Skip to content

Commit e87f416

Browse files
authored
Merge pull request #53333 from MicrosoftDocs/NEW-secure-devices-by-microsoft
NEW-secure-devices-by-microsoft --> main
2 parents e351128 + 88b78a6 commit e87f416

30 files changed

Lines changed: 454 additions & 0 deletions
27 KB
Loading

learn-pr/achievements/secure-devices-by-microsoft.svg

Lines changed: 4 additions & 0 deletions
Loading
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.dpu.secured-devices-by-microsoft.introduction
3+
title: Introduction
4+
metadata:
5+
title: Introduction
6+
description: This content is part of the "Secure at every layer with Microsoft Surface" module.
7+
ms.date: 02/03/2026
8+
author: ozahran7
9+
ms.author: v-zahranomar
10+
ms.topic: unit
11+
durationInMinutes: 1
12+
content: |
13+
[!include[](includes/1-introduction.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.dpu.secured-devices-by-microsoft.built-secure
3+
title: Built secure
4+
metadata:
5+
title: Built Secure
6+
description: This content is part of the "Secure at every layer with Microsoft Surface" module.
7+
ms.date: 02/03/2026
8+
author: ozahran7
9+
ms.author: v-zahranomar
10+
ms.topic: unit
11+
durationInMinutes: 4
12+
content: |
13+
[!include[](includes/2-built-secure.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.dpu.secured-devices-by-microsoft.trusted-at-every-layer
3+
title: Trusted at every layer
4+
metadata:
5+
title: Trusted At Every Layer
6+
description: This content is part of the "Secure at every layer with Microsoft Surface" module.
7+
ms.date: 02/03/2026
8+
author: ozahran7
9+
ms.author: v-zahranomar
10+
ms.topic: unit
11+
durationInMinutes: 8
12+
content: |
13+
[!include[](includes/3-trusted-at-every-layer.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.dpu.secured-devices-by-microsoft.built-in-security-features
3+
title: Built-in security features
4+
metadata:
5+
title: Built-In Security Features
6+
description: This content is part of the "Secure at every layer with Microsoft Surface" module.
7+
ms.date: 02/03/2026
8+
author: ozahran7
9+
ms.author: v-zahranomar
10+
ms.topic: unit
11+
durationInMinutes: 5
12+
content: |
13+
[!include[](includes/4-built-in-security-features.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.dpu.secured-devices-by-microsoft.provide-ultimate-control
3+
title: Providing ultimate control
4+
metadata:
5+
title: Providing Ultimate Control
6+
description: This content is part of the "Secure at every layer with Microsoft Surface" module.
7+
ms.date: 02/03/2026
8+
author: ozahran7
9+
ms.author: v-zahranomar
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/5-provide-ultimate-control.md)]
Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.dpu.secured-devices-by-microsoft.knowledge-check
3+
title: Knowledge check
4+
metadata:
5+
title: Knowledge Check
6+
description: This content is part of the "Secure at every layer with Microsoft Surface" module.
7+
ms.date: 02/03/2026
8+
author: ozahran7
9+
ms.author: v-zahranomar
10+
ms.topic: unit
11+
durationInMinutes: 5
12+
quiz:
13+
title: Check your knowledge
14+
questions:
15+
- content: "What does Microsoft’s Zero Trust philosophy assume about trust in security?"
16+
choices:
17+
- content: "All internal devices are trusted by default"
18+
isCorrect: false
19+
explanation: "Incorrect. The Zero Trust philosophy explicitly states that no trust is assumed, even for internal devices."
20+
- content: "Trust is assumed until a threat is detected"
21+
isCorrect: false
22+
explanation: "Incorrect. Zero Trust requires continuous verification rather than assuming trust until something goes wrong."
23+
- content: "No trust is assumed and everything must be verified"
24+
isCorrect: true
25+
explanation: "Correct. The document explains that Zero Trust means verifying everything across devices, cloud, and every security layer."
26+
- content: "Only cloud services require verification"
27+
isCorrect: false
28+
explanation: "Incorrect. Zero Trust applies across cloud, identity, applications, operating systems, and hardware."
29+
- content: "Which layers are included in Microsoft’s Zero Trust security model as described in the module?"
30+
choices:
31+
- content: "Cloud, identity, and privacy, application, operating system, hardware"
32+
isCorrect: true
33+
explanation: "Correct. These layers are explicitly listed as part of Microsoft’s Zero Trust security approach."
34+
- content: "Network, storage, application, firmware, cloud"
35+
isCorrect: false
36+
