{"id":21427,"date":"2024-06-10T21:45:34","date_gmt":"2024-06-10T21:45:34","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/06\/29\/how-to-check-for-weak-passwords-in-active-directory\/---9b845976-b29e-41d6-92de-36567344ab53"},"modified":"2024-10-17T09:01:20","modified_gmt":"2024-10-17T09:01:20","slug":"how-to-check-for-weak-passwords-in-active-directory","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/","title":{"rendered":"How To Check For Weak Passwords In Active Directory?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Ensuring the security of your data is of paramount importance, and a crucial aspect of this is having robust and secure passwords. Conducting audits for vulnerable passwords within Active Directory is a critical measure to guarantee your security measures are current and effective. Although it might seem daunting, our easy-to-follow guide titled \u201cHow To Check For Weak Passwords In Active Directory\u201d will equip you with the knowledge to pinpoint insecure passwords within an Active Directory setting, thus safeguarding your data\u2019s environment.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#1_How_to_Identify_Weak_Passwords_in_Active_Directory\" >1. How to Identify Weak Passwords in Active Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#2_Why_Strong_Passwords_are_Critical_for_Security\" >2. Why Strong Passwords are Critical for Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#3_Steps_to_Take_to_Check_for_Weak_Passwords\" >3. Steps to Take to Check for Weak Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#4_Ways_to_Make_Passwords_Stronger_and_More_Secure\" >4. Ways to Make Passwords Stronger and More Secure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Summary_of_Password_Security_Measures\" >Summary of Password Security Measures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Q_A\" >Q&amp;A<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Q_What_is_Active_Directory\" >Q: What is Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Q_How_do_I_check_for_weak_passwords_in_Active_Directory\" >Q: How do I check for weak passwords in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Q_What_is_an_important_aspect_to_consider_regarding_user_accounts_and_password_hashes\" >Q: What is an important aspect to consider regarding user accounts and password hashes?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Q_How_can_organizations_enhance_their_password_policies_to_mitigate_security_risks\" >Q: How can organizations enhance their password policies to mitigate security risks?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Q_What_is_the_significance_of_using_the_Test-PasswordQuality_cmdlet_in_identity_governance\" >Q: What is the significance of using the Test-PasswordQuality cmdlet in identity governance?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Q_How_can_companies_combat_password_spraying_attacks_to_protect_user_credentials\" >Q: How can companies combat password spraying attacks to protect user credentials?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Q_What_are_some_common_vulnerabilities_associated_with_weak_password_policies\" >Q: What are some common vulnerabilities associated with weak password policies?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Q_How_can_organizations_stay_proactive_in_managing_their_network_security\" >Q: How can organizations stay proactive in managing their network security?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-how-to-identify-weak-passwords-in-active-directory\"><span class=\"ez-toc-section\" id=\"1_How_to_Identify_Weak_Passwords_in_Active_Directory\"><\/span>1. How to Identify Weak Passwords in Active Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes to passwords, many people do not realize that there may be a weak link in their system. Weak passwords can leave Active Directory open to hackers and malicious software. So, it is important to identify and remove such weak passwords from Active Directory.<\/p>\n<p>Here are <b>four ways to easily identify weak passwords in Active Directory<\/b>:<\/p>\n<ul>\n<li>Check for blank passwords. It is important to ensure that no accounts in Active Directory have blank passwords as these are often easy to guess and exploit.<\/li>\n<li>Check for large and small passwords. Require users to set strong passwords which must contain a combination of numbers, special characters, and alphabets and should be at least 8 characters long.<\/li>\n<li>Check for old passwords. Regularly check for passwords that haven\u2019t been changed in a while and force users to change those passwords.<\/li>\n<li>Check for password use frequency. Regularly audit users\u2019 passwords to ensure that they are not using the same password too often.<\/li>\n<\/ul>\n<p>These measures can help make Active Directory more secure, while providing companies with peace of mind.<\/p>\n<h2 id=\"2-why-strong-passwords-are-critical-for-security\"><span class=\"ez-toc-section\" id=\"2_Why_Strong_Passwords_are_Critical_for_Security\"><\/span>2. Why Strong Passwords are Critical for Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Strong passwords are essential to protecting your digital identity and data. If your passwords are weak or easily guessed, attackers can easily gain access to your accounts, steal your personal information, and even cause financial harm. Here are why strong passwords are essential for keeping your data secure.<\/p>\n<ul>\n<li><b>Prevent easy access:<\/b> Strong passwords are more difficult to hack because they involve a combination of symbols, numbers, and letters. Complex passwords make it harder for hackers to guess and steal your information.<\/li>\n<li><b>Maintain privacy:<\/b> When you use strong passwords, it keeps your online activities, files, and accounts safe from strangers and outside intrusion. This helps you defend your identity and data from anyone looking to steal it.<\/li>\n<li><b>Restrict unauthorized activity:<\/b> A strong password protects your accounts from hackers. This stops them from changing your password and accessing your personal data without your permission.