Summary and resources
You learned how Microsoft Defender for Endpoint Threat and Vulnerability Management (TVM) discovers vulnerable and misconfigured devices based on known attack vectors and software vulnerabilities.
You should now be able to:
- Describe Vulnerability Management in Microsoft Defender for Endpoint
- Identify vulnerabilities on your devices with Microsoft Defender for Endpoint
- Track emerging threats in Microsoft Defender for Endpoint
Learn more
You can learn more by reviewing the following.
Become a Microsoft Defender for Endpoint Ninja
Microsoft Tech Community Security Webinars