{"id":56864,"date":"2026-01-09T09:03:16","date_gmt":"2026-01-08T23:03:16","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/?p=56864"},"modified":"2026-01-09T09:03:18","modified_gmt":"2026-01-08T23:03:18","slug":"secure-windows-11-devices-with-defender-xdr","status":"publish","type":"post","link":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/","title":{"rendered":"Secure Windows 11 Devices with Defender XDR"},"content":{"rendered":"\n<p>In this blog post <strong>Secure Windows 11 Devices with Defender XDR for Better Control<\/strong> we will explore how to protect Windows 11 devices using Microsoft Defender XDR, from the \u201cbig picture\u201d strategy down to practical rollout steps and a few real-world hunting examples.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>Windows 11 is a strong baseline security platform, but modern attacks rarely stay within a single tool or a single device. Defender XDR brings endpoint, identity, email, and cloud signals into one view so you can detect attacks earlier and respond faster. Think of it as moving from \u201ceach tool has its own alert\u201d to \u201cone incident with the full story.\u201d<\/p>\n\n\n\n<p>This post keeps things practical. You\u2019ll learn what Defender XDR is doing behind the scenes, how to configure it for Windows 11, and how to operationalise it so your team gets fewer noisy alerts and more actionable incidents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-defender-xdr-in-plain-terms\">What is Defender XDR in plain terms<\/h2>\n\n\n\n<p>Microsoft Defender XDR (Extended Detection and Response) is the layer that correlates security telemetry across multiple Defender products to create higher-confidence detections and guided remediation.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Defender for Endpoint<\/strong> provides deep endpoint telemetry and response for Windows 11 devices.<\/li>\n\n\n\n<li><strong>Defender for Identity<\/strong> adds identity-based signals from Active Directory.<\/li>\n\n\n\n<li><strong>Defender for Office 365<\/strong> contributes email and collaboration threat signals.<\/li>\n\n\n\n<li><strong>Defender for Cloud Apps<\/strong> adds SaaS and app discovery context.<\/li>\n<\/ul>\n\n\n\n<p>When those signals are connected, Defender XDR can say, \u201cThis phishing email led to a suspicious sign-in, which triggered a malicious PowerShell command, which then attempted lateral movement.\u201d That\u2019s a very different outcome than triaging four separate alerts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-technology-behind-defender-xdr\">The technology behind Defender XDR<\/h2>\n\n\n\n<p>Defender XDR works because it combines three major technology pillars:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>High-fidelity telemetry<\/strong> from endpoints and services (process creation, network connections, file writes, sign-in logs, mailbox activity, and more).<\/li>\n\n\n\n<li><strong>Analytics and correlation<\/strong> that links related events into incidents using threat intelligence, behavioural detections, and machine learning.<\/li>\n\n\n\n<li><strong>Response actions and automation<\/strong> that let you contain threats quickly (isolate a device, block a file hash, disable an account, run an antivirus scan, and more).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-windows-11-contributes-to-the-signal\">How Windows 11 contributes to the signal<\/h3>\n\n\n\n<p>Windows 11 devices provide security signals through the Defender for Endpoint sensor (built into modern Windows). It observes activity like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Process and command-line execution (useful for spotting living-off-the-land techniques)<\/li>\n\n\n\n<li>Script activity and suspicious PowerShell patterns<\/li>\n\n\n\n<li>Network connections and unusual destinations<\/li>\n\n\n\n<li>Persistence mechanisms (scheduled tasks, registry run keys, services)<\/li>\n\n\n\n<li>Credential access behaviours<\/li>\n<\/ul>\n\n\n\n<p>These events are normal by themselves, but correlation is where Defender XDR shines. The platform can connect a suspicious process on a Windows 11 laptop to a risky sign-in event from the same user and a known malicious IP observed elsewhere.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-incidents-versus-alerts\">Incidents versus alerts<\/h3>\n\n\n\n<p>An <strong>alert<\/strong> is a detection on a specific signal. An <strong>incident<\/strong> is a grouped view of multiple alerts and related entities (users, devices, mailboxes, IPs). Your goal is to manage incidents, not chase alerts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-high-level-approach-to-securing-windows-11-with-defender-xdr\">High-level approach to securing Windows 11 with Defender XDR<\/h2>\n\n\n\n<p>A successful rollout typically follows this order:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Get your Windows 11 baseline right<\/strong> (hardening and attack surface reduction).<\/li>\n\n\n\n<li><strong>Onboard devices cleanly<\/strong> into Defender for Endpoint.