{"id":4978,"date":"2020-06-08T23:33:25","date_gmt":"2020-06-08T22:33:25","guid":{"rendered":"https:\/\/www.n-able.com\/?p=4978"},"modified":"2025-06-25T15:34:39","modified_gmt":"2025-06-25T14:34:39","slug":"7-rules-for-firewall-monitoring-in-your-msp-company","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company","title":{"rendered":"Seven Firewall Monitoring Rules for MSPs"},"content":{"rendered":"<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p>Setting up a firewall is one of the first steps organizations take to establish network security. Firewalls help protect your devices and networks from an array of security threats\u2014including, as a managed services provider (MSP), unauthorized access from outside your customers\u2019 networks. Firewalls are also able to inform you of any potentially threatening attempts to connect from within customer networks.<\/p>\n<p>You should be able to effectively communicate their role to your customers, so they understand their importance. This guide will cover what a firewall is, how they differ from antivirus solutions, and which firewall monitoring rules your MSP should implement.<\/p>\n<h3><b>How does a firewall work?<\/b><\/h3>\n<p>Firewalls are hardware or software solutions that act as a filtration system. A network firewall security system will scan the data packets attempting to enter your computer or network to identify attack vectors or malicious code. If a data packet is flagged as a security risk, the firewall will prevent it from accessing your computer or infiltrating your network.<\/p>\n<p>There are numerous ways of conducting firewall monitoring and regulating your network traffic. These methods include:<\/p>\n<ul>\n<li><strong>Packet filtering:<\/strong>\u00a0When a firewall uses packet filtering, monitoring packets control network access. The firewall will observe the source and destination IP addresses, protocols, and ports, to decide whether to send them through or stop them due to suspected threats.<\/li>\n<li><strong>Proxy servers:<\/strong>\u00a0This firewall monitoring method is designed to be highly secure, although there are some disadvantages. They\u2019re slower than other firewall types and are limited in their support for applications. Instead of filtering, <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-a-proxy-server\"  data-wpil-monitor-id=\"43\">proxy servers<\/a> act as go-betweens. They create a mirror of the computer behind the firewall and prevent connections between incoming packets and the customer device. This helps protect your network from bad actors.<\/li>\n<li><strong>Stateful inspection:<\/strong>\u00a0While packet filtering examines the packet headers, stateful inspection firewalls analyze an array of data packet elements, comparing them with a database of trusted information. Incoming data packets must match with trusted information before the firewall grants them access.<\/li>\n<\/ul>\n<h3><b>The difference between firewall and antivirus<\/b><\/h3>\n<\/div>\n<div class=\"field field--name-field-blog-paragraphs field--type-entity-reference-revisions field--label-hidden field--items\">\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div>\n<div class=\"sidebar-width-40\"><\/div>\n<div class=\"blog-section-content\">\n<p>It\u2019s important to understand the difference between firewalls and antivirus because each is vulnerable to different risks and more effective in different scenarios. Firewalls help control network traffic in the system by acting as a barrier to incoming traffic. A firewall inspects data flowing from the internet to your device.<\/p>\n<p>Antivirus solutions, on the other hand, help protect systems against attacks by identifying malicious files and viruses. Antivirus takes procedural steps to examine malicious programs. They detect, identify, and remove when necessary. Regardless of these differences, both\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/server-antivirus-software\">antivirus software<\/a>\u00a0and firewalls are part of a wider cybersecurity strategy that safeguards IT systems.<\/p>\n<h3><b>Firewall best practices\u00a0<\/b><\/h3>\n<p>To help your MSP refine its\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/firewall-management-software\">firewall management\u00a0<\/a>strategy, these seven firewall monitoring and firewall log monitoring best practices are a great place to start:<\/p>\n<h4>1. TRACK FIREWALL RULE MODIFICATIONS<\/h4>\n<p>This is a firewall monitoring best practice you should adopt within your own organization\u2014but it\u2019s important to encourage customers to adopt this practice as well. Firewalls don\u2019t have change management processes built into them. Because of this, many IT administrators responsible for firewall monitoring and management don\u2019t document rule changes.<\/p>\n<p>But when there\u2019s a new rule change, it can conflict with other rules or business processes\u2014requiring the IT team to review all current rules in a time-consuming attempt to identify the cause of the issue. When rule changes are appropriately tracked on a regular basis, identifying the cause of a conflict is faster and easier\u2014resulting in far less downtime.