HOTSPOT - You need to recommend a solution to meet the AWS requirements. What should you include in the recommendation? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Hot Area: Suggested Answer: Box 1: Microsoft Defender for servers Scenario: Notify security administrators at Fabrikam if any AWS EC2 instances are noncompliant with secure score recommendations. Defender for Servers is one of the enhanced security features available in Microsoft Defender for Cloud. You can use it to add threat detection and advanced defenses to your Windows and Linux machines that exist in hybrid and multicloud environments. Available Defender for Server plans Defender for Servers offers you a choice between two paid plans. Both include automatic onboarding for resources in Azure, AWS, GCP. Plan 1 includes the following benefits: Automatic onboarding for resources in Azure, AWS, GCP Microsoft threat and vulnerability management Flexibility to use Microsoft Defender for Cloud or Microsoft 365 Defender portal A Microsoft Defender for Endpoint subscription that includes access to alerts, software inventory, Vulnerability Assessment and an automatic integration with Microsoft Defender for Cloud. Plan 2 includes everything in Plan 1 plus some additional benefits. Box 2: Microsoft Sentinel - Scenario: AWS Requirements - Fabrikam identifies the following security requirements for the data hosted in ContosoAWS1: Ensure that the security administrators can query AWS service logs directly from the Azure environment. Use the Amazon Web Services (AWS) connectors to pull AWS service logs into Microsoft Sentinel. Note: These connectors work by granting Microsoft Sentinel access to your AWS resource logs. Setting up the connector establishes a trust relationship between Amazon Web Services and Microsoft Sentinel. This is accomplished on AWS by creating a role that gives permission to Microsoft Sentinel to access your AWS logs. Reference: alt="Reference Image" /> Plan 1 includes the following benefits: Automatic onboarding for resources in Azure, AWS, GCP Microsoft threat and vulnerability management Flexibility to use Microsoft Defender for Cloud or Microsoft 365 Defender portal A Microsoft Defender for Endpoint subscription that includes access to alerts, software inventory, Vulnerability Assessment and an automatic integration with Microsoft Defender for Cloud. Plan 2 includes everything in Plan 1 plus some additional benefits. Box 2: Microsoft Sentinel - Scenario: AWS Requirements - Fabrikam identifies the following security requirements for the data hosted in ContosoAWS1: Ensure that the security administrators can query AWS service logs directly from the Azure environment. Use the Amazon Web Services (AWS) connectors to pull AWS service logs into Microsoft Sentinel. Note: These connectors work by granting Microsoft Sentinel access to your AWS resource logs. Setting up the connector establishes a trust relationship between Amazon Web Services and Microsoft Sentinel. This is accomplished on AWS by creating a role that gives permission to Microsoft Sentinel to access your AWS logs. Reference: https://docs.microsoft.com/en-us/azure/defender-for-cloud/defender-for-servers-introduction https://docs.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-aws https://docs.microsoft.com/en-us/azure/sentinel/connect-aws This question is in SC-100 Exam For getting Microsoft Cybersecurity Architect Expert Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Microsoft. The website does not contain actual questions and answers from Microsoft's Certification Exams. Trademarks, certification & product names are used for reference only and belong to Microsoft.
Please login or Register to submit your answer