{"id":70276,"date":"2025-02-27T17:48:12","date_gmt":"2025-02-27T17:48:12","guid":{"rendered":"https:\/\/www.n-able.com\/?p=70276"},"modified":"2025-08-28T10:30:19","modified_gmt":"2025-08-28T09:30:19","slug":"an-overview-of-microsoft-365-security-best-practices","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices","title":{"rendered":"An Overview of Microsoft 365 Security Best Practices"},"content":{"rendered":"<p class=\"ai-optimize-6 ai-optimize-introduction\"><span data-contrast=\"auto\">As organizations rely on cloud-based technologies for their operations, Microsoft 365 (M365) has become popular for its integrated suite of productivity and collaboration tools. M365 offers built-in security features that aim to protect organizations from various cybersecurity threats. However, in today\u2019s complex threat landscape, relying only on the built-in security of M365 may not be enough.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-7\"><span data-contrast=\"none\"><a href=\"https:\/\/www.n-able.com\/products\/adlumin-managed-detection-and-response\" target=\"_blank\" rel=\"noopener\">Managed Detection and Response (MDR)<\/a><\/span><span data-contrast=\"auto\">\u00a0providers specialize in offering advanced security services that can integrate seamlessly with M365 to provide an additional layer of protection. MDR providers employ a range of technologies and techniques, such as AI-driven threat detection, real-time monitoring, and incident response, to actively identify and contain threats before they can cause significant harm within the M365 environment.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-8\"><b><i><span data-contrast=\"auto\">This blog details the importance of expanding M365\u2019s security by covering the best practices MDR providers should offer.\u00a0<\/span><\/i><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-9\"><strong><span>M365 Data Security Best Practices\u00a0\u00a0\u00a0<\/span><\/strong><\/h2>\n<h3 class=\"ai-optimize-10\"><strong><span>Train Employees on Phishing Attempts\u00a0<\/span><\/strong><\/h3>\n<p class=\"ai-optimize-11\"><span data-contrast=\"auto\">Phishing attacks are a top method for cybercriminals to infiltrate systems, posing a significant risk to organizations using M365. These attacks have evolved in sophistication, making it harder for users to discern legitimate messages from malicious ones. As M365 is widely used for email communication, cybercriminals exploit this platform, disguising their phishing attempts as genuine correspondence. This tactic aims to trick users into exposing sensitive information or unknowingly downloading malware, posing grave security threats to organizations relying on M365 for their day-to-day operations.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-12\"><span data-contrast=\"auto\">By training employees in email security through a\u00a0<\/span><span>Security Training Program<\/span><span data-contrast=\"auto\">, you can help them understand the risks and how to identify suspicious emails. This can include training employees to spot phishing signs, such as unexpected attachments or unusual email addresses, and avoiding clicking on suspicious links.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h3 class=\"ai-optimize-13\"><strong><span>Use Multi-Factor Authentication (MFA) for Admin Accounts\u00a0<\/span><\/strong><\/h3>\n<p class=\"ai-optimize-14\"><span data-contrast=\"auto\">MFA is a crucial security measure that adds an extra layer of protection to user accounts. While it is commonly known that employees should be required to enable MFA, it is equally important for administrators. Admin accounts, particularly those with high-level privileges such as Global Administrators, are prime targets for attackers due to their access and control level. By compromising an admin account, an attacker can gain unauthorized control over an organization\u2019s systems and data, wreaking havoc and causing significant damage.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-15\"><span data-contrast=\"auto\">However, it is important to note that while MFA is a powerful security measure, it is not foolproof. Cybercriminals have found ways to bypass MFA and gain unauthorized account access. For example, they may use sophisticated phishing techniques to trick users into providing their password credentials on a fraudulent website that will bypass the MFA.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h3 class=\"ai-optimize-16\"><strong><span>Integrate Logs with Existing MDR Solution\u00a0<\/span><\/strong><\/h3>\n<p class=\"ai-optimize-17\"><span data-contrast=\"auto\">Integrating your M365 logs into your existing MDR solution is crucial for achieving complete visibility into your environment. By doing so, you can ensure that all logs and events from M365 are analyzed and correlated with other security data from various sources. This helps you identify and respond to threats quickly.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-18\"><span data-contrast=\"auto\">Firstly, it allows you to monitor and analyze user activities, such as logins, file access, and email actions, within the M365 environment. This visibility is essential for detecting anomalous behavior which may indicate a security breach. Secondly, integrating M365 logs with your MDR solution enables better correlation and analysis of events across your entire infrastructure. You can gain valuable context and a broader perspective on potential threats by aggregating and correlating M365 logs with logs from other systems, such as firewalls, endpoints, and cloud services.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-19\"><span data-contrast=\"auto\">This holistic approach to monitoring identifies complex attack patterns and helps your security team make informed decisions on\u00a0<\/span><span data-contrast=\"none\">incident response<\/span><span data-contrast=\"auto\">. MDR solutions often provide specific integrations for M365, making the process of integrating logs seamless and efficient. These integrations typically include connectors or APIs facilitating the ingestion and analysis of M365 logs within the Security Operations Platform.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h3 class=\"ai-optimize-20\"><strong><span>Investigating Alerts for Suspicious M365 Activity\u00a0<\/span><\/strong><\/h3>\n<p class=\"ai-optimize-21\"><span data-contrast=\"auto\">Investigating alerts for suspicious M365 activity is critical for maintaining the security and integrity of your environment.\u00a0<\/span><span>According to Microsoft<\/span><span data-contrast=\"auto\">, these activities can include looking for unusual activities related to external user file activity, external file sharing, volume of file deletion, and more.