{"id":5769,"date":"2017-05-17T21:08:31","date_gmt":"2017-05-17T20:08:31","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5769"},"modified":"2021-04-07T22:38:17","modified_gmt":"2021-04-07T21:38:17","slug":"whats-your-toolbox-part-2-essential-tools-msps-and-it-admins","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins","title":{"rendered":"What&#8217;s in your toolbox (part 2): essential tools for MSPs and IT Admins"},"content":{"rendered":"<p>Working in the managed IT services industry you probably realize that the \u201ctoolkit\u201d needed more closely resembles an entire hardware store of tools. For example, there\u2019s a set of basic and useful tools freely available from Microsoft like Performance Monitor, Resource Monitor, Process Monitor, and the like. Then there\u2019s indispensable\u00a0<a class=\"ext\" href=\"https:\/\/www.tek-tools.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">software<\/a>\u00a0for functions like creating backups and guarding against malware. Periodically, the day\u2019s task may require a forensic file recovery tool, while another requires a password cracker. On top of that, if you run SQL databases, you will require a whole other layer of specialized tools.<\/p>\n<p>The following is a list of the tools that I turn to every day and couldn\u2019t do without. Some have been around for a while, others have become essential more recently. Keep in mind that depending on how these tools are packaged, there could be some overlap.<\/p>\n<h3>1\/\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/network-monitoring-tools\">Network Monitoring<\/a>\u00a0Software Package<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg\" alt=\"Network_management.jpg\" width=\"411\" height=\"203\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>This is one tool set I\u2019ve relied on for years. These packages usually include Network Scanning Tools, Network Protocol Analyzers, Process Enumeration Tools, and Wireless Tools. I use them to scan our network and report on usage, latency, and speeds. They are absolutely essential for identifying the reason our network response suddenly starts to lag, for identifying unauthorized external access, and unauthorized internal activity.<\/p>\n<h3>2\/\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/remote-software-deployment-tools\">Software Deployment<\/a>\u00a0Package<\/h3>\n<p>In the past these consisted of writing static disk images to workstations and servers, but today they offer so much more. Not only can I automate standard desktop and server deployments, but I can customize the drivers for use on different hardware. I can also modify the add-on software that will be included in that specific implementation. If you are required to reimage machines between users, this software is a must have.<\/p>\n<p>While I have relied on these tools for years, the next three tools are the ones I have come to rely on more recently.<\/p>\n<h3>3\/ Secure\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/take-control\/use-cases\/remote-support-software-msps\">Remote Support Software<\/a><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/remote_support.jpg\" alt=\"remote_support.jpg\" width=\"407\" height=\"201\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Remote control, desktop sharing, live chat, and file transfers are functions you can no longer do without if you do any support for remote users. Remember the \u201cold days\u201d when you had to talk an end user through self-support without being able to even see their desktop? Occasionally, I still have bad dreams about such things. In many ways, the \u201cold days\u201d were not that \u201cgood.\u201d<\/p>\n<h3>4\/ Remote Monitoring and Management RMM Software<\/h3>\n<p>This tool improves on the functionality of some of the older tools.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\" target=\"_blank\" rel=\"noopener\">Remote monitoring and management<\/a>\u00a0of machines and networks is done via a small piece of software\u2014an \u201cagent\u201d\u2014that is loaded onto each endpoint. These agents resemble daemons and services in that they run in the background and perform certain actions at predefined times or in response to certain events. They differ from traditional daemons and services in that they also interact and remotely connect to a controlling terminal. From this terminal I can monitor all the functions of the remote networks and computers without leaving my desk. This enables me to remotely track network and device health, as well as respond to alerts with maintenance activities, software installs, and updates. Priceless!<\/p>\n<h3>5\/ Mobile Device Management Software<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/MDM.jpg\" alt=\"MDM.jpg\" width=\"404\" height=\"200\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>As the name implies, Mobile Device Management\u00a0(MDM) is for the administration of devices like smart phones, tablet computers, and laptops. It is another agent-based tool that someday may become a standard component of RMM. However, today it is usually implemented as a related but separate tool. With the business trend of BYOD (bring your own device) we need some way to secure the data on personal as well as company-owned mobile devices. In the case of laptops we use this software to enforce connectivity through the VPN, encrypt the entire hard drive, deliver antivirus updates (something I could also do with RMM), and also to facilitate a remote wipe of the device in case it is lost or stolen. On smart phones (the most common BYOD) it additionally separates the user\u2019s personal apps from the secure browser, secure company email, and the associated encrypted business data via \u201ccontainerization.