{"id":30174,"date":"2022-03-11T15:01:56","date_gmt":"2022-03-11T15:01:56","guid":{"rendered":"https:\/\/www.n-able.com\/?p=30174"},"modified":"2022-10-20T18:18:40","modified_gmt":"2022-10-20T17:18:40","slug":"the-myth-of-the-missing-mac-malware-part-1","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1","title":{"rendered":"The Myth of the Missing Mac Malware, part 1"},"content":{"rendered":"<p class=\"p3\">Apple once ran, and caught a reasonable amount of flak for, an ad that implied <a href=\"https:\/\/www.n-able.com\/blog\/macs-dont-get-viruses-and-other-lies?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Macs didn\u2019t get viruses<\/span><\/a>. The PC (John Hodgman) in the ad says there were \u201c114,000 known viruses\u201d for PCs in 2006, to which the Mac (Justin Long) replies, \u201cPCs. Not Macs.\u201d While misleading, it\u2019s technically correct, which may have been sufficient to avoid truth-in-advertising lawsuits.<\/p>\n<p class=\"p3\">Any long-time Mac user, and especially anyone who is used to <a href=\"https:\/\/www.n-able.com\/features\/management-for-mac?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">managing Macs<\/span><\/a> professionally will tell you that yes, Macs get malware.<\/p>\n<p class=\"p3\">To be pedantic, most malware today, regardless of platform, doesn\u2019t fit the definition of a virus. There are worms, trojans, adware, PUPs, RATs, rootkits, macros\u2014while my personal Mac has never been infected by any of these (knock on wood), I made a significant portion of my income as an IT consultant detecting, removing, and preventing such nasty things from taking root on my customers\u2019 Macs.<\/p>\n<p class=\"p3\">That being said, Apple enjoys a significant advantage against Microsoft in the struggle to <a href=\"https:\/\/www.n-able.com\/blog\/how-to-offer-successful-endpoint-security-for-macos?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">secure their respective platforms<\/span><\/a>. In order to maintain that security posture, Mac users are subjected to occasional interruptions and other minor inconveniences. As a trade-off though, the momentary diversion of granting access to an application to use your camera or microphone is preferable to an afternoon spent rooting out and removing spyware.<\/p>\n<h2 class=\"p3\">How Apple protects user data<\/h2>\n<p class=\"p3\">Historically, a contributing factor to Apple\u2019s relative lack of malware was the comparatively small share Macs occupied in the overall personal computer market. Other aspects of Apple\u2019s hardware and software design legacy will be topics for future posts in this series. Before delving into any of those though, I should start by examining what Apple has built into the current macOS to protect its users and their data from harm.<\/p>\n<p class=\"p3\">Securing an operating system against threats goes deeper than software; it starts by securing the hardware. The latest generation of Macs run on an Apple-designed chip, based on the same ARM architecture used in phones, tablets, and, well, pretty much everything that\u2019s not a computer in the traditional sense.<\/p>\n<p class=\"p3\">Built into that processor, the M1, is what\u2019s called the Secure Enclave\u2014what in previous generation Intel Macs was the T2, a separate system-on-a-chip (SoC). This is where any sensitive data resides while the Mac is running, instead of being loaded into RAM or stored unencrypted on disk. This includes biometrics data, the user\u2019s fingerprint, and face scans in the case of iPhones. When you need to authenticate with TouchID for instance, the scan data is sent into the Secure Enclave, where it\u2019s compared against what is stored there. TouchID gets back either a \u201cyes\u201d or \u201cno\u201d so the stored fingerprint never leaves the enclave. The subsystem also provides encrypted output to the OS and apps without exposing the keys used to encrypt the data.<\/p>\n<p class=\"p3\">With processing power dedicated to encryption, the Secure Enclave&rsquo;s AES Engine enables FileVault\u2014built-in disk encryption\u2014to encrypt everything on the internal drive on the fly. (Removable disks are encrypted in a different manner that doesn\u2019t involve the Secure Enclave). Other encryption schemes require the system\u2019s CPU to perform the encoding and decoding and have to balance securing data on the drive with not slowing down operations.<\/p>\n<p class=\"p3\">The actual encryption process combines the user\u2019s authentication information and a unique hardware ID built into the M1, so FileVault volumes can\u2019t easily be removed or cloned to a different machine to decrypt. Even if the user leaves FileVault turned off, the drive data is still encrypted but only with the hardware ID, so the data can only be read by the machine it was originally installed on. Nothing on the drive is readable without unlocking the encryption, including the data necessary to boot the Mac, which causes the \u201cdouble log-in\u201d situation that can catch new Mac users unawares.<\/p>\n<h2 class=\"p3\">Signed, Sealed, Notarized<\/h2>\n<p class=\"p3\">Another source of consternation among Mac newbies is what can sometimes seem like an endless barrage of notifications and requests to approve application permissions.