You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Summary - Design solutions for securing server and client endpoints
3
+
title: Summary
4
4
metadata:
5
-
title: Summary - Design solutions for securing server and client endpoints
6
-
description: "Review what you learned about designing endpoint security solutions and explore additional resources for servers, clients, IoT, OT, security baselines, remote access, and Windows LAPS."
5
+
title: Summary
6
+
description: "Summary of Design Solutions for Securing Server and Client Endpoints."
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/9-knowledge-check.yml
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -45,38 +45,38 @@ quiz:
45
45
choices:
46
46
- content: "Firewall management"
47
47
isCorrect: false
48
-
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but does not include firewall management."
48
+
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but doesn't include firewall management."
49
49
- content: "Anti-malware protection"
50
50
isCorrect: true
51
51
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, including anti-malware protection."
52
52
- content: "Web filtering"
53
53
isCorrect: false
54
-
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but does not include web filtering."
54
+
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but doesn't include web filtering."
55
55
- content: "Email filtering"
56
56
isCorrect: false
57
-
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but does not include email filtering."
57
+
explanation: "Defender for IoT provides threat protection, vulnerability management, and configuration management for IoT devices, but doesn't include email filtering."
58
58
- content: "What are Windows security baselines in Intune?"
59
59
choices:
60
60
- content: "Templates that define a set of security configurations that can be applied to devices."
61
61
isCorrect: true
62
62
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, helping to ensure that they meet organizational security requirements."
63
-
- content: "Windows operating system images that have been pre-configured for security."
63
+
- content: "Windows operating system images that have been preconfigured for security."
64
64
isCorrect: false
65
65
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, helping to ensure that they meet organizational security requirements."
66
66
- content: "A set of default security configurations that are applied to all Windows devices in an organization."
67
67
isCorrect: false
68
-
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they are not applied by default to all Windows devices in an organization."
68
+
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they aren't applied by default to all Windows devices in an organization."
69
69
- content: "A set of security configurations that are only applicable to Windows servers."
70
70
isCorrect: false
71
-
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they are not applied by default to all Windows devices in an organization."
71
+
explanation: "Windows security baselines in Intune are templates that define a set of security configurations that can be applied to devices, but they aren't applied by default to all Windows devices in an organization."
72
72
- content: "What is Microsoft Defender for IoT?"
73
73
choices:
74
74
- content: "An endpoint security solution for Windows devices."
75
75
isCorrect: false
76
76
explanation: "Microsoft Defender for IoT is a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
77
77
- content: "An endpoint security solution for Mac devices."
78
78
isCorrect: false
79
-
explanation: "Microsoft Defender for IoT is not an endpoint security solution for Mac devices, but rather a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
79
+
explanation: "Microsoft Defender for IoT isn't an endpoint security solution for Mac devices, but rather a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
80
80
- content: "A cloud-based security solution for Internet of Things (IoT) devices."
81
81
isCorrect: true
82
82
explanation: "Microsoft Defender for IoT is a cloud-based security solution for Internet of Things (IoT) devices that helps protect against cyber threats."
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/includes/2-specify-server-security-requirements.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,9 +45,9 @@ Windows Server environments require specific attention to:
45
45
46
46
Linux security requirements vary by distribution but should address:
47
47
48
-
-**SSH hardening**: Require key-based authentication, disable root login, and limit SSH access to specific users or groups
48
+
-**SSH hardening**: Require key-based authentication, disable root sign-in, and limit SSH access to specific users or groups
49
49
-**SELinux or AppArmor**: Specify mandatory access control requirements based on your distribution (SELinux for RHEL-based distributions, AppArmor for Ubuntu/SUSE)
50
-
-**Firewall configuration**: Require firewalld or iptables rules that implement least-privilege network access
50
+
-**Firewall configuration**: Require firewall or iptables rules that implement least-privilege network access
51
51
-**Package management**: Specify approved repositories and require signed packages
52
52
-**File system permissions**: Define requirements for sensitive file permissions and the use of access control lists (ACLs)
53
53
@@ -57,7 +57,7 @@ Server security requirements vary based on where servers are deployed. Your spec
57
57
58
58
### Azure virtual machines
59
59
60
-
For Azure-hosted servers, leverage platform capabilities in your requirements:
60
+
For Azure-hosted servers, use platform capabilities in your requirements:
61
61
62
62
-**Microsoft Defender for Servers**: Require either Plan 1 or Plan 2 based on protection needs. Plan 1 provides Defender for Endpoint integration for EDR capabilities. Plan 2 adds agentless scanning, file integrity monitoring, and just-in-time VM access.
63
63
-**Network security groups**: Require NSGs on all subnets with rules that follow least-privilege principles
@@ -91,7 +91,7 @@ Beyond baseline security, specify requirements for active threat protection:
91
91
92
92
**Vulnerability scanning**: Specify scanning frequency and remediation timelines:
93
93
94
-
- Critical vulnerabilities: Remediate within 7 days
94
+
- Critical vulnerabilities: Remediate within seven days
95
95
- High vulnerabilities: Remediate within 30 days
96
96
- Medium vulnerabilities: Remediate within 90 days
97
97
@@ -106,7 +106,7 @@ Your server security requirements must address applicable regulations:
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/includes/4-specify-embedded-device-security-requirements.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ Security requirements for IoT and embedded systems should begin with threat mode
7
7
Divide your IoT architecture into security zones:
8
8
9
9
-**Device zone**: Physical devices and their immediate environment
10
-
-**Gateway zone**: Edge devices that aggregate and process data locally
10
+
-**Gateway zone**: Microsoft Edge devices that aggregate and process data locally
11
11
-**Cloud zone**: Cloud-based services for data processing and management
12
12
-**Operations zone**: User interfaces and management systems
13
13
@@ -36,7 +36,7 @@ Strong device identity forms the foundation of IoT security. Unlike user authent
36
36
- Track device health, patch status, and security state
37
37
- Enable query-based grouping for scaled operations and access control
38
38
39
-
For legacy devices that cannot support strong identity, require IoT gateways to act as guardians. The gateway authenticates to cloud services on behalf of less-capable devices while enforcing security policies locally.
