{"id":2573,"date":"2026-01-06T14:11:28","date_gmt":"2026-01-06T14:11:28","guid":{"rendered":"https:\/\/clouddirect.net\/learning-hub\/?p=2573"},"modified":"2026-01-06T14:13:20","modified_gmt":"2026-01-06T14:13:20","slug":"empowering-end-user-security-microsoft-defender","status":"publish","type":"post","link":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/","title":{"rendered":"Empowering\u00a0End-User\u00a0Security\u00a0with Microsoft Defender\u00a0"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-introduction-nbsp\">Introduction&nbsp;<\/h3>\n\n<p>End users are now&nbsp;the last line of defence for&nbsp;protecting your IT infrastructure.&nbsp;&nbsp;<\/p>\n\n<p>Are you confident they have the tools and knowledge to successfully keep attackers out?<\/p>\n\n<p>Identity attacks have continued to rise using tactics such as password spray to gain unauthorised access. With over 99% of unauthorised access attempts being blocked by Multi-Factor Authentication. It is crucial employees are equipped with the right tools to protect your organisation. <\/p>\n\n<p>Increasing hybrid and remote employees makes the need for robust, intuitive security solutions more critical than ever. <a href=\"https:\/\/www.microsoft.com\/en-gb\/security\/business\/endpoint-security\/microsoft-defender-business\">Microsoft Defender<\/a>, supports organisations by offering layered protection, integrated intelligence, and a user-focused approach to security. Defender empowers organisations to protect&nbsp;against major attack vectors and enables employees to work flexibly and securely.&nbsp;<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-end-user-protection-against-attacks-vectors\">End-User Protection Against\u00a0Attacks Vectors<\/h2>\n\n<p>From phishing emails to fileless malware, users&nbsp;encounter&nbsp;a wide spectrum of attack vectors daily.&nbsp;Microsoft Defender shields users from malicious links and attachments by scanning emails, documents, and tools in real-time.&nbsp;Taking away much of the burden, and equipping employees with knowledge of potential threats. Defender\u2019s robust endpoint protection&nbsp;leverages&nbsp;AI-powered threat detection to block suspicious activities before they can cause harm. This&nbsp;can reduce the risk of&nbsp;breaches&nbsp;from drive-by downloads, rogue applications, or credential theft.&nbsp;<\/p>\n\n<p>End-users gain peace of mind&nbsp;as&nbsp;automated protections work seamlessly in the background, so they can focus on their work&nbsp;without worrying about&nbsp;clicking a link and accidentally setting off a&nbsp;cyber&nbsp;breach. Defender\u2019s user-friendly&nbsp;guidance&nbsp;and actionable steps&nbsp;also help demystify security,&nbsp;encouraging a culture of shared responsibility.&nbsp;&nbsp;&nbsp;<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-beyond-defender-the-power-of-integrated-security-ecosystem-nbsp\">Beyond Defender: The Power of Integrated Security Ecosystem&nbsp;<\/h2>\n\n<p>While Microsoft Defender is a powerful foundation, its effectiveness multiplies when integrated with complementary tools within the Microsoft security ecosystem. Conditional Access, for example, extends user protection by enforcing policies that&nbsp;evaluate both the context and risk level of access requests. If a user&nbsp;attempts&nbsp;to log in from an unfamiliar device or location, Conditional Access can prompt for&nbsp;additional&nbsp;authentication or block access&nbsp;altogether.&nbsp;This&nbsp;mitigates&nbsp;the risk of compromised credentials.&nbsp;<\/p>\n\n<p>Furthermore,&nbsp;Microsoft\u2019s Extended Detection and Response (XDR) capabilities,&nbsp;consolidates&nbsp;security telemetry from across your environment. These tools&nbsp;ensure your security teams gain a&nbsp;centralised view of the entire digital estate.&nbsp;For end users, this consolidation means faster detection and remediation of threats.&nbsp;Further good news, even if a phishing attempt slips through email defences, XDR can correlate signals&nbsp;to quarantine the threat and guide users through recovery steps.&nbsp;<\/p>\n\n<h4 class=\"wp-block-heading\" id=\"h-cost-benefits-within-m365-licensing-nbsp\">Cost Benefits within M365 Licensing&nbsp;<\/h4>\n\n<p>For many organisations, cost is a significant consideration in security strategy. Microsoft Defender\u2019s inclusion within Microsoft 365 licensing delivers exceptional value:&nbsp;&nbsp;<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Advanced protection features are available without the need for costly third-party solutions or complex integrations.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>Users&nbsp;benefit&nbsp;from consistent experiences across devices and platforms.&nbsp;<\/li>\n<\/ul>\n\n<ul class=\"wp-block-list\">\n<li>IT teams can deploy, manage, and&nbsp;monitor&nbsp;security policies from a unified console.&nbsp;<\/li>\n<\/ul>\n\n<p>This consolidation not only reduces operational&nbsp;overhead&nbsp;but&nbsp;ensures that security is not sacrificed for the sake of budget constraints.&nbsp;<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-facilitating-nbsp-secure-nbsp-flexible-work-nbsp\">Facilitating&nbsp;Secure&nbsp;Flexible Work&nbsp;<\/h2>\n\n<p>An increasing number of the workforce are looking for flexible working options, including hybrid and remote models, however, with this&nbsp;security perimeters need to be considered.