wwlpublish Perform evidence and entities investigations using Microsoft Defender for Endpoint - Training‣Introduction‣Investigate a file‣Investigate a user account‣Investigate an IP address‣Investigate a domain‣Knowledge check‣Summary and resources