{"id":126130,"date":"2023-03-01T08:00:00","date_gmt":"2023-03-01T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=126130"},"modified":"2025-07-03T05:00:28","modified_gmt":"2025-07-03T12:00:28","slug":"the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/","title":{"rendered":"The Microsoft Intune Suite fuels cyber safety and IT efficiency"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Today marks a significant shift in endpoint management and security. We&#8217;re launching the <a href=\"https:\/\/aka.ms\/IntuneSuite\"><strong>Microsoft Intune Suite<\/strong><\/a>, which unifies mission-critical advanced endpoint management and security solutions into one simple bundle. The new Intune Suite can simplify our customers\u2019 endpoint management experience, improve their security posture, and keep people at the center with exceptional user experiences. Microsoft Security and Microsoft 365 deeply integrated with the Intune Suite will empower IT and security teams with data science and AI to increase automation, helping them move simply and quickly from reactive to proactive in addressing endpoint management and other security challenges.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Intune is an industry-leading, unified endpoint management solution that organizations depend on to ensure their devices, operating systems, and apps are up-to-date, protected, and performant. Yet evolving work habits and security threats, tougher economic climate, and growing diversity of devices mean that organizations need more help in reducing complexity. Consider this: in a recent survey, two-thirds of respondents were using more than ten tools to manage and protect their digital estate.<sup>1<\/sup> More individual tools mean more management overhead, more attack surface, and more licensing costs\u2014all things organizations need to reduce.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In this blog, I want to share three reasons why the new Intune Suite will matter to you:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Even better security by reducing attack vectors.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Simplification through consolidation and automation of IT and security operations workflows.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Savings through lower management overhead and reduced support costs.<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">I\u2019ll also share some results from our latest survey of nearly four hundred endpoint management and security professionals, which will provide additional context for this new offer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-microsoft-intune-suite\">What is the Microsoft Intune Suite?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">First, let\u2019s review what capabilities the Intune Suite offers. These important capabilities have been in development for a while, and you may recall we <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-intune-blog\/reduce-your-overall-tco-with-a-new-microsoft-intune-plan\/ba-p\/3650725\" target=\"_blank\" rel=\"noreferrer noopener\">announced our plans at Microsoft Ignite 2022<\/a> to launch the Intune Suite in March 2023 with an initial set of advanced solutions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Remote Help<\/strong> is a tool that will assist helpdesks\u2014especially important as workers are now working away from the office more often<strong>.<\/strong> Remote Help is already available for Windows users and will also come to Android and Mac endpoints in future releases. It enables IT helpdesk teams to remotely troubleshoot a user\u2019s desktop and mobile devices based on a user\u2019s existing company identity. The extra Android support will prove particularly useful for managing frontline workers\u2019 devices. Learn more about recent <a href=\"https:\/\/aka.ms\/Blog_RemoteHelpUpdates\" target=\"_blank\" rel=\"noreferrer noopener\">Remote Help updates for Windows<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Endpoint Privilege Management<\/strong>, in preview in March 2023 and generally available in April 2023, will enable the controlled elevation of Windows standard users so security controls don\u2019t get in the way of productivity. The right users will have the right privileges at the right time, to reduce the security risk of overprivileged users and reduce the burden on the help desk by allowing greater self-serve for basic scenarios, like setting up a local printer. Learn more about <a href=\"https:\/\/aka.ms\/Blog_EPM\" target=\"_blank\" rel=\"noreferrer noopener\">Endpoint Privilege Management first release capabilities<\/a>. <\/li>\n\n\n\n<li class=\"wp-block-list-item\">The Intune Suite also offers <strong><a href=\"https:\/\/aka.ms\/Blog_AdvEndpointAnalytics\" target=\"_blank\" rel=\"noreferrer noopener\">advanced endpoint analytics<\/a><\/strong> features, data-driven insights that help IT administrators understand, anticipate, and improve the user experience for the staff in the organization.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">There is also <strong><a href=\"https:\/\/aka.ms\/Blog_MAMTunnel\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Tunnel for Mobile App Management<\/a><\/strong>, a micro-VPN that connects corporate resources from personal iOS\/iPadOS and Android devices, so employees can have access to company resources from their personal mobile devices when duty calls.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">The Intune Suite improves the <strong><a href=\"https:\/\/aka.ms\/Blog_SpecialtyDevices\" target=\"_blank\" rel=\"noreferrer noopener\">management of specialty devices<\/a><\/strong>, to give employees the flexibility to choose the device they need to get the job done without those devices becoming points of vulnerability.