HOTSPOT - You need to recommend a solution to meet the AWS requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Hot Area:
Suggested Answer:
Box 1: Microsoft Defender for servers Scenario: Notify security administrators at Fabrikam if any AWS EC2 instances are noncompliant with secure score recommendations. Defender for Servers is one of the enhanced security features available in Microsoft Defender for Cloud. You can use it to add threat detection and advanced defenses to your Windows and Linux machines that exist in hybrid and multicloud environments. Available Defender for Server plans Defender for Servers offers you a choice between two paid plans. Both include automatic onboarding for resources in Azure, AWS, GCP.
Plan 1 includes the following benefits: Automatic onboarding for resources in Azure, AWS, GCP Microsoft threat and vulnerability management Flexibility to use Microsoft Defender for Cloud or Microsoft 365 Defender portal A Microsoft Defender for Endpoint subscription that includes access to alerts, software inventory, Vulnerability Assessment and an automatic integration with Microsoft Defender for Cloud. Plan 2 includes everything in Plan 1 plus some additional benefits.
Box 2: Microsoft Sentinel -
Scenario: AWS Requirements - Fabrikam identifies the following security requirements for the data hosted in ContosoAWS1: Ensure that the security administrators can query AWS service logs directly from the Azure environment. Use the Amazon Web Services (AWS) connectors to pull AWS service logs into Microsoft Sentinel. Note: These connectors work by granting Microsoft Sentinel access to your AWS resource logs. Setting up the connector establishes a trust relationship between Amazon Web Services and Microsoft Sentinel. This is accomplished on AWS by creating a role that gives permission to Microsoft Sentinel to access your AWS logs. Reference: https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-servers-introduction https://docs.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-aws https://docs.microsoft.com/en-us/azure/sentinel/connect-aws
an to complete https://learn.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-aws?pivots=env-settings
native AWS connector, defender for server will be for advanced threat protection
This line "Defender for Servers is one of the enhanced security features available in Microsoft Defender for Cloud." is making me think twice to choose the correct answer between Defender for Cloud and Defeder for servers. Any clarifications?
Microsoft Defender for Cloud provides "Cloud Security Posture Management" (CSPM), providing a security analysis of all the resources in your cloud estates
Box1: Defender for Cloud
Box2: Microsoft Sentinel
https://www.youtube.com/watch?v=r-P-2lGzPFQ&list=PLQ2ktTy9rklhzzkSEZvDZT4QSIVUQZD-Y&index=9
Question 108
and the case study says:
Defender for Cloud is configured to assess all the resources in Sub1 for compliance to the HIPAA HITRUST standard.
Currently, resources that are noncompliant with the HIPAA HITRUST standard are remediated manually.
This applies to AWS instances and machines in the Sub. Therefore is Defender for Cloud to give you secure score recommendations.
1. Defender for Cloud
2. Microsoft Sentinel
https://learn.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-aws?pivots=env-settings
With cloud workloads commonly spanning multiple cloud platforms, cloud security services must do the same. Microsoft Defender for Cloud protects workloads in Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), GitHub and Azure DevOps (ADO).
https://learn.microsoft.com/en-us/azure/sentinel/connect-aws?tabs=s3
Use the Amazon Web Services (AWS) connectors to pull AWS service logs into Microsoft Sentinel. These connectors work by granting Microsoft Sentinel access to your AWS resource logs. Setting up the connector establishes a trust relationship between Amazon Web Services and Microsoft Sentinel. This is accomplished on AWS by creating a role that gives permission to Microsoft Sentinel to access your AWS logs.
For requirement: “ Notify security administrators at Fabrikam if any AWS EC2 instances are noncompliant with secure score recommendations”
>> Even though Defender for servers is a prerequisite to get secure score and recommendations in Defender for Cloud, I lean towards where we get recommendations:
“ Native cloud connector (recommended) - Provides an agentless connection to your AWS account that you can extend with Defender for Cloud's Defender plans to secure your AWS resources:
Cloud Security Posture Management (CSPM) assesses your AWS resources according to AWS-specific security recommendations and reflects your security posture in your secure score. ”
For box1, it is Microsoft Defender for servers.
Microsoft Defender for servers is part of Microsoft Defender for Cloud. This answer is more specific and should be chosen over the general Microsoft Defender for Cloud. If the option is not available, we can choose Defender for Cloud as well.
Box 1 is Microsoft Defender for Cloud
https://techcommunity.microsoft.com/t5/itops-talk-blog/step-by-step-how-to-connect-aws-machines-to-microsoft-defender/ba-p/3251096
You can't view a secure score in Defender for servers. You configure defender for servers so that you can receive logs for AWS.You review a secure score in defender for cloud.
That is correct, you first need Defender for servers and then you can view scores in Defender for servers. The question does not ask where you should view scores, and it asks what you should include in the recommendation. We should include both Defender for servers and Defender for cloud in the recommendation. But since Defender for servers is part of Defender for cloud, and it is more specific, I would vote for Defender for servers.
https://docs.microsoft.com/en-us/azure/sentinel/connect-aws?tabs=s3
Use the Amazon Web Services (AWS) connectors to pull AWS service logs into Microsoft Sentinel. These connectors work by granting Microsoft Sentinel access to your AWS resource logs. Setting up the connector establishes a trust relationship between Amazon Web Services and Microsoft Sentinel. This is accomplished on AWS by creating a role that gives permission to Microsoft Sentinel to access your AWS logs.
upvoted 5 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
d3an
Highly Voted 2 years, 1 month agodavidkoc
2 years, 1 month agoblopfr
2 years agoSelloLed
Highly Voted 2 years agoRamye
Most Recent 10 months agoMurtuza
10 months, 2 weeks agoslobav
1 year, 1 month agoServerBrain
1 year, 2 months agoServerBrain
1 year, 2 months agoCock
1 year, 5 months agozellck
1 year, 5 months agozellck
1 year, 5 months agoGurulee
1 year, 8 months agoGurulee
1 year, 8 months agoAzureJobsTillRetire
1 year, 8 months agoSofiaLorean
1 year, 9 months agonieprotetkniteeetr
1 year, 10 months agopiwiwiwiwiwiw
1 year, 11 months agoAzureJobsTillRetire
1 year, 8 months agoXyz_40
2 years agodrod
2 years agozts
2 years, 2 months agoJakeCallham
2 years agoJakeCallham
2 years agoginseng
1 year, 9 months agoTheMCT
2 years, 2 months ago