{"id":5217,"date":"2019-08-26T23:36:07","date_gmt":"2019-08-26T22:36:07","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5217"},"modified":"2021-04-01T23:36:45","modified_gmt":"2021-04-01T22:36:45","slug":"endpoint-management-monitoring","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring","title":{"rendered":"Endpoint Management and Monitoring Overview"},"content":{"rendered":"<p>Over the past decade, the rise of bring-your-own-device (BYOD) policies has led to a proliferation of mobile devices like laptops, smartphones, and tablets being used for business purposes. As a managed services provider (MSP), you\u2019ll know these devices are referred to as endpoints, but you may not have a plan in place to deal with endpoint security. Because these mobile devices pose a particular risk to business networks, it\u2019s more necessary now than ever for MSPs to make endpoint management and monitoring an essential part of network strategy.<\/p>\n<p>As hardware devices that work over the TCP\/IP network, endpoints come with all of the security risks of typical workstations plus their own unique vulnerabilities. Whether the endpoints are personal devices or provided by the business, they rarely meet the security standards established by MSPs. When employees and authorized outsiders (like partners, consultants, and clients) use such devices to connect to the network, it can open the door to the loss of sensitive data. To counter this, experts recommend a robust approach to endpoint security on business networks.<\/p>\n<h2 class=\"h3\"><b>What is an endpoint in cybersecurity?\u00a0<\/b><\/h2>\n<p><a href=\"https:\/\/www.n-able.com\/blog\/what-advanced-endpoint-security-and-why-it-so-important\">Endpoints are a major consideration in cybersecurity<\/a>\u00a0for today\u2019s businesses because they tend to be poorly managed and almost always pose security risks. Endpoints are a unique challenge, but MSPs tasked with an organization\u2019s cybersecurity should be prepared to help their customers implement more effective strategies to protect their data.<\/p>\n<p>To put it simply, endpoint security management is an issue because laptops and other wireless devices serve as potential entry points to the network, but are typically not equipped with adequate security measures. They tend to be exposed to more risks than a regular workstation, but face lower IT standards due to their nature as mobile, temporarily connected devices.<\/p>\n<p>This makes endpoints appealing to hackers as easy targets for many types of malware. If these devices have full access to the internal network, it\u2019s all too easy for threats to spread throughout the business. In addition, because they are mobile, it\u2019s possible that the devices\u2014and the data they have access to\u2014could easily fall into the wrong hands.<\/p>\n<p>MSPs need to implement tools that provide comprehensive management solutions for these endpoints. Helping ensure endpoint security and adequate network protection includes:<\/p>\n<ul>\n<li><b>Patches and updates:<\/b>\u00a0It can be difficult to enforce software updates across the network, let alone enforce updates on endpoints. There must be a process in place to ensure that endpoint users aren\u2019t using insecure or out-of-date versions of applications. You can also consider whitelisting certain applications and not others.<\/li>\n<li><b>Device policies:<\/b>\u00a0Policies are coded rules that allow you to specify and control how endpoints connect to the network. These policies will ideally be standard for mobile devices across the network, and endpoints must prove compliance before they are granted network access.<\/li>\n<li><b>Access and control:\u00a0<\/b>Network access control is a crucial method for protecting your network and helping ensure no unauthorized devices are given access. This can mean that users must enter a username and password to gain entry. You can also restrict access to network data, control user behavior (by blocking USB use or file access, for instance), and implement specific anti-threat initiatives like antivirus software. This is especially important for managing guest devices.<\/li>\n<li><b>Threat detection:<\/b>\u00a0There are a number of reasons to check endpoints for threats. Most importantly, you want to make sure threats don\u2019t spread from these devices to your internal network. But endpoints are also rich sources of threat data you can use to improve network protection more generally.<\/li>\n<\/ul>\n<h2 class=\"h3\"><b>What is endpoint detection?