Managing and monitoring MDE
Now that you have MDE set up and deployed to one or more workstations, there are several ways in which you can fine-tune the capabilities and monitor the service.
To maximize security protection in your environment, it is vital that you regularly and diligently monitor and manage your MDE instance. The following sections demonstrate how you can make the most of some of the available options. You can access these through the Microsoft 365 Defender security center at https://security.microsoft.com by navigating to the Endpoints section:
Figure 7.15: Endpoint configuration options in the security center
The following sections will discuss each of these items in detail.
Vulnerability management
The Vulnerability management section includes the items shown in the following screenshot:
Figure 7.16: Vulnerability management
The Dashboard section shows you your overall exposure score...