{"id":4530,"date":"2016-11-04T11:35:33","date_gmt":"2016-11-04T06:05:33","guid":{"rendered":"http:\/\/www.vyapin.com\/blog\/?p=4530"},"modified":"2021-05-12T08:08:46","modified_gmt":"2021-05-12T08:08:46","slug":"auditing-your-office-365-for-potential-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.vyapinsoftware.com\/blog\/auditing-your-office-365-for-potential-security-vulnerabilities","title":{"rendered":"Office 365 Security Audit \u2013 How to Identify Your Internal Threats?"},"content":{"rendered":"<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/slider-145-1.jpg\" data-lbwps-width=\"1024\" data-lbwps-height=\"512\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/slider-145-1-300x150.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4704 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/slider-145-1.jpg\" alt=\"Auditing Your Office 365 For Potential Security Vulnerabilities\" width=\"1024\" height=\"512\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/slider-145-1.jpg 1024w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/slider-145-1-300x150.jpg 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/slider-145-1-768x384.jpg 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/slider-145-1-624x312.jpg 624w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>It is a well-known fact that a significant number of Enterprise <a href=\"https:\/\/www.vyapinsoftware.com\/blog\/office-365-security-best-practices-monitor-your-internal-threats\"><strong>security breaches happen due to internal threats<\/strong><\/a> and Office 365 is no exception to this. And being a cloud environment makes things worse due to access from a variety of locations using a number of different devices. While there may be any number of threat-points in the system, the ones related to users, sharing of users information assets through One Drives, both internal and external, user group memberships, internal sharing of user mailboxes\u00a0 and almost any user related data access are the ones that have the maximum potential to cause security breaches. It is imperative that administrators perform routine scans for such internal threats by performing a security audit related to users in their Office 365 tenants. The personnel in charge of Office 365 Security should document and monitor everything about their Office 365 users \u2013 what access rights they have, who the administrators are, what roles have been assigned to Office 365 users, what permissions have been assigned to shared mailboxes, public folders and so on. For the SharePoint Online environment, everything related to permissions assigned on Sites, Lists, List Items, and Site Groups etc. must be documented and monitored regularly.<\/p>\n<p>Since the use of cloud environment has grown and evolved so much in recent times, your Office 365 tenant is likely to be accessed by more people, from more places and platforms like never before. A comprehensive approach is required for the administrators to protect the organization\u2019s information assets in this environment.<\/p>\n<blockquote><p><strong>Vyapin <a href=\"https:\/\/www.vyapinsoftware.com\/products\/office-365-management-suite\/sharepoint-online-reports\">reporting tool for SharePoint Online<\/a> &amp; Exchange Online <\/strong>\u00a0provides powerful, comprehensive reports and related management features covering all security aspects mentioned above and more.<\/p><\/blockquote>\n<p>Given below is a partial list of this solution\u2019s capabilities to address the needs of Office 365 security administration.<\/p>\n<h2><a href=\"https:\/\/www.vyapinsoftware.com\/office-365\/mailbox-permissions-reports\">Office 365 Security Audit for Exchange Online<\/a><\/h2>\n<h3>Non-Owner Mailbox Access<\/h3>\n<p>This report shows the details about the list of permissions assigned on all the mailboxes in your Office 365 tenant for users who are not the owners of those mailboxes along with the level of permissions assigned to them.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/non-owner-mailbox-access-1.png\" data-lbwps-width=\"940\" data-lbwps-height=\"560\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/non-owner-mailbox-access-1-300x179.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4532 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/non-owner-mailbox-access-1.png\" alt=\"Non owner mailbox access\" width=\"940\" height=\"560\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/non-owner-mailbox-access-1.png 940w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/non-owner-mailbox-access-1-300x179.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/non-owner-mailbox-access-1-768x458.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/non-owner-mailbox-access-1-624x372.png 624w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<h3>Shared Mailbox Access<\/h3>\n<p>One of the most useful and widely used feature in Office 365 is the Shared Mailbox, simply because it comes without costs with the licensing plans. Microsoft allows you to create any number of Shared Mailboxes and you can store up to 10 GB of data in them.<\/p>\n<p>So, it very important to manage these Shared Mailboxes frequently by monitoring the permissions assigned on these mailboxes with level of permissions assigned.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/shared-mailbox-access-1.png\" data-lbwps-width=\"940\" data-lbwps-height=\"560\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/shared-mailbox-access-1-300x179.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4533 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/shared-mailbox-access-1.png\" alt=\"Shared mailbox access\" width=\"940\" height=\"560\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/shared-mailbox-access-1.png 940w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/shared-mailbox-access-1-300x179.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/shared-mailbox-access-1-768x458.