wwlpublish Perform device investigations in Microsoft Defender for Endpoint - Training‣Introduction‣Use the device inventory list‣Investigate the device‣Use behavioral blocking‣Detect devices with device discovery‣Knowledge check‣Summary and resources