Implementing XDR to Detect Threats and Stop Attackers