BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft Exam AZ-800 Topic 8 Question 59 Discussion

Actual exam question for Microsoft's AZ-800 exam
Question #: 59
Topic #: 8
[All AZ-800 Questions]

SIMULATION

Task 7

You need to monitor the security configuration of DC1 by using Microsoft Defender for Cloud.

The required source files are located in a folder named \\dc1.contoso.com\install.

Show Suggested Answer Hide Answer
Suggested Answer: A

One possible solution to monitor the security configuration of DC1 by using Microsoft Defender for Cloud is to use the Guest Configuration feature. Guest Configuration is a service that audits settings inside Linux and Windows virtual machines (VMs) to assess their compliance with your organization's security policies. You can use Guest Configuration to monitor the security baseline settings for Windows Server in the Microsoft Defender for Cloud portal by following these steps:

On DC1, open a web browser and go to the folder named \dc1.contoso.com\install. Download the Guest Configuration extension file (GuestConfiguration.msi) and save it to a local folder, such as C:\Temp.

Run the Guest Configuration extension file and follow the installation wizard. You can choose to install the extension for all users or only for the current user. For more information on how to install the Guest Configuration extension, seeInstall the Guest Configuration extension.

After the installation is complete, sign in to the Microsoft Defender for Cloud portal (2).

In the left pane, selectSecurity Centerand thenRecommendations.

In the recommendations list, find and selectVulnerabilities in security configuration on your Windows machines should be remediated (powered by Guest Configuration).

In theRemediate Security Configurationspage, you can see the compliance status of your Windows VMs, including DC1, based on the Azure Compute Benchmark. The Azure Compute Benchmark is a set of rules that define the desired configuration state of your VMs. You can also see the number of failed, passed, and skipped rules for each VM. For more information on the Azure Compute Benchmark, seeMicrosoft cloud security benchmark: Azure compute benchmark is now available.

To view the details of the security configuration of DC1, click on the VM name and then selectView details. You can see the list of rules that apply to DC1 and their compliance status. You can also see the severity, description, and remediation steps for each rule. For example, you can see if DC1 has the latest security updates installed, if the firewall is enabled, if the password policy is enforced, and so on.

To monitor the security configuration of DC1 over time, you can use theCompliance over timechart, which shows the trend of compliance status for DC1 in the past 30 days. You can also use theCompliance breakdownchart, which shows the distribution of compliance status for DC1 by rule severity.

By using Guest Configuration, you can monitor the security configuration of DC1 by using Microsoft Defender for Cloud and ensure that it meets your organization's security standards. You can also use Guest Configuration to monitor the security configuration of other Windows and Linux VMs in your Azure environment.


Contribute your Thoughts:

Hubert
26 days ago
Haha, I bet the exam writers are laughing at us trying to figure this one out. They're probably just testing our ability to think outside the box.
upvoted 0 times
...
Tammy
27 days ago
Wait, do we need to actually connect to the DC1 server to access those files? That could be a potential security risk.
upvoted 0 times
Mauricio
7 days ago
No, we can use Microsoft Defender for Cloud to monitor the security configuration of DC1 without directly connecting to the server.
upvoted 0 times
...
...
Leota
1 months ago
Hmm, I wonder if we need to use some specific tools or commands to monitor the security configuration. Guess I'll have to do some research on that.
upvoted 0 times
Eloisa
16 days ago
I'm not sure, but I think we might need to do some research to find out.
upvoted 0 times
...
Avery
20 days ago
Do you know if there are any specific tools or commands we need to use for this task?
upvoted 0 times
...
Mila
24 days ago
Yes, that's correct. We can access the required source files from the folder \\dc1.contoso.com\\install.
upvoted 0 times
...
Brynn
25 days ago
I think we can use Microsoft Defender for Cloud to monitor the security configuration.
upvoted 0 times
...
...
Erinn
1 months ago
I believe accessing the required source files from \\dc1.contoso.com\install is crucial for this task.
upvoted 0 times
...
Gladis
2 months ago
I don't think the files are actually located in that folder. Looks like a trick question to me.
upvoted 0 times
Ahmad
27 days ago
Let's try to find another way to access the required source files.
upvoted 0 times
...
Miss
30 days ago
I think we should consult the instructions again to see if we missed anything.
upvoted 0 times
...
Elke
1 months ago
I agree, it does seem like a trick question.
upvoted 0 times
...
Ligia
1 months ago
Maybe we should double check the folder location just to be sure.
upvoted 0 times
...
...
Brynn
2 months ago
I agree, using Microsoft Defender for Cloud can help us with that.
upvoted 0 times
...
Myra
2 months ago
I think monitoring the security configuration of DC1 is important.
upvoted 0 times
...

Save Cancel