ES0.12 Module Summary

· Module 0 · Free

What you built in this module

This module established the foundation for endpoint security engineering — not by configuring any controls yet, but by building the assessment framework, the architectural understanding, and the deployment methodology that every subsequent module depends on.

You examined why traditional AV fails against modern attack chains and traced the evolution from signature-based scanning through EPP, EDR, and XDR — understanding what each generation adds and where each falls short. The critical insight: having Defender for Endpoint deployed is not the same as having endpoint security configured. The gap between “installed” and “engineered” is where attackers operate.

You mapped modern attack chains phase by phase — initial access through execution, persistence, privilege escalation, defense evasion, credential access, lateral movement, and objective — and identified the specific endpoint security controls that interrupt each phase. No single control prevents a complete attack. The layered stack provides multiple interception opportunities, but only when each layer is configured and enforced.

You assessed the five-layer endpoint security stack: hardening, prevention, detection, response, and forensic readiness. You identified the dependencies between layers — missing hardening increases the prevention workload, missing prevention floods the detection layer, missing detection leaves response without triggers, and missing forensic readiness leaves investigation without evidence. The layers are cumulative, not optional.

You evaluated the metrics that matter for endpoint security engineering — distinguishing between vanity metrics (MTTD/MTTR without context) and engineering metrics (ASR enforcement rate, custom detection TP rate, ATT&CK technique coverage, exposure score). The metrics that drive configuration decisions are different from the metrics that appear on executive dashboards. Both have a place; only the engineering metrics drive progress.

You mapped the Microsoft security ecosystem — MDE, Intune, Entra ID, Sentinel, Defender for Cloud, MDO, MDI — and identified the integration points that must be configured for the ecosystem to function as XDR rather than a collection of independent products. The MDE-to-Intune policy delivery, the MDE-to-Entra CA integration, and the MDE-to-Sentinel telemetry flow are the connections this course configures.

You assessed Northgate Engineering’s current state: MDE at 90% onboarding, everything else at default, and a maturity level of 1 (ad hoc). The gap assessment identified 15+ controls that need configuration, each mapped to a specific module in this course. The target state — Level 4 maturity with all five layers active — is achievable in 90 days with the phased deployment methodology.

You learned the deployment sequence that makes endpoint security engineering succeed: visibility first (audit mode, monitoring), then prevention (graduated ASR enforcement, LAPS, Credential Guard), then detection (custom rules, hunting), then forensic readiness (Sysmon, audit policies), then optimization (governance, automation, vulnerability management). Getting the sequence wrong causes more damage than doing nothing — controls deployed without audit data generate unknown false positives that trigger rollbacks and destroy organisational trust in the security team.

You assessed blast radius — the production impact of every endpoint security control — and learned the methodology for quantifying, mitigating, and communicating blast radius to stakeholders. Every control breaks something. The question is whether the break is anticipated, mitigated, and recoverable — or whether it surprises the organisation and kills the project.

Finally, you viewed the endpoint through the attacker’s eyes. The four checks an attacker runs in the first 60 seconds — AV/EDR presence, ASR enforcement state, logging configuration, and credential protection — determine the attacker’s path. Every “configured” result forces the attacker into noisier, more detectable alternatives. Every “not configured” result grants the attacker a free technique.

What comes next

Module ES1 goes deeper into the OS internals that endpoint security controls defend. You will understand the Windows process model, LSASS credential storage, ETW telemetry providers, the registry as an attack surface, and the Linux kernel mechanisms that modern endpoint security monitors. This foundational knowledge explains WHY each control works the way it does — and why certain configurations matter more than others. When you know what the attacker targets at the OS level, you understand what each defensive control actually protects.

The journey from here: ES1 (OS internals) → ES2-ES6 (protection engineering) → ES7-ES10 (detection and response) → ES11-ES15 (advanced operations and capstone). Each module builds on the assessment framework and deployment methodology established in this module.

💬

How was this module?

Your feedback helps us improve the course. One click is enough — comments are optional.

Thank you — your feedback has been received.

You're reading the free modules of this course

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts. Premium subscribers get access to all courses.

View Pricing See Full Syllabus