wwlpublish Perform device investigations in Microsoft Defender for Endpoint - Training
‣
Introduction
‣
Use the device inventory list
‣
Investigate the device
‣
Use behavioral blocking
‣
Detect devices with device discovery
‣
Knowledge check
‣
wwlpublish Perform device investigations in Microsoft Defender for Endpoint - Training