{"id":4917,"date":"2020-02-25T20:58:29","date_gmt":"2020-02-25T20:58:29","guid":{"rendered":"https:\/\/www.n-able.com\/?p=4917"},"modified":"2021-10-01T11:42:45","modified_gmt":"2021-10-01T10:42:45","slug":"patch-management-best-practices","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices","title":{"rendered":"Patch Management Best Practices"},"content":{"rendered":"<p>Skim today\u2019s cybersecurity headlines and the scope of damages from cyberattacks will likely shock you. Not only are the number of security breaches increasing each year, but so is the average cost of a cybercrime incident. In 2018, the average cybercrime incident\u00a0<a class=\"ext\" href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-99\/Accenture-Cost-Cyber-Crime-Infographic.pdf#zoom=50\" target=\"_blank\" rel=\"noopener noreferrer\">cost $13 million<\/a>, which represented a whopping 72% increase from 2013. By 2021, experts estimate that cybercrime will represent a total global\u00a0<a class=\"ext\" href=\"https:\/\/www.prnewswire.com\/news-releases\/cyberattacks-are-the-fastest-growing-crime-and-predicted-to-cost-the-world-6-trillion-annually-by-2021-300765090.html\" target=\"_blank\" rel=\"noopener noreferrer\">cost of $6 trillion annually<\/a>. These financial concerns are why managed services providers (MSPs) should take a proactive approach to their customers\u2019 security countermeasures and\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/risk-intelligence\/use-cases\/risk-management-process-definition\" target=\"_blank\" rel=\"noopener\">risk intelligence<\/a>.<\/p>\n<p>Patch management is one essential way MSPs can help keep their customers safe. Patches are small fixes made to the code of software applications and programs, often with the intention of addressing bugs or security issues. The consequences of improper patching can be far-reaching\u2014some of the\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/average-cost-of-data-breach\" target=\"_blank\" rel=\"noopener\">largest data breaches<\/a>\u00a0of the past few years can be traced back to a lack of patch management best practices.<\/p>\n<p>For instance, the 2017 Equifax data breach, which exposed the data of 143 million Americans, was linked to an\u00a0<a class=\"ext\" href=\"https:\/\/arstechnica.com\/information-technology\/2017\/09\/massive-equifax-breach-caused-by-failure-to-patch-two-month-old-bug\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apache Struts vulnerability<\/a>\u00a0that had gone unpatched for two months. Another high-profile breach came in 2018, when an\u00a0<a class=\"ext\" href=\"https:\/\/www.zdnet.com\/article\/singhealth-data-breach-reveals-several-inadequate-security-measures\/\" target=\"_blank\" rel=\"noopener noreferrer\">outdated version of Outlook at SingHealth<\/a>\u00a0was responsible for exposing the data of 1.5 million patients. Ultimately, strong patch management policy and procedures are essential for data privacy, and security.<\/p>\n<h3><b>What are the general steps for patch management?<\/b><\/h3>\n<p>General patch management strategy includes several processes: scanning networked devices for missing software updates, downloading these patches when they become available, deploying the patches to the necessary devices, and ensuring they are properly installed.<\/p>\n<p>Patch management for Windows machines tends to rely on two software updating services, depending on the size of the networked environment. Small- and medium-sized companies can get by with Windows Server Update Services (WSUS), which manages and deploys updates for Microsoft-specific operating systems and software across multiple machines. System Center Configuration Manager, which is designed for large-scale enterprises, builds upon the capabilities that WSUS provides but includes greater functionality for scheduling and automated patch deployment.<\/p>\n<p>Windows patch management best practices will help with the Microsoft infrastructure, but things get more complicated when considering the various third-party applications and programs that many companies rely on to achieve their strategic and organizational goals. That\u2019s why implementing a patch management software solution is often key. Patch management software not only helps to ensure that Windows server patching best practices are maintained, but that open source patch management needs are seen to as well\u2014thereby helping ensure that all applications within the computing environment are kept up to date.<\/p>\n<h3><b>Why is patch management important?<\/b><\/h3>\n<p>Proactive patch management policy and best practices provide several benefits, security being perhaps the most obvious and important. In fact,\u00a0one 2018 study\u00a0found that more than half of data breaches could be traced back to identified vulnerabilities that had been left unpatched. Because patches identify the specific vulnerabilities they\u2019re meant to fix, it\u2019s essential that they be installed quickly, because hackers and malware can start to exploit those vulnerabilities within hours of the patch\u2019s release.