{"id":1381,"date":"2023-03-24T10:14:05","date_gmt":"2023-03-24T10:14:05","guid":{"rendered":"https:\/\/www.kayimpex.com\/blog\/?p=1381"},"modified":"2023-06-19T12:40:00","modified_gmt":"2023-06-19T12:40:00","slug":"it-simplified-dmarc","status":"publish","type":"post","link":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/","title":{"rendered":"IT Simplified: DMARC"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is DMARC?<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Domain-based Message Authentication, Reporting &amp; Conformance<\/strong> (<strong>DMARC)<\/strong>  is an open email authentication protocol that provides domain-level protection of the <a title=\"email channel\" href=\"https:\/\/docs.aws.amazon.com\/pinpoint\/latest\/apireference\/apps-application-id-channels-email.html\" target=\"_blank\" rel=\"noopener\">email channel<\/a>. DMARC authentication detects and prevents <strong>email spoofing techniques<\/strong> used in phishing, business email compromise (BEC) and other email-based attacks. <br>DMARC, the sole widely adopted technology, enhances the trustworthiness of the &#8220;from&#8221; domain in email headers by leveraging existing standards.<br>The domain owner can establish a DMARC record in the DNS servers, specifying actions for unauthenticated emails.<\/p>\n\n\n\n<p>To understand DMARC it is also important to know a few other mail authentication protocols\u00a0 specifically SPF and DKIM<strong>. SPF<\/strong> Organizations can authorize senders within an SPF record published in the Domain Name System (DNS). <br>The record contains approved sender IP addresses, including those authorized to send emails on behalf of the organization. Publishing and checking SPF records provide a reliable defense against email threats that falsify &#8220;from&#8221; addresses and domains. <br>DKIM is an email authentication protocol enabling receivers to verify if an email was genuinely authorized by its owner. It allows an organization to take responsibility for transmitting a message by attaching a digital signature to it. Verification is done through cryptographic authentication using the signer\u2019s public key published in the DNS. The signature ensures that parts of the email have not been modified since the time the digital signature was attached.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2023\/06\/DMARC-2-1-1024x538.jpg\" alt=\"How DMARC works\" class=\"wp-image-1690\" width=\"607\" height=\"318\" srcset=\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2023\/06\/DMARC-2-1-1024x538.jpg 1024w, https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2023\/06\/DMARC-2-1-300x158.jpg 300w, https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2023\/06\/DMARC-2-1-768x403.jpg 768w, https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2023\/06\/DMARC-2-1.jpg 1200w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How does DMARC Work?<\/h2>\n\n\n\n<p><br>To pass DMARC authentication, a message must successfully undergo SPF and SPF alignment checks or DKIM and DKIM alignment checks. If a message fails DMARC, senders can instruct receivers on what to do with that message via a DMARC policy. There are three DMARC policies the domain owner can enforce: none (the message is delivered to the recipient and the DMARC report is sent to the domain owner), quarantine (the message is moved to a quarantine folder) and reject (the message is not delivered at all).<\/p>\n\n\n\n<p>The DMARC policy of \u201cnone\u201d is a good first step. This way, the domain owner can ensure that all legitimate email is authenticating properly. The domain owner receives DMARC reports to help them make sure that all legitimate email is identified and passes authentication. Once the domain owner is confident they have identified all legitimate senders and have fixed authentication issues, they can move to a policy of \u201creject\u201d and block phishing, business email compromise, and other email fraud attacks. As an email receiver, an organization can ensure that its secure email gateway enforces the DMARC policy implemented to the domain owner.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is DMARC in Marketing Cloud?<\/h2>\n\n\n\n<p>DMARC can be used by email service providers and domain owners to set policies that limit the usage of their domain. One such policy is restricting the domain&#8217;s usage in &#8220;from&#8221; addresses, which effectively prohibits anyone from using the domain in the &#8220;from&#8221; field except when using the provider&#8217;s webmail interface. any email service provider or domain owner can publish this type of restrictive DMARC policy can be published by  Having a powerful <a title=\"CLOUD SERVICES\" href=\"https:\/\/kayimpex.com\/cloud-services.html\" target=\"_blank\" rel=\"noopener ugc\">CLOUD SERVICES<\/a> is very important as will protect employees against inbound email threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Points to note while authenticating DMARC:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Due to the volume of DMARC reports that an email sender can receive and the <strong>lack of clarity<\/strong> provided within DMARC reports, fully implementing DMARC authentication can be difficult.