<\/p>\n<p class=\"p3\">Similar to the process that ensures the website you\u2019re logging into is actually the site you expected, apps are \u201csigned\u201d by their developers with certificates that are confirmed by the OS before an app can launch. If the signature says the app on your drive is different from the app that was signed, it won\u2019t open. If the signature itself has been modified, the app won\u2019t run.<\/p>\n<p class=\"p3\">Gatekeeper is the process that checks for signatures and changes to apps as they run and is responsible for those \u201cAre you sure?\u201d dialogs when you open something you\u2019ve downloaded for the first time. It can be set to only allow apps from the App Store to run, only allow signed apps, or turned off entirely.<\/p>\n<p class=\"p3\">To be notarized, an app is submitted to Apple, which scans and confirms it doesn\u2019t do anything malicious. Apple keeps a database of applications that have been notarized and can revoke the notarization \u201cticket\u201d later if something sneaks past. Gatekeeper checks in with Apple periodically to update an internal database of revoked tickets so it can prevent a bad app from launching, even when you\u2019re offline.<\/p>\n<p class=\"p3\">This same paradigm extends to the system\u2019s application firewall, which can be set to only allow network connections to be made by signed and notarized apps.<\/p>\n<p class=\"p3\">In addition to Gatekeeper checking signatures, another process, XProtect, scans each app when it first launches. XProtect is Apple\u2019s built-in signature-based malware scanner, comparing an app against signatures defined by security researchers in the form of \u201cYARA signatures\u201d (<a href=\"https:\/\/virustotal.github.io\/yara\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">https:\/\/virustotal.github.io\/yara\/<\/span><\/a>). In addition to that first-access scan, an app is inspected again if it\u2019s been modified or if the XProtect signatures have been updated since the last scan.<\/p>\n<h2 class=\"p3\">Just what do you think you\u2019re doing, Dave?<\/h2>\n<p class=\"p3\">Providing both fine-grained control of permissions and an endless supply of dialog boxes to click through is the Transparency, Consent, and Control (TCC) system introduced in 2016. TCC is the umbrella under which several subsystems reside that control what the individual apps can and can\u2019t access on the Mac. This includes reading and\/or writing to the user\u2019s desktop or contacts database, among others. The one that causes the most trouble tends to be \u201cScreen Capture\u201d, the ability for an app to record what\u2019s on the user\u2019s screen, typically tripping up using remote screen sharing software. Most TCC settings can be deployed by an admin via Mobile Device Management (MDM), except for screen capture and access to the microphone and camera\u2014for privacy reasons which should be obvious.<\/p>\n<p class=\"p3\">You might think that the database where the TCC preferences are stored would be a primary target for malware authors. And you would be right. Since so much else relies on the TCC database being resistant to tinkering, it\u2019s protected by the cornerstone of macOS\u2019s security: System Integrity Protection (SIP).<\/p>\n<p class=\"p3\">SIP is part of what makes macOS \u201crootless\u201d, meaning that even an admin user can\u2019t modify certain protected files on the system. Only specific apps are entitled to modify system files and that permission is built into the signature of the app\u2014and recall that if the signature is modified, it won\u2019t run. But malware doesn\u2019t need to crack the SIP protections to wreak havoc, which is why Apple has a nuclear option\u2014the pragmatically named Malware Removal Tool (MRT).<\/p>\n<p class=\"p3\">A security update from Apple has the ability to trigger a process to automatically remove an exploit in the wild, even if the malware has made its way past the notarizing scan and XProtect. When the Mac checks for updates\u2014by default, this happens at startup and when the user logs in, and daily while the system is running\u2014if a silent update has been issued, the MRT will take over and do the needful.<\/p>\n<p class=\"p3\">MRT updates don\u2019t involve downloading new signatures or definitions but replace the MRT app itself with a new version capable of detecting a specific set of threats, then nuking them from orbit. This capability was most recently invoked for a widespread and embarrassing Zoom vulnerability in 2019. People who had installed Zoom (even if they had then uninstalled it) were left with a vulnerable web server lurking on their Macs. Zoom issued updates and removal instructions and Mac admins pushed out a fix to their fleets, but even that could only cover devices that were actively managed. Ultimately, Apple was able to quietly ensure the vulnerability was purged from every Mac via an MRT update.<\/p>\n<h2 class=\"p3\">Beware The Nut Behind the Wheel<\/h2>\n<p class=\"p3\">As thorough as all these protections are, they share a single point of failure: the user. Normally, a typical user would never need to adjust or disable the defaults as configured by Apple. But then, when have you ever worked with a \u00ab\u00a0typical\u00a0\u00bb user? Or one that didn&rsquo;t tinker with a perfectly good operating system until something broke? And that&rsquo;s why, even with the Mac&rsquo;s modern security posture, there is still the need for remote management software and MDM. An RMM platform like <a href=\"https:\/\/www.n-able.com\/products\/rmm?promo=blog\" target=\"_blank\" rel=\"noopener\">N&#8209;able RMM<\/a> will alert the Mac&rsquo;s admins when security is out of compliance and automatically remedy the situation. In addition, managing the various profiles and permissions on the Macs in your network with an MDM platform\u2014we call ours Apple Device Management (ADM)\u2014will prevent curious users from making those changes in the first place.