{"id":2553,"date":"2022-10-04T12:08:45","date_gmt":"2022-10-04T12:08:45","guid":{"rendered":"https:\/\/www.iseepassword.com\/blog\/?p=2553"},"modified":"2023-10-10T10:49:33","modified_gmt":"2023-10-10T10:49:33","slug":"how-do-you-enable-auditing-on-a-windows-server","status":"publish","type":"post","link":"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/","title":{"rendered":"how do you enable auditing on a windows server?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_69_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#How_do_I_audit_a_Windows_server\" title=\"How do I audit a Windows server?\">How do I audit a Windows server?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#How_do_I_enable_security_auditing\" title=\"How do I enable security auditing?\">How do I enable security auditing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#How_do_I_enable_NTFS_auditing\" title=\"How do I enable NTFS auditing?\">How do I enable NTFS auditing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#Where_do_you_go_to_turn_on_auditing_on_the_domain_level\" title=\"Where do you go to turn on auditing on the domain level?\">Where do you go to turn on auditing on the domain level?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#What_is_auditing_in_Windows_server\" title=\"What is auditing in Windows server?\">What is auditing in Windows server?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#What_is_auditing_a_server\" title=\"What is auditing a server?\">What is auditing a server?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#How_do_I_check_my_audit_settings\" title=\"How do I check my audit settings?\">How do I check my audit settings?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#What_is_Windows_audit_policy\" title=\"What is Windows audit policy?\">What is Windows audit policy?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#How_do_I_enable_file_and_folder_in_auditing\" title=\"How do I enable file and folder in auditing?\">How do I enable file and folder in auditing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#What_is_Windows_system_auditing\" title=\"What is Windows system auditing?\">What is Windows system auditing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#How_do_I_enable_audit_logon_events\" title=\"How do I enable audit logon events?\">How do I enable audit logon events?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#Why_is_it_important_to_enable_the_audit_service\" title=\"Why is it important to enable the audit service?\">Why is it important to enable the audit service?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#Why_is_it_important_to_audit_a_server\" title=\"Why is it important to audit a server?\">Why is it important to audit a server?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.iseepassword.com\/blog\/how-do-you-enable-auditing-on-a-windows-server\/#How_do_I_check_file_logs_on_a_server\" title=\"How do I check file logs on a server?\">How do I check file logs on a server?<\/a><\/li><\/ul><\/nav><\/div>\n<p>There are a few steps you need to take in order to enable auditing on a Windows Server. <\/p>\n<p>First, you need to open the Local Security Policy console by going to Start &gt; Run and typing in secpol.msc. <\/p>\n<p>Once the console is open, expand the Local Policies node and click on Audit Policy. <\/p>\n<p>In the right pane, double-click on the Audit object access policy. <\/p>\n<p>Select Define these policy settings and click OK. <\/p>\n<p>Check both Success and Failure for Object Access and click OK again.<br \/>\nrestart computer<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_I_audit_a_Windows_server\"><\/span>How do I audit a Windows server?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_I_enable_security_auditing\"><\/span>How do I enable security auditing?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are a few different ways to enable security auditing, depending on your specific needs. One way is to use the Windows Security Auditpol tool. This tool allows you to enable or disable specific types of audits, as well as set how often they should be generated. Another way to enable security auditing is through Group Policy. You can access the Group Policy editor by typing gpedit.msc into the Run dialog box. Once you have opened the Group Policy editor, navigate to Computer Configuration &gt; Policies &gt; Windows Settings &gt; Security Settings &gt; Local Policies &gt; Audit Policy. From here, you can enable or disable various audit policies.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_I_enable_NTFS_auditing\"><\/span>How do I enable NTFS auditing?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In order to enable NTFS auditing, you will need to modify your Group Policy settings. Under Computer Configuration -&gt; Windows Settings -&gt; Security Settings -&gt; Local Policies -&gt; Audit Policy, you will need to enable the &#8220;Audit object access&#8221; policy. You can also specify which types of events should be audited under this policy.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Where_do_you_go_to_turn_on_auditing_on_the_domain_level\"><\/span>Where do you go to turn on auditing on the domain level?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To turn on auditing at the domain level, you would need to be logged in with an account that has administrative privileges. Once you are logged in, you would go to &#8220;Computer Configuration&#8221; &gt; &#8220;Windows Settings&#8221; &gt; &#8220;Security Settings&#8221; &gt; &#8220;Local Policies&#8221; &gt; &#8220;Audit Policy&#8221;. From here, you can enable or disable various auditing policies.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_auditing_in_Windows_server\"><\/span>What is auditing in Windows server?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Auditing in Windows Server is a feature that allows administrators to track and log user activity on a server. This can be useful for auditing purposes or for tracking down user activity in the event of a security incident. There are two types of auditing in Windows Server: object access auditing and privileged access auditing. Object access auditing tracks when users attempt to access objects such as files, folders, or registry keys. Privileged access auditing tracks when users attempt to perform actions that require elevated privileges, such as creating new user accounts or changing system settings.