<\/p>\n<h4>2. MONITOR FOR RULE BLOAT<\/h4>\n<p>As your company grows, you\u2019ll likely change your work processes and tools. As your processes evolve, your approach to firewall rule configurations should too. When you discontinue business processes or resources, firewall rules designed to support them may remain in place. This increases the likelihood of rule conflicts occurring. Firewall monitoring software is the best way for companies to check for old and obsolete rules so they eliminate them. Like rule modifications, you should also make your customers aware of the risk of rule bloat so they can improve their own firewall monitoring strategy.<\/p>\n<h4>3. AUDIT FIREWALL EVENT LOG<\/h4>\n<p>Firewall log monitoring involves periodically\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/logging-best-practices\" target=\"_blog\" rel=\"noopener\">auditing<\/a>\u00a0your event logs to check for changes or anomalies that might indicate your firewall settings have been modified. This practice can help you identify which rules are being triggered most often and which security rules aren\u2019t being triggered at all\u2014which may be cause for rule elimination.<\/p>\n<h4>4. COLLABORATE WITH THE BUSINESS<\/h4>\n<p>Periodically, your firewall manager should meet with the business unit to get updates on the business and its operations. With this insight, firewall managers will be better able to keep pace with important changes and make modifications to rules and settings as needed. If the business unit decides to discontinue a service, for example, the firewall manager might need to adjust the firewall\u2019s settings to\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/network-scanning-software\">optimize network efficiency<\/a>. It\u2019s recommended you hold monthly or quarterly meetings between the firewall manager and the business unit so all parties can be kept aware of relevant changes.<\/p>\n<h4>5. BLOCK TRAFFIC BY DEFAULT<\/h4>\n<p>A common firewall monitoring best practice is to block all the traffic coming into your network by default, and only allow specific traffic to certain known services. This gives you full control over who can access your network and helps prevent security breaches from occurring.<\/p>\n<p>The firewall is your first layer of defense against security threats, so it\u2019s important you restrict the ability to alter configurations to those individuals in your team who require it. Moreover, when an authorized administrator does modify a configuration, this must be recorded in the log to demonstrate compliance and to assist during audits. This also allows your team to rapidly detect unwarranted configuration changes.<\/p>\n<p>To provide various levels of\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/use-cases\/granular-access-control\" target=\"_blank\" rel=\"noopener noreferrer\">granular access<\/a>\u00a0to your IT team, you can create separate user profiles. You should also regularly monitor your firewall logs so you can more easily detect and remediate any unauthorized break-ins.<\/p>\n<h4>6. ESTABLISH A CONFIGURATION CHANGE PLAN<\/h4>\n<p>A firewall isn\u2019t static. It will need you to update or modify it from time to time for any number of reasons. Because of this, you should establish a change management plan. Unplanned configuration changes may leave a loophole in your security, and a change management plan can help prevent this from happening.<\/p>\n<p>A robust and secure firewall change management plan should include a:<\/p>\n<ul>\n<li>Definitions of the required changes and their objectives<\/li>\n<li>List of the risks involved, their potential impacts on the network, and an explanation of the mitigation plan<\/li>\n<li>Structure for the change management workflow between teams<\/li>\n<li>Proper audit trail that accounts for who made each change, why each change was made, and when each change was made<\/li>\n<\/ul>\n<h4>7. TAKE ADVANTAGE OF FIREWALL MONITORING TOOLS<\/h4>\n<p>Although the firewall monitoring best practices mentioned above can all technically be implemented manually, network firewall security is at its best when you\u2019re utilizing the right firewall monitoring software. With so many elements to keep track of, firewall monitoring software can help you proactively monitor the effectiveness of your firewall so you can adjust when necessary.<\/p>\n<p>These tools let you keep track of current rule configurations, event logs, and alerts, giving you more comprehensive insight and control over your firewall. Without a firewall monitoring tool, it can be difficult to make informed decisions about firewall rule configurations. This is especially important when it comes to identifying obsolete firewall rules that need to be removed to avoid firewall bloat.<\/p>\n<h4><b>FIREWALL MONITORING SOFTWARE MADE FOR MSPS<\/b><\/h4>\n<p>If you\u2019re looking for firewall monitoring software that can get you up and running immediately,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm?promo=blog\" target=\"_blog\" rel=\"noopener\">SolarWinds<sup>\u00ae<\/sup>\u00a0Remote Monitoring and Management (RMM)<\/a>\u00a0is the perfect solution for you. This all-in-one tool gives growing MSPs what they need to establish a robust and comprehensive security strategy. RMM helps you secure, maintain, and improve your customers\u2019 IT systems and manage both firewalls and antivirus with ease. What\u2019s more, it gives you access to fast and safe remote access, out-of-the-box monitoring templates, patch management, web protection, data-breach risk intelligence, and backup recovery\u2014all in one centralized dashboard.