{"id":24401,"date":"2023-05-31T16:17:11","date_gmt":"2023-05-31T20:17:11","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=24401"},"modified":"2023-07-13T10:56:46","modified_gmt":"2023-07-13T14:56:46","slug":"how-msps-can-prevent-fraud-in-microsoft-azure","status":"publish","type":"post","link":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/","title":{"rendered":"How MSPs can prevent fraud in Microsoft Azure"},"content":{"rendered":"<p>Identity and access management is a major pillar of modern cybersecurity\u2014and for good reason. The use of stolen credentials is present in about <a href=\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/2022-data-breach-investigations-report-dbir.pdf\">40% of cyberattacks<\/a>, and some sort of human element, whether it\u2019s falling for phishing attempts, accidentally downloading malware or some other kind of social engineering incident, is implicated in more than 80% of breaches.<\/p>\n<p>For managed service providers (MSPs) who deliver <a href=\"https:\/\/www.sherweb.com\/infrastructure\/microsoft-azure\/\">Microsoft Azure<\/a> for clients, this is absolutely something to pay close attention to. Azure environments are unfortunately not exempt from fraud attempts. On the bright side, however, there are plenty of actions MSPs can take to secure their tenants and practice vigilance against fraud attempts.<\/p>\n<h2>Recommendations for preventing fraud in Microsoft Azure<\/h2>\n<p>Both MSPs and their customers can protect against fraud in Microsoft Azure by adhering to some key best practices, such as enforcing <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/multifactor-authentication-in-azure-active-directory\/\">multifactor authentication (MFA)<\/a>, regularly reviewing activity logs and setting up relevant budget alerts, among others.<\/p>\n<p><strong>Check your identity secure score in Azure Active Directory<\/strong><\/p>\n<p>Maintaining a bird\u2019s eye view of your Azure tenants\u2019 security is a great place to start for ensuring your MSP business is in alignment with parameters recommended by Microsoft. One way to effectively do this is by checking up on your <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/identity-secure-score\">identity secure score<\/a>.<\/p>\n<p>Essentially, a tenant\u2019s secure score gives you an idea of how strong their security posture is based on their <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/microsoft-azure-active-directory\/\">Azure Active Directory<\/a> configuration. The score is determined across five categories: identity, data, devices, infrastructure and apps. It also provides further recommendations for how the score can be improved based on that configuration. To access the secure score, you\u2019ll need to be assigned one of the following roles:<\/p>\n<ul>\n<li>Global administrator<\/li>\n<li>Security administrator<\/li>\n<li>Exchange administrator<\/li>\n<li>SharePoint administrator<\/li>\n<\/ul>\n<h3>Require MFA for all Azure tenants<\/h3>\n<p>Highly regarded as an effective way to prevent cyberattacks\u2014including fraud in Microsoft Azure\u2014MFA is a relatively easy way to ensure customers\u2019 credentials go uncompromised.<\/p>\n<p>There are a <a href=\"https:\/\/learn.microsoft.com\/en-us\/partner-center\/csp-security-best-practices#:~:text=There%20are%20various%20ways%20to%20configure%20MFA\">few different ways<\/a> to configure MFA for your MSP\u2019s clients. Depending on what license your tenant is using, you might choose between using <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/concept-conditional-access-policy-common\">Conditional Access<\/a> or <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\">security defaults<\/a>. Regardless of what method you implement, it\u2019s important to ensure that your MFA method of choice is phishing resistant, and that it\u2019s required for all user accounts across the tenant.<\/p>\n<h3>Regularly review admin accounts and sign-in activity<\/h3>\n<p>Keeping a close eye on who has access to customer environments is another best practice for preventing fraud in Microsoft Azure. Similarly, it\u2019s a good idea to encourage your clients to review accounts and accesses from their end as well to ensure that the accounts of upstream partners are also legitimate.<\/p>\n<p>Implementing a least-privilege approach to access is highly recommended for keeping accounts secure, especially for roles with global, security or other administrative credentials. Furthermore, Global Admin accounts should not be used for email and collaboration tasks and their account credentials should not be shared with multiple users.<\/p>\n<p>MSPs can review sign-in information and accesses by checking the appropriate <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/reports-monitoring\/concept-audit-logs\">audit logs<\/a>. Beyond checking for suspicious sign-in times and locations, providers should also pay attention to unfamiliar recovery email addresses and phone numbers.<\/p>\n<h3>Set up alerts for budgeting and cost anomalies<\/h3>\n<p>Microsoft partners and MSPs enrolled in the Cloud Solution Provider (CSP) program should be aware that they\u2019re on the hook for any <a href=\"https:\/\/learn.microsoft.com\/en-us\/partner-center\/non-payment-fraud-misuse\">unauthorized purchases<\/a> made using clients\u2019 Azure accounts. Setting up email notifications for alerts regarding individual tenants\u2019 budgets and respective costs can help with monitoring for such fraudulent activity.<\/p>\n<p>Using <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/microsoft-cost-management-for-azure\/\">Cost Management for Azure<\/a>, MSPs can set budgets for tenant organizations to ensure their Azure consumption stays in line with their expectations. The Cost Management tool can also be configured to monitor and send out email alerts for charges that conflict with those budgets and forecasted costs.<\/p>\n<h2>Work with an expert partner to help secure your Azure tenants<\/h2>\n<p>Following the best practices listed above are a great step towards preventing fraud in Microsoft Azure, but it\u2019s understandably a lot for an individual MSP to take on alone.