Preventing Child Processes on Azure Virtual Machine | Exam AZ-801: Configuring Windows Server Hybrid Advanced Services | Microsoft

Prevent Child Processes on Azure Virtual Machine

Question

You have an Azure virtual machine named VM1 that runs Windows Server.

You plan to deploy a new line-of-business (LOB) application to VM1.

You need to prevent the application from creating child processes.

What should you configure on VM1?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A

The correct answer to the question is B. Microsoft Defender Application Control.

Microsoft Defender Application Control is a security feature in Windows Defender that enables administrators to define and enforce a set of rules on which applications can run on a system. It helps protect against malware and other threats by allowing only trusted applications to run on a system and preventing unauthorized software from executing.

In this scenario, the requirement is to prevent the LOB application from creating child processes. This can be achieved using Microsoft Defender Application Control by creating a rule that specifically allows the LOB application to run but prevents it from spawning any child processes. This ensures that the application only runs in the intended manner and does not pose a security risk by executing unauthorized processes.

Option A, Microsoft Defender Credential Guard, is a security feature in Windows 10 that helps protect credentials from attacks such as pass-the-hash and pass-the-ticket. It is not relevant to the scenario described in the question.

Option C, Microsoft Defender SmartScreen, is a security feature that helps protect against phishing and malware attacks by checking URLs and downloads against a database of known malicious sites and files. It is not relevant to the scenario described in the question.

Option D, Exploit protection, is a security feature in Windows 10 that helps protect against exploits and malware attacks by applying a set of mitigation techniques to known vulnerabilities. It is not relevant to the scenario described in the question.