{"id":54860,"date":"2016-10-28T21:05:23","date_gmt":"2016-10-28T21:05:23","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=54860"},"modified":"2016-10-28T21:05:23","modified_gmt":"2016-10-28T21:05:23","slug":"blocking-ransomware-scripts-exchange-transport-rules","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/","title":{"rendered":"Blocking Ransomware Scripts with Exchange Transport Rules"},"content":{"rendered":"<p><span style=\"color: #000000; font-family: Calibri;\">One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts. These scripts are often VBScript (.vbs), Windows Script Files (wsf), or JavaScript (.js) files, and when executed, will download a DLL or EXE to spawn the infection.<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-54861 size-full\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/dodi-transport-rules.png\" alt=\"dodi-transport-rules\" width=\"705\" height=\"236\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/dodi-transport-rules.png 705w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/dodi-transport-rules-300x100.png 300w\" sizes=\"(max-width: 705px) 100vw, 705px\" \/><\/p>\n<p style=\"text-align: center;\"><em>An example JavaScript which downloads and executes ransomware<\/em><\/p>\n<p>One way to prevent these scripts from ever getting into your users\u2019 inboxes, is by creating an Exchange Transport Rule. These rules allow you to inspect the email attachment, prior to delivering the message to the intended recipient. If the condition matches, you can immediately delete the email.<\/p>\n<p><strong>For Exchange 2007, 2010, or SBS 2011<\/strong><\/p>\n<p>To create the rule, Open the Exchange Management Console and navigate to Organization Configuration &gt; Hub Transport and click on the Transport Rules Tab. Select \u201cNew Transport Rule\u201d and give it a name. Add a comment so that you know what this rule is blocking.<\/p>\n<p>In the conditions step, select \u201cwhen any attachment file name matches text patterns\u201d. Click the Text Patterns link. Type in .vbs then press the add button. Do the same for wsf and for js. While you are at it, you can also add .vb, .hta, .exe, .bat, and .scr to the list.<\/p>\n<p>After creating the extensions list, select \u201cDelete the message without notifying anyone\u201d.<\/p>\n<p><strong>For Exchange 2013<\/strong><\/p>\n<p>If you are using Exchange 2013, you can go to the Exchange Admin Center &gt; Mail flow &gt; Rules. \u00a0When you create a new rule, you can see the full list of attachment-related conditions by clicking More options &gt; Any attachment under Apply this rule if. Add the same list of extensions (.vbs, .wsf, .js, .vb, .hta, .exe., bat, and .scr) You will need to define an action to take on mail, if the conditions are met.<\/p>\n<p>These instructions will only work if you are running Exchange. If your company uses another mail handling application, consult the user guide on how to filter based off of extensions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts. These scripts are often VBScript (.vbs), Windows Script Files (wsf), or JavaScript (.js) files, and when executed, will download a DLL or EXE to spawn the infection. An example JavaScript which downloads and executes [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":53224,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,5000,4987,183],"tags":[5079,4363,5080],"class_list":["post-54860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-ransomwarewar","category-spiceworks","category-tips","tag-blocking-ransomware","tag-ransomware","tag-scripts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Blocking Ransomware Scripts with Exchange Transport Rules<\/title>\n<meta name=\"description\" content=\"One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blocking Ransomware Scripts with Exchange Transport Rules\" \/>\n<meta property=\"og:description\" content=\"One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-28T21:05:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"160\" \/>\n\t<meta property=\"og:image:height\" content=\"160\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dodi Glenn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dodi Glenn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/\"},\"author\":{\"name\":\"Dodi Glenn\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/48ddc92048489e51436331f82e991e37\"},\"headline\":\"Blocking Ransomware Scripts with Exchange Transport Rules\",\"datePublished\":\"2016-10-28T21:05:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/\"},\"wordCount\":332,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-1.jpg\",\"keywords\":[\"blocking ransomware\",\"ransomware\",\"scripts\"],\"articleSection\":[\"Ransomware\",\"RansomwareWar\",\"SpiceWorks\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/\",\"name\":\"Blocking Ransomware Scripts with Exchange Transport Rules\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-1.jpg\",\"datePublished\":\"2016-10-28T21:05:23+00:00\",\"description\":\"One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomware-1.jpg\",\"width\":160,\"height\":160},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/blocking-ransomware-scripts-exchange-transport-rules\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blocking Ransomware Scripts with Exchange Transport Rules\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/48ddc92048489e51436331f82e991e37\",\"name\":\"Dodi Glenn\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/dodig\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Blocking Ransomware Scripts with Exchange Transport Rules","description":"One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/","og_locale":"en_US","og_type":"article","og_title":"Blocking Ransomware Scripts with Exchange Transport Rules","og_description":"One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts...","og_url":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-10-28T21:05:23+00:00","og_image":[{"width":160,"height":160,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-1.jpg","type":"image\/jpeg"}],"author":"Dodi Glenn","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Dodi Glenn","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/"},"author":{"name":"Dodi Glenn","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/48ddc92048489e51436331f82e991e37"},"headline":"Blocking Ransomware Scripts with Exchange Transport Rules","datePublished":"2016-10-28T21:05:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/"},"wordCount":332,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-1.jpg","keywords":["blocking ransomware","ransomware","scripts"],"articleSection":["Ransomware","RansomwareWar","SpiceWorks","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/","url":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/","name":"Blocking Ransomware Scripts with Exchange Transport Rules","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-1.jpg","datePublished":"2016-10-28T21:05:23+00:00","description":"One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-1.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomware-1.jpg","width":160,"height":160},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/blocking-ransomware-scripts-exchange-transport-rules\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Blocking Ransomware Scripts with Exchange Transport Rules"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/48ddc92048489e51436331f82e991e37","name":"Dodi Glenn","url":"https:\/\/www.pcmatic.com\/blog\/author\/dodig\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/54860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=54860"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/54860\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53224"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=54860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=54860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=54860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}