{"id":60150,"date":"2021-01-31T11:07:00","date_gmt":"2021-01-31T17:07:00","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=60150"},"modified":"2022-01-26T11:44:40","modified_gmt":"2022-01-26T17:44:40","slug":"feature-expansion-endpoint-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/","title":{"rendered":"Feature Expansion &#8211; Endpoint Vulnerabilities"},"content":{"rendered":"\n<p>To expand your visibility&nbsp;over possible vulnerabilities in your environment, we have expanded <a title=\"Best Business Computer Security Software\" href=\"https:\/\/www.pcmatic.com\/pro\/\">PC Matic PRO<\/a>&#8216;s Endpoint Vulnerabilities report to include two new reports: <em>SuperShield Blacklist\/Learning Mode Enabled<\/em>, and <em>Lockout Thresholds&nbsp;Not Set<\/em>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" width=\"700\" height=\"559\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/EVreport2.gif\" alt=\"\" class=\"wp-image-60155\"\/><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">SuperShield Blacklist\/Learning Mode Enabled<\/h3>\n\n\n\n<p>When SuperShield is left in Blacklist Only or Learning Mode outside of a normal test or implementation phase, it leaves devices vulnerable to attack. All devices should be running in SuperShield Protection mode to remain secured by our whitelist based protection. The <a title=\"Whitelisting Applications\" href=\"https:\/\/www.pcmatic.com\/whitelist\/\">whitelisting applications<\/a> feature protects all devices from malware and ransomware threats.<\/p>\n\n\n\n<p>Any devices in Learning Mode or Blacklist Only mode will populate here with a quick toggle to switch them over to SuperShield Protection. It is normal to see devices here while implementing in Learning Mode, but that phase should end after a couple of days. Learning mode should be temporary and the <a title=\"Whitelisting Application Tools\" href=\"https:\/\/www.pcmatic.com\/whitelist\/application-whitelisting.asp\">whitelisting of applications<\/a> should be on to maintain optimal system security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Lockout Thresholds&nbsp;Not Set<\/h3>\n\n\n\n<p>PC Matic now automatically sets the Windows Account Lockout Threshold to further secure your devices from brute force attacks. This setting specifically stops frequent incorrect login attempts to a user account which users would normally log into to gain access to RDP.  This includes other access points to the network. Our <a title=\"Best Remote Desktop Access Software\" href=\"https:\/\/www.pcmatic.com\/pro\/rdp-lifeline.asp\">Secure Remote Desktop Access Control<\/a> software protects the network by carefully monitoring remote access points. An important feature is automatic alerting on any possible system intrusions.<\/p>\n\n\n\n<p>We automatically set this threshold for you. If any devices are not pulling that setting down, or it was reset, they will populate here. You can adjust the settings yourself, or apply our recommended defaults.<\/p>\n\n\n\n<p>PC Matic Strongly recommends at least using the recommended settings below to keep your devices secure from brute force attacks. In most cases, normal users will not fail their login 10 times during a 5-minute window. This means they will never see an inconvenience\u00a0from this security setting. <\/p>\n\n\n\n<p>You can, however, make this setting much stricter if you\u2019d like. Simply lock login attempts down even more by using something similar to the high-security settings below.<\/p>\n\n\n\n<p><strong>PC Matic Recommended\/Default Settings<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Threshold &#8211; Account Lockout Threshold: 10<\/li><li>Duration &#8211; Account Lockout Duration: 5<\/li><li>Observation &#8211; Account Lockout Observation: 5<\/li><\/ul>\n\n\n\n<p>To learn more about Account Lockout Threshold, the use of secure RDP features, and what each individual setting means, you can read our <a href=\"https:\/\/techtalk.pcpitstop.com\/2019\/01\/22\/windows-account-lockout-threshold\/\">full breakdown<\/a>. PC Matic security software has a variety of <a title=\"Computer Security Features\" href=\"https:\/\/www.pcmatic.com\/pro\/features.asp\">computer security features<\/a> that work together with our global whitelist. These include automatic device authentication, remote machine and software management, automatic <a title=\"Automatic Security Patch Updating\" href=\"https:\/\/www.pcmatic.com\/pro\/security-patch-management.asp\">security patch updating<\/a>, and <a title=\"Network Security Monitoring\" href=\"https:\/\/www.pcmatic.com\/pro\/system-performance.asp\">network security performance monitoring<\/a>. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">PC Matic Endpoint Vulnerabilities Features<\/h4>\n\n\n\n<p>Secure your system from endpoint vulnerabilities with PC Matic security software. Visit PC Matic for the <a title=\">Best Endpoint Protection for Small Business&#8221; href=&#8221;https:\/\/www.pcmatic.com\/pro\/endpoint-security.asp&#8221;>best Endpoint Protection for small business<\/a>. To learn more about endpoint security, explore <a href=\"https:\/\/www.pcmatic.com\/blog\/tag\/detect-and-respond\/\">Detect and Respond on Endpoints<\/a> article.