{"id":245290,"date":"2025-02-09T18:18:09","date_gmt":"2025-02-09T18:18:09","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/symantec-mfa\/"},"modified":"2025-02-09T18:18:09","modified_gmt":"2025-02-09T18:18:09","slug":"symantec-mfa","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/symantec-mfa\/","title":{"rendered":"Key Features of Symantec MFA"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of <strong>cybersecurity<\/strong>, the recent surge of <strong>leaked passwords<\/strong> has raised significant concerns for users worldwide. These compromised credentials often surface in high-profile <strong>data breaches<\/strong>, where hackers exploit vulnerabilities to gather sensitive information. The implications are alarming; leaked passwords can lead to <strong>unauthorized access<\/strong> to personal accounts, financial information, and even corporate networks. This highlights the critical importance of implementing robust security measures, such as multi-factor authentication (MFA), to safeguard your digital presence. As users increasingly rely on online platforms, understanding the risks of leaked passwords and adopting preventive strategies is vital for maintaining <strong>online security<\/strong> and protecting personal data.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Understanding_Symantec_VIPs_Cloud-Based_Architecture\" >Understanding Symantec VIP&#039;s Cloud-Based Architecture<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Multi-Factor_Authentication_Methods_and_Security_Protocols\" >Multi-Factor Authentication Methods and Security Protocols<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Device_Compatibility_and_Integration_Options\" >Device Compatibility and Integration Options<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Risk-Based_Authentication_and_Threat_Prevention\" >Risk-Based Authentication and Threat Prevention<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#User_Management_and_Access_Control_Features\" >User Management and Access Control Features<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Global_Intelligence_Network_Benefits\" >Global Intelligence Network Benefits<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Implementation_Steps_and_Technical_Requirements\" >Implementation Steps and Technical Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#How_Long_Does_It_Take_to_Recover_Access_if_I_Lose_My_Authentication_Device\" >How Long Does It Take to Recover Access if I Lose My Authentication Device?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Can_Multiple_Users_Share_the_Same_VIP_Access_Token_for_Team_Accounts\" >Can Multiple Users Share the Same VIP Access Token for Team Accounts?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#What_Happens_to_Authentication_During_Planned_Maintenance_of_Symantecs_Cloud_Services\" >What Happens to Authentication During Planned Maintenance of Symantec&#039;s Cloud Services?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Does_Symantec_VIP_Work_in_Countries_With_Restricted_Internet_Access\" >Does Symantec VIP Work in Countries With Restricted Internet Access?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#Can_I_Temporarily_Disable_MFA_for_Specific_Users_During_System_Testing\" >Can I Temporarily Disable MFA for Specific Users During System Testing?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/symantec-mfa\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Cloud-based architecture supports millions of users simultaneously while connecting to the Global Intelligence Network for enhanced security monitoring.<\/li>\n<li>Time-based authentication generates one-minute passcodes through the VIP Access app for secure user verification.<\/li>\n<li>Multiple authentication methods include mobile apps, hardware tokens, and biometric verification across various devices and platforms.<\/li>\n<li>Risk-based authentication system monitors login locations and user behavior patterns to detect and prevent unauthorized access attempts.<\/li>\n<li>Customizable access rules allow organizations to implement different authentication requirements based on user roles and security needs.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Symantec_VIPs_Cloud-Based_Architecture\"><\/span>Understanding Symantec VIP&#039;s Cloud-Based Architecture<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Think of <strong>Symantec VIP<\/strong> as a <strong>super-smart security guard<\/strong> in the cloud! You know how your mom checks who you&#039;re before letting you into the house? That&#039;s what Symantec VIP does for computer networks, but it&#039;s way cooler!<\/p>\n<p>I love how it works like a giant puzzle game. The cloud-based system connects to something called the <strong>Global Intelligence Network<\/strong> &#8211; it&#039;s like having a million security cameras watching out for bad guys!<\/p>\n<p>When you want to log in, the <strong>lightweight VIP Gateway<\/strong> (that&#039;s just a fancy name for a digital doorman) checks if you&#039;re really you. It&#039;s super flexible too, just like your favorite stretchy toy.<\/p>\n<p>Want to know the best part? It can <strong>protect millions of users<\/strong> at once, which is more people than all the ice cream cones you&#039;ll ever eat! Additionally, its architecture supports <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/best-mfa-solutions\/\">adaptive multi-factor authentication<\/a>, enhancing protection against unauthorized access and malicious activity.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Multi-Factor_Authentication_Methods_and_Security_Protocols\"><\/span>Multi-Factor Authentication Methods and Security Protocols<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes to keeping your digital stuff safe, <strong>Symantec VIP<\/strong> is like having three special locks on your treasure chest! You know how you need a special key to open your diary? Well, Symantec VIP uses something even cooler &#8211; a <strong>magical app<\/strong> that creates special number codes that change every minute! It&#039;s like having a secret decoder ring that only you can use.