{"id":59722,"date":"2018-10-23T10:08:36","date_gmt":"2018-10-23T15:08:36","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59722"},"modified":"2019-01-22T09:27:35","modified_gmt":"2019-01-22T15:27:35","slug":"remote-desktop-protocol-security","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/","title":{"rendered":"Remote Desktop Protocol Security"},"content":{"rendered":"<h4>What is an RDP Attack?<\/h4>\n<p><a href=\"https:\/\/techtalk.pcpitstop.com\/2018\/09\/13\/rdp-attacks\/\">Remote Desktop Protocol (RDP) attacks<\/a>\u00a0have been a popular way for hackers to breach the security of a device or company network.\u00a0 An RDP attack takes place when an unauthorized person or entity is accessing a network through the device\u2019s RDP ports.\u00a0 The attack is commonly an actual person using brute force to hack into the RDP port, or it could be an automated technology also using brute force to access the RDP port.\u00a0 Brute force is a term used when someone, or something, is guessing user credentials over and over again until they are able to gain access.<\/p>\n<h4>Our Defense \u2014 Disabling Ports<\/h4>\n<p>With\u00a0the addition of our Endpoint Vulnerabilities Report and a new action for Remote Desktop Protocol at the device page, there are several places within PC Matic Pro and MSP to disable RDP ports. In order to disable RDP on a device, it must be online and have a current connection to your management console. You&#8217;ll notice in the Endpoint Vulnerabilities Report that a device may display with a grey toggle which means it is not currently connected and can&#8217;t be disabled. (See Example Below)<\/p>\n<figure id=\"attachment_59723\" aria-describedby=\"caption-attachment-59723\" style=\"width: 1076px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-59723 size-full\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/Screen-Shot-2018-10-23-at-10.45.02-AM.png\" alt=\"\" width=\"1076\" height=\"331\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Screen-Shot-2018-10-23-at-10.45.02-AM.png 1076w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Screen-Shot-2018-10-23-at-10.45.02-AM-768x236.png 768w\" sizes=\"(max-width: 1076px) 100vw, 1076px\" \/><figcaption id=\"caption-attachment-59723\" class=\"wp-caption-text\">The device HYPERV-PCP is currently offline so we can&#8217;t disable the RDP port.<\/figcaption><\/figure>\n<p>From the Actions menu at the device page, you can always enable the RDP port again if you disabled it by mistake. The enable button will only show if the RDP port is currently disabled.<\/p>\n<figure id=\"attachment_59725\" aria-describedby=\"caption-attachment-59725\" style=\"width: 1093px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-59725 size-full\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/Screen-Shot-2018-10-23-at-10.49.49-AM.png\" alt=\"\" width=\"1093\" height=\"231\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Screen-Shot-2018-10-23-at-10.49.49-AM.png 1093w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Screen-Shot-2018-10-23-at-10.49.49-AM-768x162.png 768w\" sizes=\"(max-width: 1093px) 100vw, 1093px\" \/><figcaption id=\"caption-attachment-59725\" class=\"wp-caption-text\">If RDP is already disabled, the only button that will display here is the Enable EDP option.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>What is an RDP Attack? Remote Desktop Protocol (RDP) attacks\u00a0have been a popular way for hackers to breach the security of a device or company network.\u00a0 An RDP attack takes place when an unauthorized person or entity is accessing a network through the device\u2019s RDP ports.\u00a0 The attack is commonly an actual person using brute [&hellip;]<\/p>\n","protected":false},"author":58,"featured_media":59728,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5467,12],"tags":[],"class_list":["post-59722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-null","category-the-pit-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote Desktop Protocol Security<\/title>\n<meta name=\"description\" content=\"What is an RDP Attack? Remote Desktop Protocol (RDP) attacks\u00a0have been a popular way for hackers to breach the security of a device or company network.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Desktop Protocol Security\" \/>\n<meta property=\"og:description\" content=\"What is an RDP Attack? Remote Desktop Protocol (RDP) attacks\u00a0have been a popular way for hackers to breach the security of a device or company network.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-23T15:08:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-01-22T15:27:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ProMSPThumb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"362\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Devin Bergin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devin Bergin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/\"},\"author\":{\"name\":\"Devin Bergin\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\"},\"headline\":\"Remote Desktop Protocol Security\",\"datePublished\":\"2018-10-23T15:08:36+00:00\",\"dateModified\":\"2019-01-22T15:27:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/\"},\"wordCount\":280,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ProMSPThumb.png\",\"articleSection\":[\"Null\",\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/\",\"name\":\"Remote Desktop Protocol Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ProMSPThumb.png\",\"datePublished\":\"2018-10-23T15:08:36+00:00\",\"dateModified\":\"2019-01-22T15:27:35+00:00\",\"description\":\"What is an RDP Attack? Remote Desktop Protocol (RDP) attacks\u00a0have been a popular way for hackers to breach the security of a device or company network.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ProMSPThumb.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ProMSPThumb.png\",\"width\":700,\"height\":362},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/remote-desktop-protocol-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Desktop Protocol Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/e1a87aba65278d9cd1064ad1966895fe\",\"name\":\"Devin Bergin\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/devin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote Desktop Protocol Security","description":"What is an RDP Attack? Remote Desktop Protocol (RDP) attacks\u00a0have been a popular way for hackers to breach the security of a device or company network.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/","og_locale":"en_US","og_type":"article","og_title":"Remote Desktop Protocol Security","og_description":"What is an RDP Attack? Remote Desktop Protocol (RDP) attacks\u00a0have been a popular way for hackers to breach the security of a device or company network.\u00a0","og_url":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-10-23T15:08:36+00:00","article_modified_time":"2019-01-22T15:27:35+00:00","og_image":[{"width":700,"height":362,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ProMSPThumb.png","type":"image\/png"}],"author":"Devin Bergin","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Devin Bergin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/"},"author":{"name":"Devin Bergin","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe"},"headline":"Remote Desktop Protocol Security","datePublished":"2018-10-23T15:08:36+00:00","dateModified":"2019-01-22T15:27:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/"},"wordCount":280,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ProMSPThumb.png","articleSection":["Null","The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/","url":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/","name":"Remote Desktop Protocol Security","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ProMSPThumb.png","datePublished":"2018-10-23T15:08:36+00:00","dateModified":"2019-01-22T15:27:35+00:00","description":"What is an RDP Attack? Remote Desktop Protocol (RDP) attacks\u00a0have been a popular way for hackers to breach the security of a device or company network.\u00a0","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ProMSPThumb.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ProMSPThumb.png","width":700,"height":362},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/remote-desktop-protocol-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Remote Desktop Protocol Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/e1a87aba65278d9cd1064ad1966895fe","name":"Devin Bergin","url":"https:\/\/www.pcmatic.com\/blog\/author\/devin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59722"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59722\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/59728"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}