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To expand your visibility&nbsp;over possible vulnerabilities in your environment, we have expanded PC Matic PRO&#8216;s Endpoint Vulnerabilities report to include two new reports: SuperShield Blacklist\/Learning Mode Enabled, and Lockout Thresholds&nbsp;Not Set. SuperShield Blacklist\/Learning Mode Enabled When SuperShield is left in Blacklist Only or Learning Mode outside of a normal test or implementation phase, it leaves [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6225],"tags":[6186,4773,6187,6181,108,6184,6182,6183,6185],"class_list":["post-60150","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-product-updates","tag-application-whitelisitng-tools","tag-cyber-security","tag-cybersecurity-solutions","tag-endpoint-security","tag-pc-matic","tag-rdp-management-software","tag-rdp-software","tag-remote-desktop-access","tag-whitelisting-application"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Feature Expansion - Endpoint Vulnerabilities<\/title>\n<meta name=\"description\" content=\"To expand your visibility&nbsp;over possible vulnerabilities in your environment, we have expanded PC Matic PRO&#039;s Endpoint Vulnerabilities report to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Feature Expansion - Endpoint Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"To expand your visibility&nbsp;over possible vulnerabilities in your environment, we have expanded PC Matic PRO&#039;s Endpoint Vulnerabilities report to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-31T17:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-26T17:44:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PC Matic Cybersecurity\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Cybersecurity\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/\"},\"author\":{\"name\":\"PC Matic Cybersecurity\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\"},\"headline\":\"Feature Expansion &#8211; Endpoint Vulnerabilities\",\"datePublished\":\"2021-01-31T17:07:00+00:00\",\"dateModified\":\"2022-01-26T17:44:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/\"},\"wordCount\":477,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"application whitelisitng tools\",\"cyber security\",\"cybersecurity solutions\",\"endpoint security\",\"pc matic\",\"rdp management software\",\"rdp software\",\"remote desktop access\",\"whitelisting application\"],\"articleSection\":[\"Product Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/\",\"name\":\"Feature Expansion - Endpoint Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2021-01-31T17:07:00+00:00\",\"dateModified\":\"2022-01-26T17:44:40+00:00\",\"description\":\"To expand your visibility&nbsp;over possible vulnerabilities in your environment, we have expanded PC Matic PRO's Endpoint Vulnerabilities report to\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/feature-expansion-endpoint-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Feature Expansion &#8211; Endpoint Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\",\"name\":\"PC Matic Cybersecurity\",\"description\":\"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.\",\"sameAs\":[\"https:\\\/\\\/techtalk.pcpitstop.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pcpitstop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Feature Expansion - Endpoint Vulnerabilities","description":"To expand your visibility&nbsp;over possible vulnerabilities in your environment, we have expanded PC Matic PRO's Endpoint Vulnerabilities report to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Feature Expansion - Endpoint Vulnerabilities","og_description":"To expand your visibility&nbsp;over possible vulnerabilities in your environment, we have expanded PC Matic PRO's Endpoint Vulnerabilities report to","og_url":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2021-01-31T17:07:00+00:00","article_modified_time":"2022-01-26T17:44:40+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"PC Matic Cybersecurity","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Cybersecurity","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/"},"author":{"name":"PC Matic Cybersecurity","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f"},"headline":"Feature Expansion &#8211; Endpoint Vulnerabilities","datePublished":"2021-01-31T17:07:00+00:00","dateModified":"2022-01-26T17:44:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/"},"wordCount":477,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["application whitelisitng tools","cyber security","cybersecurity solutions","endpoint security","pc matic","rdp management software","rdp software","remote desktop access","whitelisting application"],"articleSection":["Product Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/","url":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/","name":"Feature Expansion - Endpoint Vulnerabilities","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2021-01-31T17:07:00+00:00","dateModified":"2022-01-26T17:44:40+00:00","description":"To expand your visibility&nbsp;over possible vulnerabilities in your environment, we have expanded PC Matic PRO's Endpoint Vulnerabilities report to","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/feature-expansion-endpoint-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Feature Expansion &#8211; Endpoint Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f","name":"PC Matic Cybersecurity","description":"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.","sameAs":["https:\/\/techtalk.pcpitstop.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/pcpitstop\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=60150"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/60150\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=60150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=60150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=60150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}