Implementing Microsoft Defender for Endpoint Flashcards

1
Q

What are the three deployment phases of Defender for Endpoint?

A

The three deployment phases of Defender for Endpoint are Preparation, Setup, and Onboarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some considerations during the Preparation phase?

A

During the Preparation phase, you should identify stakeholders and obtain necessary approvals, understand the environment and dependencies, document endpoint and server counts, document management tools, and consider role-based access control (RBAC) using least privilege principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the recommended approach for RBAC in Defender for Endpoint?

A

Microsoft recommends using RBAC and Privileged Identity Management (PIM) to manage roles in Defender for Endpoint. RBAC allows you to assign granular permissions by defining roles, assigning Azure AD user groups to the roles, and granting access to device groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can the Cyber Defense Operations Center structure help determine RBAC structure?

A

The structure of the Cyber Defense Operations Center can help determine the RBAC structure by identifying the personas involved and assigning RBAC roles based on their specific responsibilities and needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the recommended adoption order for Defender for Endpoint components?

A

The recommended adoption order for Defender for Endpoint components, as suggested by Microsoft, is Windows Defender Antivirus, Attack Surface Reduction, Next-Gen Protection, and Endpoint Detection and Response (EDR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is it easier to replace existing solutions with Defender for Endpoint?

A

Defender for Endpoint is built into the operating system, making it easier to replace existing endpoint security solutions. It avoids the need for additional hooks into the environment and offers comprehensive protection as part of the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of validating licensing during the setup phase?

A

Validating licensing ensures that your owned licenses are properly provisioned and confirms their license state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you validate licensing in Microsoft Defender for Endpoint?

A

You can validate licensing by browsing to the Admin Center or Azure portal, navigating to the license section, or by visiting Billing | Subscriptions. If you purchased licenses through the CSP program, you can validate them in the Partner portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you configure your tenant during the setup phase?

A

To configure your tenant, you need to onboard Microsoft Defender for Endpoint. You can do this by browsing to the Microsoft 365 Security Center and accessing any item under the Endpoints section or selecting a Microsoft 365 Defender feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When is network configuration necessary in the setup phase?

A

Network configuration is necessary if your endpoints use a proxy to access the internet. If they don’t, no further configuration is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What autodiscovery methods can be used for proxy configuration with the Defender for Endpoint sensor?

A

The Defender for Endpoint sensor can autodiscover a proxy server using the Transparent proxy autodiscovery method or the Web Proxy Autodiscovery Protocol (WPAD). Manual configuration of proxy settings is also possible via the registry or the netsh command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the next phase after completing the setup phase in the Defender for Endpoint deployment?

A

The next phase is the onboarding of devices to Defender for Endpoint, which will be covered in the next lesson.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the available deployment methods for onboarding Windows endpoints to Microsoft Defender for Endpoint?

A

The available deployment methods for Windows endpoints include local scripts, Group Policy, Microsoft Endpoint Manager (formerly known as Microsoft Intune), Microsoft Endpoint Configuration Manager (formerly known as System Center Configuration Manager), VDI scripts, and integration with Azure Defender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the onboarding options for macOS endpoints?

A

macOS endpoints can be onboarded using local scripts, Microsoft Endpoint Manager, JAMF Pro, or Mobile Device Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can Linux servers be onboarded to Microsoft Defender for Endpoint?

A

Linux servers can be onboarded using local scripts, Puppet, or Ansible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can iOS and Android devices be onboarded to Defender for Endpoint?

A

iOS devices can be onboarded through the app store, while Android devices can be onboarded via Microsoft Endpoint Manager.

17
Q

What are the three deployment rings typically used when deploying Defender for Endpoint?

A

The three deployment rings are the Evaluation ring, the Pilot ring, and the Full Deployment ring.

18
Q

Why is it recommended to deploy in deployment rings?

A

Deploying in deployment rings allows for testing and verification of the deployment on a smaller scale before rolling out to all devices. It helps limit any negative effects that may arise from a deployment gone wrong.

19
Q

Where can you find documentation on onboarding using Microsoft Endpoint Configuration Manager?

A

Documentation on onboarding using Microsoft Endpoint Configuration Manager can be found at the provided URL (shown on the screen during the lesson).