{"id":177,"date":"2012-09-19T03:00:00","date_gmt":"2012-09-19T03:00:00","guid":{"rendered":"http:\/\/marcbook.local\/wds\/playground\/cybertrust\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/"},"modified":"2023-05-15T23:06:27","modified_gmt":"2023-05-16T06:06:27","slug":"microsofts-free-security-tools-windows-defender-offline","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/","title":{"rendered":"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline"},"content":{"rendered":"

UPDATE:<\/strong> For the most relevant information on Windows Defender Offline, please visit the Microsoft support page on Windows Defender offline<\/a>. We can ensure this page stays updated with the most relevant information on how to help protect your PC with Windows Defender Offline.<\/h4>\n

This article in our series focused on Microsoft\u2019s free security tools is on a tool called Windows Defender Offline<\/strong>.\u00a0 Windows Defender Offline is a standalone software application that is designed to help detect malicious and other potentially unwanted software, including rootkits that try to install themselves on a PC.\u00a0 Once on a PC, this software might run immediately, or it might run at unexpected times. Windows Defender Offline works by scanning an operating system to check the authenticity of any communication the operating system has with the Internet. If there is an application deemed unsafe, it will alert the user and block the contents of the application until the user either accepts or denies the risk.<\/p>\n

Many of the enterprise customers I talk to about malware have told me that when they find a system in their environment that is infected, they simply reformat the system and install a clean copy of their standard desktop or server image.\u00a0 They do this because for them it\u2019s the fastest, most efficient way to recover the system.\u00a0 In these types of situations, running Windows Defender Offline might help to resolve the issue and eliminate the need to reformat the system.\u00a0 It might also provide valuable information on the malware infection that could help to protect other systems in the environment.<\/p>\n

The primary benefit of using this tool is that it runs before malware, such as rootkits, can hide. When you perform a post-event malware scan and remediation by running the scan on a system infected with advanced low-level malware, the malware has a chance to run first. The malware itself may be intercepting the antimalware software\u2019s attempts to inspect, take actions, or communicate to the user. When you run an \u201coffline\u201d tool like Windows Defender Offline, you\u2019re bringing your own known-good, clean operating environment with you along with the scanner. You are booting the computer from that clean operating environment, and then running the scanner and inspecting the potentially compromised hard disk\u2019s operating system, programs and data. As such, there\u2019s integrity in the system during the \u201coffline\u201d scan. Malware that\u2019s deeply rooted in the operating system won\u2019t have the opportunity to run and hide before the scanner starts. The malware exists on the disk where it can be found and mitigated but is not actually running, so it\u2019s inhibited from being able to intercept and interfere with the scanner\u2019s activities<\/p>\n

Because Windows Defender Offline works from a clean environment, it’s a good idea if you can get access to another computer running Windows that you know is free from infection. You can use this “known-good” computer to download and install Windows Defender Offline onto removable media, such as a CD, DVD or USB flash drive, as described in Step #1 below. Using a second, known-good computer will ensure that any malware you may have on your infected PC doesn’t interfere with the download of Windows Defender Offline.\u00a0 If you can’t use a separate, known-good computer, then by all means it’s worth trying to download and install the tool with the infected PC, however Windows Defender Offline may not operate correctly.<\/p>\n

To use Windows Defender Offline, you need to follow four basic steps:<\/p>\n

Step #1<\/strong> Find a blank CD, DVD, or USB flash drive with at least 250 MB of free space. On a known-good (or \u201cuninfected\u201d) machine, download and run Windows Defender Offline \u2013 the tool will help you install it on your blank CD, DVD or USB flash drive:<\/p>\n

\"\"<\/a><\/p>\n

Step #2<\/strong> Insert the Windows Defender Offline media you created in Step #1 into the potentially infected PC and restart the PC.\u00a0 You will be prompted to run a scan:<\/p>\n

\"\"<\/a><\/p>\n

Step #3 Scan your PC for malicious and other potentially unwanted software.<\/p>\n

\"\"<\/a><\/p>\n

Step #4<\/strong> If Windows Defender Offline finds any malware on the infected PC, it will allow you to \u2018Clean PC\u2019, which will remove or quarantine the affected files:<\/p>\n

