7.10 Module Assessment
Module 7 — Final Assessment
Key takeaways
- Unonboarded devices are invisible — no telemetry, no alerts, no investigation. Run the coverage gap query weekly.
- Track EffectiveCoverage (healthy+active/total), not just CoveragePercent (onboarded/total) — the gap between them is false confidence
- Intune is the recommended onboarding method — automatic for new enrollments, no scripts or GPO
- macOS System Extension approval is the #1 Mac onboarding failure — deploy approval profiles via Intune or Jamf
- Tamper protection prevents attackers from disabling Defender with a single command — enable it tenant-wide
- Network protection blocks connections to known-malicious domains — disabled by default, enable on every device
- ASR rules prevent high-risk behaviors (macro execution, LSASS access, email executables). Enable in audit mode first, analyze for 2-4 weeks, create exclusions, then block.
- The five critical ASR rules: Office child process, email executable, LSASS credential theft, WMI/PSExec, JavaScript downloads
- Start AIR on semi-auto. Full automation only after 90+ days of data proving low false positive rates.
- Custom indicators operationalize investigation findings — attacker IPs, domains, and file hashes become fleet-wide automated protection
- Live response provides remote shell access — restrict to Tier 2+ analysts to prevent accidental damage
- Read the device timeline as a process tree: parent spawns child, child spawns grandchild. Malicious chains have Office apps spawning cmd/PowerShell.
- Collect investigation package BEFORE isolating a device — isolation drops active connections you need for evidence
- The Defender management channel survives device isolation — you can still run live response on an isolated device
- Device groups control both policy targeting and RBAC scope. Order matters: most specific first, default last.
- Device compliance + conditional access = the AiTM killer. Unenrolled device = non-compliant = blocked. MFA claims in stolen tokens are irrelevant.
- TVM provides continuous vulnerability assessment from the sensor — no separate scanning tool needed
- Prioritize patching by: exploit available > critical severity > high device count. Emergency patching for exploitable criticals.
Final assessment (12 questions)
1. CoveragePercent shows 99.2% but EffectiveCoverage shows 98.2%. What does the gap represent?
2. Tamper protection is disabled on 18 devices. An attacker gains local admin on one. What happens?
3. You enable "Block Office child processes" in block mode without audit testing. Monday morning result?
4. You see winword.exe -> cmd.exe -> powershell.exe -enc [base64] in the device timeline. Interpretation?
5. Why collect the investigation package BEFORE isolating?
6. An isolated device — can you still investigate it?
7. After the Module 13 AiTM investigation, you have 5 phishing domains. How do you operationalize them?
8. An attacker replays a stolen token from their laptop. "Require compliant device" is active. Result?
9. TVM shows a critical CVE with a public exploit on 342 devices. Correct urgency?
10. Device group evaluation order: VIP-Devices is listed after Workstations-Standard. A VIP laptop matches both. Which policy applies?
11. Semi-auto AIR has run for 30 days with 0 false positives. Full automation next?
12. Network protection is disabled by default. What does enabling it in block mode do?