{"id":1317,"date":"2022-03-17T15:15:55","date_gmt":"2022-03-17T19:15:55","guid":{"rendered":"https:\/\/powerdocs.app\/?p=1317"},"modified":"2022-03-20T21:49:14","modified_gmt":"2022-03-21T01:49:14","slug":"security-reports","status":"publish","type":"post","link":"https:\/\/powerdocs.app\/index.php\/documentation\/security-reports\/","title":{"rendered":"Security Reports"},"content":{"rendered":"\n<p>The security reports are some of the most popular reports and for good reason. They pull out security configuration data that is very difficult to view from the platform interface. For the majority of companies security is an important aspect of the implementation. One of the challenges of a system deployment is being able to see and analyze the security model as it exists over time. If you have a system with more than the simplest of security configurations, you know may understand the choir it can be to get this information. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Uses Cases<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Creating documentation for security compliance audits and analysis<\/li><li>System administrator troubleshooting of user or team data access<\/li><li>Security model assessments for upgrade projects<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Security Reports Overview<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Users Report<\/li><li>Teams Report<\/li><li>Business Units Report<\/li><li>Security Roles Report<\/li><li><span style=\"color: var(--global-palette4); font-family: &quot;Libre Baskerville&quot;, var(--global-fallback-font);\">Field Security<\/span> Report<\/li><li>Hierarchical Security Report<\/li><li>Positions Report<\/li><li>Access Team Templates Report<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">User &amp; Team Reports<\/h2>\n\n\n\n<p>The user and team report provide a list of all the users and all the teams in the system including their access mode, license type, business unit, territory and system Id (GUID) in Excel format. If you&#8217;ve ever run into an issue where a user or team GUID was provided in an error message this will come in handy. <\/p>\n\n\n<style>.kb-image_a6e42a-9c .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image_a6e42a-9c size-large\"><a href=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/User-Report-Screenshot-2022-03-19-171620.jpg\" class=\"kb-advanced-image-link\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1024\" height=\"624\" data-src=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/User-Report-Screenshot-2022-03-19-171620-1024x624.jpg\" alt=\"Click the image to see a larger version of the report.\" class=\"kb-img wp-image-1514 lazyload\" data-srcset=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/User-Report-Screenshot-2022-03-19-171620-1024x624.jpg 1024w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/User-Report-Screenshot-2022-03-19-171620-300x183.jpg 300w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/User-Report-Screenshot-2022-03-19-171620-768x468.jpg 768w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/User-Report-Screenshot-2022-03-19-171620-1536x936.jpg 1536w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/User-Report-Screenshot-2022-03-19-171620.jpg 1929w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/624;\" \/><\/a><figcaption>System User Report (Click for larger image)<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Business Units Reports<\/h2>\n\n\n\n<p>The business unit reports provide a list of all business unit within the system along with each unit&#8217;s parent business unit and the number of users in each. Depending on the security configuration of your system. In the majority of systems there will be a limited number of business units, but being able to see the number of users in each business can be useful as part of an analysis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Role Reports<\/h2>\n\n\n\n<p>The security role reports provide 3 perspectives of information, the list of security roles, Security Roles by Team\/User and a User Pivot Table which shows roles assigned by user in a horizontal format.<\/p>\n\n\n<style>.kb-image_2157a8-08 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image_2157a8-08 size-large\"><a href=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-Screenshot-2022-03-19-180246.jpg\" class=\"kb-advanced-image-link\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1024\" height=\"624\" data-src=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-Screenshot-2022-03-19-180246-1024x624.jpg\" alt=\"\" class=\"kb-img wp-image-1523 lazyload\" data-srcset=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-Screenshot-2022-03-19-180246-1024x624.jpg 1024w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-Screenshot-2022-03-19-180246-300x183.jpg 300w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-Screenshot-2022-03-19-180246-768x468.jpg 768w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-Screenshot-2022-03-19-180246-1536x936.jpg 1536w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-Screenshot-2022-03-19-180246.jpg 1929w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/624;\" \/><\/a><figcaption>Security Role Report (Click for larger image)<\/figcaption><\/figure>\n\n\n<style>.kb-image_5efbc4-26 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image_5efbc4-26 size-large\"><a