{"id":10945,"date":"2025-06-03T15:19:52","date_gmt":"2025-06-03T13:19:52","guid":{"rendered":"https:\/\/staging.netxconsult.de\/blog\/regeln_fur_outlook_erstellen\/"},"modified":"2025-06-03T15:19:52","modified_gmt":"2025-06-03T13:19:52","slug":"regeln_fur_outlook_erstellen","status":"publish","type":"post","link":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/","title":{"rendered":"Create rules for Outlook &#8211; ensure company security"},"content":{"rendered":"<p>Data security is the be-all and end-all. It is particularly important for companies to protect their data. After all, this is also data that determines the market position. Nowadays, hackers have many ways to attack from the comfort of their own homes. By email, for example. Many have already fallen victim to Trojans or ransomware.    <\/p>\n<p><a href=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Depositphotos_105262686_xl-2015-scaled.jpg\"><img decoding=\"async\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Depositphotos_105262686_xl-2015-280x300.jpg\" alt=\"\" width=\"280\" height=\"300\"><\/a><\/p>\n<p>However, not using the internet at all is of course not an option. To prevent the risk of a successful attack, warnings or blocking such files are helpful. In Outlook, it is very easy to create rules for certain senders or files:  <\/p>\n<h6><\/h6>\n<h6><\/h6>\n<h6><strong>1. open the Admin Center and switch to Exchange:<\/strong><\/h6>\n<p><a href=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Screenshot-Admin-Exchange-1.png\"><img decoding=\"async\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Screenshot-Admin-Exchange-1.png\" alt=\"\" width=\"516\" height=\"773\"><\/a><\/p>\n<h6><\/h6>\n<h6><\/h6>\n<h6><strong>2 Once there, go to the <em>Message flow<\/em> tab. You land directly in the<em> Rules<\/em> tab. Click on the <em>+<\/em> and you can create new rules:  <\/strong><\/h6>\n<p><a href=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Anmerkung-2020-05-22-101658.png\"><img decoding=\"async\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Anmerkung-2020-05-22-101658.png\" alt=\"\" width=\"697\" height=\"634\"><\/a><\/p>\n<p>Once here, click on <em>More options<\/em> and start filling in:<\/p>\n<h6><strong>3. now enter the key data for the new regulation.  <\/strong><\/h6>\n<p>Under <em>Apply this rule when &#8230;<\/em> you can select when this rule should take effect. Here you can choose between options such as the name of the sender or recipient or the content of the subject, the message text or the attachment.  <\/p>\n<p>If you want a rule to take effect when you receive an .exe file, for example, you can make the following selection and enter <em>.exe<\/em> as the keyword. Several keywords can be entered in each case. <\/p>\n<p><a href=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/exe.png\"><img decoding=\"async\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/exe.png\" alt=\"\" width=\"960\" height=\"332\"><\/a><\/p>\n<p>File types that should be blocked, according to the Microsoft Docs page (our source), are these:<\/p>\n<p>Ade, ADP, Ani, Bas, bat, CHM, cmd, com, CPL, CRT, HLP, HT, HTA, inf, ins, ISP, Job, JS, JSE, lnk, MDA, MDB, MDE, MDZ, MSC, MSI, MSP, MST, PCD, SHS, URL, VB, Visual Basic, VBS, WSC, WSF, WSH, exe, PIF.<\/p>\n<p>And a warning should be issued for these endings:<\/p>\n<p>DOTM, DOCM, XLSM, sltm, XLA, xlam, XLL, PPTM, POTM, PPAM, PPSM, sldm<\/p>\n<p>This is how to type them in:<\/p>\n<p><a href=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/endung-hinzuf%C3%BCgen.png\"><img decoding=\"async\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/endung-hinzuf%C3%BCgen.png\" alt=\"\" width=\"776\" height=\"634\"><\/a><\/p>\n<p>Then don&#8217;t forget to press the <strong>+<\/strong> to save the whole thing. You can add as many endings as you like here. <\/p>\n<p>Under <em>Proceed as follows &#8230; <\/em> I can now select what should happen as soon as a rule is triggered: Should the message be forwarded to a responsible person or deleted directly? Should it be redirected? &#8230;<\/p>\n<p>Hackers are not stupid. That&#8217;s why they use file formats that are often used in everyday life. That&#8217;s what makes it so dangerous. For this reason, it is also bad to block everything and delete it directly, otherwise problems will arise when employees have to send something to each other.   <\/p>\n<p>You should therefore pay attention to the last point:<\/p>\n<h6><\/h6>\n<h6><strong>4. add exception<\/strong><\/h6>\n<p>Be sure to use exceptions! Here you can choose when this rule is overridden. For example, when a trusted person sends or receives something.  <\/p>\n<p><a href=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Ausnahme.png\"><img decoding=\"async\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Ausnahme.png\" alt=\"\" width=\"964\" height=\"353\"><\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/de-de\/microsoft-365\/admin\/security-and-compliance\/secure-your-business-data?view=o365-worldwide#ransomware\">Microsoft Docs<\/a> has other features that help to make Outlook even more secure.<\/p>\n<p>Of course, every company has to decide for itself what arrangements to make and how to react. But it is definitely worth giving it some thought. <\/p>\n<p><strong>Questions about the Admin Center or the various Microsoft 365 packages? We are happy to take the time to answer your questions. Simply <a style=\"color: #00ccff;\" href=\"https:\/\/netxconsult.de\/en\/contact\/\">contact us via the contact form<\/a> or <a style=\"color: #00ccff;\" href=\"https:\/\/netxconsult.de\/en\/legal\/\">call us directly<\/a>!  <\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data security is the be-all and end-all. It is particularly  &#8230;<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[247],"tags":[],"class_list":["post-10945","post","type-post","status-publish","format-standard","hentry","category-it-security-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Loop Activation: A Step-by-Step Guide<\/title>\n<meta name=\"description\" content=\"To protect against dangerous ransomware, you can create rules for Outlook. This ensures the security of companies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Loop Activation: A Step-by-Step Guide\" \/>\n<meta property=\"og:description\" content=\"To protect against dangerous ransomware, you can create rules for Outlook. This ensures the security of companies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/\" \/>\n<meta property=\"og:site_name\" content=\"netX consult\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-03T13:19:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Depositphotos_105262686_xl-2015-280x300.jpg\" \/>\n<meta