\u201d It can do a whole lot more, but those functions suit our business needs.<\/p>\n<h3>Where to Go to Get These Tools<\/h3>\n<p>SolarWinds has excellent implementations of many of these essential tools. Their\u00a0<a class=\"ext\" href=\"http:\/\/www.solarwinds.com\/network-management-software\" target=\"_blank\" rel=\"noopener noreferrer\">network monitoring software<\/a>\u00a0has been industry leading since its release in 2001. Add to that the array of products available through\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/\">SolarWinds MSP<\/a>\u00a0like\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\">SolarWinds RMM<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/msp-anywhere\">MSP Anywhere<\/a>.<\/p>\n<p>So, what\u2019s in your toolkit?<\/p>\n<p><em>Dan Toth is the IT administrator for a community of 200 end-users who serve in the government healthcare sector. He has been working in the field of IT since 1995. He has variously worked as a technician, administrator, manager, and educator. Prior to returning to active network management two years ago, he worked developing degree programs and curriculum in computer technology for career colleges in Pennsylvania.<\/em><\/p>\n<p><strong>For more suggestions on what to keep in your tool box, check on our previous\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/whats-your-toolbox-essential-tools-msps-and-it-technicians\" target=\"_blank\" rel=\"noopener\">blog from Ian Waters<\/a><\/strong><\/p>\n<p>By Dan Toth<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In another part of our occasional series on tools, IT admin and writer Dan Toth takes us through the contents of his toolbox.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5769","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What&#039;s in your toolbox (part 2): essential tools for MSPs and IT Admins - N-able<\/title>\n<meta name=\"description\" content=\"In another part of our occasional series on tools, IT admin and writer Dan Toth takes us through the contents of his toolbox.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s in your toolbox (part 2): essential tools for MSPs and IT Admins - N-able\" \/>\n<meta property=\"og:description\" content=\"In another part of our occasional series on tools, IT admin and writer Dan Toth takes us through the contents of his toolbox.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-17T20:08:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-07T21:38:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"What&#8217;s in your toolbox (part 2): essential tools for MSPs and IT Admins\",\"datePublished\":\"2017-05-17T21:08:31+01:00\",\"dateModified\":\"2021-04-07T21:38:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins\"},\"wordCount\":834,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg\",\"articleSection\":[\"Best Practices\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins\",\"name\":\"What's in your toolbox (part 2): essential tools for MSPs and IT Admins - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg\",\"datePublished\":\"2017-05-17T21:08:31+01:00\",\"dateModified\":\"2021-04-07T21:38:17+00:00\",\"description\":\"In another part of our occasional series on tools, IT admin and writer Dan Toth takes us through the contents of his toolbox.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Best Practices\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/best-practices\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&rsquo;s in your toolbox (part 2): essential tools for MSPs and IT Admins\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What's in your toolbox (part 2): essential tools for MSPs and IT Admins - N-able","description":"In another part of our occasional series on tools, IT admin and writer Dan Toth takes us through the contents of his toolbox.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins","og_locale":"es_ES","og_type":"article","og_title":"What's in your toolbox (part 2): essential tools for MSPs and IT Admins - N-able","og_description":"In another part of our occasional series on tools, IT admin and writer Dan Toth takes us through the contents of his toolbox.","og_url":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2017-05-17T20:08:31+00:00","article_modified_time":"2021-04-07T21:38:17+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"What&#8217;s in your toolbox (part 2): essential tools for MSPs and IT Admins","datePublished":"2017-05-17T21:08:31+01:00","dateModified":"2021-04-07T21:38:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins"},"wordCount":834,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg","articleSection":["Best Practices"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins","url":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins","name":"What's in your toolbox (part 2): essential tools for MSPs and IT Admins - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg","datePublished":"2017-05-17T21:08:31+01:00","dateModified":"2021-04-07T21:38:17+00:00","description":"In another part of our occasional series on tools, IT admin and writer Dan Toth takes us through the contents of his toolbox.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2017\/05\/Network_management.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/whats-your-toolbox-part-2-essential-tools-msps-and-it-admins#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Best Practices","item":"https:\/\/www.n-able.com\/es\/blog\/category\/best-practices"},{"@type":"ListItem","position":2,"name":"What&rsquo;s in your toolbox (part 2): essential tools for MSPs and IT Admins"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5769"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5769\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}