{"id":24938,"date":"2024-06-11T15:10:43","date_gmt":"2024-06-11T15:10:43","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/07\/01\/check-password-policy-active-directory\/---bde09b67-954b-4198-b3a0-7ae9113e33d8"},"modified":"2024-11-01T10:21:37","modified_gmt":"2024-11-01T10:21:37","slug":"check-password-policy-active-directory","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/","title":{"rendered":"Secure Your Data: How to Check Password Policy Active Directory &#8211; Steps &amp; Benefits"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In today\u2019s world, having a secure Check Password Policy Active Directory is essential for keeping your business information safe. With the world of technology, it can be difficult to know what protections are necessary for the safety of your information. Luckily, Active Directory can provide you with a complete solution to check your password policy and keep it secure. In this article, we will cover the steps on how to check the password policy using Active Directory, as well as the benefits of having an active protection in place. Additionally, we will provide some tips on how to create a strong and secure password policy for optimal security.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#1_Ensure_a_Secure_Active_Directory_Network_with_a_Password_Policy\" >1. Ensure a Secure Active Directory Network with a Password Policy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#2_The_Benefits_of_Implementing_a_Password_Policy_in_Active_Directory\" >2. The Benefits of Implementing a Password Policy in Active Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#3_How_to_Set_Up_a_Check_Password_Policy_in_Active_Directory\" >3. How to Set Up a Check Password Policy in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#4_Make_Security_a_Priority_Take_Full_Advantage_of_Password_Policy_in_Active_Directory\" >4. Make Security a Priority: Take Full Advantage of Password Policy in Active Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_A\" >Q&amp;A<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_What_is_an_Active_Directory_Check_Password_Policy\" >Q: What is an Active Directory Check Password Policy?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_What_are_fine-grained_password_policies\" >Q: What are fine-grained password policies?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_What_is_the_maximum_password_age_in_Active_Directory\" >Q: What is the maximum password age in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_What_is_reversible_encryption_in_terms_of_password_policies\" >Q: What is reversible encryption in terms of password policies?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_How_can_I_view_the_default_domain_password_policy_settings_in_Active_Directory\" >Q: How can I view the default domain password policy settings in Active Directory?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_What_are_some_examples_of_password_complexity_requirements\" >Q: What are some examples of password complexity requirements?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_How_can_fine-grained_password_policies_enhance_password_security_in_an_organization\" >Q: How can fine-grained password policies enhance password security in an organization?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_What_is_multi-factor_authentication_and_how_does_it_relate_to_password_policies\" >Q: What is multi-factor authentication and how does it relate to password policies?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Q_How_can_password_audit_tools_help_organizations_ensure_password_security_compliance\" >Q: How can password audit tools help organizations ensure password security compliance?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-ensure-a-secure-active-directory-network-with-a-password-policy\"><span class=\"ez-toc-section\" id=\"1_Ensure_a_Secure_Active_Directory_Network_with_a_Password_Policy\"><\/span>1. Ensure a Secure Active Directory Network with a Password Policy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Active Directory is a crucial component of any organization\u2019s network security. It\u2019s important to have a well-defined and enforced password policy so that attackers can\u2019t easily access the network or any of the connected resources. Here are some key steps to ensure secure access with an effective password policy:<\/p>\n<ul>\n<li><b>Change passwords regularly.<\/b> Passwords should be changed at least once every three months. It\u2019s also important to regularly check for weak passwords and restrict the use of commonly used passwords.<\/li>\n<li><b>Create complexity rules.<\/b> Users should be required to create complex passwords of at least 12 characters, with a mix of uppercase and lowercase letters, numbers, and symbols.<\/li>\n<li><b>Encourage multifactor authentication.<\/b> Multifactor authentication doubles down on security by requiring a user to provide two layers of authentication. This helps to ensure that even if someone is able to guess a user\u2019s password, they won\u2019t be able to gain access to the network.<\/li>\n<li><b>Disable or delete unused accounts.<\/b> Unused accounts can be a potential vulnerability, so it\u2019s important to disable or delete inactive accounts to limit access to the network.<\/li>\n<\/ul>\n<p>Finally, organizations should use an active directory solution that is continuously monitoring the network and alerting administrators of any suspicious activity on the system. This helps to ensure that any attempted attack is stopped before it can do any real damage.<\/p>\n<h2 id=\"2-the-benefits-of-implementing-a-password-policy-in-active-directory\"><span class=\"ez-toc-section\" id=\"2_The_Benefits_of_Implementing_a_Password_Policy_in_Active_Directory\"><\/span>2. The Benefits of Implementing a Password Policy in Active Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Staying Secure with a Password Policy<\/b><\/p>\n<p>Having a secure password policy for Active Directory is a must for businesses, large and small. By implementing a password policy everyone\u2019s accounts, data, and information will be kept safe and out of the hands of attackers. Implementing and following a solid policy ensures:<\/p>\n<ul>\n<li>Strong and secure passwords<\/li>\n<li>Limitations to the number of failed logins<\/li>\n<li>Length and complexity requirements for passwords<\/li>\n<li>Mandatory password resets<\/li>\n<li>Requirement of complex characters for passwords<\/li>\n<\/ul>\n<p>An approved policy also allows companies to create multiple levels of security. Depending on their sensitivity and access given, different accounts could be setup with different levels of protection and security. Companies can also set certain accounts as important accounts, so they can audit and get notified when changed. All of this is possible when a password policy is in place and enforced.