<\/li>\n\n\n\n<li>DMARC parsing tools can help organizations <strong>make sense of the information<\/strong> included within DMARC reports.<\/li>\n\n\n\n<li><strong>Additional data and insights<\/strong> beyond what\u2019s included within DMARC reports help organizations to identify email senders faster and more accurately. This helps speed up the process of implementing DMARC authentication and reduces the risk of blocking legitimate email.<\/li>\n\n\n\n<li>Organizations can create a DMARC record in minutes and start <strong>gaining visibility<\/strong> through DMARC reports by enforcing a DMARC policy of \u201cnone.\u201d<\/li>\n\n\n\n<li>By properly identifying all legitimate email senders &#8211; including third-party email service providers\u2014and fixing any authentication issues, organizations should reach a <strong>high confidence level<\/strong> before enforcing a DMARC policy of \u201creject\u201d.<\/li>\n<\/ul>\n\n\n\n<p><a title=\"Click for more IT-related content\" href=\"https:\/\/www.kayimpex.com\/blog\/\">Click for more IT-related content<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is DMARC? Domain-based Message Authentication, Reporting &amp; Conformance (DMARC) is an open email authentication protocol that provides domain-level protection [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1641,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[11,12,369,13],"tags":[24,33,65,190,229,327],"class_list":["post-1381","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-servers","category-service","category-software","tag-ai","tag-artificial-intelligence","tag-cloud-computing","tag-it","tag-microsoft","tag-technology"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Simplified: DMARC -<\/title>\n<meta name=\"description\" content=\"DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC) and other email-based attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Simplified: DMARC -\" \/>\n<meta property=\"og:description\" content=\"DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC) and other email-based attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/kayimpex\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-24T10:14:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-19T12:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2023\/06\/DMARC-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krishna Jhaveri\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@kay_impex\" \/>\n<meta name=\"twitter:site\" content=\"@kay_impex\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krishna Jhaveri\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/\"},\"author\":{\"name\":\"Krishna Jhaveri\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/ee6166c7a6bca1984bc8b7178664b24c\"},\"headline\":\"IT Simplified: DMARC\",\"datePublished\":\"2023-03-24T10:14:05+00:00\",\"dateModified\":\"2023-06-19T12:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/\"},\"wordCount\":661,\"publisher\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#organization\"},\"keywords\":[\"AI\",\"artificial intelligence\",\"cloud computing\",\"IT\",\"Microsoft\",\"technology\"],\"articleSection\":[\"security\",\"servers\",\"Service\",\"software\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/\",\"url\":\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/\",\"name\":\"IT Simplified: DMARC -\",\"isPartOf\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#website\"},\"datePublished\":\"2023-03-24T10:14:05+00:00\",\"dateModified\":\"2023-06-19T12:40:00+00:00\",\"description\":\"DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC) and other email-based attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kayimpex.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Simplified: DMARC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#website\",\"url\":\"https:\/\/www.kayimpex.com\/blog\/\",\"name\":\"kayimpex.com\",\"description\":\"Understanding Cyber Security Trends in 2024\",\"publisher\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kayimpex.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#organization\",\"name\":\"Kay Impex\",\"url\":\"https:\/\/www.kayimpex.