{"id":5082,"date":"2019-03-08T23:15:12","date_gmt":"2019-03-08T23:15:12","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5082"},"modified":"2021-03-31T23:18:50","modified_gmt":"2021-03-31T22:18:50","slug":"microsoft-365-email-best-practices","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices","title":{"rendered":"The Top 5 Microsoft 365 Email Security Best Practices"},"content":{"rendered":"<p>How good is your Microsoft 365 email security? Every company that uses this popular suite of cloud-based productivity applications should be asking themselves this question. Cloud-based services are also vulnerable to malware insertion, and\u00a0<a class=\"ext\" href=\"https:\/\/www.darkreading.com\/attacks-breaches\/most-malware-arrives-via-email\/d\/d-id\/1333023\" target=\"_blank\" rel=\"noopener noreferrer\">email is the most common entry point for malware<\/a>. It should, therefore, be a priority for MSPs that their clients know and enforce some Microsoft 365 email security best practices.<\/p>\n<p><b>Is Microsoft 365 secure?\u00a0<\/b><\/p>\n<p>That isn\u2019t to say that Microsoft\u2019s service is somehow inherently insecure\u2014on the contrary, the company takes\u00a0<a class=\"ext\" href=\"https:\/\/sharegate.com\/blog\/office-365-data-protection-infographic\" target=\"_blank\" rel=\"noopener noreferrer\">uniquely stringent security precautions<\/a>. For example, it won\u2019t publicly disclose the location of its physical servers, making it known only that the area is under tight surveillance at all times. It also offers encryption for data both at rest and in motion, going above and beyond what other cloud platforms provide to ensure your network transmissions aren\u2019t intercepted.<\/p>\n<p><b>Does Microsoft 365 include antivirus, anti-spam (AVAS) protection?\u00a0<\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png\" alt=\"\" width=\"439\" height=\"220\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Exchange Online Protection is the built-in antivirus for Microsoft 365 security, guarding inboxes against spam, viruses, and known malware. This provides a basic layer for email safeguarding. But even with Microsoft covering the back end, there\u2019s still plenty that hackers can do to seize user data and introduce harmful malware onto the network if users aren\u2019t actively working to secure their platform. If you\u2019re looking to take your business clients beyond the basics of stronger passwords and two-factor authentication, we\u2019ve compiled a list of best practices for Microsoft 365 email security that should help leave you well prepared for the growing threats that enterprises face today from malware and data exposure.<\/p>\n<p><b>1. Use Microsoft 365 Secure Score<\/b><\/p>\n<p>If you haven\u2019t checked out Microsoft 365\u2019s suite of out-of-the-box security tools or read\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/office-365-security-scorecard\" target=\"_blank\" rel=\"noopener\">our blog<\/a>\u00a0on the subject, you may not have ever used Microsoft 365 Secure Score. The tool uses advanced analytics to recommend actions you can take to keep digital assets safer. It\u2019s a great example of gamification, taking the complex work of cybersecurity and turning it into an intuitive and engaging app that allows the user to slowly but surely improve their security stance.<\/p>\n<p>The system gives you a \u201cscore\u201d out of 452, though the goal isn\u2019t necessarily to get as many points as possible. Secure Score recommends reaching a \u201cbalanced\u201d score between 254 and 372 that indicates you do enough to secure your email data, but not so much that it unnecessarily impacts productivity. Secure Score takes into account security needs, settings and recent activity, and current Microsoft services in order to recommend the practices best suited for the enterprise.<\/p>\n<p><b>2. Block attachments used for malware<\/b><\/p>\n<p>Again, Microsoft 365 and Microsoft Exchange offer some\u00a0<a class=\"ext\" href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/SecurityCompliance\/\" target=\"_blank\" rel=\"noopener noreferrer\">robust anti-malware capabilities<\/a>\u00a0out of the box, including multiple anti-malware scan engines, real-time threat response, and rapid integration of new patches and malware definitions to respond quickly to new threats. But you can go even further by blocking email attachments of files that are commonly used for malware.<\/p>\n<p>Just sign into the Microsoft 365 Security and Compliance center, look under Threat Management and select Policy, then Anti-Malware. Double-click the default policy, then click Settings. Turn on Common Attachment Types\u2014in the future, you can add or remove attachment types as needed. This step will add another layer of protection for your network in the event that authorized employees are careless about opening suspicious messages.<\/p>\n<p><b>3. Create anti-ransomware mail flow rules<\/b><\/p>\n<p>For improved Microsoft 365 email security, prevent hackers from locking you out of your own data systems and even your devices. You\u2019ll need to create mail flow rules that block attachments commonly used for\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/why-ransomware-business-continuity-issue\" target=\"_blank\" rel=\"noopener\">ransomware<\/a>. Just open the admin center for Exchange, click on Rules under Mail Flow, then click Create a New Rule. You\u2019ll be presented with a wide range of options that allow you to either block emails that could contain ransomware and other malicious code, or to preemptively warn users who receive such emails.<\/p>\n<p>A ransomware attack can be one of the most financially damaging forms of online threat. It\u2019s better to be particularly cautious in this arena and favor stringent rules, rather than leave the door open to emails with malicious code.<\/p>\n<p><b>4.<\/b>\u00a0<b>Implement additional security software<\/b><\/p>\n<p>Businesses serious about safeguarding will want to choose a robust, email-specific tool like SolarWinds\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\" target=\"_blank\" rel=\"noopener\">Mail Assure<\/a>. This cloud-based solution focuses solely on email security, at an affordable per mailbox rate for any businesses of any size. With no additional hardware or maintenance needed, this tool integrates with Microsoft 365 to protect against\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/spam-filtering\">spam<\/a>,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/centrally-managed-antivirus\">viruses<\/a>,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/endpoint-security-software\">malware<\/a>, and\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/spear-phishing-prevention\">phishing<\/a>, using a global threats database to identify even the latest scams.<\/p>\n<p><b>5. Use Office Message Encryption<\/b><\/p>\n<p>Microsoft 365 has Office Message Encryption on as a default. The service encrypts both incoming and outgoing email messages and is fully compatible with the web-based version of Outlook, Gmail, Yahoo!, and other common email platforms. Email message encryption is critical for protection against email-borne malware because it represents the first layer of security, blocking outsiders from viewing message content.<\/p>\n<p>With little exception, the rule at your office should be to use either or both of the two protection options that Office Message Encryption provides when sending an email message: Do Not Forward and Encrypt.<\/p>\n<p><b>Going beyond security basics<\/b><\/p>\n<p>Each of these steps is uniquely important, but the secret to eliminating the threat of malware can\u2019t be boiled down to a one-size-fits-all security posture. Developing a strong policy for safeguarding data and emails on Microsoft 365 will require MSPs to understand each client\u2019s unique security vulnerabilities and acknowledge the impact that certain best practices might have on their productivity. Following best security practices is only the first step toward establishing Microsoft 365 security.<\/p>\n<p>For optimal email security, it\u2019s best to go beyond basic Microsoft 365 functions and consider\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\" target=\"_blank\" rel=\"noopener\">software<\/a>\u00a0that can keep an email server safe in the event of an attack or outage. Security isn\u2019t a single, straightforward process, but a long journey that requires constant vigilance against advancing threats. These first steps will help lay a crucial foundation for companies hoping to remain protected from malware attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is your O365 environment secure? Find tips, tricks, and best practices for securing your Microsoft Office 365 email and data.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5082","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Top 5 Microsoft 365 Email Security Best Practices - N-able<\/title>\n<meta name=\"description\" content=\"Is your O365 environment secure? Find tips, tricks, and best practices for securing your Microsoft Office 365 email and data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Top 5 Microsoft 365 Email Security Best Practices - N-able\" \/>\n<meta property=\"og:description\" content=\"Is your O365 environment secure? Find tips, tricks, and best practices for securing your Microsoft Office 365 email and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T23:15:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-31T22:18:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"The Top 5 Microsoft 365 Email Security Best Practices\",\"datePublished\":\"2019-03-08T23:15:12+00:00\",\"dateModified\":\"2021-03-31T22:18:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices\"},\"wordCount\":1001,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices\",\"name\":\"The Top 5 Microsoft 365 Email Security Best Practices - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png\",\"datePublished\":\"2019-03-08T23:15:12+00:00\",\"dateModified\":\"2021-03-31T22:18:50+00:00\",\"description\":\"Is your O365 environment secure? Find tips, tricks, and best practices for securing your Microsoft Office 365 email and data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Top 5 Microsoft 365 Email Security Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Top 5 Microsoft 365 Email Security Best Practices - N-able","description":"Is your O365 environment secure? Find tips, tricks, and best practices for securing your Microsoft Office 365 email and data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices","og_locale":"it_IT","og_type":"article","og_title":"The Top 5 Microsoft 365 Email Security Best Practices - N-able","og_description":"Is your O365 environment secure? Find tips, tricks, and best practices for securing your Microsoft Office 365 email and data.","og_url":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-03-08T23:15:12+00:00","article_modified_time":"2021-03-31T22:18:50+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"The Top 5 Microsoft 365 Email Security Best Practices","datePublished":"2019-03-08T23:15:12+00:00","dateModified":"2021-03-31T22:18:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices"},"wordCount":1001,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png","articleSection":["Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices","url":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices","name":"The Top 5 Microsoft 365 Email Security Best Practices - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png","datePublished":"2019-03-08T23:15:12+00:00","dateModified":"2021-03-31T22:18:50+00:00","description":"Is your O365 environment secure? Find tips, tricks, and best practices for securing your Microsoft Office 365 email and data.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/_TW_1024x512.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/microsoft-365-email-best-practices#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"The Top 5 Microsoft 365 Email Security Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=5082"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/5082\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=5082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}