Better device configuration shouldn’t be like herding cats Hunting for common security weaknesses using Microsoft Defender for Endpoint. Please Share This Share this content Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window