wwlpublish Utilize Vulnerability Management in Microsoft Defender for Endpoint - Training
- After completing this module, you'll be able to
describe Vulnerability Managementin Microsoft Defender forEndpoint, identifyvulnerabilitieson your devices, andtrack emerging threatswithin the system.
‣
Introduction
‣
Understand vulnerability management
‣
Explore vulnerabilities on your devices
‣
Manage remediation
‣
Knowledge check
‣