Check the wording in the Introduction to Zero Trust Training - Unit 4: Zero Trust Components - Networks

Jack 20 Reputation points
2025-02-15T16:56:05.8066667+00:00

Hi,

Could someone check to see if the wording the Network section in the Introduction to zero trust training is correct. It doesn't make sense to me.

https://learn.microsoft.com/en-us/training/modules/zero-trust-introduction/zero-trust-components

'Networks represent the means to access our data. Using network access controls and monitoring user and device behavior in real time can provide insights and visibility into threats and help cybercriminals to move laterally across your network. Network segmentation, using threat detection and prevention tools, and encrypting network traffic will reduce the likelihood of an attack and mitigate the fallout from a breach.'

Should it be and help stop cybercriminals to move laterally across your network or have I misunderstood the concept.

Appreciate the help.

This question is related to the following Learning Module

Windows Network
Windows Network
Windows: A family of Microsoft operating systems that run across personal computers, tablets, laptops, phones, internet of things devices, self-contained mixed reality headsets, large collaboration screens, and other devices.Network: A group of devices that communicate either wirelessly or via a physical connection.
828 questions
Microsoft 365 Training
Microsoft 365 Training
Microsoft 365: Formerly Office 365, is a line of subscription services offered by Microsoft which adds to and includes the Microsoft Office product line.Training: Instruction to develop new skills.
116 questions
0 comments No comments
{count} votes

Accepted answer
  1. Marcin Policht 36,260 Reputation points MVP
    2025-02-15T17:10:47.02+00:00

    You're right to question the wording. The phrase "help cybercriminals to move laterally across your network" suggests that network controls would assist attackers, which is the opposite of the intended meaning.

    A clearer and more accurate way to phrase it would be:

    "Networks represent the means to access our data. Using network access controls and monitoring user and device behavior in real time can provide insights and visibility into threats and help prevent cybercriminals from moving laterally across your network. Network segmentation, using threat detection and prevention tools, and encrypting network traffic will reduce the likelihood of an attack and mitigate the fallout from a breach."

    This revision correctly conveys that these security measures help stop attackers rather than aiding them.

    This forum is monitored by Microsoft staff - so hopefully someone with access to the Learn content will be able to take action and modify it accordingly


    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.