3.4. Describe threat protection with Microsoft 365 Defender