{"id":70284,"date":"2024-12-05T17:53:36","date_gmt":"2024-12-05T17:53:36","guid":{"rendered":"https:\/\/www.n-able.com\/?p=70284"},"modified":"2025-08-28T10:31:09","modified_gmt":"2025-08-28T09:31:09","slug":"unraveling-cyber-defense-model-secrets-port-scan-detection","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection","title":{"rendered":"Unraveling Cyber Defense Model Secrets: Port Scan Detection"},"content":{"rendered":"<section class=\"av_textblock_section \">\n<div class=\"avia_textblock \">\n<p class=\"ai-optimize-6 ai-optimize-introduction\"><span data-contrast=\"auto\">Welcome to the Unraveling Cyber Defense Model Secrets series, where we shine a light on our Data Science team, explore their latest detections, and learn how to navigate the cyberattack landscape.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-7\"><span data-contrast=\"auto\">Early threat detection is crucial in today\u2019s cybersecurity world. Port scanning, a common tactic by attackers, probes network ports to uncover vulnerabilities. The Adlumin Data Science Team developed a new Machine Learning (ML) alert to enhance early-stage detection capabilities and focus on identifying port scans by leveraging an ML ensemble model trained on aggregated firewall log messages. The model learns normal traffic patterns and isolates suspicious behavior effectively. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-8\"><span data-contrast=\"auto\">The alert is designed to detect suspicious activity originating from private sources, which are frequently used by threat actors for vulnerability scanning after an internal host has been compromised. By addressing these early indicators, the new ML\u00a0<\/span><span data-contrast=\"auto\">alert provides a significant advancement in threat detection and response.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-9\"><span data-contrast=\"auto\">This blog delves into the workings of port scans, their implications, and how the new Adlumin detection elevates your cybersecurity posture.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-10\">The \u201cHandshake\u201d<\/h2>\n<p class=\"ai-optimize-11\"><span data-contrast=\"auto\">Computers exchange information across networks by using IP addresses and ports to identify where the data is coming from and where it needs to go. For example, when conducting a Google search, your computer (the initiator) connects to a Google server (the responder). Before any information is exchanged, the two computers perform a handshake to establish a connection. This process involves three steps:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"5\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-12\"><span data-contrast=\"auto\">The initiator sends a connection request to the responder.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"5\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-13\"><span data-contrast=\"auto\">The responder replies, confirming it is ready to communicate.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"5\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-14\"><span data-contrast=\"auto\">The initiator sends a final acknowledgment.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<p class=\"ai-optimize-15\"><span data-contrast=\"auto\">Once this handshake is complete, your computer can start sending data, like your search query, to the Google server.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-16\">Ports and Their Role in Network Communication<\/h2>\n<p class=\"ai-optimize-17\"><span data-contrast=\"auto\">Every computer or device connected to the internet has 65,535 available ports associated with its IP address. Ports act like doors that allow data to enter and exit a machine. At any given time, most ports are closed, but some are open to enable specific tasks. For example, your browser knows to connect to port 443 when accessing a secure website like Google, as this port is reserved for HTTPS traffic.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-18\"><span data-contrast=\"auto\">When your computer initiates a connection, it typically picks a random port from the range of available ports on your end (called ephemeral ports) to communicate with the destination. However, an attacker trying to infiltrate a system wouldn\u2019t know which ports are open on the destination machine.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-19\"><span data-contrast=\"auto\">To narrow their efforts, attackers often focus on well-known ports\u2014a standardized range of ports numbered 0 to 1023 that are commonly used for essential services (e.g., port 80 for HTTP, port 25 for email). The remaining ports (1024 to 65,535) are more random and harder to predict, which makes them less attractive for attackers to target.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-20\"><b><span data-contrast=\"auto\">What Is a Port Scan?<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p class=\"ai-optimize-21\"><span data-contrast=\"auto\">A port scan is a technique attackers use to find open and available ports on a target machine. The initiator (in this case, the attacker) systematically sends connection requests to multiple ports on the destination, one after the other, to identify which ports respond as open. Once an open port is found, attackers can exploit it to gain further access to the machine or move deeper into the network.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-22\"><span data-contrast=\"auto\">Port scans become particularly suspicious when they occur between two devices on the same network. Normally, devices within the same network already know which ports to use for communication, so scanning multiple ports suggests that someone is probing for vulnerabilities. If successful, the attacker could use the open port as an entry point to compromise the machine or spread their attack to other devices on the network.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<\/div>\n<\/section>\n<div class=\"avia-image-container av-styling- avia-builder-el-12 el_after_av_textblock el_before_av_hr avia-align-center\">\n<div class=\"avia-image-container-inner\">\n<div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" loading=\"lazy\" class=\"avia_image\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/receiver-machine.jpg\" alt=\"\" title=\"Screenshot\" height=\"358\" width=\"917\" \/><\/div>\n<\/div>\n<\/div>\n<div class=\"hr hr-invisible avia-builder-el-13 el_after_av_image el_before_av_textblock \"><span data-contrast=\"auto\">The Adlumin platform ingests and processes firewall log messages to extract key relevant information. When looking at firewall log messages, the actions taken by the firewall or the type of traffic over connections can be indicative of a port scan. The Port Scan ML model aggregates certain information from firewall logs, not limited to but including: the IP addresses, port numbers, and number of bytes transmitted over the connection. Then it generates features from this dataset such as the entropy of the number of bytes, how many destination ports were involved etc.