<\/b><\/h2>\n<p>The term endpoint detection was coined by Anton Chuvakin of\u00a0<a class=\"ext\" href=\"https:\/\/blogs.gartner.com\/anton-chuvakin\/2013\/07\/26\/named-endpoint-threat-detection-response\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner<\/a>, who in 2013 decided that \u201cendpoint threat detection and response,\u201d otherwise known as endpoint detection and response or EDR, was an appropriate name for the emerging problem of detecting suspicious activities on endpoints. Since then,\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/endpoint-detection-and-response-modern-weapons-against-cybercriminals\">EDR<\/a>\u00a0has become a popular concept for professionals seeking to protect networks and minimize the risk that endpoints continue to pose.<\/p>\n<p>The purpose of EDR is to gain insights into the threats that could occur or have already occurred. That means MSPs detect potential or existing threats and take appropriate measures to prevent attacks or mitigate harm. Of course, this requires high-quality monitoring of endpoint systems and how they are used. But to effectively protect a customer\u2019s network, simply looking for endpoint threats is not enough. The additional capabilities that MSPs need for effective endpoint detection include:<\/p>\n<ul>\n<li><b>Preventative measures:\u00a0<\/b>Because endpoints are so vulnerable, it isn\u2019t advisable to simply wait until a threat occurs. With endpoints, it\u2019s important to implement as many proactive measures as possible.<\/li>\n<li><b>Mobile compatibility:\u00a0<\/b>Mobile devices spend more time offline. This means you\u2019ll need to consider how to deal with threat detection or manage the device even when you don\u2019t currently have direct access to the device.<\/li>\n<li><b>Automatic protection:\u00a0<\/b>With the right policies in place, endpoint systems should be able to automatically neutralize many threats without MSP intervention.<\/li>\n<li><b>Alerting:\u00a0<\/b>Of course, MSPs can\u2019t be expected to manually scan through their entire endpoint inventory. Automatic alerts are a necessity if you hope to stay on top of potential threats for the dozens of endpoints your customers may use.<\/li>\n<li><b>Recovery and quarantine:\u00a0<\/b>If a threat is detected on an endpoint, your first round of defense may simply be to disconnect the device.<b>\u00a0<\/b>You\u2019ll then need to dig into the device itself and figure out what happened, but this \u201cquarantining\u201d allows you to minimize the extent of the threat.<\/li>\n<\/ul>\n<h2 class=\"h3\"><b>What is endpoint visibility?\u00a0<\/b><\/h2>\n<p>Endpoint visibility means having meaningful insight into all managed devices. MSPs are already tasked with collecting data across challenging environments like cloud platforms and virtual machines, but it\u2019s also important to collect data from endpoints like mobile phones and laptops. By gathering and centralizing the right kind of data about individual endpoints, MSPs can quickly answer key visibility questions that help ensure overall network security. Potential questions about endpoints include the following:<\/p>\n<ul>\n<li>Are these all authorized devices?<\/li>\n<li>Which employees or guests are using these devices?<\/li>\n<li>Are all relevant applications updated or patched?<\/li>\n<li>Is a user attempting to access sensitive data or share files?<\/li>\n<li>Is there currently malware on any user\u2019s system?<\/li>\n<li>What is the threat history of each device?<\/li>\n<li>Is any user attempting to use a USB drive?<\/li>\n<li>Is any device attempting to share or push a suspicious file?<\/li>\n<li>Is traffic normal across all endpoints?<\/li>\n<\/ul>\n<h2 class=\"h3\"><b>What is endpoint monitoring?<\/b><\/h2>\n<p>Essentially, endpoint monitoring is about tracking activity and risks on all the mobile devices that join your network. The term describes the ongoing, continuous process of managing a dynamic array of endpoints on a business network. For that, you need endpoint visibility and access, as well as the ability to\u00a0<a class=\"ext\" href=\"https:\/\/www.solarwinds.com\/security-event-manager\/use-cases\/threat-detection\" target=\"_blank\" rel=\"noopener noreferrer\">detect (and automatically address) threats<\/a>. Information can be gathered in a central database to help ensure further analysis, comparison, reporting, and alerting.<\/p>\n<p>In order to effectively monitor endpoint agents, MSPs typically need automated software. It\u2019s difficult for MSPs to manually enforce policies and security standards across even a small number of mobile devices. To truly protect customer networks, it\u2019s smart to consider using endpoint management tools.<\/p>\n<p>One good example of endpoint monitoring software is\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\">SolarWinds<sup>\u00ae<\/sup>\u00a0RMM<\/a>. While RMM offers an array of features to help you manage your customers as a remote MSP, a new feature focuses specifically on monitoring endpoints and managing their associated risks. Using an automated tool like RMM is an effective way to protect the network and any sensitive data from the many risks that endpoints pose.