<\/li>\n\n\n\n<li><strong>Turn on key Defender XDR capabilities<\/strong> (automated investigation and response, tamper protection, advanced hunting access).<\/li>\n\n\n\n<li><strong>Operationalise<\/strong> with roles, alert tuning, and response playbooks.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-step-1-set-a-strong-windows-11-security-baseline\">Step 1: Set a strong Windows 11 security baseline<\/h2>\n\n\n\n<p>Before you chase advanced detections, make Windows 11 harder to compromise.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-core-baseline-items-to-prioritise\">Core baseline items to prioritise<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>BitLocker<\/strong> with TPM-backed encryption (protects data at rest).<\/li>\n\n\n\n<li><strong>Windows Hello for Business<\/strong> (reduces password exposure and improves sign-in security).<\/li>\n\n\n\n<li><strong>Credential Guard<\/strong> and <strong>VBS<\/strong> where compatible (protects secrets in memory).<\/li>\n\n\n\n<li><strong>Smart App Control<\/strong> and\/or application control strategy (reduces risky app execution).<\/li>\n\n\n\n<li><strong>Attack Surface Reduction (ASR) rules<\/strong> (blocks common attacker techniques).<\/li>\n<\/ul>\n\n\n\n<p>If you\u2019re using Microsoft Intune, start with a security baseline policy for Windows 11 and then layer your organisation\u2019s controls on top. Keep exceptions explicit and documented.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-step-2-onboard-windows-11-devices-to-defender-for-endpoint\">Step 2: Onboard Windows 11 devices to Defender for Endpoint<\/h2>\n\n\n\n<p>Defender XDR\u2019s endpoint visibility comes from Defender for Endpoint. Onboarding is the point where your Windows 11 devices begin streaming security telemetry to the security portal.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-recommended-onboarding-methods\">Recommended onboarding methods<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Microsoft Intune<\/strong> (best for cloud-managed endpoints)<\/li>\n\n\n\n<li><strong>Group Policy<\/strong> (common in traditional AD environments)<\/li>\n\n\n\n<li><strong>Local script\/package<\/strong> (useful for pilots or special cases)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-practical-rollout-tip\">Practical rollout tip<\/h3>\n\n\n\n<p>Run a pilot first (IT + a friendly business group). Validate:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Devices appear in the Defender portal within expected time<\/li>\n\n\n\n<li>ASR rules do not break business apps<\/li>\n\n\n\n<li>Performance impact is acceptable<\/li>\n\n\n\n<li>Alerts are routed to the right team<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-step-3-configure-the-defender-xdr-capabilities-that-matter-most\">Step 3: Configure the Defender XDR capabilities that matter most<\/h2>\n\n\n\n<p>You can enable a lot of features quickly, but focusing on a few high-impact items gets better outcomes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-enable-tamper-protection\">Enable Tamper Protection<\/h3>\n\n\n\n<p>Tamper Protection helps prevent attackers (or even well-meaning users) from disabling Defender security settings. This is one of those \u201cset it early\u201d controls because it protects your controls.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-turn-on-automated-investigation-and-response-air\">Turn on Automated Investigation and Response (AIR)<\/h3>\n\n\n\n<p>AIR uses analytic models and playbooks to automatically investigate alerts and take approved actions, such as quarantining files or stopping malicious processes. It won\u2019t replace your team, but it can dramatically cut response time for common threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-use-attack-surface-reduction-rules-thoughtfully\">Use Attack Surface Reduction rules thoughtfully<\/h3>\n\n\n\n<p>ASR rules are very effective, but they need a controlled rollout. A practical pattern is:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Start in <strong>Audit<\/strong> mode to see potential impact<\/li>\n\n\n\n<li>Review audit events and create exceptions where justified<\/li>\n\n\n\n<li>Move to <strong>Block<\/strong> for the highest-value rules first<\/li>\n<\/ul>\n\n\n\n<p>Examples of rules many organisations prioritise include blocking Office from creating child processes and blocking credential stealing from LSASS (where compatible).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-integrate-identity-and-email-signals-when-possible\">Integrate identity and email signals when possible<\/h3>\n\n\n\n<p>Defender XDR is most valuable when incidents include the \u201chow it started\u201d story. If you can, connect:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identity signals (to detect risky sign-ins, lateral movement patterns, suspicious privilege use)<\/li>\n\n\n\n<li>Email and collaboration signals (to spot phishing delivery and user interaction)<\/li>\n<\/ul>\n\n\n\n<p>This is where you often see incident quality improve: fewer one-off \u201csuspicious process\u201d alerts and more complete \u201cphishing-to-endpoint\u201d incidents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-step-4-establish-roles-access-and-operating-rhythm\">Step 4: Establish roles, access, and operating rhythm<\/h2>\n\n\n\n<p>Tools don\u2019t fail as often as workflows do. Defender XDR works best when you\u2019re clear on who can do what, and what \u201cgood\u201d looks like.