GitBit
BlogFirst lesson
Sign Up

Question 12 of 18

Previous QuestionNext Question

Your organization has a Microsoft Defender for Endpoint deployment with custom network indicators turned on.

The table below shows two Windows 10 computers that are protected by Microsoft Defender for Endpoint.

Table showing Computer names and tags

The following table shows the machine groups in Microsoft Defender for Endpoint.

Machine groups showing name and rules

In the following table, you can see the URLs/Domains indicators created from the Microsoft Defender admin center.

Domain chart

For each of the following statements, click yes if the statement is true. If the statement is false click No.

From a web browser on Computer1, you can open http://litwareinc.com/public

From a web browser on Computer1, you can open http://www.contoso.com

From a web browser on Computer2, you can open http://litwareinc.com

Computer1 has a tag of Kiosk1 which makes Computer1 part of Group1. Group1 is blocked from accessing http://www.contoso.com

All machines are allowed to access http://litwareinc.com/public so Computer1 can access http://litwareinc.com/public.

Computer2's name ends with 2 and has a tag of tag1 so computer2 is part of Group2. Group2 is blocked from accessing http://litwareinc.com

https://www.gitbit.org/course/ms-500/learn/Protecting-Windows-10-and-other-devices-with-Microsoft-Defender-for-Endpoint-z0qPG6v4T

Did you like the site?