Endpoint security in Intune Overview Flashcards

(43 cards)

1
Q

What are the 8 high level categories in the Endpoint security node?

A
  • Overview
  • All devices
  • Security baselines
  • Security tasks
  • Manage
  • Monitor
  • Set up
  • Help and support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the default page when opening the Endpoint security node in Microsoft Intune admin center?

A

Overview page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does the endpoint security Overview page present?

A

A consolidated dashboard with displays and information from focused nodes of endpoint security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

in Overview, what information does the Defender for Endpoint Connector status view display?

A

Current status for the tenant-wide Defender for Endpoint Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in Overview, what is the purpose of the label in the Defender for Endpoint Connector status view?

A

Serves as a link to open the Microsoft Defender for Endpoint portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

in Overview, what does the table for Windows devices onboarded to Defender for Endpoint show?

A

Tenant-wide status for endpoint detection and response (EDR) onboarding, with counts of devices that are and aren’t onboarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

in Overview, what does the label in the Windows devices onboarding table link to?

A

Opens the Summary tab of the Endpoint detection and response policy node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

in Overview, what does the link ‘Deploy preconfigured policy’ do?

A

Opens the policy node for Endpoint detection and response to deploy a policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

in Overview, what does the link ‘Onboard devices to Defender for Endpoint’ open?

A

Opens the Defender portal for additional onboarding steps outside of Intune’s workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can the Antivirus agent status report be found in the Intune admin center?

A

Reports > Microsoft Defender Antivirus on the Summary tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in Overview, what additional reports are included in the Other Monitoring reports section?

A

Tiles that open additional Microsoft Defender Antivirus reports, including Detected Malware Firewall Status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

in Overview, what does another tile in the Other Monitoring reports section open?

A

Opens the Defender portal to view sensor and antivirus health data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the All devices view in the Endpoint security node include?

A

A list of all devices from your Microsoft Entra ID available in Microsoft Intune

The All devices view allows for detailed inspection of each device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can you do from the All devices view in the Endpoint security node?

A

Select devices to drill in for more information

This feature facilitates a deeper understanding of device details and statuses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are security baselines in Intune?

A

Preconfigured groups of Windows device configuration settings with best practice recommendations from Microsoft security teams

Security baselines are designed to simplify the management of security settings on devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which device settings do security baselines in Intune support?

A

Windows device settings, Microsoft Edge, Microsoft Defender for Endpoint Protection, and more

This support helps ensure consistency and security across different platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of security baselines in Intune?

A

To configure device configuration settings based on best practice recommendations

They help streamline the security management process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why is it important to understand other methods of configuring devices when using security baselines?

A

To avoid conflicts between different configuration settings

Conflicts can lead to security vulnerabilities or operational issues.

19
Q

True or False: Security baselines are the only method available in Intune for configuring device settings.

A

False

Intune offers several methods for configuration beyond security baselines.

20
Q

Fill in the blank: Security baselines in Intune are preconfigured groups of _______.

A

Windows device configuration settings

These settings are aligned with best practices.

21
Q

Where can you configure security baselines?

A

Go to Endpoint security > Security baselines

22
Q

What is the purpose of integrating Intune with Microsoft Defender for Endpoint?

A

To review Security tasks that identify at-risk devices and provide steps to mitigate that risk.

This integration allows for effective communication between security teams to manage vulnerabilities.

23
Q

Who determines which devices are at risk in the integration process?

A

The Microsoft Defender for Endpoint team.

They assess the security posture and communicate findings to the Intune team.

24
Q

What information do Security tasks created by the Microsoft Defender for Endpoint team include?

A

The devices at risk, the vulnerability, and guidance on how to mitigate that risk.

This helps streamline the remediation process for Intune admins.

25
What actions can Intune Admins take regarding security tasks?
Select, review, and act to remediate those tasks. ## Footnote This includes implementing the recommended mitigations.
26
What do Intune Admins do once a security task is mitigated?
Set the task to complete, which communicates the status back to the Microsoft Defender for Endpoint team. ## Footnote This ensures both teams are updated on remediation efforts.
27
Fill in the blank: Security tasks in Intune help identify _______.
[at-risk devices]. ## Footnote Identifying these devices is crucial for proactive security measures.
28
True or False: Intune Admins can only view security tasks but cannot take action on them.
False. ## Footnote Intune Admins can actively remediate security tasks.
29
Where can you create and review Security tasks ?
Go to Endpoint security > Security tasks
30
# 10 What does "Manage" view contain ?
* antivirus * disk encryption * firewall * Endpoint Priviledge Management * Endpoint detection and response * App control for business * Attack Surface Reduction * Account protection * Device compliance * Conditional access
31
Where can you find a view of Assignment failures?
Go to Endpoint security > Monitor > Assignment failures
32
Where do you go to connect and configure Ms Defender for Endpoint
Go to Endpoint security > Set up > MS Defender for Endpoint
33
# 8 What can you configure with Endpoint security policies?
* Antivirus, * Disk Encryption, * Firewall, * Endpoint Detection and Response, * Attack Surface Reduction, * Account Protection, * Device Compliance, * Conditional access ## Footnote All under the "Manage" view
34
# 2 What does the Antivirus setting enable you to do?
Review Windows 11 unhealthy endpoints and devices with active malware, create and assign antivirus profiles ## Footnote Includes options for Microsoft Defender Antivirus exclusions and Windows Security Experience.
35
What profiles can be created under Disk Encryption?
BitLocker profiles for Windows 11 devices, macOS encryption settings ## Footnote Provides security for data at rest.
36
What does the Firewall setting allow you to do?
Create and configure firewall profiles and firewall rules ## Footnote Essential for controlling incoming and outgoing network traffic.
37
What is the purpose of Endpoint Detection and Response?
Create profiles that provide advanced attack detections that are near real-time and actionable ## Footnote Enhances threat detection capabilities.
38
List some profiles that can be configured under Attack Surface Reduction.
* App and browser isolation * Device control * Attack surface reduction rules * Exploit protection * Web protection (for legacy Edge) * Application control ## Footnote These profiles help reduce the attack surface on managed devices.
39
What does Account Protection help to secure?
User credentials using Windows Hello for Business and Credential Guard technology ## Footnote Aims to strengthen user authentication.
40
What settings are included in Device Compliance management?
* Policies * Notifications * Retire Noncompliant devices * Locations * Compliance policy settings ## Footnote Ensures devices meet security standards.
41
What is the function of Conditional access policies?
Enforce access requirements when specific conditions occur ## Footnote Example: deny access to cloud apps for non-compliant devices.
42
What is an advantage of using an Endpoint protection configuration profile?
Combining and configuring all Microsoft Defender security settings in a single profile ## Footnote Streamlines management of security settings.
43
Name 10 settings included in an Endpoint protection configuration profile.
* Microsoft Defender Application Guard * Windows Defender Firewall * Microsoft Defender SmartScreen * Windows Encryption * Microsoft Defender Exploit Guard * Microsoft Defender Application Control * Microsoft Defender Credential Guard * Microsoft Defender Security Center * Xbox services * User Rights ## Footnote These components enhance overall endpoint security.