href=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Roles-by-Team-and-User-Report-Screenshot-2022-03-19-180246.jpg\" class=\"kb-advanced-image-link\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1024\" height=\"624\" data-src=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Roles-by-Team-and-User-Report-Screenshot-2022-03-19-180246-1024x624.jpg\" alt=\"\" class=\"kb-img wp-image-1526 lazyload\" data-srcset=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Roles-by-Team-and-User-Report-Screenshot-2022-03-19-180246-1024x624.jpg 1024w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Roles-by-Team-and-User-Report-Screenshot-2022-03-19-180246-300x183.jpg 300w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Roles-by-Team-and-User-Report-Screenshot-2022-03-19-180246-768x468.jpg 768w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Roles-by-Team-and-User-Report-Screenshot-2022-03-19-180246-1536x936.jpg 1536w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Roles-by-Team-and-User-Report-Screenshot-2022-03-19-180246.jpg 1929w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/624;\" \/><\/a><figcaption>Security Roles by Team and User Report (Click for larger image)<\/figcaption><\/figure>\n\n\n<style>.kb-image_98a73a-87 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image_98a73a-87 size-large\"><a href=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-User-Pivot-Table-Screenshot-2022-03-19-183832.jpg\" class=\"kb-advanced-image-link\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1024\" height=\"624\" data-src=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-User-Pivot-Table-Screenshot-2022-03-19-183832-1024x624.jpg\" alt=\"\" class=\"kb-img wp-image-1527 lazyload\" data-srcset=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-User-Pivot-Table-Screenshot-2022-03-19-183832-1024x624.jpg 1024w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-User-Pivot-Table-Screenshot-2022-03-19-183832-300x183.jpg 300w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-User-Pivot-Table-Screenshot-2022-03-19-183832-768x468.jpg 768w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-User-Pivot-Table-Screenshot-2022-03-19-183832-1536x936.jpg 1536w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Role-Report-User-Pivot-Table-Screenshot-2022-03-19-183832.jpg 1929w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/624;\" \/><\/a><figcaption>Security Role &#8211; User Roles Pivot Table Report (Click for larger image)<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Security Privilege Reports<\/h2>\n\n\n\n<p>The security privilege reports create a comprehensive view of security privileges assigned to both users and by entity. These reports are both available as a Microsoft Word based report and an export of the raw security privilege data into Excel spreadsheets. A full report is created for each user and entity.<\/p>\n\n\n\n<p>If we take an example user Alicia Thomber, we can see all of the full set of privileges that she has been granted via the roles assigned. If we wanted to dive deeper into how she received her privileges, we can compare what roles she was assigned with the privileges of those roles from the security role reports. This is one of the best ways to troubleshoot access permissions that can happen within a system and tweak the security roles or assigned roles to correct issues.<\/p>\n\n\n<style>.kb-image_1d2487-07 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image_1d2487-07 size-large\"><a href=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Alicia-Thomber-User-Privileges-Report-Screenshot-2022-03-19-203128.jpg\" class=\"kb-advanced-image-link\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1024\" height=\"624\" data-src=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Alicia-Thomber-User-Privileges-Report-Screenshot-2022-03-19-203128-1024x624.jpg\" alt=\"\" class=\"kb-img wp-image-1541 lazyload\" data-srcset=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Alicia-Thomber-User-Privileges-Report-Screenshot-2022-03-19-203128-1024x624.jpg 1024w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Alicia-Thomber-User-Privileges-Report-Screenshot-2022-03-19-203128-300x183.jpg 300w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Alicia-Thomber-User-Privileges-Report-Screenshot-2022-03-19-203128-768x468.jpg 768w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Alicia-Thomber-User-Privileges-Report-Screenshot-2022-03-19-203128-1536x936.jpg 1536w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Alicia-Thomber-User-Privileges-Report-Screenshot-2022-03-19-203128.jpg 1929w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/624;\" \/><\/a><figcaption>User Privileges Report &#8211; Alicia Thomber (Click for larger image)<\/figcaption><\/figure>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns_493ea6-6f{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns_493ea6-6f .kt-button{font-weight:normal;font-style:normal;}.kt-btns_493ea6-6f .