<\/p>\n<p>However, patch management best practices can also help to optimize business-critical functions in other ways. Take productivity, for example. While patches help to prevent the exploitation of vulnerabilities in software code, many of them also provide performance improvements, leading to fewer application crashes and system downtime. Automated patch management also helps to ensure that organizations stay abreast of the latest technological developments and updates, which can include new features and capabilities that often increase the ease and speed of use for end-users.<\/p>\n<p>One other benefit that\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/windows-patch-management\">patch management<\/a>\u00a0provides is compliance. Because of the ubiquity of cyberthreats, many regulatory bodies require businesses to demonstrate they\u2019re actively staying on top of security updates and best practices. Failure to do so can result in legal and financial ramifications.<\/p>\n<h3><b>What are patch management best practices?<\/b><\/h3>\n<p>Pressing concerns about security means patch management best practices are vital to a safer and more secure computing environment. Here are a few of the policies and practices that MSPs should be enacting to help ensure their customers\u2019 assets are safe.<\/p>\n<ol>\n<li><b>Maintain accurate systems inventory<br \/>\n<\/b>If you don\u2019t have an accurate inventory of all the software and hardware elements connected to a network, it becomes incredibly difficult to ensure that all applications and devices are kept patched. Running regular scans of a network\u2019s asset inventory is important for keeping an accurate portrait, which can then be used to determine which patches need to be applied.<\/li>\n<li><b>Assign assets to categories<br \/>\n<\/b>After creating an accurate inventory, group them by how exposed they are to attack and how great an impact they would have on business functions if they were to be taken offline. This helps determine which assets require immediate patch deployment (anywhere between hours and days of a patch\u2019s release) or a more standard timeframe (which could take up to several weeks). Assets that store sensitive information, support public-facing elements, or enable important functions should be given priority.<\/li>\n<li><b>Consolidate software<br \/>\n<\/b>The more versions of software a customer is using, the more complicated patching becomes. That\u2019s why streamlining software is another important practice\u2014it reduces administrative overhead and promotes internal cohesion by helping ensure that multiple distinct applications or programs aren\u2019t being used for the same purpose. Fewer software options result in fewer patches that will eventually need to be deployed, meaning less risk for vulnerability.<\/li>\n<li><b>Stay on top of vendor patch announcements<br \/>\n<\/b>Third-party products are commonplace in networked environments, which makes keeping up with vendor patch announcements a key part of maintaining patch security. Having an accurate asset inventory allows you to subscribe to third-party vendor security updates, which can often be sent to specific email inboxes or communication channels to help ensure that they aren\u2019t overlooked.<\/li>\n<li><b>Work around patch exceptions<br \/>\n<\/b>It\u2019s likely you\u2019ll encounter situations in which a patch can\u2019t be deployed immediately or requires changes in order for it to work properly. Given that this can take time, the best course of action is to limit how much risk the asset in question is exposed to until the patch can be applied. While you should have already restricted user permissions to necessary personnel only, this step becomes even more essential when patch exceptions come into play. You should never expose high-stakes assets like servers to the internet when left unpatched.<\/li>\n<li><b>Test before you deploy<br \/>\n<\/b>Every network environment is going to have at least a few unique quirks. For this reason, it\u2019s important to test patches in restricted sandbox environments that allow MSPs to help ensure a given patch doesn\u2019t cause problems or cause assets to crash. If a patch clears the smaller subset of systems, you can likely roll it out in additional subsets across the rest of the network.<\/li>\n<li><b>Automate when possible<br \/>\n<\/b>You can often automate open source patch management. If your customers rely on open source applications and libraries, you should patch them as soon as possible. Because it can be difficult to track the various open source libraries and tools in use by your customer\u2019s developers, automation is an essential part of helping ensure that asset inventories are kept up to date\u2014including which open source tools are in use and the software versions that are vulnerable and require patching.<\/li>\n<\/ol>\n<p>The best automated tools will come with library integrations baked-in, meaning that you\u2019ll be able to instantly know which libraries customer\u2019s developers are using. This will allow you to automatically deploy updates when unsafe library versions are detected. Because vulnerabilities in open source code will affect whatever applications end up using those portions of vulnerable code, it\u2019s strongly advised that open source patching be automated so you don\u2019t have to track down each application and individually fix affected code.