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-22\"><span data-contrast=\"auto\">However, configuring and managing alerts can be a lot to handle for IT teams, especially in large and complex environments. MDR solutions can alleviate the heavy load on IT teams by sifting through and prioritizing the alerts generated by the M365 integration. These solutions can analyze the context of alerts, correlate multiple events, and provide real-time insights into the severity and priority of each alert.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-23\"><span data-contrast=\"auto\">One common scenario where MDR solutions provide immense value is detecting \u201cimpossible travel\u201d from the M365 integration. Cybercriminals often attempt to log in from multiple locations across different geographical regions within a short period of time, which is humanly impossible.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-24\"><span data-contrast=\"none\">User Entity &amp; Behavior Analytics (UEBA)<\/span><span data-contrast=\"auto\">\u00a0is a critical tool that allows MDR teams to effectively track and analyze employee behavior patterns within the M365 environment. With UEBA, organizations can identify anomalies and suspicious activities, including unauthorized logons from different locations, as cybercriminals may possess employee credentials. By leveraging UEBA, companies can establish a proactive approach to securing compromised accounts, preventing further unauthorized access, and taking immediate action. The presence of a dedicated MDR team provides organizations with extended visibility beyond their boundaries, ensuring enhanced security measures.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h3 class=\"ai-optimize-25\"><strong><span>Strengthening Cybersecurity with MDR Providers\u00a0<\/span><\/strong><\/h3>\n<p class=\"ai-optimize-26\"><span data-contrast=\"auto\">While M365 offers built-in security features, the evolving threat landscape requires additional layers of protection to safeguard organizations. MDR providers fill this gap by integrating seamlessly with M365 and leveraging advanced threat detection technologies, real-time monitoring, and incident response capabilities.\u00a0\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-27\"><span><a href=\"https:\/\/www.n-able.com\/products\/adlumin-managed-detection-and-response\" target=\"_blank\" rel=\"noopener\">MDR solutions<\/a><\/span><span data-contrast=\"auto\">\u00a0not only help manage the overwhelming number of alerts generated by M365 but also provide expertise and insights to prioritize and address these threats effectively. By partnering with MDR providers and implementing best practices within your cybersecurity strategy, organizations can enhance their security posture and mitigate the risks associated<\/span><span data-contrast=\"auto\">\u00a0with using\u00a0<\/span><span data-contrast=\"auto\">M365<\/span><span data-contrast=\"auto\">.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Boost M365 cybersecurity with MDR solutions\u2014advanced threat detection, real-time monitoring, and expert incident response. Learn about seamless Adlumin integration.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-70276","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>An Overview of Microsoft 365 Security Best Practices - N-able<\/title>\n<meta name=\"description\" content=\"Boost M365 cybersecurity with MDR solutions\u2014advanced threat detection, real-time monitoring, and expert incident response. Learn about seamless Adlumin integration.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Overview of Microsoft 365 Security Best Practices - N-able\" \/>\n<meta property=\"og:description\" content=\"Boost M365 cybersecurity with MDR solutions\u2014advanced threat detection, real-time monitoring, and expert incident response. Learn about seamless Adlumin integration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-27T17:48:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-28T09:30:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_AnOverviewofMicrosoft365SecurityBestPractices.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"An Overview of Microsoft 365 Security Best Practices\",\"datePublished\":\"2025-02-27T17:48:12+00:00\",\"dateModified\":\"2025-08-28T09:30:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices\"},\"wordCount\":965,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices\",\"name\":\"An Overview of Microsoft 365 Security Best Practices - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2025-02-27T17:48:12+00:00\",\"dateModified\":\"2025-08-28T09:30:19+00:00\",\"description\":\"Boost M365 cybersecurity with MDR solutions\u2014advanced threat detection, real-time monitoring, and expert incident response. Learn about seamless Adlumin integration.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"An Overview of Microsoft 365 Security Best Practices - N-able","description":"Boost M365 cybersecurity with MDR solutions\u2014advanced threat detection, real-time monitoring, and expert incident response. Learn about seamless Adlumin integration.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices","og_locale":"de_DE","og_type":"article","og_title":"An Overview of Microsoft 365 Security Best Practices - N-able","og_description":"Boost M365 cybersecurity with MDR solutions\u2014advanced threat detection, real-time monitoring, and expert incident response. Learn about seamless Adlumin integration.","og_url":"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2025-02-27T17:48:12+00:00","article_modified_time":"2025-08-28T09:30:19+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_AnOverviewofMicrosoft365SecurityBestPractices.png","type":"image\/png"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"An Overview of Microsoft 365 Security Best Practices","datePublished":"2025-02-27T17:48:12+00:00","dateModified":"2025-08-28T09:30:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices"},"wordCount":965,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices","url":"https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices","name":"An Overview of Microsoft 365 Security Best Practices - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2025-02-27T17:48:12+00:00","dateModified":"2025-08-28T09:30:19+00:00","description":"Boost M365 cybersecurity with MDR solutions\u2014advanced threat detection, real-time monitoring, and expert incident response. Learn about seamless Adlumin integration.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/an-overview-of-microsoft-365-security-best-practices"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/70276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=70276"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/70276\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=70276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}