You are an IT security manager at a large enterprise using Microsoft Defender for Endpoint. Recently, your network detected unusual behaviour from an endpoint, indicating a potential threat. To efficiently investigate and remediate this threat, you need to utilize a feature of Microsoft Defender for Endpoint that can automatically examine alerts, reduce the alert volume, and take immediate action to resolve the breach. Which feature of Microsoft Defender for Endpoint should you use in this scenario?