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_auditing_a_server\"><\/span>What is auditing a server?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Auditing a server is the process of examining the server&#8217;s configuration and security settings to ensure that it is compliant with organizational policies and industry best practices. This can be done manually or using automated tools.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_I_check_my_audit_settings\"><\/span>How do I check my audit settings?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The best way to check your audit settings is to contact your auditing firm or accountant. They will be able to provide you with the most accurate and up-to-date information on your specific situation.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_Windows_audit_policy\"><\/span>What is Windows audit policy?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Windows audit policy is a set of rules that dictate what events should be audited on a computer system running Microsoft Windows. These rules can be configured by administrators to help monitor and track activity on the system, as well as to identify potential security risks.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_I_enable_file_and_folder_in_auditing\"><\/span>How do I enable file and folder in auditing?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In order to enable auditing for files and folders, you will need to modify the security settings for the desired objects. To do this, open the Properties dialog for the file or folder in question, select the Security tab, and then click on the Advanced button. In the Advanced Security Settings dialog, select the Auditing tab, and then click on the &#8220;Edit&#8221; button. This will bring up a list of users and groups that have been granted or denied access to the object; from here you can add or remove entries as needed.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_Windows_system_auditing\"><\/span>What is Windows system auditing?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>System auditing is the process of monitoring and reviewing activity on a computer system in order to identify unauthorized or unusual activity. This can be done manually, using tools like Event Viewer or Task Manager, or by setting up automated alerts.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_I_enable_audit_logon_events\"><\/span>How do I enable audit logon events?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In order to enable audit logon events, you will need to modify the security settings for your computer. To do this, open the Control Panel and select &#8220;Security Options.&#8221; Under the &#8220;Local Policies&#8221; section, click on &#8220;Audit Policy.&#8221; Double-click on the policy titled &#8220;Audit Logon Events.&#8221; Select the option labeled &#8220;Define these policy settings.&#8221; Choose whether to enable auditing for successful or failed logon attempts, or both. Click OK to save your changes.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_is_it_important_to_enable_the_audit_service\"><\/span>Why is it important to enable the audit service?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are several reasons why enabling the audit service is important: <\/p>\n<p>1. It provides a mechanism for tracking user activity and identifying potential security issues.<br \/>\n2. It can help with troubleshooting system problems.<br \/>\n3. It can be used to generate reports that show which users accessed which resources and when.<br \/>\n4. It can help assess compliance with internal policies or external regulations.<br \/>\n5. In some cases, it may be required by law or corporate policy.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_is_it_important_to_audit_a_server\"><\/span>Why is it important to audit a server?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It is important to audit a server for several reasons: <\/p>\n<p>1. To ensure the security of the server and its data.<br \/>\n2. To ensure compliance with internal policies and external regulations.<br \/>\n3. To identify potential performance bottlenecks or configuration issues.<br \/>\n4. To prevent unauthorized access to the server or its data.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_I_check_file_logs_on_a_server\"><\/span>How do I check file logs on a server?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are a few ways to check file logs on a server. One way is to use the command line tool &#8220;tail&#8221;. This will display the last few lines of a log file. Another way is to use a text editor such as vim or nano to open the log file and view it.<br \/>\n{&#8220;@context&#8221;:&#8221;https:\/\/schema.org&#8221;,&#8221;@type&#8221;:&#8221;FAQPage&#8221;,&#8221;mainEntity&#8221;:[{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;How do I enable security auditing?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnThere are a few different ways to enable security auditing, depending on your specific needs. One way is to use the Windows Security Auditpol tool. This tool allows you to enable or disable specific types of audits, as well as set how often they should be generated. Another way to enable security auditing is through Group Policy. You can access the Group Policy editor by typing gpedit.msc into the Run dialog box. Once you have opened the Group Policy editor, navigate to Computer Configuration &gt; Policies &gt; Windows Settings &gt; Security Settings &gt; Local Policies &gt; Audit Policy. From here, you can enable or disable various audit policies.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;How do I enable NTFS auditing?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnIn order to enable NTFS auditing, you will need to modify your Group Policy settings. Under Computer Configuration -&gt; Windows Settings -&gt; Security Settings -&gt; Local Policies -&gt; Audit Policy, you will need to enable the &#8220;Audit object access&#8221; policy. You can also specify which types of events should be audited under this policy.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;Where do you go to turn on auditing on the domain level?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnTo turn on auditing at the domain level, you would need to be logged in with an account that has administrative privileges. Once you are logged in, you would go to &#8220;Computer Configuration&#8221; &gt; &#8220;Windows Settings&#8221; &gt; &#8220;Security Settings&#8221; &gt; &#8220;Local Policies&#8221; &gt; &#8220;Audit Policy&#8221;. From here, you can enable or disable various auditing policies.