39
+
For legacy devices that can't support strong identity, require IoT gateways to act as guardians. The gateway authenticates to cloud services on behalf of less-capable devices while enforcing security policies locally.
40
40
41
41
## Define network security requirements
42
42
@@ -64,7 +64,7 @@ For operational technology (OT) environments, require alignment with the Purdue
64
64
65
65
## Specify threat detection and monitoring
66
66
67
-
Continuous monitoring is essential for detecting threats in IoT environments, particularly for legacy devices that cannot run security agents.
67
+
Continuous monitoring is essential for detecting threats in IoT environments, particularly for legacy devices that can't run security agents.
@@ -90,7 +90,7 @@ Microsoft Defender for IoT provides these capabilities through OT network sensor
90
90
91
91
## Define update management requirements
92
92
93
-
Devices that cannot receive security updates become permanent vulnerabilities. Specify update mechanisms that support the full device lifecycle.
93
+
Devices that can't receive security updates become permanent vulnerabilities. Specify update mechanisms that support the full device lifecycle.
94
94
95
95
**Update capabilities**: Require devices to support:
96
96
@@ -108,7 +108,7 @@ Devices that cannot receive security updates become permanent vulnerabilities. S
108
108
109
109
- Supported device lifetime with committed security updates
110
110
- Decommissioning procedures for devices reaching end of support
111
-
- Replacement timelines for devices that cannot be updated
111
+
- Replacement timelines for devices that can't be updated
112
112
113
113
## Apply zero-trust principles
114
114
@@ -142,7 +142,7 @@ Zero-trust architecture assumes breach and requires verification for every acces
142
142
143
143
When specifying IoT and embedded security requirements, consider:
144
144
145
-
**Device constraints**: Many IoT devices have limited processing power, memory, and storage. Requirements must account for devices that cannot run full security agents or support complex cryptographic operations.
145
+
**Device constraints**: Many IoT devices have limited processing power, memory, and storage. Requirements must account for devices that can't run full security agents or support complex cryptographic operations.
146
146
147
147
**Operational continuity**: Industrial and OT environments prioritize availability. Security controls must not disrupt critical processes. Plan for maintenance windows and gradual rollouts.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-securing-server-client-endpoints/includes/5-design-solution-securing-operational-technology-industrial-control-systems.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
Security architects evaluating solutions for operational technology (OT) and industrial control systems (ICS) face unique challenges. Traditional security tools designed for IT environments often cannot monitor specialized industrial protocols or deploy agents on embedded controllers. Microsoft Defender for IoT addresses these challenges through agentless network monitoring purpose-built for OT environments.
1
+
Security architects evaluating solutions for operational technology (OT) and industrial control systems (ICS) face unique challenges. Traditional security tools designed for IT environments often can't monitor specialized industrial protocols or deploy agents on embedded controllers. Microsoft Defender for IoT addresses these challenges through agentless network monitoring purpose-built for OT environments.
2
2
3
3
## Evaluate the solution architecture
4
4
@@ -14,7 +14,7 @@ Defender for IoT uses a distributed architecture with network sensors deployed a
14
14
15
15
**Sensor capabilities**: OT sensors perform deep packet inspection across 100+ industrial protocols including Modbus, OPC-UA, BACnet, DNP3, and proprietary SCADA protocols. The sensors use machine learning to establish behavioral baselines and detect anomalies without requiring signatures for every threat variant.
16
16
17
-
**Agentless monitoring**: Evaluate whether agentless monitoring addresses your security requirements. Defender for IoT monitors traffic passively—it requires no agents on endpoints, no changes to device configurations, and no impact on production systems. This approach is essential for environments with legacy programmable logic controllers (PLCs), remote terminal units (RTUs), and embedded controllers that cannot support endpoint agents.
17
+
**Agentless monitoring**: Evaluate whether agentless monitoring addresses your security requirements. Defender for IoT monitors traffic passively—it requires no agents on endpoints, no changes to device configurations, and no impact on production systems. This approach is essential for environments with legacy programmable logic controllers (PLCs), remote terminal units (RTUs), and embedded controllers that can't support endpoint agents.
18
18
19
19
## Assess deployment model options
20
20
@@ -150,6 +150,6 @@ When evaluating Defender for IoT for your organization, consider:
150
150
151
151
**Change management**: Plan for initial learning mode where sensors establish baselines. Alert tuning reduces false positives after deployment.
152
152
153
-
**Operational impact**: Validate that passive monitoring does not introduce latency or affect deterministic behavior of control systems.
153
+
**Operational impact**: Validate that passive monitoring doesn't introduce latency or affect deterministic behavior of control systems.
154
154
155
155
**Licensing**: Defender for IoT licenses based on committed devices. Plan capacity based on expected device count across all sites.
0 commit comments