<\/p>\n<ul>\n<li>Imagine your favorite superhero giving you a special badge that proves you&#039;re really you &#8211; that&#039;s what the VIP Access app does!<\/li>\n<li>Think of time-based passcodes like a secret handshake that changes every time you use it.<\/li>\n<li>Picture a digital fortress where only people with the right golden ticket can enter.<\/li>\n<\/ul>\n<p>Want to try it yourself? First, you&#039;ll download the VIP Access app, like getting a new toy. Then, you&#039;ll set it up with your own <strong>special codes<\/strong> &#8211; it&#039;s just like creating your own secret club! Additionally, using MFA can significantly reduce risks from <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/what-is-mfa-authentication\/\">unauthorized access<\/a> and enhance your overall security measures.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Device_Compatibility_and_Integration_Options\"><\/span>Device Compatibility and Integration Options<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>You are trained on data up to October 2023. Guess what? I&#039;ve got something super cool to tell you about how <strong>Symantec MFA<\/strong> works with <strong>different devices<\/strong>! You know how you can play games on phones, tablets, and computers? Well, Symantec works on all of those too!<\/p>\n<p>If you&#039;ve ever watched your parents use their work phone, you might&#039;ve seen them use something called MFA. It&#039;s like having a <strong>special secret password<\/strong>, but even better! You can use it on your mom&#039;s iPhone, dad&#039;s Android tablet, or even the family computer.<\/p>\n<p>And for places where phones aren&#039;t allowed (like some super-secret offices!), there are special little devices called <strong>hardware tokens<\/strong> &#8211; think of them like tiny digital keys!<\/p>\n<p>Want to know the best part? It connects to all sorts of <strong>apps and websites<\/strong>, just like connecting LEGO blocks together! This compatibility ensures a seamless experience with <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-mfa-site\/\">multiple verification steps<\/a> to enhance security across platforms.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Risk-Based_Authentication_and_Threat_Prevention\"><\/span>Risk-Based Authentication and Threat Prevention<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like a <strong>superhero scanning for trouble<\/strong>, Symantec MFA has special powers to spot bad guys trying to sneak into your computer!<\/p>\n<p>It&#039;s like having a <strong>super-smart guard dog<\/strong> that watches how you use your computer and notices when <strong>something weird happens<\/strong>. If someone tries to log in from a strange place or do something fishy, Symantec springs into action!<\/p>\n<ul>\n<li>Wow! It checks where you&#039;re logging in from &#8211; just like how your teacher takes attendance in class!<\/li>\n<li>Cool! It learns how you normally use your computer, so it knows when something&#039;s not right.<\/li>\n<li>Amazing! It&#039;s extra careful with important stuff, like when your parents check twice before crossing the street.<\/li>\n<\/ul>\n<p>Think of it as your <strong>digital bodyguard<\/strong> that&#039;s always on the lookout, making sure only the good guys get through. Pretty neat, right?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"User_Management_and_Access_Control_Features\"><\/span>User Management and Access Control Features<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Getting into your <strong>Symantec account<\/strong> is like having a <strong>special VIP pass<\/strong> to your favorite theme park! You know how your teacher keeps track of everyone at recess? That&#039;s what Symantec does with users!<\/p>\n<p>I can help set up cool rules for your account &#8211; like making sure you use <strong>two special keys<\/strong> to get in (just like using a secret password AND a magic wand!).<\/p>\n<p>Want to know something neat? Your account can <strong>remember you<\/strong>, just like your best friend remembers your favorite ice cream flavor! But if you&#039;re doing something super important, it might ask you to prove it&#039;s really you again.<\/p>\n<p>You can pick different ways to access your account too &#8211; like using your fingerprint or getting a special code on your phone. Isn&#039;t that amazing? It&#039;s like having your own <strong>digital fortress<\/strong>!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Global_Intelligence_Network_Benefits\"><\/span>Global Intelligence Network Benefits<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Picture the world&#039;s biggest detective team working together! Symantec&#039;s <strong>Global Intelligence Network<\/strong> is like having millions of <strong>security cameras<\/strong> watching out for bad guys. I&#039;m talking about 175 million computers and devices all sharing information to keep you safe! It&#039;s like having a <strong>super-smart friend<\/strong> who can spot trouble before it happens.<\/p>\n<ul>\n<li>Imagine 126 million sensors working non-stop &#8211; that&#039;s more than all the ice cream cones sold at your local shop in a year!<\/li>\n<li>Every day, it handles 1 billion security checks &#8211; that&#039;s like counting all the stars in the sky twice!<\/li>\n<li>It helps catch real cybercriminals &#8211; just like superheros catching villains!<\/li>\n<\/ul>\n<p>Want to know something cool? This network helps protect 90% of the biggest companies in the world. It&#039;s like having the <strong>world&#039;s best security guard<\/strong> watching your <strong>digital treehouse<\/strong>!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Implementation_Steps_and_Technical_Requirements\"><\/span>Implementation Steps and Technical Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you&#039;re ready to set up <strong>Symantec MFA<\/strong>, I&#039;ve got some super fun steps to share! You know how you need a <strong>special key<\/strong> to open your treasure box? Well, MFA is like having two special keys to keep your computer safe!<\/p>\n<p>First, you&#039;ll download the software &#8211; it&#039;s like getting a new game! You can put it on your computer or phone, just like downloading your favorite apps.