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/shared-mailbox-access-1-624x372.png 624w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<h3>Security Impact report for users<\/h3>\n<p>Security Impact report for Users is a report that analyzes the level of impact a user is likely to have with respect to Office 365 security. It shows who has access to which mailboxes and other related information that lets you analyze the security implications of users\u2019 access rights, roles and group memberships within Office 365. This report shows information about Group Membership, <a href=\"https:\/\/www.vyapinsoftware.com\/office-365\/distribution-group-activity-reports\">Distribution Group Membership<\/a>, <a href=\"https:\/\/www.vyapinsoftware.com\/office-365\/role-administration-activity-reports\">Administration Roles<\/a>, Other User Mailbox Access, Shared Mailbox Access, <a href=\"https:\/\/www.vyapinsoftware.com\/office-365\/public-folder-reports\">Public Folder Access<\/a> and Licenses assigned for users. Additionally, it also gives information about users One Drive content. This <a href=\"https:\/\/www.vyapinsoftware.com\/products\/office-365-management-suite\/audit-and-compliance-reports\/\"><strong>Office 365 security report<\/strong><\/a> lets you study the security impact of users and take the required actions when users are provisioned or deprovisioned or when there is a security breach.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/security-impact-report-for-users-1.png\" data-lbwps-width=\"940\" data-lbwps-height=\"560\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/security-impact-report-for-users-1-300x179.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4534 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/security-impact-report-for-users-1.png\" alt=\"security impact report for users\" width=\"940\" height=\"560\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/security-impact-report-for-users-1.png 940w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/security-impact-report-for-users-1-300x179.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/security-impact-report-for-users-1-768x458.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/security-impact-report-for-users-1-624x372.png 624w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<h2><a href=\"https:\/\/www.vyapinsoftware.com\/office-365\/security-reports-for-sharepoint-online\">Office 365 Security Audit for SharePoint Online<\/a><\/h2>\n<h3>Effective Permissions of Sites, Lists and List Items<\/h3>\n<p>As an administrator of your SharePoint Online environment, you may come across a situation when you have to track the permissions assigned on SharePoint objects like Sites, Lists or List Items due to possible data theft, accidental deletions etc. to narrow down the list of users who may be responsible. The administrator will have to review and analyze permissions assigned for all users on SharePoint objects.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-sites-list-and-list-items-1.png\" data-lbwps-width=\"940\" data-lbwps-height=\"560\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-sites-list-and-list-items-1-300x179.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4535 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-sites-list-and-list-items-1.png\" alt=\"effective permissions for sites list and list items\" width=\"940\" height=\"560\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-sites-list-and-list-items-1.png 940w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-sites-list-and-list-items-1-300x179.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-sites-list-and-list-items-1-768x458.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-sites-list-and-list-items-1-624x372.png 624w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<h3>Effective Permissions of Users and Groups<\/h3>\n<p>This <a href=\"https:\/\/www.vyapinsoftware.com\/office-365\/group-reports\">Users and Groups Permissions report<\/a> will display the list of permissions assigned for the selected users \/ groups on Sites, Lists or List items with the level of permissions assigned. This will help administrators to keep track of the user permissions and to monitor indirect permission assignments for users (through groups).<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-users-and-groups-1.png\" data-lbwps-width=\"940\" data-lbwps-height=\"560\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-users-and-groups-1-300x179.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4536 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-users-and-groups-1.png\" alt=\"effective permissions for users and groups\" width=\"940\" height=\"560\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-users-and-groups-1.png 940w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-users-and-groups-1-300x179.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-users-and-groups-1-768x458.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/effective-permissions-for-users-and-groups-1-624x372.png 624w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<h3>OneDrive Security Audit for SharePoint Online<\/h3>\n<p>OneDrive for Business is an integral part of Office 365 or SharePoint Server, and provides place in the cloud where you can\u00a0store, share, and sync your work files. You can update and share your files from any device with OneDrive for Business. You can even work on Office documents with others at the same time.<\/p>\n<p>OneDrive for Business\u00a0is online storage intended for business purposes. Your OneDrive for Business is managed by your organization and lets you share and collaborate on work documents with co-workers. Site collection administrators in your organization control what you can do in the library.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/office-365\/onedrive-reports-for-sharepoint-online\">OneDrive Reports<\/a> shows the list of folders and files to which the selected users has access to. This is a useful feature to check where all a user of interest as access to in One Drive. Something an administrator will find useful in the event of a <a href=\"https:\/\/www.vyapinsoftware.com\/blog\/office-365-security-audit-users-mailboxes-and-one-drive\"><strong>One Drive security breaches<\/strong><\/a>.<\/p>\n<h3>OneDrive User Permissions<\/h3>\n<p>OneDrive User Permissions report shows the list of folders and files in all personal OneDrive sites to which a user has access to. It shows the access rights of the user account to folders and files of other users in their OneDrive sites. This report displays the information such as Account Name, Email Address, Folder or File Name, Object Type, Folder or File URL, Account Type, Permission Type, Permission Level, Author, Editor, Size (in MB).