Microsoft AZ-140 - Configuring and Operating Microsoft Azure Virtual Desktop
Which two actions should you perform to meet the security requirements for Defender for Endpoint? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