&nbsp;<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Following the March 1, 2023, launch, another capability that will be added to the Intune Suite is <strong>advanced app management<\/strong>, offering an enterprise app catalog and controls for easy app discovery, deployment, and automatic updating to mitigate risks introduced by out-of-date apps. Later this year, we will also introduce a <strong>cloud certificate management<\/strong> solution to issue and manage VPN and Wi-Fi certificates from Intune to devices without on-premises infrastructure. We will continue to add additional advanced capabilities to the Intune Suite over time, providing more endpoint security, automation, and control of the user computing landscape and experience.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">So, why is this important for you now? It goes back to better security, simplification, and savings.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1-improve-security-and-reduce-attack-vectors\">1. Improve security and reduce attack vectors<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Even if IT and security organizations are becoming accustomed to supporting and protecting remote and hybrid work, our surveys show there is still much work to be done to improve enterprise endpoint security. Only 43 percent of endpoint management and security professionals said that their organization actively manages more than three-quarters of their endpoints.<sup>1<\/sup> Put another way, 57 percent of organizations do not have visibility or control over a quarter of their endpoints or more. Further, only 37 percent of organizations use patch management, and only 39 percent use Endpoint Privilege Management. As such, there is clearly an opportunity to increase the breadth of devices organizations can manage to have a more complete view of the health and performance of their digital estate. There is also an opportunity to improve the depth of protection offered through more Endpoint Privilege Management and more regular patch updates. This basic \u201ccyber hygiene\u201d is core to the way the suite improves security and is foundational before any <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a> initiative can really gain traction.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Security professionals see tighter product integration as a key step. When asked in our survey how they could improve their organization\u2019s endpoint security, \u201cintegration\u201d was the top answer. The Intune Suite delivers integration on multiple levels: between the various Intune Suite components, with Microsoft 365, and with other Microsoft Security assets. Better integration means fewer vulnerable spots that could be attacked. Microsoft has learned to be intentional about creating integrated value across its portfolio and with the Intune Suite, we are committed to continue building end-to-end value for users, IT, and security operations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">One extra advantage of using a single vendor for more of your endpoint security needs is that there is one single dataset rather than multiple disparate streams of data. Uniform, consistent data means better security analytics and visibility to potential vulnerabilities and anomalies. You can\u2019t mitigate what you can\u2019t see. Bringing together the data and actionable insights in one place increases your ability to assess, manage, and act on potential risks across your device landscape.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow has-quote-default-font-size\">\n<p class=\"wp-block-paragraph\">\u201c<em>The Microsoft Intune Suite is going to help us consolidate our endpoint management solutions, saving costs, making our lives easier, and keeping the hospital data secure. I would highly recommend the Microsoft Intune Suite to any organization looking to enhance their security posture<\/em>.\u201d\u2014<a href=\"https:\/\/customers.microsoft.com\/story\/1601658121961363219-milton-keynes-nhs-health-provider-microsoft-intune\" target=\"_blank\" rel=\"noreferrer noopener\">Ibrar Mahmood<\/a>, IT Cyber Security Manager, Milton Keynes University Hospital NHS Foundation Trust.<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1000\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-1.jpg\" alt=\"Two medical professionals in a hospital examination room reviewing a patient chart on a mobile tablet device.\" class=\"wp-image-126133\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-1.jpg 1920w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-1-300x156.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-1-1024x533.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-1-768x400.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-1-1536x800.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-simplify-endpoint-management\">2. Simplify endpoint management<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Many organizations have reported increased complexity within their IT environment over the past few years. This makes sense: smartphones, bring your own device (BYOD), hybrid work, and evolving security threats can all increase complexity. Yet, the response to the current complexity has been to add more point solutions, which is a step backward as more solutions mean more vendor integration requirements, possibly creating additional attack surfaces.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Given other top IT priorities\u2014cloud migrations, lowering costs, AI, analytics, and staff retention\u2014it is understandable why endpoint tools have not been consolidated yet. However, I believe that the simplification and consolidation of endpoint management tools is needed quickly. By choosing the Intune Suite, you can simplify your approach to advanced endpoint management, meaning more bandwidth to focus on other priorities in 2023 and beyond.