{"id":89223,"date":"2019-04-03T12:00:32","date_gmt":"2019-04-03T19:00:32","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89223"},"modified":"2023-05-15T23:09:07","modified_gmt":"2023-05-16T06:09:07","slug":"secure-access-microsoft-365-enterprise-e5","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/","title":{"rendered":"Secure access to your enterprise with Microsoft 365"},"content":{"rendered":"

Most lessons in cybersecurity are born out of necessity. In this case, it was my need for a haircut.<\/p>\n

Last weekend, I was reminded why it\u2019s time to rethink the conventional wisdom about secure passwords and user access. I was making an appointment online and at the very end of the process, the website asked me to sign in to complete the transaction. The problem? I had forgotten my password. I was prompted to answer security questions and then reset my password with a new eight-character word that includes at least one capital letter, one lowercase letter, a number, and a symbol. The thing that bothers me is that I considered re-using another password\u2014maybe the one I use for Facebook or OpenTable\u2014at least then I\u2019d remember it! But I\u2019m in the security industry. I know better. I\u2019ve heard too many stories about a hacker stealing a password from some no-name site only to parlay it into access to a large organization. In the end, I did what we always tell our users to do and generated a unique password (I really needed that haircut), but I understand why so many users don\u2019t. It\u2019s an impossible task, and the truth is, these rules aren\u2019t making us any more secure.<\/p>\n

\"InfographicWhat if we could make user access simpler for users and simultaneously more secure for the enterprise?<\/em> That’s the topic of the first e-book in a six-part series that describes how you can use the full Microsoft 365 Enterprise E5 suite to comprehensively address today\u2019s security challenges without reducing employee productivity.<\/p>\n

The first e-book, Secure access to your enterprise<\/a>, tells the story of Christina, Vice President of Operations, who is savvy about security, but is also very busy. The e-book gives you a real-world perspective on how the requirements of her job can put the enterprise at risk, even when she does everything right. Learn how Azure Active Directory (Azure AD) integrates with other security products in Microsoft 365 to reduce the likelihood that a user\u2019s password will be stolen, detect when a user has been compromised, and to give you back control when a user is compromised.<\/p>\n

Reduce the likelihood that a user\u2019s credentials will be stolen<\/h3>\n

One of the reasons that user credentials are stolen or guessed is because people must remember so many of them. Even your most senior users may use the same password for several applications, which increases the likelihood that the password will be stolen. A good user access solution simplifies access, so your users are encouraged to use secure authentication methods, and it verifies user identity at every sign-in. The Secure access to your enterprise<\/a> e-book provides more context around why passwords are at risk and offers up solutions such as Azure AD single sign-on (SSO) that are simple and more secure.<\/p>\n

Detect when a user has been compromised<\/h3>\n

Even when good preventative practices are in place, you need to adopt an \u201cassume breach\u201d mindset. Bad actors have the patience and resources to find and exploit even the smallest vulnerability. Eventually someone in your organization will be compromised. Conditional access can detect when user sign-in behavior deviates from the norm and apply automated, custom policies to confirm identity before providing access.<\/p>\n

Take back control of compromised identities<\/h3>\n

Once you\u2019ve determined that a user has been compromised, you need to respond quickly. Bad actors have been known to sell credentials on the dark web, and once they are inside your organization, they will look for ways to get access to your most valuable data. The Secure access to your enterprise<\/a> e-book includes several examples of how Microsoft 365 Enterprise E5 products help you respond quickly to limit the damage if you suffer a security breach.<\/p>\n

Learn more<\/h3>\n

Download the Secure access to your enterprise<\/a> e-book for more details on how you can move your organization towards a password-less future. Check back next week to read the second e-book in this series, \u201cDiscover and manage shadow IT,\u201d which describes how to safeguard your organization against unsanctioned cloud apps and rogue devices.<\/p>\n","protected":false},"excerpt":{"rendered":"

User access can be simpler for your users and more secure for the enterprise. Read our latest e-book, \u201cSecure access to your enterprise,\u201d to find out how.<\/p>\n","protected":false},"author":96,"featured_media":89224,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3673,3683],"products":[3690,3693],"threat-intelligence":[],"tags":[],"coauthors":[2014],"class_list":["post-89223","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-identity-and-access-management","topic-security-management","products-microsoft-defender","products-microsoft-defender-xdr"],"yoast_head":"\nSecure access to your enterprise with Microsoft 365 | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"User access can be simpler for your users and more secure for the enterprise. Read our latest e-book, \u201cSecure access to your enterprise,\u201d to find out how.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure access to your enterprise with Microsoft 365 | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"User access can be simpler for your users and more secure for the enterprise. Read our latest e-book, \u201cSecure access to your enterprise,\u201d to find out how.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-03T19:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T06:09:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-full-size.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rani Lofstrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-full-size.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rani Lofstrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/rani-lofstrom\/\",\"@type\":\"Person\",\"@name\":\"Rani Lofstrom\"}],\"headline\":\"Secure access to your enterprise with Microsoft 365\",\"datePublished\":\"2019-04-03T19:00:32+00:00\",\"dateModified\":\"2023-05-16T06:09:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/\"},\"wordCount\":692,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-card.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/\",\"name\":\"Secure access to your enterprise with Microsoft 365 | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-card.jpg\",\"datePublished\":\"2019-04-03T19:00:32+00:00\",\"dateModified\":\"2023-05-16T06:09:07+00:00\",\"description\":\"User access can be simpler for your users and more secure for the enterprise. Read our latest e-book, \u201cSecure access to your enterprise,\u201d to find out how.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-card.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-card.jpg\",\"width\":440,\"height\":268,\"caption\":\"Image of a worker's hands holding a device. A finger is about to tap on the screen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure access to your enterprise with Microsoft 365\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure access to your enterprise with Microsoft 365 | Microsoft Security Blog","description":"User access can be simpler for your users and more secure for the enterprise. Read our latest e-book, \u201cSecure access to your enterprise,\u201d to find out how.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/","og_locale":"en_US","og_type":"article","og_title":"Secure access to your enterprise with Microsoft 365 | Microsoft Security Blog","og_description":"User access can be simpler for your users and more secure for the enterprise. Read our latest e-book, \u201cSecure access to your enterprise,\u201d to find out how.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/","og_site_name":"Microsoft Security Blog","article_published_time":"2019-04-03T19:00:32+00:00","article_modified_time":"2023-05-16T06:09:07+00:00","og_image":[{"width":2000,"height":1334,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-full-size.jpg","type":"image\/jpeg"}],"author":"Rani Lofstrom","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-full-size.jpg","twitter_misc":{"Written by":"Rani Lofstrom","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/rani-lofstrom\/","@type":"Person","@name":"Rani Lofstrom"}],"headline":"Secure access to your enterprise with Microsoft 365","datePublished":"2019-04-03T19:00:32+00:00","dateModified":"2023-05-16T06:09:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/"},"wordCount":692,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-card.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/","name":"Secure access to your enterprise with Microsoft 365 | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-card.jpg","datePublished":"2019-04-03T19:00:32+00:00","dateModified":"2023-05-16T06:09:07+00:00","description":"User access can be simpler for your users and more secure for the enterprise. Read our latest e-book, \u201cSecure access to your enterprise,\u201d to find out how.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-card.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/Secure-access-card.jpg","width":440,"height":268,"caption":"Image of a worker's hands holding a device. A finger is about to tap on the screen."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/03\/secure-access-microsoft-365-enterprise-e5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Secure access to your enterprise with Microsoft 365"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89223"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=89223"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89223\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/89224"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=89223"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=89223"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=89223"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=89223"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=89223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=89223"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=89223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}