{"id":4897,"date":"2019-03-28T16:05:35","date_gmt":"2019-03-28T16:05:35","guid":{"rendered":"https:\/\/www.n-able.com\/?p=4897"},"modified":"2021-04-15T15:44:22","modified_gmt":"2021-04-15T14:44:22","slug":"logging-best-practices","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices","title":{"rendered":"Logging and Monitoring Best Practices"},"content":{"rendered":"<p>Your audit or event log, the document that records significant events in your IT system, can be an invaluable resource in understanding your network\u2014as long as you follow best practices for logging and monitoring. When you\u2019re experiencing a capacity issue, dealing with a cybersecurity threat, or just want to seek out better, more efficient ways of allocating resources and managing your systems, a properly maintained audit log can provide all the answers you need.<\/p>\n<p>The challenge for IT professionals is dealing with a massive trove of different logs that can be about as disparate and distributed as the systems themselves. Maintaining and archiving all this data for years at a time can ironically contribute to the very capacity issues that IT pros would want to use audit logs to solve. Without a clear idea of exactly what information you\u2019re supposed to be storing, you may find that your log data doesn\u2019t give you the insight you need once the time comes to analyze it.<\/p>\n<p>These problems can be easily overcome with a primer on how to create, manage, and analyze audit logs. In this piece, we\u2019ll cover the basics of\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/importance-monitoring-windows-event-logs\" target=\"_blank\" rel=\"noopener\">event log management<\/a>, explain some logging best practices, and answer some frequently asked questions about effective log retention, audit log security, and log storage management.<\/p>\n<h3><b>What information should my audit logs feature?<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg\" alt=\"\" width=\"439\" height=\"217\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Any event in an IT system can be included in an audit log. The needs and risks associated with every application and server instance will differ greatly, and it\u2019s these factors that should determine what information you are continually logging and analyzing. However, it\u2019s safe to say that in almost all scenarios, your audit logs should feature these elements:<\/p>\n<ul>\n<li>User ID<\/li>\n<li>Terminal identity<\/li>\n<li>Log on and log off time and date<\/li>\n<li>Systems, data, applications, files, and networks accessed<\/li>\n<li>Failed attempts to access systems, data, applications, files, and networks<\/li>\n<li>Changes to system configurations and use of system utilities<\/li>\n<li>Alarms and other security events<\/li>\n<li>Activity from cybersecurity tools like the\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/firewall-management-software\">firewall\u00a0<\/a>or\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/server-antivirus-software\">antivirus software<\/a><\/li>\n<\/ul>\n<h3><b>How long should audit logs be kept?<\/b><\/h3>\n<p>The amount of time you should archive event logs depends on the type of log you\u2019re keeping. Your client or organization may have particular requirements and recommendations regarding audit logging, and most forms of logging are subject to regulation. However, if you remain unsure as to how long you should be keeping a given audit log, logging best practices suggest keeping everything for at least one year.<\/p>\n<p>When setting a length of time with\u00a0<a class=\"ext\" href=\"https:\/\/www.loggly.com\/solution\/log-management\/\" target=\"_blank\" rel=\"noopener noreferrer\">event log management<\/a>, it may help to remember that distributed IT networks have significantly changed the practice of audit logging and monitoring. A large enterprise network can feature thousands of server instances or containers, and each of those instances and containers is constantly generating audit logs. As a result, more log data is being created today than ever before. These volumes of data are so massive that companies may reasonably struggle with the question of how to manage and store it all, let alone how to regularly comb through it for important insights about their\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/network-security-scanning-software\">network\u2019s security and performance<\/a>. In order for an enterprise to successfully store all this data for months or a full year, it\u2019s often logistically necessary to use a cloud-based, managed services solution.<\/p>\n<h3><b>What is application logging?\u00a0<\/b><\/h3>\n<p>Just like with any other component of your network, activity within your applications needs to be regularly saved and analyzed. One major difference between an\u00a0<a class=\"ext\" href=\"https:\/\/www.loggly.com\/solution\/application-logging\/\" target=\"_blank\" rel=\"noopener noreferrer\">application log<\/a>\u00a0and other event logs in your IT system, however, is that the log\u2019s format and content are determined by the application rather than your operating system. This is to say, unless you\u2019re developing the application yourself you have little control over what information is featured in log files.