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;What is auditing in Windows server?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnAuditing in Windows Server is a feature that allows administrators to track and log user activity on a server. This can be useful for auditing purposes or for tracking down user activity in the event of a security incident. There are two types of auditing in Windows Server: object access auditing and privileged access auditing. Object access auditing tracks when users attempt to access objects such as files, folders, or registry keys. Privileged access auditing tracks when users attempt to perform actions that require elevated privileges, such as creating new user accounts or changing system settings.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;What is auditing a server?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnAuditing a server is the process of examining the server&#8217;s configuration and security settings to ensure that it is compliant with organizational policies and industry best practices. This can be done manually or using automated tools.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;How do I check my audit settings?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnThe best way to check your audit settings is to contact your auditing firm or accountant. They will be able to provide you with the most accurate and up-to-date information on your specific situation.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;What is Windows audit policy?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnWindows audit policy is a set of rules that dictate what events should be audited on a computer system running Microsoft Windows. These rules can be configured by administrators to help monitor and track activity on the system, as well as to identify potential security risks.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;How do I enable file and folder in auditing?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnIn order to enable auditing for files and folders, you will need to modify the security settings for the desired objects. To do this, open the Properties dialog for the file or folder in question, select the Security tab, and then click on the Advanced button. In the Advanced Security Settings dialog, select the Auditing tab, and then click on the &#8220;Edit&#8221; button. This will bring up a list of users and groups that have been granted or denied access to the object; from here you can add or remove entries as needed.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;What is Windows system auditing?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnSystem auditing is the process of monitoring and reviewing activity on a computer system in order to identify unauthorized or unusual activity. This can be done manually, using tools like Event Viewer or Task Manager, or by setting up automated alerts.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;How do I enable audit logon events?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnIn order to enable audit logon events, you will need to modify the security settings for your computer. To do this, open the Control Panel and select &#8220;Security Options.&#8221; Under the &#8220;Local Policies&#8221; section, click on &#8220;Audit Policy.&#8221; Double-click on the policy titled &#8220;Audit Logon Events.&#8221; Select the option labeled &#8220;Define these policy settings.&#8221; Choose whether to enable auditing for successful or failed logon attempts, or both. Click OK to save your changes.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;Why is it important to enable the audit service?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnThere are several reasons why enabling the audit service is important: nn1. It provides a mechanism for tracking user activity and identifying potential security issues.n2. It can help with troubleshooting system problems.n3. It can be used to generate reports that show which users accessed which resources and when.n4. It can help assess compliance with internal policies or external regulations.n5. In some cases, it may be required by law or corporate policy.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;Why is it important to audit a server?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnIt is important to audit a server for several reasons: nn1. To ensure the security of the server and its data. n2. To ensure compliance with internal policies and external regulations. n3. To identify potential performance bottlenecks or configuration issues. n4. To prevent unauthorized access to the server or its data.&#8221;}},{&#8220;@type&#8221;:&#8221;Question&#8221;,&#8221;name&#8221;:&#8221;How do I check file logs on a server?&#8221;,&#8221;acceptedAnswer&#8221;:{&#8220;@type&#8221;:&#8221;Answer&#8221;,&#8221;text&#8221;:&#8221;nnThere are a few ways to check file logs on a server. One way is to use the command line tool &#8220;tail&#8221;. This will display the last few lines of a log file. Another way is to use a text editor such as vim or nano to open the log file and view it.&#8221;}}]}<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a few steps you need to take in order to enable auditing on a Windows Server. First, you need to open the Local Security Policy console by going to Start &gt; Run and typing in secpol.msc. Once the console is open, expand the Local Policies node and click on Audit Policy. In the [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2553","post","type-post","status-publish","format-standard","hentry","category-resources"],"_links":{"self":[{"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/posts\/2553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/comments?post=2553"}],"version-history":[{"count":2,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/posts\/2553\/revisions"}],"predecessor-version":[{"id":11680,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/posts\/2553\/revisions\/11680"}],"wp:attachment":[{"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/media?parent=2553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/categories?post=2553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iseepassword.com\/blog\/wp-json\/wp\/v2\/tags?post=2553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}