Summary
In this chapter, you learned about the Microsoft 365 Defender for Endpoint product, including how to deploy it to a variety of platforms, configure basic protection features, and use the Vulnerability management tools to investigate and remediate risks.
These tools are critical for maintaining a secure operating environment and allow organizations to confidently support a wide range of devices. Microsoft 365 Defender for Endpoint can be used as part of Conditional Access policies to ensure only trusted devices are accessing your organization’s data as well as creating baselines to validate endpoint configurations.
In the next chapter, you’ll start learning about Microsoft Purview information protection and data lifecycle management.