Knowledge check

Completed
1.

Which component of Microsoft Defender for Endpoint will enable users to take advantage of protections such as application control, network protection, and web protection?

2.

Which of the following components do you install on your device to gather information and detect suspicious events?

3.

How can users access Microsoft Defender for Endpoint?