<\/p>\n<p>An application normally contains code to write various types of events to an application log file. The log file can reveal message flow issues and application problems. It can also contain information about user and system actions that have occurred. Logged events typically include the following:<\/p>\n<ul>\n<li>Application exceptions<\/li>\n<li>Major events like startups, stops, and restarts, as well as security events.<\/li>\n<li>Error events that prevent the application from starting<\/li>\n<li>Some debug information<\/li>\n<li>SQL logs<\/li>\n<\/ul>\n<h3><b>What is audit logs security?<\/b><\/h3>\n<p>In cybersecurity, we have a number of active protection measures we can take, including antivirus software, some form of user authentication, and firewalls. These tools are at the disposal of network security specialists to prevent unauthorized users or users with malicious intent from stealing or destroying assets within that network, while protecting those who are authorized to use those networks. But what happens when, despite all these measures, an attack occurs? Security professionals can turn to their event logs to search for answers.<\/p>\n<p>When security breaks down and your application or network is compromised, event logging and monitoring can notify you that a problem exists as well as where the breach has occurred, enabling you to stop or limit the damage. It can also help you understand the vulnerabilities that have been exploited by an outside threat so you can attempt to recover or protect that data\u2014or at least do what\u2019s necessary to avoid similar breaches in the future.<\/p>\n<p>But the mere presence of audit logs isn\u2019t sufficient to protect you from cyberattacks, just like security cameras can\u2019t offer you any intelligence if they aren\u2019t trained on the area you\u2019re trying to protect. Here are some logging and monitoring best practices for ensuring that you are not only logging significant IT events, but that you\u2019re doing so in a way that will be easier to assess in the event of a security breach.<\/p>\n<ol>\n<li><b>Automate reviews<\/b>A log management software solution is a necessary tool in any IT manager\u2019s arsenal, but it isn\u2019t enough on its own. Logs must not only be collected but carefully reviewed\u2014and in the case of particularly high-risk applications, these reviews should be automatically conducted on an hourly basis. Ideally,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/threat-monitor\" target=\"_blank\" rel=\"noopener\">the solution you use<\/a>\u00a0to do this would not only detect security threats in logs but deploy automated responses, such as blocking IP addresses, changing privileges, and disabling accounts.<\/li>\n<li><b>Maintain manual administrator logs<\/b>Because administrators have so many more permissions than other users, their accounts must be monitored and protected with more vigilance. These users could exercise caution by manually logging their activities, including the times they logged on and off. These manual logs should be handled and analyzed with special attention if possible.<\/li>\n<li><b>Frequently review fault logs<\/b>Errors reported by servers, applications, or by the people who use them are incredibly vital to the work of troubleshooting. Understanding whether a recurring problem is the result of faulty equipment or user error, for instance, can be incredibly difficult without a well-maintained fault log. Logs for incredibly important and\/or high-risk applications like eCommerce platforms should be reviewed and\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/log-parser-tutorial\" target=\"_blank\" rel=\"noopener\">analyzed every day<\/a>. Other applications and servers can have their fault logs checked every week or so.<\/li>\n<li><b>Create log redundancy<\/b>Cybercriminals will often try to break into your log files in order to delete any evidence of the breach they committed. That\u2019s why it\u2019s important in logging best practices to record logs both locally and to a remote server that will be harder for criminals to access\u2014discrepancy between the two files will trigger an alarm and prevent a breach from going unnoticed.<\/li>\n<li><b><b>Make sure system clocks are synchronized<\/b><\/b>In the world of forensics, understanding the exact order of events is essential to piecing together an accurate account of what crimes were committed and by whom. Doing that becomes very difficult if the clock on a particular device is inaccurate, even if it\u2019s only by a minute or two. Regularly check the clocks of all devices in a system to ensure they\u2019re all in sync.<\/li>\n<\/ol>\n<h3><b>What is unique about the Security Log in Windows?\u00a0<\/b><\/h3>\n<p>Microsoft offers an activity log specifically for the purposes of detecting attempts at unauthorized access. While the operating system uses its own criteria for determining what events are significant enough to record in the Security Log, administrators have the ability to configure the tool to include any operating system activity they choose.