Summary and resources

Completed

You learned how Microsoft Defender for Endpoint Threat and Vulnerability Management (TVM) discovers vulnerable and misconfigured devices based on known attack vectors and software vulnerabilities.

You should now be able to:

  • Describe Vulnerability Management in Microsoft Defender for Endpoint
  • Identify vulnerabilities on your devices with Microsoft Defender for Endpoint
  • Track emerging threats in Microsoft Defender for Endpoint

Learn more

You can learn more by reviewing the following.

Become a Microsoft Defender for Endpoint Ninja

Microsoft Tech Community Security Webinars