Resource Configuration: - Service: Microsoft Defender Vulnerability Management (Standard tier) - Key metrics: Continuous asset discovery, risk-based prioritization, remediation tracking - Integration: Microsoft Defender for Endpoint with PowerShell detection testing capability Your organization has recently onboarded 200 Windows devices to Microsoft Defender for Endpoint. Security team reports inconsistent vulnerability detection across the environment, with some devices showing no vulnerability data despite being onboarded. Technical requirements include verifying device onboarding status, implementing vulnerability assessment workflows, and improving the organization's Microsoft Secure Score. Compliance requirements mandate documenting remediation activities for all critical vulnerabilities within 14 days. Requirements: - Verify all devices are properly reporting to Defender for Endpoint - Implement risk-based vulnerability prioritization - Track remediation status in real-time - Improve Microsoft Secure Score by at least 15% Given the above configuration and requirements, which action should the security administrator take first to verify proper device onboarding to Microsoft Defender for Endpoint while ensuring comprehensive vulnerability detection?