&nbsp;<\/p>\n\n<p>Microsoft Defender\u2019s cloud-native architecture and integration with Azure Active Directory enable employees to work securely from anywhere. Real-time threat intelligence&nbsp;ensures&nbsp;that whether&nbsp;in the office&nbsp;or on the move, users&nbsp;remain&nbsp;protected against emerging threats.&nbsp;<\/p>\n\n<p>Conditional Access policies further empower organisations.&nbsp;An ability to&nbsp;dynamically assess&nbsp;risk and adapting controls based on user behaviour and context. For employees, this&nbsp;translates into frictionless access&nbsp;to&nbsp;resources&nbsp;with confidence that their security is not&nbsp;impacted.&nbsp;<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-ai-driven-security-respecting-configurations-and-amplifying-protection-nbsp\">AI-Driven Security: Respecting Configurations and Amplifying Protection&nbsp;<\/h2>\n\n<p>AI is at the heart of Microsoft\u2019s security stack, enabling smarter defences and more adaptive protections. Solutions like Microsoft 365 Copilot and Security Copilot,&nbsp;ensure&nbsp;that user&nbsp;data&nbsp;remains&nbsp;governed by the&nbsp;existing security configurations.&nbsp;&nbsp; <\/p>\n\n<p>Microsoft 365 Copilot&nbsp;operates&nbsp;within the boundaries of user permissions, never exposing information to which a user does not have access. This means that&nbsp;the&nbsp;efficiency&nbsp;of AI-powered&nbsp;assistance&nbsp;never come at the expense of data security or privacy.&nbsp;This trust is vital for users to&nbsp;leverage&nbsp;AI tools confidently in their day-to-day work.&nbsp;<\/p>\n\n<p>Security Copilot, meanwhile, is poised to transform the incident response lifecycle.&nbsp;Security Copilot can automate Endpoint Detection and Response (EDR) workflows,&nbsp;rapidly triaging alerts, correlating events, and even suggesting or executing remediation actions. This means that incidents are resolved faster, with minimal disruption and less risk of human error.&nbsp;<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-conclusion-nbsp\">Conclusion&nbsp;<\/h3>\n\n<p>In an era where cyber threats are ever-present and working patterns are more dynamic than ever,&nbsp;an&nbsp;integrated security suite offers&nbsp;organisations a compelling advantage. From defending against major attack vectors to enabling secure, flexible work, Defender empowers users to navigate the digital world with confidence. When complemented by tools like Conditional Access, XDR, and AI-powered solutions, the benefits extend far beyond basic protection.&nbsp;&nbsp;<\/p>\n\n<p>Ultimately, the&nbsp;best security is the kind users barely&nbsp;notice:&nbsp;always present, always vigilant, and always enabling them to do their best work.&nbsp;<\/p>\n\n<p>Ready to discuss how you can make better use of Microsoft Defender and improve your security posture? Speak to one of our experts by filling in the form below. <\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction&nbsp; End users are now&nbsp;the last line of defence for&nbsp;protecting your IT infrastructure.&nbsp;&nbsp; Are you confident they have the tools and knowledge to successfully keep attackers out? Identity attacks have continued to rise using tactics such as password spray to gain unauthorised access. With over 99% of unauthorised access attempts being blocked by Multi-Factor Authentication. [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":2574,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[31],"tags":[66],"post_media_type":[24],"class_list":["post-2573","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-security","tag-microsoft-security","post_media_type-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Empowering End-User Security for Flexible Work<\/title>\n<meta name=\"description\" content=\"Discover how Microsoft Defender strengthens end-user security to enable secure, flexible work for modern organisations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Empowering\u00a0End-User\u00a0Security\u00a0with Microsoft Defender\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover how Microsoft Defender strengthens end-user security to enable secure, flexible work for modern organisations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Hub\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-06T14:11:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-06T14:13:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/01\/End-user-working-Header-Image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"abbieantoine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"abbieantoine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/\"},\"author\":{\"name\":\"abbieantoine\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"headline\":\"Empowering\u00a0End-User\u00a0Security\u00a0with Microsoft Defender\u00a0\",\"datePublished\":\"2026-01-06T14:11:28+00:00\",\"dateModified\":\"2026-01-06T14:13:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/\"},\"wordCount\":977,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/01\\\/End-user-working-Header-Image.png\",\"keywords\":[\"Microsoft Security\"],\"articleSection\":[\"Microsoft Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/\",\"name\":\"Empowering End-User Security for Flexible Work\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/01\\\/End-user-working-Header-Image.png\",\"datePublished\":\"2026-01-06T14:11:28+00:00\",\"dateModified\":\"2026-01-06T14:13:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\"},\"description\":\"Discover how Microsoft