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-role-based-access-control\">Role-based access control<\/h3>\n\n\n\n<p>Separate duties so that responders can act fast without over-privileging everyone:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security readers for stakeholders<\/li>\n\n\n\n<li>Security operators for triage and containment<\/li>\n\n\n\n<li>Security admins for policy and integration changes<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-define-response-playbooks\">Define response playbooks<\/h3>\n\n\n\n<p>Create simple playbooks for common scenarios:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing + suspicious sign-in<\/strong>: force password reset, revoke sessions, confirm MFA, hunt for endpoint execution<\/li>\n\n\n\n<li><strong>Malware on endpoint<\/strong>: isolate device, run AV scan, collect investigation package, validate persistence removal<\/li>\n\n\n\n<li><strong>Potential data exfiltration<\/strong>: identify destination, block indicators, review user activity, assess impacted data<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-practical-threat-hunting-on-windows-11-with-defender-xdr\">Practical threat hunting on Windows 11 with Defender XDR<\/h2>\n\n\n\n<p>Once devices are onboarded and policies are in place, hunting is how you get proactive. You\u2019re looking for weak signals that didn\u2019t become a high-confidence alert yet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-re-hunting-for\">What you\u2019re hunting for<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Suspicious PowerShell usage (encoded commands, unusual parent processes)<\/li>\n\n\n\n<li>Unusual child processes spawned by Office apps<\/li>\n\n\n\n<li>Rare outbound network connections to new domains<\/li>\n\n\n\n<li>Persistence creation shortly after a phishing event<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-example-hunting-queries-kql\">Example hunting queries (KQL)<\/h3>\n\n\n\n<p>These examples show the style of investigation teams commonly run. Adjust to your environment and test in a safe way.<\/p>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-b7bf22aaa24d712352a0fd17f6068a0b\"><code>\/\/ Find PowerShell with encoded commands\nDeviceProcessEvents\n| where FileName in~ (\"powershell.exe\", \"pwsh.exe\")\n| where ProcessCommandLine has_any (\"-enc\", \"-encodedcommand\")\n| project Timestamp, DeviceName, AccountName, ProcessCommandLine, InitiatingProcessFileName\n| order by Timestamp desc\n<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-b3a1e9f2cb5bb3d2f75eec852e599e2a\"><code>\/\/ Office spawning suspicious child processes (common phishing\/macro pattern)\nDeviceProcessEvents\n| where InitiatingProcessFileName in~ (\"winword.exe\", \"excel.exe\", \"powerpnt.exe\", \"outlook.exe\")\n| where FileName in~ (\"cmd.exe\", \"powershell.exe\", \"wscript.exe\", \"cscript.exe\", \"mshta.exe\", \"rundll32.exe\")\n| project Timestamp, DeviceName, AccountName, InitiatingProcessFileName, FileName, ProcessCommandLine\n| order by Timestamp desc\n<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-10e0be678e6bc2b67a65c48f0e4d98a8\"><code>\/\/ Rare outbound connections to newly seen domains (simple rarity check)\nlet lookback = 7d;\nDeviceNetworkEvents\n| where Timestamp &amp;gt; ago(lookback)\n| summarize ConnCount=count(), FirstSeen=min(Timestamp), LastSeen=max(Timestamp) by RemoteUrl, DeviceName\n| where ConnCount &amp;lt; 3\n| order by FirstSeen desc\n<\/code><\/pre>\n\n\n\n<p>If you\u2019re new to hunting, start by saving a small set of queries that align to your top risks (phishing, credential theft, ransomware). Run them weekly, then tune.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-containment-and-response-actions-that-work-well-for-windows-11\">Containment and response actions that work well for Windows 11<\/h2>\n\n\n\n<p>Speed matters when you confirm malicious activity. Common endpoint response actions include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Isolate device<\/strong> to stop outbound communication while preserving access for responders<\/li>\n\n\n\n<li><strong>Collect investigation package<\/strong> for deeper forensic review<\/li>\n\n\n\n<li><strong>Run antivirus scan<\/strong> or initiate remediation actions<\/li>\n\n\n\n<li><strong>Block indicators<\/strong> (file hash, IP, URL) where appropriate<\/li>\n<\/ul>\n\n\n\n<p>Pair endpoint actions with identity actions when incidents involve compromised accounts (session revocation, reset credentials, confirm MFA, review privileges).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-reducing-noise-without-missing-real-threats\">Reducing noise without missing real threats<\/h2>\n\n\n\n<p>Alert fatigue is real. The goal is not \u201czero alerts,\u201d it\u2019s \u201calerts that mean something.