<\/p>\n<p>While there are a few key things to keep in mind when it comes to patch management best practices in 2020 and beyond, the bottom line is that patch management is crucial to helping protect your customers in today\u2019s computing world. To make patch management as smooth as possible, consider user-friendly tools that make rollout and reporting easy.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds<sup>\u00ae<\/sup>\u00a0RMM<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/www.solarwiogndsmsp.com\/products\/n-central\/patch-management?promo=blog\" target=\"_blank\" rel=\"noopener noreferrer\">N&#8209;central<\/a><sup>\u00ae<\/sup><sup>\u00a0<\/sup>both feature a robust patch management feature that can help fine-tune your patch management policies and make updating your customers\u2019 software a seamless process.<\/p>\n<p><b>Interested in learning more about how patch management software works?\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/products\" target=\"_blank\" rel=\"noopener\"><b>Explore our product suite<\/b><\/a><b>\u00a0to see how you can prepare for potential vulnerabilities.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Skim today\u2019s cybersecurity headlines and the scope of damages from cyberattacks will likely shock you. Not only are the number of security breaches increasing each year, but so is the&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4917","post","type-post","status-publish","format-standard","hentry","topic-remote-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Management Best Practices - N-able<\/title>\n<meta name=\"description\" content=\"Read about patch management best practices you can incorporate into your environment to protect servers and endpoint devices from outside threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Management Best Practices - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about patch management best practices you can incorporate into your environment to protect servers and endpoint devices from outside threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-25T20:58:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-01T10:42:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Patch Management Best Practices\",\"datePublished\":\"2020-02-25T20:58:29+00:00\",\"dateModified\":\"2021-10-01T10:42:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices\"},\"wordCount\":1412,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Remote Management\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices\",\"name\":\"Patch Management Best Practices - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2020-02-25T20:58:29+00:00\",\"dateModified\":\"2021-10-01T10:42:45+00:00\",\"description\":\"Read about patch management best practices you can incorporate into your environment to protect servers and endpoint devices from outside threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Remote Management\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/remote-management\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Management Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Management Best Practices - N-able","description":"Read about patch management best practices you can incorporate into your environment to protect servers and endpoint devices from outside threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices","og_locale":"de_DE","og_type":"article","og_title":"Patch Management Best Practices - N-able","og_description":"Read about patch management best practices you can incorporate into your environment to protect servers and endpoint devices from outside threats.","og_url":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-02-25T20:58:29+00:00","article_modified_time":"2021-10-01T10:42:45+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Patch Management Best Practices","datePublished":"2020-02-25T20:58:29+00:00","dateModified":"2021-10-01T10:42:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices"},"wordCount":1412,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Remote Management"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices","url":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices","name":"Patch Management Best Practices - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2020-02-25T20:58:29+00:00","dateModified":"2021-10-01T10:42:45+00:00","description":"Read about patch management best practices you can incorporate into your environment to protect servers and endpoint devices from outside threats.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-management-best-practices#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Remote Management","item":"https:\/\/www.n-able.com\/de\/blog\/category\/remote-management"},{"@type":"ListItem","position":2,"name":"Patch Management Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/4917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=4917"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/4917\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=4917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}