Describe endpoint security with Microsoft Intune
The Microsoft 365 Defender portal has a menu section for reviewing and managing security for endpoints. For full configuration and management of endpoints, you should be using Microsoft Defender for Endpoint and configure the management through Endpoint Manager with Microsoft Intune.
Figure 12.22 shows the device inventory list that is found within the Microsoft 365 Defender portal. This provides a list of devices that have been found within your tenant. This can be virtual machines or endpoint devices:
Navigating to Configuration management shows further detail on devices that are being monitored with Microsoft Defender for Endpoint and provides you with an Onboard more devices link, as shown in Figure 12.23: