{"id":5109,"date":"2020-04-22T23:56:52","date_gmt":"2020-04-22T22:56:52","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5109"},"modified":"2021-03-31T23:59:03","modified_gmt":"2021-03-31T22:59:03","slug":"what-is-edr-endpoint-detection-and-response","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response","title":{"rendered":"What is EDR (Endpoint Detection and Response)?"},"content":{"rendered":"<p>Ransomware, malware, phishing, and spear phishing\u2014all clear and present dangers to your customers\u2019 networks, businesses, and personally identifiable information (PII). And now, these attacks are preying on people\u2019s fear, uncertainty, and doubt surrounding the rise of COVID-19.<\/p>\n<p>How do you secure those networks in the face of an ever-changing environment? Perhaps your best defense is one you may not be overly familiar with:<b>\u00a0<\/b><a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\">Endpoint Detection and Response<\/a><b>\u00a0<\/b>(EDR). Anton Chauvin of Gartner originated the term, using it to describe\u00a0<a class=\"ext\" href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/history-edr\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cthis family of new tools focused on visibility, and from prevention to detection for the endpoint.\u201d<\/a><\/p>\n<p>So, what is EDR? It\u2019s a multifaceted solution that does everything modern managed antivirus (AV) can do, but takes things a step further\u2014providing greater security and (most importantly) peace of mind. These include, but are not limited to:<\/p>\n<ul>\n<li>Monitoring<\/li>\n<li>Threat detection<\/li>\n<li>Whitelisting\/blacklisting<\/li>\n<li>Threat response<\/li>\n<li>Integration with other cybersecurity solutions<\/li>\n<\/ul>\n<p>Let\u2019s take a closer look at this new weapon made for your cybersecurity arsenal.<\/p>\n<h3><b>EDR\u2019s place in the cybersecurity universe<\/b><\/h3>\n<p>EDR centers on protecting endpoints. Given the number of threats that spawn daily, antivirus and other point solutions can make managing large numbers of endpoints difficult. When we talk about traditional managed antivirus (MAV), it&rsquo;s typically from a passive standpoint. MAV can only detect and quarantine known threats\u2014those that have been previously identified. Therein lies the rub\u2014MAV requires regular signature updates. This means there is often a gap in coverage between when a virus is discovered and when your customers become protected. Plus, threats that haven\u2019t yet been discovered can operate in the wild before you can even get an update.<em>\u00a0It\u2019s a reactive approach with proactive intent.\u00a0<\/em><\/p>\n<p>In contrast, EDR is proactive. Comprised of monitoring software and endpoint agents,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/edr-solutions\">EDR solutions<\/a>\u00a0use integrated machine learning and advanced artificial intelligence (AI) to identify suspicious behaviors and address them regardless of whether or not there\u2019s a signature. For example, if several files change at the same time, chances are it\u2019s more likely a result of an endpoint assault rather than user error.<\/p>\n<h3><b>The only constant is change<\/b><\/h3>\n<p>Think about it\u2014the world is in a constant state of flux, and technology is no different. The cloud has changed everything, from the rise of ecommerce to enterprise-based solutions that billions of individuals rely on daily. But with progress comes inevitable roadblocks, and for the cloud, we must focus on intent\u2014specifically those who look to profit from it in harmful ways. Data is arguably your customers\u2019 greatest asset\u2014so how do you help safeguard that asset?<\/p>\n<h3><b>AI to the rescue<\/b><\/h3>\n<p>For the moment, let\u2019s focus on the positives that have come about with the rise of machine learning. If we look at the benefits of AI for EDR, the core benefit is advanced technology, which allows it to recognize and deal with advanced threats. This is where EDR excels\u2014asking questions like:<\/p>\n<ul>\n<li>Has this endpoint performed this activity before?<\/li>\n<li>Does this file or behavior exhibit unusual patterns?<\/li>\n<li>Why are secured files being looked at or hit?<\/li>\n<\/ul>\n<p>Advanced polymorphic viruses (those that can generate modified versions of themselves to counter detection) and zero-day threats (which target and exploit a previously unknown vulnerability) fall into the above line of questioning. EDR not only asks these questions, it also provides the answers we need to address the threats\u2014with options to kill, quarantine, remediate, and rollback.<\/p>\n<h3><b>Ransomware realities<\/b><\/h3>\n<p>No doubt you\u2019ve heard of ransomware. Someone opens an attachment or email, or visits a webpage with malicious script, and they\u2019re greeted with a notification that all their files are encrypted. The cybercriminal will only return their files after they pay a princely sum in Bitcoin \u2013except there is no guarantee they will get their data back. Many corporations are unwilling to risk paying a ransom because of this lack of a guarantee.<\/p>\n<p>It can happen to anyone, and the facts are staggering:<\/p>\n<ul>\n<li>Businesses experienced an average of\u00a0<a class=\"ext\" href=\"https:\/\/www.coveware.com\/blog\/2020\/1\/22\/ransomware-costs-double-in-q4-as-ryuk-sodinokibi-proliferate\" target=\"_blank\" rel=\"noopener noreferrer\">16.2 days<\/a>\u00a0of downtime at the end of 2019 due to ransomware<\/li>\n<li><a class=\"ext\" href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\">One business will be hit every 11 seconds<\/a>\u00a0by a ransomware attack by 2021, according to some predictions<\/li>\n<li>The predicted cost of damages due to ransomware in 2021 is\u00a0<a class=\"ext\" href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\">$20 billion<\/a><\/li>\n<\/ul>\n<h3><b>The solution we need, before we know we need it<\/b><\/h3>\n<p>When an endpoint agent discovers a threat, EDR springs into action via the central monitoring system. The central monitoring system analyzes and correlates threats. Depending on which EDR solution you use, you can even visually trace the genesis of the threat and its path to the endpoint as\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/security\" target=\"_blank\" rel=\"noopener\">SolarWinds<sup>\u00ae<\/sup>\u00a0EDR<\/a>\u00a0does. While MAV and disk encryption are valid ways to secure your endpoints, EDR offers capabilities that help futureproof your users\u2019 machines. These include near real-time file analysis and alerts, detailed forensics, offline protection, the ability to disconnect from the network to help prevent further spread, and the killer feature\u2014infected file rollback.