{"id":25295,"date":"2025-04-11T14:49:56","date_gmt":"2025-04-11T12:49:56","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=25295"},"modified":"2025-04-11T14:52:08","modified_gmt":"2025-04-11T12:52:08","slug":"forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/","title":{"rendered":"Forwarding Profiles in THOR Cloud Enterprise: Direct Log Delivery from Endpoints"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]We\u2019re introducing <b>Forwarding Profiles<\/b> in <a href=\"\/thor-cloud\">THOR Cloud Enterprise<\/a> \u2014 a feature designed to streamline how scan results are delivered to external systems such as SIEMs, log collectors, or analysis platforms. Rather than downloading logs manually or relying on intermediate cloud services, this feature enables the THOR scanner itself to forward logs directly from the endpoint to your target infrastructure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"margin-top: 10px;\" src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-11-at-12.32.31-1-1024x723.png\" width=\"1024\" height=\"723\" alt=\"\" class=\"wp-image-25309 alignnone size-large\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-11-at-12.32.31-1-980x692.png 980w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-11-at-12.32.31-1-480x339.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<h2>Endpoint-Driven Log Forwarding<\/h2>\n<p>One of the most important architectural aspects of this feature is where the forwarding occurs. It\u2019s not the THOR Cloud platform that pushes logs to your SIEM\u2014it\u2019s the THOR scanner on each endpoint that performs this action. Once a scan completes, the local scanner connects to the configured destination and transmits the logs directly.<\/p>\n<p>This offers significant advantages:<\/p>\n<ul>\n<li><b>Confidentiality:<\/b> Logs remain inside your environment and do not pass through the cloud.<\/li>\n<li><b>Immediate availability:<\/b> Data reaches your SIEM or analysis system as soon as the scan finishes.<\/li>\n<li><b>Reduced cloud dependencies:<\/b> Ideal for regulated, segmented, or air-gapped environments.<\/li>\n<\/ul>\n<p>However, there are trade-offs. Since forwarding occurs per endpoint, every host must be able to reach the destination (host, port, protocol). If delivery fails\u2014due to firewall rules, DNS resolution issues, or TLS misconfiguration\u2014the error will appear in the local scan log. There is no centralized retry mechanism: delivery success is per-endpoint and per-scan.<\/p>\n<h2>Profile Configuration and Use<\/h2>\n<p>Forwarding Profiles are configured in the THOR Cloud portal, under the dedicated \u201cForwarding\u201d section. Each profile defines:<\/p>\n<ul>\n<li>One or more destination hosts (FQDN or IP)<\/li>\n<li>Port and protocol (TCP or UDP, with optional TLS)<\/li>\n<li>Log format: Syslog, JSON, or CEF<\/li>\n<li>(Optional) Root CA certificate for TLS-secured connections<\/li>\n<\/ul>\n<p>You can maintain multiple profiles, each tailored to a specific use case\u2014such as production vs. staging, or by region, business unit, or sensitivity level.<\/p>\n<p>When launching a scan campaign, you\u2019ll find a forwarding profile dropdown in the campaign configuration screen. If a default profile has been defined, it will be pre-selected automatically. This integration ensures that logs are consistently forwarded without requiring manual selection\u2014though it\u2019s easy to override if necessary.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"margin-top: 10px;\" src=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-11-at-12.35.46-1-1024x1021.png\" width=\"1024\" height=\"1021\" alt=\"\" class=\"wp-image-25310 alignnone size-large\" srcset=\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-11-at-12.35.46-1-980x977.png 980w, https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-11-at-12.35.46-1-480x479.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<h2>Optional Log Storage Bypass<\/h2>\n<p>Every forwarding profile also supports an optional setting to disable cloud-based log storage. When enabled, THOR Cloud does not retain the results of a scan\u2014the logs are forwarded only to the specified external systems. This is useful for scenarios in which data must not leave the local network or be retained in third-party environments.<\/p>\n<h2>Summary<\/h2>\n<p>Forwarding Profiles in THOR Cloud Enterprise offer a practical, secure, and flexible way to integrate forensic scan results into your centralized workflows. By pushing logs directly from the endpoint to your internal systems, you retain control over your data and reduce operational overhead. For distributed or compliance-focused environments, this change supports secure autonomy at scale\u2014without compromising on visibility or traceability.<\/p>\n<p><b>The feature is available now to all THOR Cloud Enterprise users.<\/b> Please reach out to your Nextron contact if you require profile-based forwarding without THOR Cloud storage, or if you need guidance on setting up your internal receivers.