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Simplification also enables the consolidation of your security vendors\u2014A Gartner\u00ae survey reported in September 2022 that 75 percent of organizations are pursuing security vendor consolidation in 2022, up from 29 percent in 2020.<sup>2<\/sup> This not only presents the opportunity to reduce risk and direct licensing costs but saves time and mental overhead in not having to manage so many supplier relationships.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">One example of reduced mental overhead: the Intune Suite also simplifies your IT and security operations. One unified admin console means unified workflows. You no longer need to hop from one admin console to the next or stitch together workflows.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We are dedicated to helping organizations use the power and data of the cloud to further automate and orchestrate IT workflows to cut complexity. As Omdia recently put it, when ranking Microsoft a leader, in the Digital Workplace Management\/Unified Endpoint Management Platforms, 2023 assessment, &#8220;<em>The sheer scale of signals Microsoft has visibility of enables more analytics, automation opportunities, and insights across the endpoint estate than any other UEM vendor.<\/em>&#8220;<sup>3<\/sup><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1234\" height=\"1003\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-new-graph.jpg\" alt=\"A chart from Omdia with a astronomic, purple background that maps the position of nine endpoint management service providers based on their market momentum and capabilities, with Microsoft showing the largest market presence and highest momentum and capabilities. \" class=\"wp-image-126170\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-new-graph.jpg 1234w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-new-graph-300x244.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-new-graph-1024x832.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-new-graph-768x624.jpg 768w\" sizes=\"auto, (max-width: 1234px) 100vw, 1234px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"3-enable-cost-savings\">3. Enable cost savings<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Many C-suite executives are looking for cost savings in 2023\u2014the Intune Suite delivers multiple ways to save.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">First, the Intune Suite reduces the overhead of negotiating and overseeing separate contracts with multiple vendors. It means less integration of work between components and training on different tools. It also means fewer costs from employee downtime due to a security breach and lower IT helpdesk costs through fewer inbound calls and faster resolution of remaining tickets.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">National Railway Company of Belgium (SNCB) easily manages more than 21,000 devices with Microsoft Intune. \u201c<em>Intune is a huge success story for SNCB,<\/em>\u201d says Bouke Stijns, Chief Information Security Manager, SNCB. His team fully containerizes SNCB applications on smartphones so that the company can\u2019t access employees\u2019 personal apps and data. He also appreciates that compliance with the General Data Protection Regulation (GDPR) is built into Microsoft solutions and the Microsoft licensing model, which optimizes the IT budget in an industry that allocates resources to passenger experience rather than IT expenditure. \u201c<em>Our Microsoft license offers an extensive set of security solutions that optimizes budget and reduces the number of vendors we need to coordinate with<\/em>,\u201d he explains. Read the full <a href=\"https:\/\/customers.microsoft.com\/story\/1597936847573512922-sncb-travel-transportation-microsoft-security-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">customer story<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1472\" height=\"768\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-3.jpg\" alt=\"Railroad tracks with train rushing past in foreground with city skyline in the background. \" class=\"wp-image-126135\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-3.jpg 1472w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-3-300x157.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-3-1024x534.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-3-768x401.jpg 768w\" sizes=\"auto, (max-width: 1472px) 100vw, 1472px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Second, the Intune Suite bundled list price is lower than the sum of all the individual capabilities of the Intune Suite and delivers Microsoft integrated value greater than the cost and overhead of managing alternative vendor solutions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The bundle is available as an add-on to any plan that includes Intune, which most customers get through the value of their Microsoft 365 subscription. For added flexibility, the individual solutions within the suite will also be available as standalone add-ons to Intune, so organizations can migrate to the Microsoft solution they prioritize based on their needs.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Additionally, for advanced features that extend the value of Intune beyond core endpoint management functionality\u2014for example, protecting and managing specialty devices or Tunnel for Mobile App Management for unenrolled devices\u2014we are introducing a new plan, Microsoft Intune Plan 2, that you can buy for specific, targeted users.