{"id":20782,"date":"2021-07-06T17:46:14","date_gmt":"2021-07-06T16:46:14","guid":{"rendered":"https:\/\/www.n-able.com\/?p=20782"},"modified":"2021-07-06T21:58:00","modified_gmt":"2021-07-06T20:58:00","slug":"hardening-n-able-rmm","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm","title":{"rendered":"Hardening N&#8209;able RMM"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">When security is done well it\u2019s not always convenient. Advanced security can sometimes even mean minor inconveniences to MSPs and their employees. But the rise in ransomware attacks requires improved security measures and harder environments, making small inconveniences worth it in the long run. In this blog I\u2019ll look at some options for how you can harden your N&#8209;able<sup>\u2122<\/sup> RMM dashboard.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Multifactor authentication<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">As easy as multifactor authentication (MFA) is to enable, the need to have your smartphone near so you can retrieve a passcode is enough of an inconvenience that some users are resistant to using it, even within an MSP. The power that MFA provides to prevent unauthorized access, however, is worth it. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Why use MFA? Everyone is aware that phishing emails, trojans, RATS, and keystroke loggers can facilitate the exfiltration of a user\u2019s credentials. System administrators, help desk support technicians, and other IT roles are not immune to these types of attacks. If you\u2019re not using MFA in your own organization, once an attacker has those credentials, the barriers preventing them from exploiting those credentials are significantly reduced. MFA improves protection against the threat of an attacker having access to your RMM dashboard because they have a user\u2019s email address and password. The five minutes a day spent retrieving MFA passcodes is well worth the additional protection they provide. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Read more on setting up MFA in RMM <a href=\"https:\/\/documentation.n-able.com\/remote-management\/userguide\/Content\/2fa.htm?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">here<\/span><\/a>.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Restrict access based on IP<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">By default, <a href=\"https:\/\/www.n-able.com\/features\/dashboard?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">N&#8209;able RMM<\/span><\/a> will ask you to confirm your identity via an email when you log in from a new IP address for the first time. Anyone who uses RMM has seen these emails and some consider them to be inconvenient. This is another situation where the occasional email may be inconvenient, but they do serve an important function of ensuring logins from new IP addresses have to pass an additional \u201cproof of identity\u201d check. There is a way to overcome the downside to the auto-detect new IP by using a list of approved IP addresses instead. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Why restrict access to RMM with an IP list? Like with MFA, the purpose of IP restriction is to prevent an attacker who obtains credentials for your RMM from logging in with only those credentials. If an attacker has obtained a user\u2019s RMM login credentials, they may also have access to that user\u2019s email account. This would allow them to successfully defeat the auto-detect new IP email verification. By disabling the auto-detect feature and using a pre-approved list of IP addresses instead, you can restrict access to your RMM from only those pre-approved IP addresses. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">There are convenient and less convenient ways of dealing with your pre-approved IP address list. One is to ensure all RMM dashboard users access the RMM from a centralized location. This could be physically from your main office or from VM jumpboxes if users are working from home. Another option is to have all RMM dashboard users obtain static IPs from their ISP. This does carry additional cost, but it can be worth the improved security posture.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Read more about setting up an approved IP address list <a href=\"https:\/\/documentation.n-able.com\/remote-management\/userguide\/Content\/ip_restriction.htm?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">here<\/span><\/a>.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Session timeout<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Technicians and system engineers are always in high demand and can be pulled in different directions at a moment\u2019s notice. Even though best practice is to lock your workstation when you are away, humans are fallible creatures and we sometimes forget. N&#8209;able RMM can time out a user\u2019s session after some time to improve security. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Why use session timeouts? For those who are impatient they can be another inconvenience. The frustration of having to log in and retrieve an MFA passcode multiple times a day can quickly lead some to disable the session timeouts. This, of course, weakens the security due to users potentially being left logged in long after they are no longer present. This could be an unlocked public workstation that a field technician logged in to while on-site or it could be a system account left open, either of which could be compromised by an attacker allowing them access to your dashboard.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Session timeouts don\u2019t happen unannounced, so as long as a user is actively using the RMM dashboard their session will stay open, and they will receive a warning prior to the session being closed. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Learn more about session timeout settings <a href=\"https:\/\/documentation.n-able.com\/remote-management\/userguide\/Content\/security_timeout.htm?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">here<\/span><\/a>.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Follow least privilege for permissions<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">A core tenant of IT security is giving users the least amount of privilege needed for them to perform their work. N&#8209;able RMM has an expansive set of permissions to help control what a user can see or do within the RMM.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Why restrict a user\u2019s capabilities in RMM? Just as all IT staff don\u2019t receive enterprise admin permissions on a domain, not every user should have all permissions enabled in RMM. While it\u2019s convenient to have any user have the capability to do anything at any time in RMM, that also creates a larger attack surface than is warranted. A prime example of a permission you shouldn\u2019t give to all users is the ability to upload new automated tasks or scripts. Junior technicians or malicious actors with the ability to upload new scripts to RMM can cause serious harm. Restricting this permission to only a single account can improve security and it can also improve quality control in the environment, by forcing any new tasks or checks added to be vetted.