A cybersecurity team believes a new, unknown threat has infiltrated a computer on their network. Which two Microsoft Defender for Endpoint capabilities would be most effective in investigating and addressing this potential zero-day attack? (Choose two)