{"id":255,"date":"2020-11-10T14:56:35","date_gmt":"2020-11-10T20:56:35","guid":{"rendered":"https:\/\/idsinc.com\/?p=255"},"modified":"2021-11-30T14:18:46","modified_gmt":"2021-11-30T20:18:46","slug":"finely-tuned-006-the-main-event","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/finely-tuned-006-the-main-event\/","title":{"rendered":"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">By Bobby R. Williams Jr. on 11\/10\/20 7:00 AM<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Investigators don\u2019t start with answers. We ask questions. Our mission (should we choose to accept it) is to determine what happened and when. There may be a valuable gem hidden in your data, but we won\u2019t know until we start digging. In the expanding digital universe, there are artifacts all around us. Knowing what they are and how to parse them is key to uncovering the narrative within the data. If you need to construct a timeline of events, the Event logs on Windows workstations and servers are a great place to start.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\">Event logs track many useful actions. Events such as logons, log offs and machine power are just a few examples. If you are responding to an incident, event logs will likely be a vital source of information. To ensure that information is there when you need it, you need to ensure that logs are archived. Sounds simple right?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">There are configuration settings you control that help determine how far back your logs may go. If you simply use the default settings, the size may be too small to save the key event logs. It\u2019s also helpful to know which logs track which events. This can help you decide where to make changes to your log archiving protocol.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-are-event-logs-significant\"><strong>Why are event logs significant?<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Much like middle children, event logs are often an afterthought. Organizations focus a lot on preventive security measures, like access points, authentication and encryption. This is important. You want to be proactive. In digital forensics and cyber security investigations, you need to reconstruct what happened. Who had access? When? Event logs can hold the answers, whether determining the activities of a departed employee, responding to an incident or defending an active intrusion. If you are not intentional about how logs are managed, you may be letting the answers to future questions slip through your \u2026 hard drives.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What\u2019s my takeaway?<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Understand that there may not be a single main event in your investigation. The answers often lie in correlating a series of events. A qualified expert can help you understand event log entries and get closer to what happened. In order to do this, you need to make sure event logs are being archived with an intentional protocol.<\/li><li>Expanding the size of key log files can help you retain more data. New events can push old events out once you reach max log size. Fortunately, machine storage has become relatively inexpensive and generating logs will not hog your resources. So, increase the size of important Event Logs from 20 MB to a few GB. I say increase the size of all logs whenever possible. If size and storage space is still a concern, choose key logs for expanded size. My colleague Jonathan Karchmer recommends Security.evtx as an example of where to focus.<\/li><li>If your organization is not already doing so, consider using SIEM technology to aggregate and examine Event Logs. At a minimum, start by forwarding Event Logs from critical workstations, and backing up machine and server Event Logs to another repository. Redundancy helps secure against data loss. When events age out on your computers and servers, the backup location could contain years of activity that would have been lost otherwise. For organizations with more advanced security postures, utilizing and tuning SIEM will help in proactive \u201chunting\u201d for bad guys. A qualified expert may be able to start triage simply by collecting a copy of your archived event logs, which could then help target an investigation and save you money.<\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">These simple steps can help get your organization closer to being ready for the main event.<\/p>","protected":false},"excerpt":{"rendered":"<p>By Bobby R. Williams Jr. on 11\/10\/20 7:00 AM Investigators don\u2019t start with answers. We ask questions. Our mission (should we choose to accept it) is to determine what happened and when. There may be a valuable gem hidden in your data, but we won\u2019t know until we start digging. In the expanding digital universe, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2398,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Finely Tuned \u2013 006 The Main Event - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/finely-tuned-006-the-main-event\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators\" \/>\n<meta property=\"og:description\" content=\"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/finely-tuned-006-the-main-event\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-10T20:56:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-30T20:18:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bobby R. Williams, Jr.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bobby R. Williams, Jr.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\"},\"author\":{\"name\":\"Bobby R. Williams, Jr.\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/51826f1058472210a83b02aaabace2ca\"},\"headline\":\"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators\",\"datePublished\":\"2020-11-10T20:56:35+00:00\",\"dateModified\":\"2021-11-30T20:18:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\"},\"wordCount\":623,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202018.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\",\"name\":\"Finely Tuned \u2013 006 The Main Event - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202018.jpg\",\"datePublished\":\"2020-11-10T20:56:35+00:00\",\"dateModified\":\"2021-11-30T20:18:46+00:00\",\"description\":\"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202018.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/iDS-NewLogoBlogImages-202018.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/finely-tuned-006-the-main-event\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/51826f1058472210a83b02aaabace2ca\",\"name\":\"Bobby R. Williams, Jr.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g\",\"caption\":\"Bobby R. Williams, Jr.\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/bobby\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Finely Tuned \u2013 006 The Main Event - iDiscovery Solutions","description":"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/finely-tuned-006-the-main-event\/","og_locale":"en_GB","og_type":"article","og_title":"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators","og_description":"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.","og_url":"https:\/\/idsinc.com\/en_gb\/finely-tuned-006-the-main-event\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-11-10T20:56:35+00:00","article_modified_time":"2021-11-30T20:18:46+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","type":"image\/jpeg"}],"author":"Bobby R. Williams, Jr.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bobby R. Williams, Jr.","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/"},"author":{"name":"Bobby R. Williams, Jr.","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/51826f1058472210a83b02aaabace2ca"},"headline":"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators","datePublished":"2020-11-10T20:56:35+00:00","dateModified":"2021-11-30T20:18:46+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/"},"wordCount":623,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/","url":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/","name":"Finely Tuned \u2013 006 The Main Event - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","datePublished":"2020-11-10T20:56:35+00:00","dateModified":"2021-11-30T20:18:46+00:00","description":"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power.","breadcrumb":{"@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2020\/07\/iDS-NewLogoBlogImages-202018.jpg","width":2500,"height":1250,"caption":"To ensure that data is there when needed, keep log archives. Windows Event logs tracks actions like logons, log offs and machine power."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/finely-tuned-006-the-main-event\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Finely Tuned \u2013 006 The Main Event: Windows Event Logs are Tools for Investigators"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/51826f1058472210a83b02aaabace2ca","name":"Bobby R. Williams, Jr.","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d68bb652098b4da6daf0a0f15071be9cb0fcd2b2a21f8491afcf25e58e120e7?s=96&d=mm&r=g","caption":"Bobby R. Williams, Jr."},"url":"https:\/\/idsinc.com\/en_gb\/author\/bobby\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=255"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/255\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2398"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}