<\/li>\n<\/ul>\n<p>Strong passwords are the cornerstone of digital security and essential for protecting your personal information. Use a combination of symbols, numbers, and letters to create a strong password for all your online accounts and keep your data safe from malicious attackers.<\/p>\n<h2 id=\"3-steps-to-take-to-check-for-weak-passwords\"><span class=\"ez-toc-section\" id=\"3_Steps_to_Take_to_Check_for_Weak_Passwords\"><\/span>3. Steps to Take to Check for Weak Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Step 1: Identify All Accounts with Weak Passwords<\/b><br \/>\nThe first step to checking for weak passwords is to create a master list of all of your online accounts. This list should include both personal and business accounts. Write each username or account name next to the corresponding account. This will allow you to have all of your accounts organized and easily identify which ones need updated passwords.<\/p>\n<p><b>Step 2: Change Passwords with Popular Security Standards<\/b><br \/>\nOnce the list of accounts is compiled, it\u2019s time to start updating the passwords. To ensure the strongest security, you should choose passwords that adhere to popular security standards. This includes creating passwords that are at least 8 characters long, with a combination of letters, numbers, and special characters. Additionally, you should avoid easily guessed passwords such as birthdays or anniversaries.<\/p>\n<p><b>Step 3: Make Use of Password Managers<\/b><br \/>\nPassword managers can help you save, generate, and even store the passwords you use for different accounts. This tool can help you create the most secure passwords for each account and reduce the strain of having to remember multiple passwords. Many modern day browsers, such as Google Chrome, also have built-in password managers for added convenience.<\/p>\n<h2 id=\"4-ways-to-make-passwords-stronger-and-more-secure\"><span class=\"ez-toc-section\" id=\"4_Ways_to_Make_Passwords_Stronger_and_More_Secure\"><\/span>4. Ways to Make Passwords Stronger and More Secure<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It\u2019s essential to create strong passwords to protect our digital life. Here are four tips to make sure the passwords we use are as secure as possible:<\/p>\n<ul>\n<li><strong>Use long passwords with a mix of characters:<\/strong> The longer the password the better, and the more numbers, special characters and mix of <a title=\"How To Change Suddenlink Wifi Password\" href=\"https:\/\/logmeonce.com\/resources\/how-to-change-suddenlink-wifi-password\/\" data-abc=\"true\">lower\/upper case letters<\/a>, the better.<\/li>\n<li><strong>Avoid common passwords:<\/strong> Names, common words and date of birth can be easily guessed or obtained through social media. It\u2019s a good idea to avoid these.<\/li>\n<\/ul>\n<p>Using unique passwords for all accounts is also a great idea. If one account is hacked, the rest of the accounts will remain secure. To help manage a variety of passwords, users can try a trusted password manager such as and . This ensures that all passwords are stored securely, and users don\u2019t need to constantly switch to different passwords for each account.<\/p>\n<p>User accounts are an essential aspect of any organization&#8217;s security measures. Password hashes play a crucial role in ensuring the protection of user credentials. Having a robust password policy in place can prevent security breaches caused by weak or guessable passwords. It is important to regularly review the password list and eliminate any default passwords that may put the system at risk. Directory services and domain controllers manage access to resources within the network and enforcing bad password practices can lead to unauthorized access. Identity governance plays a key role in maintaining the security of user accounts and preventing unauthorized access. Implementing the Test-PasswordQuality cmdlet and using a custom dictionary can help enhance password security. Organizations should continuously monitor the list of users and passwords to ensure compliance with strong password policies and password complexity requirements. By staying vigilant and proactive in managing passwords and security controls, businesses can mitigate security threats and protect vital operations from unauthorized access and security breaches. Sources: Microsoft TechNet, NIST Special Publication 800-63, Specops Software documentation.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Summary_of_Password_Security_Measures\"><\/span>Summary of Password Security Measures<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Step Number<\/th>\n<th>Security Measure<\/th>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>Identify All Accounts with Weak Passwords<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>Change Passwords with Popular Security Standards<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>Make Use of Password Managers<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>Ways to Make Passwords Stronger and More Secure<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Avoid Common Passwords<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>Use Long Passwords with a Mix of Characters<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td>Use Unique Passwords for Each Account<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td>Implement Password Security Measures Proactively<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_Active_Directory\"><\/span>Q: What is Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Active Directory is a system used to store usernames and passwords of users in an organization\u2019s network. It helps manage access and security permissions.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_do_I_check_for_weak_passwords_in_Active_Directory\"><\/span>Q: How do I check for weak passwords in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: To check for weak passwords in Active Directory, you can use a password audit tool. This will scan the system and check for passwords that do not meet an organization\u2019s security policy. This will help identify and <a title=\"How To Check For Weak Passwords In Active Directory\" href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/\" data-abc=\"true\">address weak passwords quickly<\/a>.