<\/p>\n<p>Overall, the best way to ensure your passwords are strong and secure is to follow and implement a password policy. Not only is this secure, but its easier for everyone in the business to understand and comply with. It keeps sensitive data private and accounts secure.<\/p>\n<h2 id=\"3-how-to-set-up-a-check-password-policy-in-active-directory\"><span class=\"ez-toc-section\" id=\"3_How_to_Set_Up_a_Check_Password_Policy_in_Active_Directory\"><\/span>3. How to Set Up a Check Password Policy in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Establishing a password policy is an essential step towards protecting an Active Directory environment. Here is a comprehensive guide to setting up your check-password policy like a pro:<\/p>\n<ul>\n<li><b>Choose your parameters:<\/b> The first step in setting up a check-password policy in AD is to decide on the parameters. This includes the password length, complexity requirements, and age. Additionally, it is important to consider the frequency of password updates.<\/li>\n<li><b>Enforce the policy:<\/b> After choosing and configuring the policy settings, it is necessary to enforce them on the domain controller. This can be done through the Group Policy Object (GPO) or by command line.<\/li>\n<li><b>Test the policy:<\/b> Once the policy is enforced, it is important to verify that it is working properly. This can be done by testing a few users\u2019 passwords and making sure they all adhere to the policy.<\/li>\n<\/ul>\n<p>At this point, the password policy should be completely set up and functioning properly. To ensure its effectiveness, it is important to regularly check the policy against the best security practices. This will ensure that the Active Directory environment is secure and effective.<\/p>\n<h2 id=\"4-make-security-a-priority-take-full-advantage-of-password-policy-in-active-directory\"><span class=\"ez-toc-section\" id=\"4_Make_Security_a_Priority_Take_Full_Advantage_of_Password_Policy_in_Active_Directory\"><\/span>4. Make Security a Priority: Take Full Advantage of Password Policy in Active Directory<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes to keeping your network secure, password policy should be one of your top priorities. The good news is, if you use Active Directory (AD), you can take full advantage of a set of built-in tools and options that help strengthen the security of your system.<\/p>\n<p><b>Using Complex Passwords and Enforcing Password Expiry:<\/b> AD can ensure that users are using passwords that are complex enough, so that they\u2019re difficult to guess or crack. This feature insures that your network remains secure, no matter who is using it. Furthermore, AD will enforce password expirations on a set schedule, so passwords are changed and updated regularly.<\/p>\n<p><b>Utilizing History Settings and Account Lockouts:<\/b> You can also set history settings with AD, so that users won\u2019t be able to reuse their previous passwords. This helps eliminate the possibility that someone would use the same password previously used and compromise the system\u2019s security. Additionally, AD will lockout accounts after a certain number of attempts, slowing down any potential hacker.<\/p>\n<ul>\n<li>Complex passwords<\/li>\n<li>Password expirations<\/li>\n<li>Password history settings<\/li>\n<li>Account lockouts<\/li>\n<\/ul>\n<p>By taking full advantage of the password policy options available in Active Directory, you can be confident that your system is doing its job to keep your network secure and safe from any unwelcome visitors.<\/p>\n<p>Fine-grained password policies play a crucial role in maintaining the security of an organization&#8217;s network and data. These policies encompass various elements such as maximum and minimum password age, password complexity requirements, and lockout policies to ensure that user passwords adhere to strict security standards. By implementing fine-grained password policies, organizations can enhance their overall password security and reduce the risk of unauthorized access or data breaches. Microsoft&#8217;s Active Directory provides a range of tools and cmdlets, such as Get-ADUserResultantPasswordPolicy and New-ADFineGrainedPasswordPolicy, to help administrators configure and manage these policies effectively. Additionally, third-party tools like Specops Password Auditor can also assist in auditing and enforcing strong password policies. By enforcing strong password policies, organizations can mitigate the risk of password-related security incidents and better protect their digital assets.<\/p>\n<table style=\"border-collapse: collapse; width: 100%; border: 1px solid black;\">\n<tbody>\n<tr style=\"background-color: lightgray;\">\n<th style=\"padding: 10px; font-weight: bold; font-size: 18px;\">Key Steps<\/th>\n<th style=\"padding: 10px; font-weight: bold; font-size: 18px;\">Benefits<\/th>\n<\/tr>\n<tr style=\"background-color: #f0f8ff;\">\n<td style=\"padding: 10px; text-align: center;\">Change passwords regularly<\/td>\n<td style=\"padding: 10px; text-align: center;\">Enhanced security and protection from attacks<\/td>\n<\/tr>\n<tr style=\"background-color: white;\">\n<td style=\"padding: 10px; text-align: center;\">Create complexity rules<\/td>\n<td style=\"padding: 10px; text-align: center;\">Increase difficulty for attackers to guess passwords<\/td>\n<\/tr>\n<tr style=\"background-color: #f0f8ff;\">\n<td style=\"padding: 10px; text-align: center;\">Encourage multifactor authentication<\/td>\n<td style=\"padding: 10px; text-align: center;\">Extra layer of security for user accounts<\/td>\n<\/tr>\n<tr style=\"background-color: white;\">\n<td style=\"padding: 10px; text-align: center;\">Disable or delete unused accounts<\/td>\n<td style=\"padding: 10px; text-align: center;\">Reduced vulnerability and access to the network<\/td>\n<\/tr>\n<tr style=\"background-color: #f0f8ff;\">\n<td style=\"padding: 10px; text-align: center;\">Continuous monitoring with Active Directory<\/td>\n<td style=\"padding: 10px; text-align: center;\">Immediate detection and prevention of suspicious activity<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_an_Active_Directory_Check_Password_Policy\"><\/span>Q: What is an Active Directory Check Password Policy?