explanation: "Incorrect. Network and storage aren't listed as Zero Trust layers in the document."
37+
- content: "Identity, networking, power management, storage, firmware"
38+
isCorrect: false
39+
explanation: "Incorrect. Power management and storage aren't included in the Zero Trust layers described."
40+
- content: "Cloud, application, desktop software, peripherals, networking"
41+
isCorrect: false
42+
explanation: "Incorrect. Desktop software, peripherals, and networking aren't identified as Zero Trust layers in the content."
43+
- content: "What is the role of Surface UEFI on Surface devices?"
44+
choices:
45+
- content: "It replaces Windows and manages user applications"
46+
isCorrect: false
47+
explanation: "Incorrect. Surface UEFI doesn't replace Windows or manage applications."
48+
- content: "It acts as a small operating system that controls and protects firmware"
49+
isCorrect: true
50+
explanation: "Correct. The document explains that UEFI functions like a small operating system to help secure firmware."
51+
- content: "It encrypts user files stored on the device"
52+
isCorrect: false
53+
explanation: "Incorrect. File encryption is handled by features like BitLocker, not UEFI."
54+
- content: "It provides biometric authentication for users"
55+
isCorrect: false
56+
explanation: "Incorrect. Biometric authentication is provided by Windows Hello for Business."
57+
- content: "What is one key benefit of using Rust in Surface device firmware?"
58+
choices:
59+
- content: "It improves graphical performance of devices"
60+
isCorrect: false
61+
explanation: "Incorrect. Rust is discussed in the context of memory safety and security, not graphics."
62+
- content: "It prevents memory errors and reduces security risks"
63+
isCorrect: true
64+
explanation: "Correct. The document states that Rust helps prevent memory errors that can lead to security vulnerabilities."
65+
- content: "It enables faster Wi-Fi connectivity"
66+
isCorrect: false
67+
explanation: "Incorrect. Wi-Fi performance improvements are covered under Wi-Fi 7, not Rust."
68+
- content: "It replaces the need for firmware updates"
69+
isCorrect: false
70+
explanation: "Incorrect. Firmware updates are still required and delivered through Windows Update."
71+
- content: "What is a primary function of Surface Enterprise Management Mode (SEMM)?"
72+
choices:
73+
- content: "Managing user passwords and authentication methods"
74+
isCorrect: false
75+
explanation: "Incorrect. Password and authentication management is handled by tools like Windows Hello for Business."
76+
- content: "Centrally setting and locking UEFI firmware settings"
77+
isCorrect: true
78+
explanation: "Correct. SEMM allows IT administrators to centrally configure and lock UEFI settings across Surface devices."
79+
- content: "Encrypting data stored on removable drives"
80+
isCorrect: false
81+
explanation: "Incorrect. Drive encryption is handled by BitLocker and BitLocker to Go."
82+
- content: "Monitoring network traffic across Surface devices"
83+
isCorrect: false
84+
explanation: "Incorrect. Network traffic monitoring isn't described as a function of SEMM."
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.dpu.secured-devices-by-microsoft.summary
3+
title: Summary
4+
metadata:
5+
title: Summary
6+
description: This content is part of the "Secure at every layer with Microsoft Surface" module.
7+
ms.date: 02/03/2026
8+
author: ozahran7
9+
ms.author: v-zahranomar
10+
ms.topic: unit
11+
durationInMinutes: 1
12+
content: |
13+
[!include[](includes/7-summary.md)]
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
Secure device hardware and software experiences are incredibly important to the success of businesses and a modern workforce. Strong security is a foundational consideration for IT decision makers and remote employees. In this module, you'll explore how the combination of Surface devices, Windows 11 Pro, and Microsoft 365 deliver secure and agile experiences for business users.
2+
3+
## Learning objectives
4+
5+
By the end of this module, you'll be able to:
6+
7+
- Explain Microsoft's Zero Trust Philosophy and its impact on device security.
8+
- Describe how Surface devices are secure and trusted at every layer.
9+
- Identify key security features in Surface hardware, firmware, and Windows 11 Pro.
10+
- Apply best practices for device management, compliance, and lifecycle security.
11+
- Demonstrate how to use Surface-specific tools for ultimate control and protection.

0 commit comments

Comments
 (0)