{"id":21278,"date":"2021-07-14T14:55:03","date_gmt":"2021-07-14T13:55:03","guid":{"rendered":"https:\/\/www.n-able.com\/?p=21278"},"modified":"2022-06-10T18:07:58","modified_gmt":"2022-06-10T17:07:58","slug":"july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities","title":{"rendered":"July 2021 Patch Tuesday: PrintNightmare and 117 Security Vulnerabilities"},"content":{"rendered":"<p>This month we saw a rise in the number of vulnerabilities addressed by Microsoft, and a significant out-of-band update to address PrintNightmare vulnerabilities. With four vulnerabilities under <em>Active Exploitation <\/em>and six marked as <em>Exploitation More Likely<\/em>, we have a manageable list of priority patches. All vulnerabilities this month are rated as important or higher so you shouldn\u2019t skip anything over. Additional guidance from Microsoft concerning best practices might add some project work for some environments; I\u2019ll cover that below in the section about PrintNightmare.<\/p>\n<p>Microsoft addressed 120 vulnerabilities in Patch Tuesday and out-of-band updates this month. With 2,790 different potential patches available when you consider different OS builds it\u2019s worth taking a moment to appreciate what Windows<sup>\u00ae<\/sup> Server Update Services (WSUS) and other patch management solutions do to help streamline patching. For MSPs, this is another part of the drive to automation and efficiency. Don\u2019t hesitate to use this point as part of your sales conversation when a client asks why you need to manage their patching.<\/p>\n<h2><strong>Microsoft vulnerabilities<\/strong><\/h2>\n<p>As I mentioned above, Microsoft delivered security updates to deal with vulnerabilities, including six marked as <em>Exploitation More Likely<\/em> and four as <em>Exploitation Detected<\/em>. There are also five non-exploited zero-day vulnerabilities that should receive attention. That gives us 15 priority vulnerabilities for this month, including the out-of-band update to contend with PrintNightmare. If you must prioritize any one of the following vulnerabilities over the others it will likely be any remote code execution (RCE) vulnerabilities.<\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31979\" target=\"_blank\" rel=\"noopener\">CVE-2021-31979<\/a> Windows Kernel Elevation of Privilege Vulnerability \u2013 Exploitation Detected<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-33771\" target=\"_blank\" rel=\"noopener\"><u>CVE-2021-33771<\/u><\/a> Windows Kernel Elevation of Privilege Vulnerability \u2013 Exploitation Detected<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34448\" target=\"_blank\" rel=\"noopener\">CVE-2021-34448<\/a> Scripting Engine Memory Corruption Vulnerability \u2013 Exploitation Detected<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527\" target=\"_blank\" rel=\"noopener\">CVE-2021-34527<\/a> Windows Print Spooler RCE Vulnerability \u2013 Exploitation Detected<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34520\" target=\"_blank\" rel=\"noopener\">CVE-2021-34520<\/a> Microsoft SharePoint Server RCE Vulnerability \u2013 Exploitation More Likely<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34473\" target=\"_blank\" rel=\"noopener\">CVE-2021-34473<\/a> Microsoft Exchange Server RCE Vulnerability \u2013 Exploitation More Likely<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34468\" target=\"_blank\" rel=\"noopener\">CVE-2021-34468<\/a> Microsoft SharePoint Server RCE Vulnerability \u2013 Exploitation More Likely<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34467\" target=\"_blank\" rel=\"noopener\">CVE-2021-34467<\/a> \u00a0\u00a0Microsoft SharePoint Server RCE \u2013 Exploitation More Likely<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34449\" target=\"_blank\" rel=\"noopener\">CVE-2021-34449<\/a> Win32k Elevation of Privilege Vulnerability \u2013 Exploitation More Likely<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-33780\" target=\"_blank\" rel=\"noopener\">CVE-2021-33780<\/a> Windows DNS Server RCE Vulnerability \u2013 Exploitation More Likely<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34492\" target=\"_blank\" rel=\"noopener\">CVE-2021-34492<\/a> Windows Certificate Spoofing Vulnerability \u2013 Exploitation Less Likely<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34523\" target=\"_blank\" rel=\"noopener\">CVE-2021-34523<\/a> Microsoft Exchange Server Elevation of Privilege Vulnerability<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34473\" target=\"_blank\" rel=\"noopener\">CVE-2021-34473<\/a> Microsoft Exchange Server Remote Code Execution Vulnerability<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-33779\" target=\"_blank\" rel=\"noopener\">CVE-2021-33779<\/a> Windows ADFS Security Feature Bypass Vulnerability<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-33781\" target=\"_blank\" rel=\"noopener\">CVE-2021-33781<\/a> Active Directory Security Feature Bypass Vulnerability<\/li>\n<\/ul>\n<h2>PrintNightmare<\/h2>\n<p>CVE-2021-34527, otherwise known as PrintNightmare, is a severe threat and has the potential to upset the long-established habits of IT administrators. Microsoft issued updated guidance throughout early July on how to mitigate the threat of PrintNightmare. Microsoft gave additional guidance after the release of KB5005010 that recommends applying registry changes to further mitigate future chances of exploitation. We\u2019ve have automation scripts available for those changes in the <a href=\"https:\/\/me.n-able.com\/s\/global-search\/%40uri#t=AutomationCookbook&#038;sort=relevancy#sort=relevancy\" target=\"_blank\" rel=\"noopener\">Automation Cookbook<\/a> for use with the <a href=\"https:\/\/me.n-able.com\/s\/article\/Post-KB5005010-PrintNightmare-Remediation-NC\" target=\"_blank\" rel=\"noopener\">N&#8209;able<sup>\u2122<\/sup> N&#8209;central<\/a><sup>\u00ae<\/sup> and <a href=\"https:\/\/me.n-able.com\/s\/article\/Post-KB5005010-PrintNightmare-Remediation-RMM\" target=\"_blank\" rel=\"noopener\">N&#8209;able RMM<\/a> products.