Orange County NC Website
Statement of Work <br />Orange County NC <br />v20221005 March 8, 2023 p. 13 of 26 <br />o Virtual Desktop Infrastructure (VDI) (persistent or non-persistent). <br />• Server onboarding and configuration: <br />o Configuring a proxy server for offline communications. <br />o Configuring Configuration Manager deployment packages on down- <br />level Configuration Manager instances and versions. <br />o Onboarding servers to Defender for Cloud Apps. <br />o Servers not managed by Configuration Manager. <br />• macOS onboarding and configuration: <br />o JAMF-based deployment. <br />o Other mobile device management (MDM) product-based deployment. <br />o Manual deployment. <br />• Configuration of the following attack surface reduction capabilities: <br />o Hardware-based app and browser isolation (including Application <br />Guard). <br />o App control. <br />o Device control. <br />o Exploit protection. <br />o Network and endpoint firewalls. <br />• Configuration or management of account protection features like: <br />o Credential Guard. <br />o Local user group membership. <br />• Configuration or management of BitLocker. Note: For information on BitLocker <br />assistance with Windows 11, see Windows 11. <br />• Configuration or management of network device discovery. <br />• Configuration or management of the following device discovery capabilities: <br />o Onboarding of unmanaged devices not in scope for FastTrack (like <br />Linux). <br />o Configuring or remediating internet-of-things (IoT) devices including <br />vulnerability assessments of IoT devices through Defender for IoT. <br />o Integration with third-party tooling. <br />o Exclusions for device discovery. <br />o Preliminary networking assistance. <br />o Troubleshooting network issues. <br />• Mobile devices, including: <br />o Attack surface reduction rules. <br />o Extended detection and response. <br />o Automated investigation and remediation (including live response) <br />o Secure configuration assessment and Secure Score. <br />o Web content filtering. <br />• Attack simulations (including penetration testing). <br />• Enrollment or configuration of Microsoft Threat Experts. <br />• Configuration or training reviewing API or security information and event <br />management (SIEM) connections. <br />• Training or guidance covering advanced hunting. <br />• Training or guidance covering the use of or creation of Kusto queries. <br />• Training or guidance covering Microsoft Defender SmartScreen configuration using <br />Group Policy Objects (GPOs), Windows Security, or Microsoft Edge. <br />• Some Windows 365 features including: <br />o Troubleshooting project management of customer Windows 365 <br />deployment. <br />o Configuration of Windows 365 Cloud PC. <br />DocuSign Envelope ID: 4F8CE7A2-004B-4516-AE7C-0C68141E2FF6