wwlpublish Utilize Vulnerability Management in Microsoft Defender for Endpoint - Training
- After completing this module, you'll be able to
describe Vulnerability Management
in Microsoft Defender forEndpoint
, identifyvulnerabilities
on your devices, andtrack emerging threats
within the system.
‣
Introduction
‣
Understand vulnerability management
‣
Explore vulnerabilities on your devices
‣
Manage remediation
‣
Knowledge check
‣