<\/p>\n<h3><b>Like it never happened<\/b><\/h3>\n<p>Rollback is where an MSP can offer the greatest value to their clients. This feature uses advanced technology to take \u201csnapshots\u201d of the endpoint at regular intervals (set at the administrator\u2019s discretion). If ransomware hits, it only takes a few clicks to roll back the endpoint disk image to a previous point in time, saving the company significant time and money Can you really put a price on that kind of peace of mind?<\/p>\n<h3><b>Deployment considerations\u00a0<\/b><\/h3>\n<p>Before you deploy EDR, you should consider your own capabilities. This enhanced functionality brings a bit more complexity, so SMBs and IT pros should consider their resources before deploying.<\/p>\n<p>As we\u2019ve mentioned before, EDR is not the only way to secure an endpoint. Look at your data and the use case for each employee. While EDR is perfect for someone who manages sensitive human resource data (such as payroll and PII), it may not be necessary for someone who simply stores personal files in the cloud or has a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/backup\/use-cases\/endpoint-backup\">solid backup client<\/a>\u00a0combined with disk encryption and MAV. One size does not fit all.<\/p>\n<h3><b>The final word<\/b><\/h3>\n<p>You have options\u2014not just to deploy EDR or stick with more traditional systems, but among potential vendors. You should thoroughly consider the strengths and weaknesses of every angle.<\/p>\n<p>At the end of the day, EDR requires an agent to run on each endpoint. SolarWinds MSP offers options for Windows, Mac, and Linux, as well as integration with our existing\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\">SolarWinds<sup>\u00a0<\/sup>N&#8209;central<sup>\u00ae<\/sup><\/a>\u00a0monitoring platform. Don\u2019t forget, a solid layered approach to network security is recommended so make sure to patch and back up regularly.<\/p>\n<p>I hope you\u2019ve enjoyed this introduction to EDR. Join me next month for a deeper dive into the differences between MAV and EDR.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As an MSP, how do you secure your customers\u2019 networks against a growing tide of cyberattacks? Find out about the role endpoint detection and response can play in protecting your&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5109","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is EDR (Endpoint Detection and Response)? - N-able<\/title>\n<meta name=\"description\" content=\"As an MSP, how do you secure your customers\u2019 networks against a growing tide of cyberattacks? Find out about the role endpoint detection and response can play in protecting your networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is EDR (Endpoint Detection and Response)? - N-able\" \/>\n<meta property=\"og:description\" content=\"As an MSP, how do you secure your customers\u2019 networks against a growing tide of cyberattacks? Find out about the role endpoint detection and response can play in protecting your networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-22T22:56:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-31T22:59:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"What is EDR (Endpoint Detection and Response)?\",\"datePublished\":\"2020-04-22T23:56:52+01:00\",\"dateModified\":\"2021-03-31T22:59:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response\"},\"wordCount\":1117,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response\",\"name\":\"What is EDR (Endpoint Detection and Response)? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-04-22T23:56:52+01:00\",\"dateModified\":\"2021-03-31T22:59:03+00:00\",\"description\":\"As an MSP, how do you secure your customers\u2019 networks against a growing tide of cyberattacks? Find out about the role endpoint detection and response can play in protecting your networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is EDR (Endpoint Detection and Response)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is EDR (Endpoint Detection and Response)? - N-able","description":"As an MSP, how do you secure your customers\u2019 networks against a growing tide of cyberattacks? Find out about the role endpoint detection and response can play in protecting your networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response","og_locale":"fr_FR","og_type":"article","og_title":"What is EDR (Endpoint Detection and Response)? - N-able","og_description":"As an MSP, how do you secure your customers\u2019 networks against a growing tide of cyberattacks? Find out about the role endpoint detection and response can play in protecting your networks.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-04-22T22:56:52+00:00","article_modified_time":"2021-03-31T22:59:03+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"What is EDR (Endpoint Detection and Response)?","datePublished":"2020-04-22T23:56:52+01:00","dateModified":"2021-03-31T22:59:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response"},"wordCount":1117,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response","url":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response","name":"What is EDR (Endpoint Detection and Response)? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-04-22T23:56:52+01:00","dateModified":"2021-03-31T22:59:03+00:00","description":"As an MSP, how do you secure your customers\u2019 networks against a growing tide of cyberattacks? Find out about the role endpoint detection and response can play in protecting your networks.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/what-is-edr-endpoint-detection-and-response#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"What is EDR (Endpoint Detection and Response)?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=5109"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5109\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=5109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}