Endpoint & Network Defense
How devices and the network resist intrusion, and how breaches get contained when they happen.
Capture progress
13 of 13 fields captured
Maturity preview · Developing
Endpoint & network defense tools
EDR, MDR, device management, firewall, and network defense systems in use. Endpoint is the most tool-diverse sub-domain — the F1–F13 posture questions below score how these tools are configured, monitored, and integrated.
Tool
Tool
Tool
Tool

Endpoint protection

The endpoint detection & response product running on staff and student devices. Single biggest predictor of whether ransomware detonates or gets quarantined at first execution.

F2Coverage by device class

Which platforms have EDR deployed today.

Who watches the EDR alerts after hours. If your EDR vendor also provides 24/7 SOC monitoring, name them here.

Device management

How staff and student devices are enrolled, configured, and pushed updates.

How OS and third-party patches reach endpoints.

Good = staff users are standard, IT uses just-in-time elevation. Acceptable = standard with local admin password solution (LAPS).

Network defense

Whether staff, student, IoT/OT, and guest traffic are isolated from each other at L3.

The firewall captured here is pulled from your tech stack inventory.

If your firewall handles IDS/IPS (Field 9), select that option.

CIPA filtering is a federal funding requirement for E-rate participation.

Exploited remote access is a top-two K-12 breach root cause.

F13OT vendor remote accessTop-weighted

HVAC, access control, video, paging, and bell-system vendors with persistent remote access. The K-12-specific worst-offender path — if IT doesn't know about it, no other control can apply.

Notes