<\/p>\n<p>Sherweb can help! Our Azure experts can offer guidance and resources to help keep your clients safe according to their needs. Reach out to us to <a href=\"https:\/\/www.sherweb.com\/infrastructure\/microsoft-azure\/resell\/\">start a conversation<\/a> about how we can support your Azure practice, or <a href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\">check out our partner guide<\/a> for more information about how we can position your MSP business for growth.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity and access management is a major pillar of modern cybersecurity\u2014and for good reason. T","protected":false},"author":177,"featured_media":24405,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[752],"tags":[919,1031,703],"class_list":["post-24401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-server","tag-cybersecurity","tag-identity-and-access-management","tag-microsoft-azure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How MSPs can prevent fraud in Microsoft Azure | Sherweb<\/title>\n<meta name=\"description\" content=\"Prevent fraud in Microsoft Azure with key best practices: MFA, review access activity, set alerts for anomalies for added security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How MSPs can prevent fraud in Microsoft Azure | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Prevent fraud in Microsoft Azure with key best practices: MFA, review access activity, set alerts for anomalies for added security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-31T20:17:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-13T14:56:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976\"},\"headline\":\"How MSPs can prevent fraud in Microsoft Azure\",\"datePublished\":\"2023-05-31T20:17:11+00:00\",\"dateModified\":\"2023-07-13T14:56:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/\"},\"wordCount\":732,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg\",\"keywords\":[\"Cybersecurity\",\"Identity and Access Management\",\"Microsoft Azure\"],\"articleSection\":[\"Cloud Server\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/\",\"url\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/\",\"name\":\"How MSPs can prevent fraud in Microsoft Azure | Sherweb\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg\",\"datePublished\":\"2023-05-31T20:17:11+00:00\",\"dateModified\":\"2023-07-13T14:56:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976\"},\"description\":\"Prevent fraud in Microsoft Azure with key best practices: MFA, review access activity, set alerts for anomalies for added security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#primaryimage\",\"url\":\"\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg\",\"contentUrl\":\"\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"fraud in Microsoft Azure\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sherweb.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Server\",\"item\":\"https:\/\/www.sherweb.com\/blog\/category\/cloud-server\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How MSPs can prevent fraud in Microsoft Azure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\",\"url\":\"https:\/\/www.sherweb.com\/blog\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/the-sherweb-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How MSPs can prevent fraud in Microsoft Azure | Sherweb","description":"Prevent fraud in Microsoft Azure with key best practices: MFA, review access activity, set alerts for anomalies for added security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/","og_locale":"en_US","og_type":"article","og_title":"How MSPs can prevent fraud in Microsoft Azure | Sherweb","og_description":"Prevent fraud in Microsoft Azure with key best practices: MFA, review access activity, set alerts for anomalies for added security.","og_url":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2023-05-31T20:17:11+00:00","article_modified_time":"2023-07-13T14:56:46+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"How MSPs can prevent fraud in Microsoft Azure","datePublished":"2023-05-31T20:17:11+00:00","dateModified":"2023-07-13T14:56:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/"},"wordCount":732,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg","keywords":["Cybersecurity","Identity and Access Management","Microsoft Azure"],"articleSection":["Cloud Server"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/","url":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/","name":"How MSPs can prevent fraud in Microsoft Azure | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg","datePublished":"2023-05-31T20:17:11+00:00","dateModified":"2023-07-13T14:56:46+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Prevent fraud in Microsoft Azure with key best practices: MFA, review access activity, set alerts for anomalies for added security.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#primaryimage","url":"\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/5-steps-to-prevent-Azure-fraud-1200x480-1.jpg","width":2400,"height":920,"caption":"fraud in Microsoft Azure"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/how-msps-can-prevent-fraud-in-microsoft-azure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Server","item":"https:\/\/www.sherweb.com\/blog\/category\/cloud-server\/"},{"@type":"ListItem","position":3,"name":"How MSPs can prevent fraud in Microsoft Azure"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Cybersecurity","Identity and Access Management","Microsoft Azure"],"_links":{"self":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/24401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/comments?post=24401"}],"version-history":[{"count":1,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/24401\/revisions"}],"predecessor-version":[{"id":24402,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/24401\/revisions\/24402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media\/24405"}],"wp:attachment":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media?parent=24401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/categories?post=24401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/tags?post=24401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}