<\/p>\n<p class=\"p3\">So, when you click on a file and that annoying popup appears on your screen asking if you\u2019re sure you want to open it, go ahead and roll your eyes. Your Mac is doing what it can to protect you from miscreants and malware, but no security solution can protect you from yourself. That&rsquo;s why MSPs exist.<\/p>\n<h2 class=\"p3\">Resources and further reading<\/h2>\n<ul>\n<li class=\"p4\"><a href=\"http:\/\/apple.com\/security\" target=\"_blank\" rel=\"noopener\">apple.com\/security<\/a><\/li>\n<li class=\"p3\"><a href=\"https:\/\/objective-see.com\/\" target=\"_blank\" rel=\"noopener\">objective-see.com<\/a><\/li>\n<li class=\"p3\"><a href=\"https:\/\/eclecticlight.co\/\" target=\"_blank\" rel=\"noopener\">eclecticlight.co<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In the first part of his blog series looking at Macs and viruses, This blog looks at the persistent protections provided by the Apple platform.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-30174","post","type-post","status-publish","format-standard","hentry","topic-apple","topic-head-nerds"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Myth of the Missing Mac Malware, part 1 - N-able<\/title>\n<meta name=\"description\" content=\"In the first part of this blog series looking at Macs and viruses, we look at the persistent protections provided by the Apple platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Myth of the Missing Mac Malware, part 1 - N-able\" \/>\n<meta property=\"og:description\" content=\"In the first part of this blog series looking at Macs and viruses, we look at the persistent protections provided by the Apple platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-11T15:01:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-20T17:18:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/03\/220926_blogbanner_TheMyth_MissingMacMalware_Part1_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/03\/220926_blogbanner_TheMyth_MissingMacMalware_Part1_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"The Myth of the Missing Mac Malware, part 1\",\"datePublished\":\"2022-03-11T15:01:56+00:00\",\"dateModified\":\"2022-10-20T17:18:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1\"},\"wordCount\":1653,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Head Nerds\",\"Mac Support\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1\",\"name\":\"The Myth of the Missing Mac Malware, part 1 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2022-03-11T15:01:56+00:00\",\"dateModified\":\"2022-10-20T17:18:40+00:00\",\"description\":\"In the first part of this blog series looking at Macs and viruses, we look at the persistent protections provided by the Apple platform.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/head-nerds-fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Myth of the Missing Mac Malware, part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Myth of the Missing Mac Malware, part 1 - N-able","description":"In the first part of this blog series looking at Macs and viruses, we look at the persistent protections provided by the Apple platform.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1","og_locale":"fr_FR","og_type":"article","og_title":"The Myth of the Missing Mac Malware, part 1 - N-able","og_description":"In the first part of this blog series looking at Macs and viruses, we look at the persistent protections provided by the Apple platform.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-03-11T15:01:56+00:00","article_modified_time":"2022-10-20T17:18:40+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/03\/220926_blogbanner_TheMyth_MissingMacMalware_Part1_ss.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/03\/220926_blogbanner_TheMyth_MissingMacMalware_Part1_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"The Myth of the Missing Mac Malware, part 1","datePublished":"2022-03-11T15:01:56+00:00","dateModified":"2022-10-20T17:18:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1"},"wordCount":1653,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Head Nerds","Mac Support"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1","url":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1","name":"The Myth of the Missing Mac Malware, part 1 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2022-03-11T15:01:56+00:00","dateModified":"2022-10-20T17:18:40+00:00","description":"In the first part of this blog series looking at Macs and viruses, we look at the persistent protections provided by the Apple platform.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/the-myth-of-the-missing-mac-malware-part-1#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/head-nerds-fr"},{"@type":"ListItem","position":2,"name":"The Myth of the Missing Mac Malware, part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/30174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=30174"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/30174\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=30174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}