212
content: |
1313
[!include[](includes/10-summary.md)]

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/2-specify-server-security-requirements.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-securing-server-client-endpoints.specify-server-security-requirements
3-
title: Specify server security requirements
3+
title: Specify security requirements for servers
44
metadata:
5-
title: Specify server security requirements
6-
description: "SC-100 preparatory unit on the topic: specify server security requirements."
7-
ms.date: 09/26/2024
5+
title: Specify security requirements for servers
6+
description: "SC-100 preparatory unit on the topic: specify security requirements for servers, including multiple platforms and operating systems."
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-securing-server-client-endpoints.specify-requirements-mobile-devices-clients
3-
title: Specify requirements for mobile devices and clients
3+
title: Specify security requirements for mobile devices and clients
44
metadata:
5-
title: Specify requirements for mobile devices and clients
6-
description: "SC-100 preparatory unit on the topic: specify requirements for mobile devices and clients."
7-
ms.date: 09/26/2024
5+
title: Specify security requirements for mobile devices and clients
6+
description: "Learn how to specify security requirements for mobile devices and client workstations including endpoint protection, hardening, and configuration."
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 10
11+
durationInMinutes: 7
1212
content: |
1313
[!include[](includes/3-specify-requirements-mobile-devices-clients.md)]
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-securing-server-client-endpoints.specify-embedded-device-security-requirements
3-
title: Specify internet of things (IoT) and embedded device security requirements
3+
title: Specify security requirements for IoT devices and embedded systems
44
metadata:
5-
title: Specify internet of things (IoT) and embedded device security requirements
6-
description: "SC-100 preparatory unit on the topic: specify internet of things (IoT) and embedded device security requirements."
7-
ms.date: 09/26/2024
5+
title: Specify security requirements for IoT devices and embedded systems
6+
description: "Learn how to specify security requirements for IoT devices and embedded systems including device identity, network segmentation, and threat detection."
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 10
11+
durationInMinutes: 11
1212
content: |
1313
[!include[](includes/4-specify-embedded-device-security-requirements.md)]
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-securing-server-client-endpoints.design-solution-securing-operational-technology-industrial-control-systems
3-
title: Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
3+
title: Evaluate solutions for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
44
metadata:
5-
title: Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT
6-
description: "SC-100 preparatory unit on the topic: secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT."
7-
ms.date: 09/26/2024
5+
title: Evaluate solutions for securing operational technology (OT) and industrial control systems (ICS) by using Microsoft Defender for IoT
6+
description: "Learn how to evaluate Microsoft Defender for IoT for securing OT and ICS environments including deployment models, integrations, and threat detection."
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 10
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/5-design-solution-securing-operational-technology-industrial-control-systems.md)]

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/6-specify-security-baselines-server-client-endpoints.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ uid: learn.wwl.design-solutions-securing-server-client-endpoints.specify-securit
33
title: Specify security baselines for server and client endpoints
44
metadata:
55
title: Specify security baselines for server and client endpoints
6-
description: "SC-100 preparatory unit on the topic: specify security baselines for server and client endpoints."
7-
ms.date: 3/15/2023
6+
description: Learn how to specify security baselines for Windows Server and Windows client endpoints, including SCT baselines for servers and MDM baselines for Intune-managed devices.
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 10
11+
durationInMinutes: 7
1212
content: |
1313
[!include[](includes/6-specify-security-baselines-server-client-endpoints.md)]

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/7-design-solution-secure-remote-access.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ uid: learn.wwl.design-solutions-securing-server-client-endpoints.design-solution
33
title: Design a solution for secure remote access
44
metadata:
55
title: Design a solution for secure remote access
6-
description: "SC-100 preparatory unit on the topic: Design a solution for secure remote access."
7-
ms.date: 3/15/2023
6+
description: Learn how to design secure remote access to virtual machines in Azure landing zones using Azure Bastion, just-in-time access, and hybrid connectivity options.
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 10
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/7-design-solution-secure-remote-access.md)]

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/8-evaluate-windows-local-admin-password-solution.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ uid: learn.wwl.design-solutions-securing-server-client-endpoints.evaluate-window
33
title: Evaluate Windows Local Admin Password Solution (LAPS) solutions
44
metadata:
55
title: Evaluate Windows Local Admin Password Solution (LAPS) solutions
6-
description: "SC-100 preparatory unit on the topic: Evaluate Windows Local Admin Password Solution (LAPS) solutions."
7-
ms.date: 5/20/2024
6+
description: Learn how to evaluate Windows LAPS for managing local administrator account passwords, comparing backup directories, security models, and migration from legacy LAPS.
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 10
11+
durationInMinutes: 8
1212
content: |
1313
[!include[](includes/8-evaluate-windows-local-admin-password-solution.md)]

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/9-knowledge-check.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ title: Module assessment
44
metadata:
55
title: Module assessment
66
description: "Knowledge check for module on the topic: design solutions for securing server and client endpoints."
7-
ms.date: 09/26/2024
7+
ms.date: 02/07/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
1111
module_assessment: true
12-
durationInMinutes: 10
12+
durationInMinutes: 5
1313
###########################################################################
1414
###
1515
### General guidance (https://review.learn.microsoft.com/learn-docs/docs/id-guidance-knowledge-check)
@@ -45,38 +45,38 @@ quiz:
4545
choices:
4646
- content: "Firewall management"
4747
isCorrect: false
48-
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but does not include firewall management."
48+
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but doesn't include firewall management."
4949
- content: "Anti-malware protection"
5050
isCorrect: true
5151
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, including anti-malware protection."
5252
- content: "Web filtering"
5353
isCorrect: false
54-
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but does not include web filtering."
54+
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but doesn't include web filtering."
5555
- content: "Email filtering"
5656
isCorrect: false
57-
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but does not include email filtering."
57+
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but doesn't include email filtering."
5858
- content: "What are Windows security baselines in Intune?"
5959
choices:
6060
- content: "Templates that define a set of security configurations that can be applied to devices."
6161
isCorrect: true
6262
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, helping to ensure that they meet organizational security requirements."
63-
- content: "Windows operating system images that have been pre-configured for security."
63+
- content: "Windows operating system images that have been preconfigured for security."
6464
isCorrect: false
6565
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, helping to ensure that they meet organizational security requirements."
6666
- content: "A set of default security configurations that are applied to all Windows devices in an organization."
6767
isCorrect: false
68-
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they are not applied by default to all Windows devices in an organization."
68+
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they aren't applied by default to all Windows devices in an organization."
6969
- content: "A set of security configurations that are only applicable to Windows servers."
7070
isCorrect: false
71-
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they are not applied by default to all Windows devices in an organization."
71+
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they aren't applied by default to all Windows devices in an organization."
7272
- content: "What is Microsoft Defender for IoT?"
7373
choices:
7474
- content: "An endpoint security solution for Windows devices."
7575
isCorrect: false
7676
explanation: "Microsoft Defender for IoT is a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
7777
- content: "An endpoint security solution for Mac devices."
7878
isCorrect: false
79-
explanation: "Microsoft Defender for IoT is not an endpoint security solution for Mac devices, but rather a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
79+
explanation: "Microsoft Defender for IoT isn't an endpoint security solution for Mac devices, but rather a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
8080
- content: "A cloud-based security solution for Internet of Things (IoT) devices."
8181
isCorrect: true
8282
explanation: "Microsoft Defender for IoT is a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."

0 commit comments

Comments
 (0)