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2024\/09\/PastedGraphic-4-1.png\",\"contentUrl\":\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2024\/09\/PastedGraphic-4-1.png\",\"width\":153,\"height\":91,\"caption\":\"Kay Impex\"},\"image\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/kayimpex\/\",\"https:\/\/twitter.com\/kay_impex\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/ee6166c7a6bca1984bc8b7178664b24c\",\"name\":\"Krishna Jhaveri\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8a532be5c3f43bc3d1be6ef69353a6cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8a532be5c3f43bc3d1be6ef69353a6cf?s=96&d=mm&r=g\",\"caption\":\"Krishna Jhaveri\"},\"url\":\"https:\/\/www.kayimpex.com\/blog\/author\/janhavi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Simplified: DMARC -","description":"DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC) and other email-based attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/","og_locale":"en_US","og_type":"article","og_title":"IT Simplified: DMARC -","og_description":"DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC) and other email-based attacks.","og_url":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/","article_publisher":"https:\/\/www.facebook.com\/kayimpex\/","article_published_time":"2023-03-24T10:14:05+00:00","article_modified_time":"2023-06-19T12:40:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2023\/06\/DMARC-1.jpg","type":"image\/jpeg"}],"author":"Krishna Jhaveri","twitter_card":"summary_large_image","twitter_creator":"@kay_impex","twitter_site":"@kay_impex","twitter_misc":{"Written by":"Krishna Jhaveri","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/#article","isPartOf":{"@id":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/"},"author":{"name":"Krishna Jhaveri","@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/ee6166c7a6bca1984bc8b7178664b24c"},"headline":"IT Simplified: DMARC","datePublished":"2023-03-24T10:14:05+00:00","dateModified":"2023-06-19T12:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/"},"wordCount":661,"publisher":{"@id":"https:\/\/www.kayimpex.com\/blog\/#organization"},"keywords":["AI","artificial intelligence","cloud computing","IT","Microsoft","technology"],"articleSection":["security","servers","Service","software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/","url":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/","name":"IT Simplified: DMARC -","isPartOf":{"@id":"https:\/\/www.kayimpex.com\/blog\/#website"},"datePublished":"2023-03-24T10:14:05+00:00","dateModified":"2023-06-19T12:40:00+00:00","description":"DMARC is an open email authentication protocol that provides domain-level protection of the email channel. DMARC authentication detects and prevents email spoofing techniques used in phishing, business email compromise (BEC) and other email-based attacks.","breadcrumb":{"@id":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kayimpex.com\/blog\/2023\/03\/24\/it-simplified-dmarc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kayimpex.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IT Simplified: DMARC"}]},{"@type":"WebSite","@id":"https:\/\/www.kayimpex.com\/blog\/#website","url":"https:\/\/www.kayimpex.com\/blog\/","name":"kayimpex.com","description":"Understanding Cyber Security Trends in 2024","publisher":{"@id":"https:\/\/www.kayimpex.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kayimpex.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kayimpex.com\/blog\/#organization","name":"Kay Impex","url":"https:\/\/www.kayimpex.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2024\/09\/PastedGraphic-4-1.png","contentUrl":"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2024\/09\/PastedGraphic-4-1.png","width":153,"height":91,"caption":"Kay Impex"},"image":{"@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/kayimpex\/","https:\/\/twitter.com\/kay_impex"]},{"@type":"Person","@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/ee6166c7a6bca1984bc8b7178664b24c","name":"Krishna Jhaveri","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8a532be5c3f43bc3d1be6ef69353a6cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a532be5c3f43bc3d1be6ef69353a6cf?s=96&d=mm&r=g","caption":"Krishna Jhaveri"},"url":"https:\/\/www.kayimpex.com\/blog\/author\/janhavi\/"}]}},"featured_media_src_url":"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2023\/06\/DMARC-1-1024x538.jpg","_links":{"self":[{"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/posts\/1381"}],"collection":[{"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/comments?post=1381"}],"version-history":[{"count":14,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/posts\/1381\/revisions"}],"predecessor-version":[{"id":1699,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/posts\/1381\/revisions\/1699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/media\/1641"}],"wp:attachment":[{"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/media?parent=1381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/categories?post=1381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/tags?post=1381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}