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/div>\n<section class=\"av_textblock_section \">\n<div class=\"avia_textblock \">\n<p class=\"ai-optimize-24\"><span data-contrast=\"auto\">The model raises alerts when it finds enough log messages between two internal IP addresses that meet the characteristics of port scan activity when analyzed in the aggregate. To make this determination, it uses a machine learning classifier that was trained on datasets containing examples of port scans.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-25\"><span data-contrast=\"auto\">In addition to the ML classifier described above, the model ensemble includes domain-knowledge rules based on filtering the aggregated dataset for specific values for certain features, and this logic can also raise alerts. The values and features that are filtered on meet the expectations of port scan traffic and were developed by the Adlumin Data Science Team in consultation with the Adlumin Engineering, Threat Research, and MDR Teams.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-26\"><span data-contrast=\"auto\">Strengthening Your Defense Against Port Scans<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p class=\"ai-optimize-27\"><span data-contrast=\"auto\">Port scans are a critical component of an attacker\u2019s toolkit, providing insights into network vulnerabilities that can be exploited for further malicious activity. This\u00a0 new alert brings a sophisticated, proactive solution to this challenge by detecting and flagging port scan behaviors within aggregated firewall logs. It not only strengthens your defense against network reconnaissance but also integrates seamlessly with the platform&#8217;s Threat Intelligence capability for comprehensive investigation analysis. By combining cutting-edge machine learning with domain expertise, the Adlumin platform empowers security teams to act swiftly and decisively, ensuring networks remain secure against evolving threats.<\/span><span data-ccp-props=\"{\"><\/span><\/p>\n<p class=\"ai-optimize-28\"><strong>See how our platform helps your team find and address threats by arranging a demo or trying out our platform for free.<\/strong><\/p>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Detect port scans with Adlumin\u2019s advanced ML-based solution. Strengthen network security and gain real-time threat insights for proactive cyber defense.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-70284","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Unraveling Cyber Defense Model Secrets: Port Scan Detection - N-able<\/title>\n<meta name=\"description\" content=\"Detect port scans with Adlumin\u2019s advanced ML-based solution. Strengthen network security and gain real-time threat insights for proactive cyber defense.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unraveling Cyber Defense Model Secrets: Port Scan Detection - N-able\" \/>\n<meta property=\"og:description\" content=\"Detect port scans with Adlumin\u2019s advanced ML-based solution. Strengthen network security and gain real-time threat insights for proactive cyber defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-05T17:53:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-28T09:31:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_UnravelingCyberDefenseModelSecrets-PortScanDetection.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Unraveling Cyber Defense Model Secrets: Port Scan Detection\",\"datePublished\":\"2024-12-05T17:53:36+00:00\",\"dateModified\":\"2025-08-28T09:31:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection\"},\"wordCount\":933,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/receiver-machine.jpg\",\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection\",\"name\":\"Unraveling Cyber Defense Model Secrets: Port Scan Detection - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/receiver-machine.jpg\",\"datePublished\":\"2024-12-05T17:53:36+00:00\",\"dateModified\":\"2025-08-28T09:31:09+00:00\",\"description\":\"Detect port scans with Adlumin\u2019s advanced ML-based solution. Strengthen network security and gain real-time threat insights for proactive cyber defense.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#primaryimage\",\"url\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/receiver-machine.jpg\",\"contentUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/receiver-machine.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Unraveling Cyber Defense Model Secrets: Port Scan Detection - N-able","description":"Detect port scans with Adlumin\u2019s advanced ML-based solution. Strengthen network security and gain real-time threat insights for proactive cyber defense.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection","og_locale":"de_DE","og_type":"article","og_title":"Unraveling Cyber Defense Model Secrets: Port Scan Detection - N-able","og_description":"Detect port scans with Adlumin\u2019s advanced ML-based solution. Strengthen network security and gain real-time threat insights for proactive cyber defense.","og_url":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-12-05T17:53:36+00:00","article_modified_time":"2025-08-28T09:31:09+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_UnravelingCyberDefenseModelSecrets-PortScanDetection.png","type":"image\/png"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Unraveling Cyber Defense Model Secrets: Port Scan Detection","datePublished":"2024-12-05T17:53:36+00:00","dateModified":"2025-08-28T09:31:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection"},"wordCount":933,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#primaryimage"},"thumbnailUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/receiver-machine.jpg","inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection","url":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection","name":"Unraveling Cyber Defense Model Secrets: Port Scan Detection - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#primaryimage"},"thumbnailUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/receiver-machine.jpg","datePublished":"2024-12-05T17:53:36+00:00","dateModified":"2025-08-28T09:31:09+00:00","description":"Detect port scans with Adlumin\u2019s advanced ML-based solution. Strengthen network security and gain real-time threat insights for proactive cyber defense.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/unraveling-cyber-defense-model-secrets-port-scan-detection#primaryimage","url":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/receiver-machine.jpg","contentUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/receiver-machine.jpg"},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/70284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=70284"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/70284\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=70284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}