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Learn more about the new <a href=\"https:\/\/aka.ms\/IntuneSuitePricing\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Intune plans and pricing<\/a>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow has-quote-default-font-size\">\n<p class=\"wp-block-paragraph\"><em>\u201cI\u2019m eagerly awaiting the migration of all our mobile devices to the Microsoft Intune Suite as our core UEM System. Looking into the migration, we just know\u2014due to the work the team and Microsoft put into Intune the last years\u2014that we are making an exciting step forward to an even better reliable and integrated UEM platform for our mobile devices, better preparing us for the future and all challenges that lie ahead.\u201d<\/em>\u2014Florian Weisenberger, Product Owner Mobile Workplace iOS, Audi.<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1395\" height=\"726\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-4.jpg\" alt=\"Group of people wearing Microsoft Hololens headsets viewing a VR image of a four-wheel vehicle chassis. \" class=\"wp-image-126139\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-4.jpg 1395w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-4-300x156.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-4-1024x533.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/02\/Intune-4-768x400.jpg 768w\" sizes=\"auto, (max-width: 1395px) 100vw, 1395px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">The net effect of the new, comprehensive Intune Suite, Intune Plan 2, and the single solution add-ons to Intune offer organizations flexible options to plan their budgets, IT and security lifecycle, and vendor contracts in a deliberate and calculated way\u2014with security, simplification, and savings in mind.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"join-us-at-microsoft-secure\">Join us at Microsoft Secure<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In Omdia\u2019s report, they wrote: \u201c<em>Microsoft\u2019s focus is on bringing together this range of mission-critical endpoint and application management and security tools into a single cloud solution. In delivering this integrated set of capabilities, the vendor will help customers simplify how endpoints are managed, strengthen security postures, potentially reduce total cost of ownership, and improve employee experiences<\/em>.&#8221;<sup>3<\/sup><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Intune Suite represents shift change in endpoint security, simplification, and savings. I encourage you to learn more by watching the new <a href=\"https:\/\/aka.ms\/Mechanics_IntuneSuite\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Mechanics video<\/a> and visiting our <a href=\"https:\/\/aka.ms\/IntuneSuite\">Microsoft Intune Suite<\/a> page to discover the expanding set of Intune products. Finally, please <a href=\"https:\/\/aka.ms\/MicrosoftSecure\" target=\"_blank\" rel=\"noreferrer noopener\">join us at Microsoft Secure<\/a> on March 28, 2023, where our product leadership will add perspective about the Intune Suite and demonstrate the integrated innovation and value of the new bundled solution.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and Twitter (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>1<\/sup><a href=\"https:\/\/aka.ms\/ESGEndpointBook\" target=\"_blank\" rel=\"noreferrer noopener\">Endpoint Management Vulnerability Gap<\/a>, Enterprise Strategy Group. Fieldwork was conducted in November 2022.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>2<\/sup> Gartner Press Release, <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-09-12-gartner-survey-shows-seventy-five-percent-of-organizations-are-pursuing-security-vendor-consolidation-in-2022\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner Survey Shows 75% of Organizations Are Pursuing Security Vendor Consolidation in 2022<\/a>, Gartner. September 13, 2022. GARTNER is a registered trademark and service mark of Gartner, Inc., and\/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><sup>3<\/sup><a href=\"https:\/\/aka.ms\/OmdiaUEMReport\" target=\"_blank\" rel=\"noreferrer noopener\">Omdia Universe: Digital Workspace Management\/Unified Endpoint Management Platforms, 2023<\/a>, Omdia. December 12, 2022. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today marks a significant shift in endpoint management and security. We are launching the Microsoft Intune Suite, which unifies mission-critical advanced endpoint management and security solutions into one simple bundle.<\/p>\n","protected":false},"author":107,"featured_media":126173,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3706],"topic":[3664,3672,3689],"coauthors":[2700],"class_list":["post-126130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","product-microsoft-intune","topic-ai-and-machine-learning","topic-endpoint-security","topic-zero-trust","review-flag-1694638265-576","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-and-o-1694638265-458","review-flag-bundl-1694638263-532","review-flag-gartn-1694638272-278","review-flag-new-1694638263-340","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Microsoft Intune Suite helps simplify security solutions | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Today, we&#039;re launching the Microsoft Intune Suite, unifying advanced endpoint management and security solutions into one simple bundle.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Microsoft Intune Suite helps simplify security solutions | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Today, we&#039;re launching the Microsoft Intune Suite, unifying advanced endpoint management and security solutions into one simple bundle.