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_an_important_aspect_to_consider_regarding_user_accounts_and_password_hashes\"><\/span>Q: What is an important aspect to consider regarding user accounts and password hashes?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: User accounts and password hashes play a crucial role in security breaches as they are often targeted by bad actors. It is important to have a strong password policy in place to prevent unauthorized access.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_can_organizations_enhance_their_password_policies_to_mitigate_security_risks\"><\/span>Q: How can organizations enhance their password policies to mitigate security risks?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Organizations can implement a strong password policy with password complexity requirements, regular password changes, and enforcing strong passwords to prevent guessable and weak passwords.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_the_significance_of_using_the_Test-PasswordQuality_cmdlet_in_identity_governance\"><\/span>Q: What is the significance of using the Test-PasswordQuality cmdlet in identity governance?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: The Test-PasswordQuality cmdlet helps organizations assess the strength of user passwords and ensure compliance with password policies to enhance security controls.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_can_companies_combat_password_spraying_attacks_to_protect_user_credentials\"><\/span>Q: How can companies combat password spraying attacks to protect user credentials?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Companies can use security solutions like Enzoic for Active Directory or Cloud Security Plus to monitor password strength, detect weak passwords, and prevent password spraying attacks that target bad password attempts.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_some_common_vulnerabilities_associated_with_weak_password_policies\"><\/span>Q: What are some common vulnerabilities associated with weak password policies?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Common vulnerabilities include using simple passwords, reusing previous passwords, and not implementing strong password complexity requirements, which can lead to security incidents and unauthorized access.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_can_organizations_stay_proactive_in_managing_their_network_security\"><\/span>Q: How can organizations stay proactive in managing their network security?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: By conducting regular audits of Active Directory, implementing security updates, and using tools like Active Directory Lite or Remote Access Plus Enterprise, organizations can enhance their security posture and protect against security threats.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Using a password management tool like LogMeOnce is an excellent solution to check your active directory for weak passwords. LogMeOnce is one of the <a title=\"Webull Password Requirements\" href=\"https:\/\/logmeonce.com\/resources\/webull-password-requirements\/\" data-abc=\"true\">leading password management tools<\/a> that offers a free account and provides comprehensive yet simple protection for your passwords and data. Highly secure and with features such as a password generator and a secure vault, LogMeOnce is a great way to help you check your active directory for weak passwords. By creating a free LogMeOnce account, you can <a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">create secure passwords<\/a> for your active directory and enjoy peace of mind knowing that your data are safe. Strong passwords are essential to prevent malicious access, and LogMeOnce is one of the best solutions to check for weak passwords in your active directory.<\/p>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"aaab24d5-988c-457a-b139-8e5a2682aa65\" data-message-model-slug=\"gpt-4o-mini\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Reference: <a href=\"https:\/\/logmeonce.com\/resources\/how-to-check-for-weak-passwords-in-active-directory\/\" target=\"_new\" rel=\"noopener\" data-abc=\"true\">How to Check for Weak Passwords in Active Directory?<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"mb-2 flex gap-3 empty:hidden -ml-2\">\n<div class=\"items-center justify-start rounded-xl p-1 flex\">\n<div class=\"flex items-center\"><button class=\"rounded-lg text-token-text-secondary hover:bg-token-main-surface-secondary\" aria-label=\"Read aloud\" data-testid=\"voice-play-turn-action-button\"><\/button><button class=\"rounded-lg text-token-text-secondary hover:bg-token-main-surface-secondary\" aria-label=\"Copy\" data-testid=\"copy-turn-action-button\"><\/button><\/p>\n<div class=\"flex\"><\/div>\n<div class=\"flex items-center pb-0\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Ensuring the security of your data is of paramount importance, and a crucial aspect of this is having robust and secure passwords. Conducting audits for vulnerable passwords within Active Directory is a critical measure to guarantee your security measures are current and effective. Although it might seem daunting, our easy-to-follow guide titled \u201cHow To Check [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[2960,5990,808,4233,10312],"class_list":["post-21427","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-account-management","tag-active-directory-2","tag-password-security","tag-password-strength-2","tag-security-policies"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/21427","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=21427"}],"version-history":[{"count":3,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/21427\/revisions"}],"predecessor-version":[{"id":231166,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/21427\/revisions\/231166"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=21427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=21427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=21427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}