<\/p>\n<p>The problem is that these specific event log management policies have also become a popular target among hackers. Because administrators have this ability to configure the Security Log, for example, it\u2019s very common for attackers to attempt to compromise administrator accounts and tamper with these records, prompting many companies to create redundancy in their logging as recommended above. Similarly, because the\u00a0<a class=\"ext\" href=\"https:\/\/www.loggly.com\/solution\/security-log-analysis\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security Log<\/a>\u00a0can only hold a certain number of events, hackers will sometimes try to overload the system by generating so many events that incriminating evidence is overwritten.<\/p>\n<h3><b>Going forward<\/b><\/h3>\n<p>These best practices represent a good start, but as we\u2019ve covered here, there\u2019s simply too much information to analyze without the help of an effective tool. IT pros looking to leverage all their audit log data should turn to a solution that\u2019s capable of both helping to demonstrate\u00a0 compliance as well as responding to security threats as they\u2019re detected in activity log data. SolarWinds<sup>\u00ae\u00a0<\/sup><a href=\"https:\/\/www.solarwindsmsp.com\/products\/threat-monitor\" target=\"_blank\" rel=\"noopener\">Threat Monitor<\/a>\u00a0takes the guesswork out of logging and monitoring. The platform provides a single, holistic view so you can better examine the disparate event logs across network infrastructure. This solution keeps logs for a full year and can analyze thousands of logs quickly, comparing incidents with known threat intelligence. With a solution created with best practices in mind, your clients can rest assured that you are helping to keep their business networks secure.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your audit or event log, the document that records significant events in your IT system, can be an invaluable resource in understanding your network\u2014as long as you follow best practices&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4897","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Logging &amp; Event Log Management Best Practices - N-able<\/title>\n<meta name=\"description\" content=\"Read about logging best practices to ensure that you efficiently retrieve and archive event logs to manage your network and users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logging &amp; Event Log Management Best Practices - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about logging best practices to ensure that you efficiently retrieve and archive event logs to manage your network and users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-28T16:05:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-15T14:44:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Logging and Monitoring Best Practices\",\"datePublished\":\"2019-03-28T16:05:35+00:00\",\"dateModified\":\"2021-04-15T14:44:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices\"},\"wordCount\":1608,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices\",\"name\":\"Logging & Event Log Management Best Practices - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg\",\"datePublished\":\"2019-03-28T16:05:35+00:00\",\"dateModified\":\"2021-04-15T14:44:22+00:00\",\"description\":\"Read about logging best practices to ensure that you efficiently retrieve and archive event logs to manage your network and users.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Logging and Monitoring Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Logging & Event Log Management Best Practices - N-able","description":"Read about logging best practices to ensure that you efficiently retrieve and archive event logs to manage your network and users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices","og_locale":"fr_FR","og_type":"article","og_title":"Logging & Event Log Management Best Practices - N-able","og_description":"Read about logging best practices to ensure that you efficiently retrieve and archive event logs to manage your network and users.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-03-28T16:05:35+00:00","article_modified_time":"2021-04-15T14:44:22+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Logging and Monitoring Best Practices","datePublished":"2019-03-28T16:05:35+00:00","dateModified":"2021-04-15T14:44:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices"},"wordCount":1608,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg","articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices","url":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices","name":"Logging & Event Log Management Best Practices - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg","datePublished":"2019-03-28T16:05:35+00:00","dateModified":"2021-04-15T14:44:22+00:00","description":"Read about logging best practices to ensure that you efficiently retrieve and archive event logs to manage your network and users.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logging%20body%20pic.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/logging-best-practices#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Logging and Monitoring Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/4897","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=4897"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/4897\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=4897"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}