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019re introducing Forwarding Profiles in THOR Cloud Enterprise \u2014 a feature designed to streamline how scan results are delivered to external systems such as SIEMs, log collectors, or analysis platforms. Rather than downloading logs manually or relying on intermediate cloud services, this feature enables the THOR scanner itself to forward logs directly from the endpoint to your target infrastructure. Endpoint-Driven Log Forwarding One of the most important architectural aspects of this feature is where the forwarding occurs. It\u2019s not the THOR Cloud platform that pushes logs to your SIEM\u2014it\u2019s the THOR scanner on each endpoint that performs this action. Once a scan completes, the local scanner connects to the configured destination and transmits the logs directly. This offers significant advantages: Confidentiality: Logs remain inside your environment and do not pass through the cloud. Immediate availability: Data reaches your SIEM or analysis system as soon as the scan finishes. Reduced cloud dependencies: Ideal for regulated, segmented, or air-gapped environments. However, there are trade-offs. Since forwarding occurs per endpoint, every host must be able to reach the destination (host, port, protocol). If delivery fails\u2014due to firewall rules, DNS resolution issues, or TLS misconfiguration\u2014the error will appear in the local scan log. There [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25311,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[749,1,760,556],"tags":[13,7,59,5,48],"class_list":["post-25295","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-homepage","category-nextron","category-recommended","category-thor-cloud","tag-detection","tag-scanner","tag-sigma","tag-thor","tag-yara"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Forwarding Profiles in THOR Cloud Enterprise: Direct Log Delivery from Endpoints - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Forwarding Profiles in THOR Cloud Enterprise: Direct Log Delivery from Endpoints\",\"datePublished\":\"2025-04-11T12:49:56+00:00\",\"dateModified\":\"2025-04-11T12:52:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/\"},\"wordCount\":612,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/fedbc823c5669814ee7a665d5c95885d78fe519f4777e3c147489d536bd247d4.jpg\",\"keywords\":[\"detection\",\"scanner\",\"Sigma\",\"thor\",\"YARA\"],\"articleSection\":[\"Homepage\",\"Nextron\",\"Recommended\",\"THOR Cloud\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/\",\"name\":\"Forwarding Profiles in THOR Cloud Enterprise: Direct Log Delivery from Endpoints - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/fedbc823c5669814ee7a665d5c95885d78fe519f4777e3c147489d536bd247d4.jpg\",\"datePublished\":\"2025-04-11T12:49:56+00:00\",\"dateModified\":\"2025-04-11T12:52:08+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#primaryimage\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/fedbc823c5669814ee7a665d5c95885d78fe519f4777e3c147489d536bd247d4.jpg\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/fedbc823c5669814ee7a665d5c95885d78fe519f4777e3c147489d536bd247d4.jpg\",\"width\":1792,\"height\":1024},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Forwarding Profiles in THOR Cloud Enterprise: Direct Log Delivery from Endpoints - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Forwarding Profiles in THOR Cloud Enterprise: Direct Log Delivery from Endpoints","datePublished":"2025-04-11T12:49:56+00:00","dateModified":"2025-04-11T12:52:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/"},"wordCount":612,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/fedbc823c5669814ee7a665d5c95885d78fe519f4777e3c147489d536bd247d4.jpg","keywords":["detection","scanner","Sigma","thor","YARA"],"articleSection":["Homepage","Nextron","Recommended","THOR Cloud"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/","url":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/","name":"Forwarding Profiles in THOR Cloud Enterprise: Direct Log Delivery from Endpoints - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#primaryimage"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/fedbc823c5669814ee7a665d5c95885d78fe519f4777e3c147489d536bd247d4.jpg","datePublished":"2025-04-11T12:49:56+00:00","dateModified":"2025-04-11T12:52:08+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/2025\/04\/11\/forwarding-profiles-in-thor-cloud-enterprise-direct-log-delivery-from-endpoints\/#primaryimage","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/fedbc823c5669814ee7a665d5c95885d78fe519f4777e3c147489d536bd247d4.jpg","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2025\/04\/fedbc823c5669814ee7a665d5c95885d78fe519f4777e3c147489d536bd247d4.jpg","width":1792,"height":1024},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/25295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=25295"}],"version-history":[{"count":12,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/25295\/revisions"}],"predecessor-version":[{"id":25313,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/25295\/revisions\/25313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media\/25311"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=25295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=25295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=25295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}