Summary and knowledge check

Completed

In this module, you learned how Microsoft Defender for Endpoint can help your organization stay secure.

Now that you've completed this module, you should be able to:

  • Define the capabilities of Microsoft Defender for Endpoint.
  • Understand how to hunt threats within your network.
  • Explain how Microsoft Defender for Endpoint can remediate risks in your environment.

Check your knowledge

1.

What is required to deploy Microsoft Defender for Endpoint to Windows devices in your organization?

2.

Which of the following choices describes threat hunting using Microsoft Defender for Endpoint?

3.

Which of the following capabilities isn't a component of Microsoft Defender for Endpoint?