<\/p>\n<p>As an MSP, your customers expect that you\u2019ll be able to keep them protected from the rising number of security threats in today\u2019s digital era. With RMM, the\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/remote-management\/endpoint-detection-and-response\">endpoint detection and response feature<\/a>\u00a0\u00a0allows even the busiest MSPs to stay ahead of potential threats to offer customers effective endpoint protection. The tool lets you create custom policies to manage endpoint agents and constantly analyzes files to detect threats. Behavioral AI engines power data point analysis, meaning RMM is well-equipped to help protect against ransomware, zero-day attacks, and the evolving threat landscape. And when threats do occur, you don\u2019t have to be online to take care of them\u2014the tool responds with automatic rollbacks (and sends an instant alert to keep you informed).<\/p>\n<p>With the right\u00a0<a class=\"ext\" href=\"https:\/\/www.tek-tools.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">software tools<\/a>\u00a0for endpoint management and monitoring, protecting customer networks doesn\u2019t have to be a headache.<\/p>\n<p><b>Help ensure you&#8217;re protected from breaches by Visiting our\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/resources\/security\" target=\"_blank\" rel=\"noopener\">Security Resource Center\u00a0<\/a>for other common IT threats.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read about the benefits of efficient endpoint management tactics and the importance of strong endpoint security policies to help prevent external or internal threats.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5217","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Endpoint Management and Monitoring - N-able<\/title>\n<meta name=\"description\" content=\"Read about the benefits of efficient endpoint management tactics and the importance of strong endpoint security policies to help prevent external or internal threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Management and Monitoring - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about the benefits of efficient endpoint management tactics and the importance of strong endpoint security policies to help prevent external or internal threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-26T22:36:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-01T22:36:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Endpoint Management and Monitoring Overview\",\"datePublished\":\"2019-08-26T23:36:07+01:00\",\"dateModified\":\"2021-04-01T22:36:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring\"},\"wordCount\":1427,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring\",\"name\":\"Endpoint Management and Monitoring - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2019-08-26T23:36:07+01:00\",\"dateModified\":\"2021-04-01T22:36:45+00:00\",\"description\":\"Read about the benefits of efficient endpoint management tactics and the importance of strong endpoint security policies to help prevent external or internal threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Management and Monitoring Overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Endpoint Management and Monitoring - N-able","description":"Read about the benefits of efficient endpoint management tactics and the importance of strong endpoint security policies to help prevent external or internal threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring","og_locale":"de_DE","og_type":"article","og_title":"Endpoint Management and Monitoring - N-able","og_description":"Read about the benefits of efficient endpoint management tactics and the importance of strong endpoint security policies to help prevent external or internal threats.","og_url":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-08-26T22:36:07+00:00","article_modified_time":"2021-04-01T22:36:45+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"7\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Endpoint Management and Monitoring Overview","datePublished":"2019-08-26T23:36:07+01:00","dateModified":"2021-04-01T22:36:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring"},"wordCount":1427,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring","url":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring","name":"Endpoint Management and Monitoring - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2019-08-26T23:36:07+01:00","dateModified":"2021-04-01T22:36:45+00:00","description":"Read about the benefits of efficient endpoint management tactics and the importance of strong endpoint security policies to help prevent external or internal threats.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/endpoint-management-monitoring#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Endpoint Management and Monitoring Overview"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5217"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5217\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}