\u201d A few practical ways to get there:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tune exclusions carefully<\/strong>: exclude known-good behaviours, not whole categories.<\/li>\n\n\n\n<li><strong>Use device groups<\/strong>: apply stricter policies to high-risk populations (admins, servers, finance devices).<\/li>\n\n\n\n<li><strong>Review incident outcomes<\/strong>: if an incident type is consistently benign, refine the conditions rather than ignoring it.<\/li>\n\n\n\n<li><strong>Track a few metrics<\/strong>: time to acknowledge, time to contain, and % incidents auto-remediated.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-simple-deployment-checklist\">A simple deployment checklist<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Confirm licensing and tenant readiness for Defender XDR components<\/li>\n\n\n\n<li>Apply Windows 11 security baseline and BitLocker\/Hello policies<\/li>\n\n\n\n<li>Onboard pilot devices to Defender for Endpoint<\/li>\n\n\n\n<li>Enable Tamper Protection and test policy enforcement<\/li>\n\n\n\n<li>Roll out ASR rules in Audit, then Block with exceptions<\/li>\n\n\n\n<li>Enable Automated Investigation and Response<\/li>\n\n\n\n<li>Connect identity\/email signals for better incident correlation<\/li>\n\n\n\n<li>Define RBAC roles and response playbooks<\/li>\n\n\n\n<li>Run weekly hunting and tune based on outcomes<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-closing-thoughts\">Closing thoughts<\/h2>\n\n\n\n<p>Securing Windows 11 devices with Defender XDR is less about installing \u201cyet another agent\u201d and more about building a connected security story: strong endpoint controls, rich telemetry, smart correlation, and fast response. Start with a clean baseline, onboard in phases, enable automation carefully, and keep improving with hunting and tuning.<\/p>\n\n\n\n<p>If you approach it as an operational program (not a one-time configuration), Defender XDR can significantly reduce both your risk and the time your team spends chasing low-value alerts.<\/p>\n\n\n\n<ul class=\"wp-block-yoast-seo-related-links yoast-seo-related-links\">\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/\">How to Use Microsoft Graph Security API<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cloudproinc.com.au\/index.php\/2025\/04\/18\/getting-started-with-the-openai-responses-api-in-net\/\">Getting Started with the OpenAI Responses API in .NET<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cloudproinc.com.au\/index.php\/wiz-security-deployment-services\/\">Wiz Security Deployment Services<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2022\/02\/23\/five-ways-to-secure-your-microsoft-365-tenant-tips-to-keep-your-data-safe\/\">Five Ways to Secure Your Microsoft 365 Tenant: Tips to Keep Your Data Safe<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2025\/09\/03\/keep-docker-containers-running-prevent-common-exits\/\">Keep Docker Containers Running: Prevent Common Exits<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to use Microsoft Defender XDR to harden Windows 11 endpoints, detect real threats faster, and automate response with practical configuration steps and rollout tips.<\/p>\n","protected":false},"author":1,"featured_media":56865,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"Secure Windows 11 Devices with Defender XDR","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Learn how to secure Windows 11 devices with Defender XDR for improved control and faster response to threats.","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13,29,12],"tags":[],"class_list":["post-56864","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-microsoft-defender-xdr","category-microsoft-intune"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secure Windows 11 Devices with Defender XDR - CPI Consulting<\/title>\n<meta name=\"description\" content=\"Learn how to secure Windows 11 devices with Defender XDR for improved control and faster response to threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Windows 11 Devices with Defender XDR\" \/>\n<meta property=\"og:description\" content=\"Learn how to secure Windows 11 devices with Defender XDR for improved control and faster response to threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-08T23:03:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-08T23:03:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudproinc.com.au\/wp-content\/uploads\/2026\/01\/post-1-1024x585.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"Secure Windows 11 Devices with Defender XDR\",\"datePublished\":\"2026-01-08T23:03:16+00:00\",\"dateModified\":\"2026-01-08T23:03:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/\"},\"wordCount\":1539,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/post-1.png\",\"articleSection\":[\"Blog\",\"Microsoft defender XDR\",\"Microsoft Intune\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/\",\"url\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/\",\"name\":\"Secure Windows 11 Devices with Defender XDR - CPI Consulting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/post-1.png\",\"datePublished\":\"2026-01-08T23:03:16+00:00\",\"dateModified\":\"2026-01-08T23:03:18+00:00\",\"description\":\"Learn how to secure Windows 11 devices with Defender XDR for improved control and faster response to threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/post-1.