Defender strengthens end-user security to enable secure, flexible work for modern organisations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/#primaryimage\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/01\\\/End-user-working-Header-Image.png\",\"contentUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/01\\\/End-user-working-Header-Image.png\",\"width\":1600,\"height\":900,\"caption\":\"End User Security Header Image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/empowering-end-user-security-microsoft-defender\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Empowering\u00a0End-User\u00a0Security\u00a0with Microsoft Defender\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\",\"name\":\"Learning Hub\",\"description\":\"Cloud Direct\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#\\\/schema\\\/person\\\/74dbe97225c05374d42d142cdc1d2a28\",\"name\":\"abbieantoine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g\",\"caption\":\"abbieantoine\"},\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/author\\\/abbiefawcett\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Empowering End-User Security for Flexible Work","description":"Discover how Microsoft Defender strengthens end-user security to enable secure, flexible work for modern organisations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/","og_locale":"en_GB","og_type":"article","og_title":"Empowering\u00a0End-User\u00a0Security\u00a0with Microsoft Defender\u00a0","og_description":"Discover how Microsoft Defender strengthens end-user security to enable secure, flexible work for modern organisations.","og_url":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/","og_site_name":"Learning Hub","article_published_time":"2026-01-06T14:11:28+00:00","article_modified_time":"2026-01-06T14:13:20+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/01\/End-user-working-Header-Image.png","type":"image\/png"}],"author":"abbieantoine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"abbieantoine","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/#article","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/"},"author":{"name":"abbieantoine","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"headline":"Empowering\u00a0End-User\u00a0Security\u00a0with Microsoft Defender\u00a0","datePublished":"2026-01-06T14:11:28+00:00","dateModified":"2026-01-06T14:13:20+00:00","mainEntityOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/"},"wordCount":977,"commentCount":0,"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/01\/End-user-working-Header-Image.png","keywords":["Microsoft Security"],"articleSection":["Microsoft Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/","url":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/","name":"Empowering End-User Security for Flexible Work","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#website"},"primaryImageOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/#primaryimage"},"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/01\/End-user-working-Header-Image.png","datePublished":"2026-01-06T14:11:28+00:00","dateModified":"2026-01-06T14:13:20+00:00","author":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28"},"description":"Discover how Microsoft Defender strengthens end-user security to enable secure, flexible work for modern organisations.","breadcrumb":{"@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/#primaryimage","url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/01\/End-user-working-Header-Image.png","contentUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2026\/01\/End-user-working-Header-Image.png","width":1600,"height":900,"caption":"End User Security Header Image"},{"@type":"BreadcrumbList","@id":"https:\/\/clouddirect.net\/learning-hub\/empowering-end-user-security-microsoft-defender\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clouddirect.net\/learning-hub\/"},{"@type":"ListItem","position":2,"name":"Empowering\u00a0End-User\u00a0Security\u00a0with Microsoft Defender\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/clouddirect.net\/learning-hub\/#website","url":"https:\/\/clouddirect.net\/learning-hub\/","name":"Learning Hub","description":"Cloud Direct","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clouddirect.net\/learning-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/clouddirect.net\/learning-hub\/#\/schema\/person\/74dbe97225c05374d42d142cdc1d2a28","name":"abbieantoine","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce602c3177d962945f4172c276ce0c8abbd01fc5fd47682808e33229e221c82?s=96&d=mm&r=g","caption":"abbieantoine"},"url":"https:\/\/clouddirect.net\/learning-hub\/author\/abbiefawcett\/"}]}},"_links":{"self":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/comments?post=2573"}],"version-history":[{"count":5,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2573\/revisions"}],"predecessor-version":[{"id":2580,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/2573\/revisions\/2580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media\/2574"}],"wp:attachment":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media?parent=2573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/categories?post=2573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/tags?post=2573"},{"taxonomy":"post_media_type","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/post_media_type?post=2573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}