Skip to content

Commit f40cfce

Browse files
committed
fix for acrolinx
1 parent ce1b2bd commit f40cfce

5 files changed

Lines changed: 24 additions & 24 deletions

File tree

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/10-summary.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-securing-server-client-endpoints.summary
3-
title: Summary - Design solutions for securing server and client endpoints
3+
title: Summary
44
metadata:
5-
title: Summary - Design solutions for securing server and client endpoints
6-
description: "Review what you learned about designing endpoint security solutions and explore additional resources for servers, clients, IoT, OT, security baselines, remote access, and Windows LAPS."
5+
title: Summary
6+
description: "Summary of Design Solutions for Securing Server and Client Endpoints."
77
ms.date: 02/05/2026
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/9-knowledge-check.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -45,38 +45,38 @@ quiz:
4545
choices:
4646
- content: "Firewall management"
4747
isCorrect: false
48-
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but does not include firewall management."
48+
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but doesn't include firewall management."
4949
- content: "Anti-malware protection"
5050
isCorrect: true
5151
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, including anti-malware protection."
5252
- content: "Web filtering"
5353
isCorrect: false
54-
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but does not include web filtering."
54+
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but doesn't include web filtering."
5555
- content: "Email filtering"
5656
isCorrect: false
57-
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but does not include email filtering."
57+
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but doesn't include email filtering."
5858
- content: "What are Windows security baselines in Intune?"
5959
choices:
6060
- content: "Templates that define a set of security configurations that can be applied to devices."
6161
isCorrect: true
6262
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, helping to ensure that they meet organizational security requirements."
63-
- content: "Windows operating system images that have been pre-configured for security."
63+
- content: "Windows operating system images that have been preconfigured for security."
6464
isCorrect: false
6565
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, helping to ensure that they meet organizational security requirements."
6666
- content: "A set of default security configurations that are applied to all Windows devices in an organization."
6767
isCorrect: false
68-
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they are not applied by default to all Windows devices in an organization."
68+
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they aren't applied by default to all Windows devices in an organization."
6969
- content: "A set of security configurations that are only applicable to Windows servers."
7070
isCorrect: false
71-
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they are not applied by default to all Windows devices in an organization."
71+
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they aren't applied by default to all Windows devices in an organization."
7272
- content: "What is Microsoft Defender for IoT?"
7373
choices:
7474
- content: "An endpoint security solution for Windows devices."
7575
isCorrect: false
7676
explanation: "Microsoft Defender for IoT is a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
7777
- content: "An endpoint security solution for Mac devices."
7878
isCorrect: false
79-
explanation: "Microsoft Defender for IoT is not an endpoint security solution for Mac devices, but rather a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
79+
explanation: "Microsoft Defender for IoT isn't an endpoint security solution for Mac devices, but rather a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
8080
- content: "A cloud-based security solution for Internet of Things (IoT) devices."
8181
isCorrect: true
8282
explanation: "Microsoft Defender for IoT is a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/includes/2-specify-server-security-requirements.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,9 +45,9 @@ Windows Server environments require specific attention to:
4545

4646
Linux security requirements vary by distribution but should address:
4747

48-
- **SSH hardening**: Require key-based authentication, disable root login, and limit SSH access to specific users or groups
48+
- **SSH hardening**: Require key-based authentication, disable root sign-in, and limit SSH access to specific users or groups
4949
- **SELinux or AppArmor**: Specify mandatory access control requirements based on your distribution (SELinux for RHEL-based distributions, AppArmor for Ubuntu/SUSE)
50-
- **Firewall configuration**: Require firewalld or iptables rules that implement least-privilege network access
50+
- **Firewall configuration**: Require firewall or iptables rules that implement least-privilege network access
5151
- **Package management**: Specify approved repositories and require signed packages
5252
- **File system permissions**: Define requirements for sensitive file permissions and the use of access control lists (ACLs)
5353

@@ -57,7 +57,7 @@ Server security requirements vary based on where servers are deployed. Your spec
5757

5858
### Azure virtual machines
5959

60-
For Azure-hosted servers, leverage platform capabilities in your requirements:
60+
For Azure-hosted servers, use platform capabilities in your requirements:
6161

6262
- **Microsoft Defender for Servers**: Require either Plan 1 or Plan 2 based on protection needs. Plan 1 provides Defender for Endpoint integration for EDR capabilities. Plan 2 adds agentless scanning, file integrity monitoring, and just-in-time VM access.
6363
- **Network security groups**: Require NSGs on all subnets with rules that follow least-privilege principles
@@ -91,7 +91,7 @@ Beyond baseline security, specify requirements for active threat protection:
9191

9292
**Vulnerability scanning**: Specify scanning frequency and remediation timelines:
9393

94-
- Critical vulnerabilities: Remediate within 7 days
94+
- Critical vulnerabilities: Remediate within seven days
9595
- High vulnerabilities: Remediate within 30 days
9696
- Medium vulnerabilities: Remediate within 90 days
9797

@@ -106,7 +106,7 @@ Your server security requirements must address applicable regulations:
106106
| Regulation | Key server requirements |
107107
| --- | --- |
108108
| **PCI-DSS** | Quarterly vulnerability scans, file integrity monitoring, strong cryptography, audit logging |
109-
| **HIPAA** | Access controls, audit controls, encryption, automatic logoff |
109+
| **HIPAA** | Access controls, audit controls, encryption, automatic sign out |
110110
| **SOC 2** | Logical access controls, system monitoring, change management, encryption |
111111
| **ISO 27001** | Asset management, access control, cryptography, operations security |
112112