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/post-1.png\",\"width\":1792,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/2026\\\/01\\\/09\\\/secure-windows-11-devices-with-defender-xdr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Windows 11 Devices with Defender XDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#website\",\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cloudproinc.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure Windows 11 Devices with Defender XDR - CPI Consulting","description":"Learn how to secure Windows 11 devices with Defender XDR for improved control and faster response to threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/","og_locale":"en_US","og_type":"article","og_title":"Secure Windows 11 Devices with Defender XDR","og_description":"Learn how to secure Windows 11 devices with Defender XDR for improved control and faster response to threats.","og_url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/","og_site_name":"CPI Consulting","article_published_time":"2026-01-08T23:03:16+00:00","article_modified_time":"2026-01-08T23:03:18+00:00","og_image":[{"width":1024,"height":585,"url":"https:\/\/www.cloudproinc.com.au\/wp-content\/uploads\/2026\/01\/post-1-1024x585.png","type":"image\/png"}],"author":"CPI Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CPI Staff","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/#article","isPartOf":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/"},"author":{"name":"CPI Staff","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"Secure Windows 11 Devices with Defender XDR","datePublished":"2026-01-08T23:03:16+00:00","dateModified":"2026-01-08T23:03:18+00:00","mainEntityOfPage":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/"},"wordCount":1539,"commentCount":0,"publisher":{"@id":"https:\/\/cloudproinc.com.au\/#organization"},"image":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/01\/post-1.png","articleSection":["Blog","Microsoft defender XDR","Microsoft Intune"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/","url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/","name":"Secure Windows 11 Devices with Defender XDR - CPI Consulting","isPartOf":{"@id":"https:\/\/cloudproinc.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/#primaryimage"},"image":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/01\/post-1.png","datePublished":"2026-01-08T23:03:16+00:00","dateModified":"2026-01-08T23:03:18+00:00","description":"Learn how to secure Windows 11 devices with Defender XDR for improved control and faster response to threats.","breadcrumb":{"@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/#primaryimage","url":"\/wp-content\/uploads\/2026\/01\/post-1.png","contentUrl":"\/wp-content\/uploads\/2026\/01\/post-1.png","width":1792,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/09\/secure-windows-11-devices-with-defender-xdr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"Secure Windows 11 Devices with Defender XDR"}]},{"@type":"WebSite","@id":"https:\/\/cloudproinc.com.au\/#website","url":"https:\/\/cloudproinc.com.au\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/cloudproinc.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudproinc.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cloudproinc.com.au\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/cloudproinc.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/cloudproinc.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/www.cloudproinc.com.au\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"\/wp-content\/uploads\/2026\/01\/post-1.png","jetpack-related-posts":[{"id":417,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2024\/07\/23\/how-to-use-microsoft-graph-security-api\/","url_meta":{"origin":56864,"position":0},"title":"How to Use Microsoft Graph Security API","author":"CPI Staff","date":"July 23, 2024","format":false,"excerpt":"In this Microsoft Defender XDR article, we will show how to use Microsoft Graph Security API using a REST API client and retrieve XDR alerts. Microsoft Defender Extended Detection and Response (XDR) is an enterprise end-to-end security solution that detects, prevents, investigates and responds to security threats from endpoints, users,\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 1x, \/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 1.5x, \/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 2x, \/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 3x, \/wp-content\/uploads\/2024\/07\/How-to-Use-Microsoft-Graph-Security-API.webp 4x"},"classes":[]},{"id":53106,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/02\/19\/enhance-windows-11-security-with-asr-rules\/","url_meta":{"origin":56864,"position":1},"title":"Enhance Windows 11 Security With ASR rules","author":"CPI Staff","date":"February 19, 2025","format":false,"excerpt":"In this Microsoft Intune blog post, we will explain and demonstrate how to enhance Windows 11 security by implementing Attack Surface Reduction (ASR) rules. In today\u2019s digital landscape, securing endpoints has become more critical than ever. With the increasing sophistication of cyber threats, organizations must adopt robust security measures to\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2025\/02\/Enhancing-Windows-11-Security-with-Microsoft-Intune-Attack-Surface-Reduction-Rules.