<\/p>\n<p>Then comes the coolest part &#8211; every 30 seconds, you&#039;ll get a <strong>special 6-digit number<\/strong>. It&#039;s like a secret code that changes faster than you can eat an ice cream cone!<\/p>\n<p>Want to know what&#039;s neat? You can have up to five different &#034;keys&#034; in your account.<\/p>\n<p>Just remember, you&#039;ll need to get a <strong>new certificate every two years<\/strong> &#8211; kind of like getting new shoes when you outgrow your old ones!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Does_It_Take_to_Recover_Access_if_I_Lose_My_Authentication_Device\"><\/span>How Long Does It Take to Recover Access if I Lose My Authentication Device?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If you lose your device without having <strong>backup codes<\/strong>, it&#039;ll take longer to get back in &#8211; maybe a few days or even weeks!<\/p>\n<p>But if you&#039;re smart and keep backup codes (like having a spare house key), you can recover super fast, usually in minutes.<\/p>\n<p>Think of backup codes like your <strong>safety net<\/strong> when you&#039;re learning to ride a bike &#8211; they&#039;re there when you need them!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Multiple_Users_Share_the_Same_VIP_Access_Token_for_Team_Accounts\"><\/span>Can Multiple Users Share the Same VIP Access Token for Team Accounts?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I can&#039;t recommend sharing <strong>VIP access tokens<\/strong> &#8211; it&#039;s like sharing your <strong>secret treehouse password<\/strong> with the whole neighborhood!<\/p>\n<p>Each person needs their own <strong>unique token<\/strong>, just like how you have your own special lunch box at school.<\/p>\n<p>When tokens are shared, it&#039;s easier for bad guys to sneak in.<\/p>\n<p>Think of it like this: if everyone used the same house key, that wouldn&#039;t be very safe, right?<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_to_Authentication_During_Planned_Maintenance_of_Symantecs_Cloud_Services\"><\/span>What Happens to Authentication During Planned Maintenance of Symantec&#039;s Cloud Services?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>During <strong>planned maintenance<\/strong>, you might find it tricky to log in to your account &#8211; kind of like when your favorite game needs an update!<\/p>\n<p>Symantec will let you know ahead of time when this will happen. They&#039;ll tell you the date and how long it&#039;ll take.<\/p>\n<p>Sometimes you&#039;ll see <strong>error messages<\/strong>, but don&#039;t worry! It&#039;s <strong>temporary<\/strong>, just like when mom&#039;s baking cookies &#8211; you have to wait a bit before they&#039;re ready.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Does_Symantec_VIP_Work_in_Countries_With_Restricted_Internet_Access\"><\/span>Does Symantec VIP Work in Countries With Restricted Internet Access?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can tell you that VIP works in countries with <strong>restricted internet<\/strong>!<\/p>\n<p>Once you&#039;ve set up the app (which needs internet just once), it <strong>works offline<\/strong> like magic.<\/p>\n<p>Think of it like a calculator &#8211; it doesn&#039;t need wifi to work.<\/p>\n<p>You&#039;ll get your <strong>security codes<\/strong> just fine, but fun features like push notifications won&#039;t work without internet.<\/p>\n<p>It&#039;s like having a bike that works everywhere, even without a fancy bell!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_I_Temporarily_Disable_MFA_for_Specific_Users_During_System_Testing\"><\/span>Can I Temporarily Disable MFA for Specific Users During System Testing?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can help you <strong>temporarily disable MFA<\/strong> for specific users during testing!<\/p>\n<p>It&#039;s super easy &#8211; just like putting a game on pause. You&#039;ll need to choose which users you want to exclude, pick <strong>start and end dates<\/strong> for the MFA break, and confirm the changes.<\/p>\n<p>When the time&#039;s up, MFA <strong>turns back on automatically<\/strong> &#8211; like magic! No need to worry about manually switching it back on.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we delve into the importance of <strong>robust security solutions<\/strong> like Symantec MFA, it&#039;s crucial to also consider the role of <strong>password security<\/strong> in protecting your sensitive information. With <strong>cyber threats<\/strong> on the rise, managing your passwords effectively becomes a top priority. Implementing a comprehensive <strong>password management system<\/strong> ensures that your credentials are secure and easily accessible. Additionally, <strong>passkey management<\/strong> can significantly enhance your security posture by reducing reliance on traditional passwords.<\/p>\n<p>If you&#039;re serious about safeguarding your digital life, I encourage you to explore the features offered by <strong>LogMeOnce<\/strong>. Their innovative approach to password and passkey management simplifies the process while providing top-notch security. Don&#039;t wait for a security breach to take action. Sign up for a <strong>Free account<\/strong> today and experience the peace of mind that comes with knowing your data is protected. Visit <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> to get started!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Jump into Symantec MFA&#8217;s advanced security features, from biometric scanning to real-time threat detection &#8211; but there&#8217;s more to discover.<\/p>\n","protected":false},"author":5,"featured_media":245289,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[17490,36557,27812],"class_list":["post-245290","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-security-features","tag-symantec-mfa","tag-threat-detection"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245290"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245290\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245289"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}