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-01T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T12:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Wallent\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Wallent\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/michael-wallent\/\",\"@type\":\"Person\",\"@name\":\"Michael Wallent\"}],\"headline\":\"The Microsoft Intune Suite fuels cyber safety and IT efficiency\",\"datePublished\":\"2023-03-01T16:00:00+00:00\",\"dateModified\":\"2025-07-03T12:00:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/\"},\"wordCount\":2134,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg\",\"articleSection\":[\"Cybersecurity\",\"Endpoint security\",\"Microsoft Intune\",\"Security Intelligence\",\"Zero Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/\",\"name\":\"New Microsoft Intune Suite helps simplify security solutions | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg\",\"datePublished\":\"2023-03-01T16:00:00+00:00\",\"dateModified\":\"2025-07-03T12:00:28+00:00\",\"description\":\"Today, we're launching the Microsoft Intune Suite, unifying advanced endpoint management and security solutions into one simple bundle.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg\",\"width\":900,\"height\":600,\"caption\":\"Enterprise office worker in focused work.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Microsoft Intune Suite fuels cyber safety and IT efficiency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/6265896eb2fbd520cb9708a9805e272f\",\"name\":\"Emma Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/817fa835e37c3701d37abe0e3fcf7292cd04cadb428bc980efe824f54c61425d?s=96&d=microsoft&r=ge3f5098d46332e7ca1de9f73c61773fc\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/817fa835e37c3701d37abe0e3fcf7292cd04cadb428bc980efe824f54c61425d?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/817fa835e37c3701d37abe0e3fcf7292cd04cadb428bc980efe824f54c61425d?s=96&d=microsoft&r=g\",\"caption\":\"Emma Jones\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/emmajones\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Microsoft Intune Suite helps simplify security solutions | Microsoft Security Blog","description":"Today, we're launching the Microsoft Intune Suite, unifying advanced endpoint management and security solutions into one simple bundle.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/","og_locale":"en_US","og_type":"article","og_title":"New Microsoft Intune Suite helps simplify security solutions | Microsoft Security Blog","og_description":"Today, we're launching the Microsoft Intune Suite, unifying advanced endpoint management and security solutions into one simple bundle.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/","og_site_name":"Microsoft Security Blog","article_published_time":"2023-03-01T16:00:00+00:00","article_modified_time":"2025-07-03T12:00:28+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg","type":"image\/jpeg"}],"author":"Michael Wallent","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg","twitter_misc":{"Written by":"Michael Wallent","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/michael-wallent\/","@type":"Person","@name":"Michael Wallent"}],"headline":"The Microsoft Intune Suite fuels cyber safety and IT efficiency","datePublished":"2023-03-01T16:00:00+00:00","dateModified":"2025-07-03T12:00:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/"},"wordCount":2134,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg","articleSection":["Cybersecurity","Endpoint security","Microsoft Intune","Security Intelligence","Zero Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/","name":"New Microsoft Intune Suite helps simplify security solutions | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg","datePublished":"2023-03-01T16:00:00+00:00","dateModified":"2025-07-03T12:00:28+00:00","description":"Today, we're launching the Microsoft Intune Suite, unifying advanced endpoint management and security solutions into one simple bundle.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/03\/CLO22_TechOffice_057.jpg","width":900,"height":600,"caption":"Enterprise office worker in focused work."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/03\/01\/the-microsoft-intune-suite-fuels-cyber-safety-and-it-efficiency\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"The Microsoft Intune Suite fuels cyber safety and IT efficiency"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/6265896eb2fbd520cb9708a9805e272f","name":"Emma Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/817fa835e37c3701d37abe0e3fcf7292cd04cadb428bc980efe824f54c61425d?s=96&d=microsoft&r=ge3f5098d46332e7ca1de9f73c61773fc","url":"https:\/\/secure.gravatar.com\/avatar\/817fa835e37c3701d37abe0e3fcf7292cd04cadb428bc980efe824f54c61425d?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/817fa835e37c3701d37abe0e3fcf7292cd04cadb428bc980efe824f54c61425d?s=96&d=microsoft&r=g","caption":"Emma Jones"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/emmajones\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/126130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/107"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=126130"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/126130\/revisions"}],"predecessor-version":[{"id":141051,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/126130\/revisions\/141051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/126173"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=126130"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=126130"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=126130"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=126130"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=126130"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=126130"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=126130"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=126130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}