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2025\/02\/Enhancing-Windows-11-Security-with-Microsoft-Intune-Attack-Surface-Reduction-Rules.webp 1x, \/wp-content\/uploads\/2025\/02\/Enhancing-Windows-11-Security-with-Microsoft-Intune-Attack-Surface-Reduction-Rules.webp 1.5x, \/wp-content\/uploads\/2025\/02\/Enhancing-Windows-11-Security-with-Microsoft-Intune-Attack-Surface-Reduction-Rules.webp 2x"},"classes":[]},{"id":57413,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/09\/ai-powered-device-code-phishing-now-bypasses-mfa-what-australian-organisations-must-do-next\/","url_meta":{"origin":56864,"position":2},"title":"AI-Powered Device Code Phishing Now Bypasses MFA \u2014 What Australian Organisations Must Do Next","author":"CPI Staff","date":"April 9, 2026","format":false,"excerpt":"Multi-factor authentication has been the security baseline for years. Most Australian organisations treat it as the final checkpoint \u2014 if MFA is in place, accounts are protected. That assumption just got a serious challenge. Microsoft Defender Security Research has exposed a widespread phishing campaign that bypasses MFA entirely. It abuses\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 1x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 1.5x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 2x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 3x, \/wp-content\/uploads\/2026\/04\/ai-powered-device-code-phishing-now-bypasses-mfa-cover.png 4x"},"classes":[]},{"id":57260,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/03\/16\/how-ai-agents-will-reshape-enterprise-it-over-the-next-3-years\/","url_meta":{"origin":56864,"position":3},"title":"How AI Agents Will Reshape Enterprise IT Over the Next 3 Years","author":"CPI Staff","date":"March 16, 2026","format":false,"excerpt":"AI agents will not replace your IT team, but they will change how support, security, onboarding, and reporting get done. Here is what business leaders should prepare for now.","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/ai\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/03\/post-24.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/03\/post-24.png 1x, \/wp-content\/uploads\/2026\/03\/post-24.png 1.5x, \/wp-content\/uploads\/2026\/03\/post-24.png 2x, \/wp-content\/uploads\/2026\/03\/post-24.png 3x, \/wp-content\/uploads\/2026\/03\/post-24.png 4x"},"classes":[]},{"id":56951,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/02\/04\/how-python-info-stealers-are-targeting-macos-endpoints\/","url_meta":{"origin":56864,"position":4},"title":"How Python Info-Stealers Are Targeting macOS Endpoints","author":"CPI Staff","date":"February 4, 2026","format":false,"excerpt":"Python-based info-stealers are increasingly hitting macOS via fake installers, copy-paste \u201cfixes,\u201d and stealthy packaging. Learn how they work, what they steal, and how to harden Macs in business environments.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/02\/post-6.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/02\/post-6.png 1x, \/wp-content\/uploads\/2026\/02\/post-6.png 1.5x, \/wp-content\/uploads\/2026\/02\/post-6.png 2x, \/wp-content\/uploads\/2026\/02\/post-6.png 3x, \/wp-content\/uploads\/2026\/02\/post-6.png 4x"},"classes":[]},{"id":53831,"url":"https:\/\/www.cloudproinc.com.au\/index.php\/2025\/09\/15\/manage-macos-byod-devices-with-microsoft-intune\/","url_meta":{"origin":56864,"position":5},"title":"Manage macOS BYOD Devices with Microsoft Intune","author":"CPI Staff","date":"September 15, 2025","format":false,"excerpt":"A practical guide to enroll, secure, and support personal Macs with Intune\u2014without ruining the user experience or sacrificing privacy.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/www.cloudproinc.com.au\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 1x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 1.5x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 2x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 3x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/56864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/comments?post=56864"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/56864\/revisions"}],"predecessor-version":[{"id":56867,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/posts\/56864\/revisions\/56867"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media\/56865"}],"wp:attachment":[{"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/media?parent=56864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/categories?post=56864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudproinc.com.au\/index.php\/wp-json\/wp\/v2\/tags?post=56864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}