Summary and resources

Completed

You learned how deploying the Microsoft Defender for Endpoint environment involves configuring your tenant, onboarding your devices, and configuring security.

You should now be able to:

  • Create your Microsoft Defender for Endpoint environment

  • Onboard devices to be monitored by Microsoft Defender for Endpoint

  • Configure Microsoft Defender for Endpoint environment settings

Learn more

You can learn more by reviewing the following.

Set up Microsoft Defender for Endpoint deployment

Onboard devices to the Microsoft Defender for Endpoint service

Become a Microsoft Defender for Endpoint Ninja (formerly MDATP)

Microsoft Tech Community Security Webinars