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/includes/4-specify-embedded-device-security-requirements.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Security requirements for IoT and embedded systems should begin with threat mode
77
Divide your IoT architecture into security zones:
88

99
- **Device zone**: Physical devices and their immediate environment
10-
- **Gateway zone**: Edge devices that aggregate and process data locally
10+
- **Gateway zone**: Microsoft Edge devices that aggregate and process data locally
1111
- **Cloud zone**: Cloud-based services for data processing and management
1212
- **Operations zone**: User interfaces and management systems
1313

@@ -36,7 +36,7 @@ Strong device identity forms the foundation of IoT security. Unlike user authent
3636
- Track device health, patch status, and security state
3737
- Enable query-based grouping for scaled operations and access control
3838

39-
For legacy devices that cannot support strong identity, require IoT gateways to act as guardians. The gateway authenticates to cloud services on behalf of less-capable devices while enforcing security policies locally.
39+
For legacy devices that can't support strong identity, require IoT gateways to act as guardians. The gateway authenticates to cloud services on behalf of less-capable devices while enforcing security policies locally.
4040

4141
## Define network security requirements
4242

@@ -64,7 +64,7 @@ For operational technology (OT) environments, require alignment with the Purdue
6464

6565
## Specify threat detection and monitoring
6666

67-
Continuous monitoring is essential for detecting threats in IoT environments, particularly for legacy devices that cannot run security agents.
67+
Continuous monitoring is essential for detecting threats in IoT environments, particularly for legacy devices that can't run security agents.
6868

6969
**Network-based detection**: Require agentless network sensors that:
7070

@@ -90,7 +90,7 @@ Microsoft Defender for IoT provides these capabilities through OT network sensor
9090

9191
## Define update management requirements
9292

93-
Devices that cannot receive security updates become permanent vulnerabilities. Specify update mechanisms that support the full device lifecycle.
93+
Devices that can't receive security updates become permanent vulnerabilities. Specify update mechanisms that support the full device lifecycle.
9494

9595
**Update capabilities**: Require devices to support:
9696

@@ -108,7 +108,7 @@ Devices that cannot receive security updates become permanent vulnerabilities. S
108108

109109
- Supported device lifetime with committed security updates
110110
- Decommissioning procedures for devices reaching end of support
111-
- Replacement timelines for devices that cannot be updated
111+
- Replacement timelines for devices that can't be updated
112112

113113
## Apply zero-trust principles
114114

@@ -142,7 +142,7 @@ Zero-trust architecture assumes breach and requires verification for every acces
142142

143143
When specifying IoT and embedded security requirements, consider:
144144

145-
**Device constraints**: Many IoT devices have limited processing power, memory, and storage. Requirements must account for devices that cannot run full security agents or support complex cryptographic operations.
145+
**Device constraints**: Many IoT devices have limited processing power, memory, and storage. Requirements must account for devices that can't run full security agents or support complex cryptographic operations.
146146

147147
**Operational continuity**: Industrial and OT environments prioritize availability. Security controls must not disrupt critical processes. Plan for maintenance windows and gradual rollouts.
148148

learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/includes/5-design-solution-securing-operational-technology-industrial-control-systems.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
Security architects evaluating solutions for operational technology (OT) and industrial control systems (ICS) face unique challenges. Traditional security tools designed for IT environments often cannot monitor specialized industrial protocols or deploy agents on embedded controllers. Microsoft Defender for IoT addresses these challenges through agentless network monitoring purpose-built for OT environments.
1+
Security architects evaluating solutions for operational technology (OT) and industrial control systems (ICS) face unique challenges. Traditional security tools designed for IT environments often can't monitor specialized industrial protocols or deploy agents on embedded controllers. Microsoft Defender for IoT addresses these challenges through agentless network monitoring purpose-built for OT environments.
22

33
## Evaluate the solution architecture
44

@@ -14,7 +14,7 @@ Defender for IoT uses a distributed architecture with network sensors deployed a
1414

1515
**Sensor capabilities**: OT sensors perform deep packet inspection across 100+ industrial protocols including Modbus, OPC-UA, BACnet, DNP3, and proprietary SCADA protocols. The sensors use machine learning to establish behavioral baselines and detect anomalies without requiring signatures for every threat variant.
1616

17-
**Agentless monitoring**: Evaluate whether agentless monitoring addresses your security requirements. Defender for IoT monitors traffic passively—it requires no agents on endpoints, no changes to device configurations, and no impact on production systems. This approach is essential for environments with legacy programmable logic controllers (PLCs), remote terminal units (RTUs), and embedded controllers that cannot support endpoint agents.
17+
**Agentless monitoring**: Evaluate whether agentless monitoring addresses your security requirements. Defender for IoT monitors traffic passively—it requires no agents on endpoints, no changes to device configurations, and no impact on production systems. This approach is essential for environments with legacy programmable logic controllers (PLCs), remote terminal units (RTUs), and embedded controllers that can't support endpoint agents.
1818

1919
## Assess deployment model options
2020

@@ -150,6 +150,6 @@ When evaluating Defender for IoT for your organization, consider:
150150

151151
**Change management**: Plan for initial learning mode where sensors establish baselines. Alert tuning reduces false positives after deployment.
152152

153-
**Operational impact**: Validate that passive monitoring does not introduce latency or affect deterministic behavior of control systems.
153+
**Operational impact**: Validate that passive monitoring doesn't introduce latency or affect deterministic behavior of control systems.
154154

155155
**Licensing**: Defender for IoT licenses based on committed devices. Plan capacity based on expected device count across all sites.

0 commit comments

Comments
 (0)