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Active Directory Check Password Policy is a feature on servers and computers running Microsoft Windows that helps keep passwords secure by setting rules for creating and using them. It can help make sure passwords are harder for hackers to guess and keep them from being reused.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_fine-grained_password_policies\"><\/span>Q: What are fine-grained password policies?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Fine-grained password policies allow organizations to set different password requirements for different sets of users within a domain, providing more granular control over password security.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_the_maximum_password_age_in_Active_Directory\"><\/span>Q: What is the maximum password age in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: The maximum password age is a security setting in Active Directory that specifies the maximum number of days that a password can be used before a user is required to change it.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_reversible_encryption_in_terms_of_password_policies\"><\/span>Q: What is reversible encryption in terms of password policies?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Reversible encryption is a security setting that should be disabled in password policies, as it allows for the retrieval of plaintext passwords from their encrypted form.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_can_I_view_the_default_domain_password_policy_settings_in_Active_Directory\"><\/span>Q: How can I view the default domain password policy settings in Active Directory?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: You can view the default domain password policy settings in Active Directory by accessing the Group Policy Management Console and navigating to the &#8220;Default Domain Policy&#8221; under the &#8220;Group Policy Objects&#8221; container.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_some_examples_of_password_complexity_requirements\"><\/span>Q: What are some examples of password complexity requirements?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Password complexity requirements may include the use of special characters, uppercase letters, lowercase letters, and numbers in passwords to create stronger and more secure passwords.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_can_fine-grained_password_policies_enhance_password_security_in_an_organization\"><\/span>Q: How can fine-grained password policies enhance password security in an organization?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Fine-grained password policies allow organizations to tailor password requirements to different user groups, ensuring that passwords are strong and compliant with security standards.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_multi-factor_authentication_and_how_does_it_relate_to_password_policies\"><\/span>Q: What is multi-factor authentication and how does it relate to password policies?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Multi-factor authentication is an additional layer of security that requires users to provide more than one form of verification to access an account. It can complement password policies by adding another level of protection against unauthorized access.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_can_password_audit_tools_help_organizations_ensure_password_security_compliance\"><\/span>Q: How can password audit tools help organizations ensure password security compliance?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Password audit tools like Specops Password Auditor can scan user passwords, identify unsafe passwords, and provide recommendations for improving password security based on compliance requirements and best practices.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Securely checking and updating your password policy in Active Directory is an important step to ensure your data is adequately protected. Make sure you keep it fresh and safe with a LogMeOnce account \u2013 the perfect free solution for users seeking a secure and reliable way to manage their credentials.\u00a0<a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">LogMeOnce<\/a> provides the perfect platform to effortlessly manage passwords and <a title=\"Check Password Policy Active Directory\" href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/\" data-abc=\"true\">check <\/a><a title=\"Granular Password Policy Active Directory\" href=\"https:\/\/logmeonce.com\/resources\/granular-password-policy-active-directory\/\" data-abc=\"true\">password policy active directory<\/a> in just a few clicks. With an array of features,\u00a0LogMeOnce\u2019s secure platform helps ensure your data is kept safe with features such as a password auditor and policy enforcer, giving users peace of mind that their account details remain protected.<\/p>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"137e5b76-d62e-425e-b147-24d07f1b2d87\" data-message-model-slug=\"gpt-4o\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Reference: <a href=\"https:\/\/logmeonce.com\/resources\/check-password-policy-active-directory\/\" target=\"_new\" rel=\"noopener\" data-abc=\"true\">Check Password Policy Active Directory<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Learn how to verify Password Policy Active Directory settings and ensure robust security measures. Enhance your account protection with LogMeOnce&#8217;s FREE Auto-login, SSO, and Identity Theft Protection.<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[6360,6522,5990,783],"class_list":["post-24938","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-check","tag-policy-2","tag-active-directory-2","tag-password"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/24938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=24938"}],"version-history":[{"count":2,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/24938\/revisions"}],"predecessor-version":[{"id":233773,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/24938\/revisions\/233773"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=24938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=24938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=24938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}