<\/p>\n<p>If you have a highly diverse customer base and you\u2019re looking for ways to offer powerful customization capabilities,\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/\" target=\"_blog\" rel=\"noopener\">SolarWinds N&#8209;central<sup>\u00ae<\/sup><\/a>\u00a0is likely a better fit for you. The N&#8209;central software\u2019s powerful automation allows you to onboard, configure, and patch hundreds of devices with a rules-based workflow, allowing your technicians to focus on the more difficult tasks that need their attention. It uses advanced security technology to help you protect your customers, resolve issues rapidly with a robust remote support offering, and self-heal to significantly improve customer uptime.<\/p>\n<p>Both RMM and N&#8209;central were designed with MSPs in mind and offer sophisticated and easy-to-use firewall monitoring capabilities for your customers. To learn more, access a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/trial?promo=blog\" target=\"_blog\" rel=\"noopener\">30-day free trial of N&#8209;central here\u00a0<\/a>or a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/trial?promo=blog\" target=\"_blog\" rel=\"noopener\">30-day free trial of RMM here\u00a0<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Setting up a firewall is one of the first steps organizations take to establish network security. Firewalls help protect your devices and networks from an array of security threats\u2014including, as&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-4978","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Seven Firewall Monitoring Rules for MSPs - N-able<\/title>\n<meta name=\"description\" content=\"Find out how firewalls work, read about the difference between firewall and antivirus, and discover the top seven firewall best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seven Firewall Monitoring Rules for MSPs - N-able\" \/>\n<meta property=\"og:description\" content=\"Find out how firewalls work, read about the difference between firewall and antivirus, and discover the top seven firewall best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-08T22:33:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T14:34:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Seven Firewall Monitoring Rules for MSPs\",\"datePublished\":\"2020-06-08T23:33:25+01:00\",\"dateModified\":\"2025-06-25T14:34:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company\"},\"wordCount\":1481,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company\",\"name\":\"Seven Firewall Monitoring Rules for MSPs - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2020-06-08T23:33:25+01:00\",\"dateModified\":\"2025-06-25T14:34:39+00:00\",\"description\":\"Find out how firewalls work, read about the difference between firewall and antivirus, and discover the top seven firewall best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seven Firewall Monitoring Rules for MSPs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Seven Firewall Monitoring Rules for MSPs - N-able","description":"Find out how firewalls work, read about the difference between firewall and antivirus, and discover the top seven firewall best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company","og_locale":"pt_BR","og_type":"article","og_title":"Seven Firewall Monitoring Rules for MSPs - N-able","og_description":"Find out how firewalls work, read about the difference between firewall and antivirus, and discover the top seven firewall best practices.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-06-08T22:33:25+00:00","article_modified_time":"2025-06-25T14:34:39+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Seven Firewall Monitoring Rules for MSPs","datePublished":"2020-06-08T23:33:25+01:00","dateModified":"2025-06-25T14:34:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company"},"wordCount":1481,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company","url":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company","name":"Seven Firewall Monitoring Rules for MSPs - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2020-06-08T23:33:25+01:00","dateModified":"2025-06-25T14:34:39+00:00","description":"Find out how firewalls work, read about the difference between firewall and antivirus, and discover the top seven firewall best practices.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/7-rules-for-firewall-monitoring-in-your-msp-company#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Seven Firewall Monitoring Rules for MSPs"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/4978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=4978"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/4978\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=4978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}