Watch this video on YouTube
When onboarding devices to Microsoft Defender for Endpoint, which of the following is not a method used for onboarding devices to the Defender for Endpoint service?