name=\"author\" content=\"MainMailWP\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"MainMailWP\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/\"},\"author\":{\"name\":\"MainMailWP\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/04723f19033e0e343c34e4f4adc2335a\"},\"headline\":\"Create rules for Outlook &#8211; ensure company security\",\"datePublished\":\"2025-06-03T13:19:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/\"},\"wordCount\":531,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Depositphotos_105262686_xl-2015-280x300.jpg\",\"articleSection\":[\"IT security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/\",\"name\":\"Microsoft Loop Activation: A Step-by-Step Guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Depositphotos_105262686_xl-2015-280x300.jpg\",\"datePublished\":\"2025-06-03T13:19:52+00:00\",\"description\":\"To protect against dangerous ransomware, you can create rules for Outlook. This ensures the security of companies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Depositphotos_105262686_xl-2015-280x300.jpg\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Depositphotos_105262686_xl-2015-280x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/regeln_fur_outlook_erstellen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Create rules for Outlook &#8211; ensure company security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"name\":\"netX consult\",\"description\":\"IT-Beratung\",\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\",\"name\":\"netX consult e.K.\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"width\":241,\"height\":240,\"caption\":\"netX consult e.K.\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netxconsult\\\/about\",\"https:\\\/\\\/www.youtube.com\\\/@netXconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/04723f19033e0e343c34e4f4adc2335a\",\"name\":\"MainMailWP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f427b96ea3f7c641530ce1581af6ff918699fb16e1eb5f497f944a0940417089?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f427b96ea3f7c641530ce1581af6ff918699fb16e1eb5f497f944a0940417089?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f427b96ea3f7c641530ce1581af6ff918699fb16e1eb5f497f944a0940417089?s=96&d=mm&r=g\",\"caption\":\"MainMailWP\"},\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/author\\\/mainmailwp\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Loop Activation: A Step-by-Step Guide","description":"To protect against dangerous ransomware, you can create rules for Outlook. This ensures the security of companies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Loop Activation: A Step-by-Step Guide","og_description":"To protect against dangerous ransomware, you can create rules for Outlook. This ensures the security of companies.","og_url":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/","og_site_name":"netX consult","article_published_time":"2025-06-03T13:19:52+00:00","og_image":[{"url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Depositphotos_105262686_xl-2015-280x300.jpg","type":"","width":"","height":""}],"author":"MainMailWP","twitter_card":"summary_large_image","twitter_misc":{"Written by":"MainMailWP","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/#article","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/"},"author":{"name":"MainMailWP","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/04723f19033e0e343c34e4f4adc2335a"},"headline":"Create rules for Outlook &#8211; ensure company security","datePublished":"2025-06-03T13:19:52+00:00","mainEntityOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/"},"wordCount":531,"commentCount":0,"publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Depositphotos_105262686_xl-2015-280x300.jpg","articleSection":["IT security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/","url":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/","name":"Microsoft Loop Activation: A Step-by-Step Guide","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/#primaryimage"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Depositphotos_105262686_xl-2015-280x300.jpg","datePublished":"2025-06-03T13:19:52+00:00","description":"To protect against dangerous ransomware, you can create rules for Outlook. This ensures the security of companies.","breadcrumb":{"@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/#primaryimage","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Depositphotos_105262686_xl-2015-280x300.jpg","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2020\/05\/Depositphotos_105262686_xl-2015-280x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/netxconsult.de\/en\/blog\/regeln_fur_outlook_erstellen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/netxconsult.de\/en\/"},{"@type":"ListItem","position":2,"name":"Create rules for Outlook &#8211; ensure company security"}]},{"@type":"WebSite","@id":"https:\/\/netxconsult.de\/en\/#website","url":"https:\/\/netxconsult.de\/en\/","name":"netX consult","description":"IT-Beratung","publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netxconsult.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netxconsult.de\/en\/#organization","name":"netX consult e.K.","url":"https:\/\/netxconsult.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","width":241,"height":240,"caption":"netX consult e.K."},"image":{"@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/netxconsult\/about","https:\/\/www.youtube.com\/@netXconsult"]},{"@type":"Person","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/04723f19033e0e343c34e4f4adc2335a","name":"MainMailWP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f427b96ea3f7c641530ce1581af6ff918699fb16e1eb5f497f944a0940417089?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f427b96ea3f7c641530ce1581af6ff918699fb16e1eb5f497f944a0940417089?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f427b96ea3f7c641530ce1581af6ff918699fb16e1eb5f497f944a0940417089?s=96&d=mm&r=g","caption":"MainMailWP"},"url":"https:\/\/netxconsult.de\/en\/blog\/author\/mainmailwp\/"}]}},"_links":{"self":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/10945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/comments?post=10945"}],"version-history":[{"count":0,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/10945\/revisions"}],"wp:attachment":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media?parent=10945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/categories?post=10945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/tags?post=10945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}