001 Protect against threats with Microsoft Defender for Endpoint
002 Deploy the Microsft Defender for Endpoint environment
003 Implement Windows Security Enhancements
004 Device Investigations
005 Perform actions on a device
006 Perform evidence and entities investigations
007 Configure and manage automation
008 Configure alerts and detections
009 Threat and Vulnerability Management
39792098-s3l1-protect-against-threats-with-microsoft-defender-for-endpoint-resource.zip
39792100-s3l2-deploy-the-microsft-defender-for-endpoint-environment-resource.zip
39792104-s3l3-implement-windows-security-enhancements-resource.zip
39792106-s3l4-device-investigations-resource.zip
39792108-s3l5-perform-actions-on-a-device-resource.zip
39792112-s3l6-perform-evidence-and-entities-investigations-resource.zip
39792116-s3l7-configure-and-manage-automation-resource.zip
39792120-s3l8-configure-alerts-and-detections-resource.zip
39792122-s3l9-threat-and-vulnerability-management-resource.zip