<\/p>\n<p>The <a href=\"https:\/\/docs.microsoft.com\/en-us\/defender-for-identity\/cas-isp-print-spooler\" target=\"_blank\" rel=\"noopener\">guidance<\/a> from Microsoft also specifies that \u201cdomain controllers and Active Directory admin systems need to have the Print spooler service disabled\u201d due to unconstrained delegation from any authenticated user account on the domain. For single server environments where that server hosts multiple roles, this guidance requires you to perform a risk assessment to determine if the addition of a dedicated print server is warranted.<\/p>\n<h2>Cumulative updates<\/h2>\n<p>We have cumulative updates for all supported Windows 10 builds as usual. The KB5004237 Cumulative for Windows 10 21H1 and 20H2 includes fixes for printer issues that may have arisen from KB5005010. Aside from normal roll-up behavior there is nothing of note about cumulative updates as of print.<\/p>\n<h2>Third-party vulnerabilities: Adobe<\/h2>\n<p>Five Adobe products received security updates this month. There are no standouts at this time, but you can read more at the <a href=\"https:\/\/helpx.adobe.com\/security\/security-bulletin.html\" target=\"_blank\" rel=\"noopener\">Security Bulletins and Advisories<\/a> from Adobe.<\/p>\n<h2>Summary<\/h2>\n<p>PrintNightmare gave us a scare and even after Microsoft released security updates and guidance, it\u2019s worth re-evaluating what systems need Print Spooler service enabled in the first place. The goal of patching a system is to harden it against exploitation; shutting off Print Spooler where it\u2019s not needed is just another hardening measure you can undertake to improve the resiliency of your managed environments.<\/p>\n<p>Prioritize the zero-day, <em>Exploitation Detected<\/em>, and <em>Exploitation More Likely<\/em> vulnerabilities, but since all vulnerabilities are marked as important or higher, strive to get all requisite patches applied sooner rather than later.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Lewis Pope is the head security nerd at N&#8209;able. You can follow him on<\/em><\/p>\n<p><em>Twitter:\u00a0<\/em><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><em>@cybersec_nerd<\/em><\/a><\/p>\n<p><em>Linkedin:\u00a0<\/em><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\/\" target=\"_blank\" rel=\"noopener\"><em>thesecuritypope<\/em><\/a><\/p>\n<p><em>Twitch:\u00a0<\/em><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><em>cybersec_nerd<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Following the scare caused by the Print Spooler at the beginning of the month, Lewis Pope takes a look at that and more in this month\u2019s Patch Tuesday release.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-21278","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>July 2021 Patch Tuesday report - N-able<\/title>\n<meta name=\"description\" content=\"Following the scare caused by the Print Spooler at the beginning of the month, we look at that &amp; more in this month\u2019s Patch Tuesday release.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"July 2021 Patch Tuesday report - N-able\" \/>\n<meta property=\"og:description\" content=\"Following the scare caused by the Print Spooler at the beginning of the month, we look at that &amp; more in this month\u2019s Patch Tuesday release.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-14T13:55:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:07:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"July 2021 Patch Tuesday: PrintNightmare and 117 Security Vulnerabilities\",\"datePublished\":\"2021-07-14T14:55:03+01:00\",\"dateModified\":\"2022-06-10T17:07:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities\"},\"wordCount\":740,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities\",\"name\":\"July 2021 Patch Tuesday report - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2021-07-14T14:55:03+01:00\",\"dateModified\":\"2022-06-10T17:07:58+00:00\",\"description\":\"Following the scare caused by the Print Spooler at the beginning of the month, we look at that & more in this month\u2019s Patch Tuesday release.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"July 2021 Patch Tuesday: PrintNightmare and 117 Security Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"July 2021 Patch Tuesday report - N-able","description":"Following the scare caused by the Print Spooler at the beginning of the month, we look at that & more in this month\u2019s Patch Tuesday release.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities","og_locale":"de_DE","og_type":"article","og_title":"July 2021 Patch Tuesday report - N-able","og_description":"Following the scare caused by the Print Spooler at the beginning of the month, we look at that & more in this month\u2019s Patch Tuesday release.","og_url":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-07-14T13:55:03+00:00","article_modified_time":"2022-06-10T17:07:58+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"July 2021 Patch Tuesday: PrintNightmare and 117 Security Vulnerabilities","datePublished":"2021-07-14T14:55:03+01:00","dateModified":"2022-06-10T17:07:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities"},"wordCount":740,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities","url":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities","name":"July 2021 Patch Tuesday report - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2021-07-14T14:55:03+01:00","dateModified":"2022-06-10T17:07:58+00:00","description":"Following the scare caused by the Print Spooler at the beginning of the month, we look at that & more in this month\u2019s Patch Tuesday release.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/july-2021-patch-tuesday-printnightmare-and-117-security-vulnerabilities#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"July 2021 Patch Tuesday: PrintNightmare and 117 Security Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/21278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=21278"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/21278\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=21278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}