Summary and resources
You learned how deploying the Microsoft Defender for Endpoint environment involves configuring your tenant, onboarding your devices, and configuring security.
You should now be able to:
Create your Microsoft Defender for Endpoint environment
Onboard devices to be monitored by Microsoft Defender for Endpoint
Configure Microsoft Defender for Endpoint environment settings
Learn more
You can learn more by reviewing the following.
Set up Microsoft Defender for Endpoint deployment
Onboard devices to the Microsoft Defender for Endpoint service
Become a Microsoft Defender for Endpoint Ninja (formerly MDATP)
Microsoft Tech Community Security Webinars