\"\"<\/a><\/p>\n

Windows Defender Offline will walk you through the details of these four steps when you’re using the tool. If you’ve been prompted in Microsoft Security Essentials or Windows Defender to download and run Windows Defender Offline, it’s important that you do so to make sure that your data and your PC isn’t compromised.<\/p>\n

Because new threats appear daily, it’s important to always have the most up-to-date version of Windows Defender Offline. Armed with up-to-date definition files, Windows Defender Offline can detect malicious and potentially unwanted software, and then notify you of the risks.<\/p>\n

Tim Rains
\nDirector
\nTrustworthy Computing<\/p>\n

<\/div>\n","protected":false},"excerpt":{"rendered":"

This article in our series <\/a>focused on Microsoft’s free security tools is on a tool called Windows Defender Offline<\/strong>.  Windows Defender Offline is a standalone software application that is designed to help detect malicious and other potentially unwanted software, including rootkits that try to install themselves on a PC.  Once on a PC, this software might run immediately, or it might run at unexpected times. Windows Defender Offline works by scanning an operating system to check the authenticity of any communication the operating system has with the Internet. If there is an application deemed unsafe, it will alert the user and block the contents of the application until the user either accepts or denies the risk.<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3663],"topic":[3687],"products":[3690],"threat-intelligence":[3732],"tags":[],"coauthors":[1954],"class_list":["post-177","post","type-post","status-publish","format-standard","hentry","content-type-research","topic-threat-intelligence","products-microsoft-defender","threat-intelligence-influence-operations"],"yoast_head":"\nMicrosoft\u2019s Free Security Tools \u2013 Windows Defender Offline | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"This article in our series focused on Microsoft’s free security tools is on a tool called Windows Defender Offline.  Windows Defender Offline is a standalone software application that is designed to help detect malicious and other potentially unwanted software, including rootkits that try to install themselves on a PC.  Once on a PC, this software might run immediately, or it might run at unexpected times. Windows Defender Offline works by scanning an operating system to check the authenticity of any communication the operating system has with the Internet. If there is an application deemed unsafe, it will alert the user and block the contents of the application until the user either accepts or denies the risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-19T03:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:06:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/uploads\/2012\/09\/7444.2.jpg\" \/>\n<meta name=\"author\" content=\"Tim Rains\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Rains\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/timrains\/\",\"@type\":\"Person\",\"@name\":\"Tim Rains\"}],\"headline\":\"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline\",\"datePublished\":\"2012-09-19T03:00:00+00:00\",\"dateModified\":\"2023-05-16T06:06:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/\"},\"wordCount\":807,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2012\/09\/7444.2.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/\",\"name\":\"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2012\/09\/7444.2.jpg\",\"datePublished\":\"2012-09-19T03:00:00+00:00\",\"dateModified\":\"2023-05-16T06:06:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2012\/09\/7444.2.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2012\/09\/7444.2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline | Microsoft Security Blog","og_description":"This article in our series focused on Microsoft’s free security tools is on a tool called Windows Defender Offline.  Windows Defender Offline is a standalone software application that is designed to help detect malicious and other potentially unwanted software, including rootkits that try to install themselves on a PC.  Once on a PC, this software might run immediately, or it might run at unexpected times. Windows Defender Offline works by scanning an operating system to check the authenticity of any communication the operating system has with the Internet. If there is an application deemed unsafe, it will alert the user and block the contents of the application until the user either accepts or denies the risk.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/","og_site_name":"Microsoft Security Blog","article_published_time":"2012-09-19T03:00:00+00:00","article_modified_time":"2023-05-16T06:06:27+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/uploads\/2012\/09\/7444.2.jpg"}],"author":"Tim Rains","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tim Rains","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/timrains\/","@type":"Person","@name":"Tim Rains"}],"headline":"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline","datePublished":"2012-09-19T03:00:00+00:00","dateModified":"2023-05-16T06:06:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/"},"wordCount":807,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2012\/09\/7444.2.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/","name":"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2012\/09\/7444.2.jpg","datePublished":"2012-09-19T03:00:00+00:00","dateModified":"2023-05-16T06:06:27+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2012\/09\/7444.2.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2012\/09\/7444.2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/09\/19\/microsofts-free-security-tools-windows-defender-offline\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft\u2019s Free Security Tools \u2013 Windows Defender Offline"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/177"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=177"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/177\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=177"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=177"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=177"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=177"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=177"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}