\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">There are a large selection of permissions in N&#8209;able RMM. It will take more than just a few minutes to review them all but it is worth the time. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Learn more about permission in RMM <a href=\"https:\/\/documentation.n-able.com\/remote-management\/userguide\/Content\/rp_main.htm?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">here<\/span><\/a>. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Practice good cyberhygiene and security in-house<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">A chain is only as strong as its weakest link. An MSP should always endeavor to make sure internal operations and security don\u2019t allow intrusions into managed environments. Following a robust security framework can help you dial in your processes and technical controls to improve your own security as well as expose opportunities for expanding your portfolio of services. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">While security is a never-ending endeavor that requires constant vigilance and resources, there are things you can do today to improve the security of N&#8209;able RMM:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\">Enable MFA for all RMM users and for email access. More <a href=\"https:\/\/documentation.n-able.com\/remote-management\/userguide\/Content\/2fa.htm?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">here<\/span><\/a>.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Restrict access to RMM to a list of pre-approved IP addresses. Consider having users log in from hardened VM images that are reset weekly or daily. More <a href=\"https:\/\/documentation.n-able.com\/remote-management\/userguide\/Content\/ip_restriction.htm?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">here<\/span><\/a>.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Enable session timeouts for RMM dashboard users. More <a href=\"https:\/\/documentation.n-able.com\/remote-management\/userguide\/Content\/security_timeout.htm?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">here<\/span><\/a>.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Follow the principal of least privilege for user permissions. More <a href=\"https:\/\/documentation.n-able.com\/remote-management\/userguide\/Content\/rp_main.htm?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">here<\/span><\/a>.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Practice what you preach. Make sure your internal systems are properly patched, monitored, and protected by a next-gen endpoint protection tool with detection and remediation capabilities like N&#8209;able Endpoint Detection and Response (EDR). Ensure all users use a <a href=\"https:\/\/www.passportalmsp.com\/?promo=blog\" target=\"_blank\" rel=\"noopener\">password manager<\/a> to discourage reuse of passwords and enable auditing.<\/span><\/li>\n<\/ul>\n<p class=\"p5\"><span class=\"s1\"><i>Lewis Pope is the head security nerd at N&#8209;able. You can follow him on<\/i><\/span><\/p>\n<p class=\"p6\"><span class=\"s4\"><i>Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p6\"><span class=\"s4\"><i>Linkedin:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p6\"><span class=\"s4\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sometimes extra layers of security can seem like an inconvenience, but as Lewis Pope explains, the benefits to your security posture far outweigh any downsides.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-20782","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How you can harden your RMM dashboard | N-able<\/title>\n<meta name=\"description\" content=\"Security is a never-ending endeavor, requiring constant vigilance and resources. Learn about how you can harden your N-able RMM dashboard.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How you can harden your RMM dashboard | N-able\" \/>\n<meta property=\"og:description\" content=\"Security is a never-ending endeavor, requiring constant vigilance and resources. Learn about how you can harden your N-able RMM dashboard.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-06T16:46:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-06T20:58:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Hardening N&#8209;able RMM\",\"datePublished\":\"2021-07-06T17:46:14+01:00\",\"dateModified\":\"2021-07-06T20:58:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm\"},\"wordCount\":1168,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm\",\"name\":\"How you can harden your RMM dashboard | N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2021-07-06T17:46:14+01:00\",\"dateModified\":\"2021-07-06T20:58:00+00:00\",\"description\":\"Security is a never-ending endeavor, requiring constant vigilance and resources. Learn about how you can harden your N-able RMM dashboard.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hardening N&#8209;able RMM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How you can harden your RMM dashboard | N-able","description":"Security is a never-ending endeavor, requiring constant vigilance and resources. Learn about how you can harden your N-able RMM dashboard.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm","og_locale":"de_DE","og_type":"article","og_title":"How you can harden your RMM dashboard | N-able","og_description":"Security is a never-ending endeavor, requiring constant vigilance and resources. Learn about how you can harden your N-able RMM dashboard.","og_url":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-07-06T16:46:14+00:00","article_modified_time":"2021-07-06T20:58:00+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Hardening N&#8209;able RMM","datePublished":"2021-07-06T17:46:14+01:00","dateModified":"2021-07-06T20:58:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm"},"wordCount":1168,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm","url":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm","name":"How you can harden your RMM dashboard | N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2021-07-06T17:46:14+01:00","dateModified":"2021-07-06T20:58:00+00:00","description":"Security is a never-ending endeavor, requiring constant vigilance and resources. Learn about how you can harden your N-able RMM dashboard.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/hardening-n-able-rmm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Hardening N&#8209;able RMM"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/20782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=20782"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/20782\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=20782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}