<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-user-permissions-1.png\" data-lbwps-width=\"940\" data-lbwps-height=\"560\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-user-permissions-1-300x179.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4537 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-user-permissions-1.png\" alt=\"onedrive user permissions\" width=\"940\" height=\"560\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-user-permissions-1.png 940w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-user-permissions-1-300x179.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-user-permissions-1-768x458.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-user-permissions-1-624x372.png 624w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<h3>OneDrive Non-Owner Permissions<\/h3>\n<p>OneDrive Non-Owner Permissions report shows the list of users who are not owners but have access to the folders and files within the personal site of a particular user. It displays the users with permissions assigned on folders and files of a personal OneDrive store. Information such as Folder or File Name, Object Type, Folder or File URL, Account Name, Email Address, Account Type, Permission Type, Permission Level, Author, Editor, Size (in MB).<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-non-owner-permissions-1.png\" data-lbwps-width=\"940\" data-lbwps-height=\"560\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-non-owner-permissions-1-300x179.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4538 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-non-owner-permissions-1.png\" alt=\"onedrive non owner permissions\" width=\"940\" height=\"560\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-non-owner-permissions-1.png 940w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-non-owner-permissions-1-300x179.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-non-owner-permissions-1-768x458.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-non-owner-permissions-1-624x372.png 624w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<h3>Site Collection Administrator Access<\/h3>\n<p>Site Collection Administrator Access report shows the list of users who are site collection administrators or site collection owners of the selected OneDrive personal site. Information such as Personal Site of (User), Personal Site Email, Personal Site URL and Site Admin Access.<\/p>\n<p><a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/site-collection-administrator-access-1.png\" data-lbwps-width=\"940\" data-lbwps-height=\"560\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/site-collection-administrator-access-1-300x179.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4539 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/site-collection-administrator-access-1.png\" alt=\"Site collection administrator access\" width=\"940\" height=\"560\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/site-collection-administrator-access-1.png 940w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/site-collection-administrator-access-1-300x179.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/site-collection-administrator-access-1-768x458.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/site-collection-administrator-access-1-624x372.png 624w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<h3>OneDrive Permissions<\/h3>\n<p>OneDrive Permissions report is an OneDrive site-based access rights report that shows the list of users who have access to any particular OneDrive personal site within Office 365. Information such as Personal Site of (User), Personal Site Email, Personal Site URL, User or Group Name, Email Address, Type and Permission Levels.<br \/>\n<a href=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-permissions-1.png\" data-lbwps-width=\"940\" data-lbwps-height=\"560\" data-lbwps-srcsmall=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-permissions-1-300x179.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4540 size-full\" src=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-permissions-1.png\" alt=\"OneDrive permissions\" width=\"940\" height=\"560\" srcset=\"https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-permissions-1.png 940w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-permissions-1-300x179.png 300w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-permissions-1-768x458.png 768w, https:\/\/www.vyapinsoftware.com\/blog\/wp-content\/uploads\/2016\/11\/onedrive-permissions-1-624x372.png 624w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/a><\/p>\n<blockquote><p>To audit your Office 365 environment for any potential Security vulnerabilities, try <strong><a href=\"https:\/\/www.vyapinsoftware.com\/products\/office-365-management-suite\/office-365-reports\">Office 365 reporting tool<\/a>.<\/strong><\/p>\n<h2 style=\"text-align: center;\">Download free trial version of <a href=\"https:\/\/www.vyapinsoftware.com\/products\/office-365-management-suite\/office-365-reports\">Microsoft 365 Reports<\/a> Now!<\/h2>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>It is a well-known fact that a significant number of Enterprise security breaches happen due to internal threats and Office 365 is no exception to this. And being a cloud environment makes things worse due to access from a variety of locations using a number of different devices. While there may be any number of [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4704,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[142],"tags":[35,49,54],"class_list":["post-4530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-office-365-reporting","tag-office-365-auditing","tag-office-365-security-monitor","tag-office-365-vulnerabilities"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/4530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/comments?post=4530"}],"version-history":[{"count":14,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/4530\/revisions"}],"predecessor-version":[{"id":7884,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/4530\/revisions\/7884"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/media\/4704"}],"wp:attachment":[{"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/media?parent=4530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/categories?post=4530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vyapinsoftware.com\/blog\/wp-json\/wp\/v2\/tags?post=4530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}