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns_493ea6-6f .kt-btn-wrap-0 .kt-button::before{display:none;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kt-btn-align-left kt-btn-tablet-align-inherit kt-btn-mobile-align-inherit kt-btns-wrap kt-btns_493ea6-6f\"><div class=\"kt-btn-wrap kt-btn-wrap-0\"><a class=\"kt-button button kt-btn-0-action kt-btn-size-standard kt-btn-style-basic kt-btn-svg-show-always kt-btn-has-text-true kt-btn-has-svg-false kb-btn-global-inherit wp-block-button__link\" download href=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/CRM414977-UserPrivileges-Alicia-Thomber.docx\"><span class=\"kt-btn-inner-text\">User Privilege Report Sample<\/span><\/a><\/div><\/div>\n\n\n<style>.kb-image_3ae771-47 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image_3ae771-47 size-large\"><a href=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Report-Priviges-by-Entity-Screenshot-2022-03-19-232051.jpg\" class=\"kb-advanced-image-link\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"1024\" height=\"624\" data-src=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Report-Priviges-by-Entity-Screenshot-2022-03-19-232051-1024x624.jpg\" alt=\"\" class=\"kb-img wp-image-1570 lazyload\" data-srcset=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Report-Priviges-by-Entity-Screenshot-2022-03-19-232051-1024x624.jpg 1024w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Report-Priviges-by-Entity-Screenshot-2022-03-19-232051-300x183.jpg 300w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Report-Priviges-by-Entity-Screenshot-2022-03-19-232051-768x468.jpg 768w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Report-Priviges-by-Entity-Screenshot-2022-03-19-232051-1536x936.jpg 1536w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Report-Priviges-by-Entity-Screenshot-2022-03-19-232051.jpg 1929w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/624;\" \/><\/a><figcaption>Privileges by Entity &#8211; Account (Click for larger image)<\/figcaption><\/figure>\n\n\n<style>.wp-block-kadence-advancedbtn.kb-btns_aaad49-c0{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns_aaad49-c0 .kt-button{font-weight:normal;font-style:normal;}.kt-btns_aaad49-c0 .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns_aaad49-c0 .kt-btn-wrap-0 .kt-button::before{display:none;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kt-btn-align-left kt-btn-tablet-align-inherit kt-btn-mobile-align-inherit kt-btns-wrap kt-btns_aaad49-c0\"><div class=\"kt-btn-wrap kt-btn-wrap-0\"><a class=\"kt-button button kt-btn-0-action kt-btn-size-standard kt-btn-style-basic kt-btn-svg-show-always kt-btn-has-text-true kt-btn-has-svg-false kb-btn-global-inherit wp-block-button__link\" download href=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/CRM414977-Privileges-Account.docx\"><span class=\"kt-btn-inner-text\">Entity Privilege Report Sample<\/span><\/a><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Access Team Templates<\/h2>\n\n\n\n<p>There are two types of teams that you can use to control record access &#8211;\u00a0<em>owner teams<\/em>\u00a0and\u00a0<em>access teams<\/em>. <span style=\"color: var(--global-palette4); font-family: &quot;Libre Baskerville&quot;, var(--global-fallback-font);\">An access team doesn\u2019t own records and doesn\u2019t have security roles assigned to the team. The users have privileges defined by their individual security roles and by the roles from other teams in which they are members. The records are shared with an access team and the team members are granted access rights on the records, such as Read, Write, or Append.<\/span> The access team template report displays all the team templates that are configured in your system.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" width=\"1024\" height=\"272\" data-src=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Access-Team-Template-Report-Screenshot-2022-03-20-213337-1024x272.jpg\" alt=\"\" class=\"wp-image-1582 lazyload\" data-srcset=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Access-Team-Template-Report-Screenshot-2022-03-20-213337-1024x272.jpg 1024w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Access-Team-Template-Report-Screenshot-2022-03-20-213337-300x80.jpg 300w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Access-Team-Template-Report-Screenshot-2022-03-20-213337-768x204.jpg 768w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Access-Team-Template-Report-Screenshot-2022-03-20-213337-1536x407.jpg 1536w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Access-Team-Template-Report-Screenshot-2022-03-20-213337-2048x543.jpg 2048w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/272;\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Team Memberships<\/h2>\n\n\n\n<p>An owner team owns records and has security roles assigned to the team. The team\u2019s privileges are defined by these security roles. In addition to privileges provided by the team, team members have the privileges defined by their individual security roles and by the roles from other teams in which they are members. A team has full access rights on the records that the team owns. The team membership report provides the list of all teams a user is assigned to within your system.<\/p>\n\n\n<style>.kb-image_972436-ef .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image_972436-ef size-large\"><img decoding=\"async\" width=\"874\" height=\"1024\" data-src=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Team-Membership-Report-Screenshot-2022-03-20-214245-874x1024.jpg\" alt=\"\" class=\"kb-img wp-image-1584 lazyload\" data-srcset=\"https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Team-Membership-Report-Screenshot-2022-03-20-214245-874x1024.jpg 874w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Team-Membership-Report-Screenshot-2022-03-20-214245-256x300.jpg 256w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Team-Membership-Report-Screenshot-2022-03-20-214245-768x899.jpg 768w, https:\/\/powerdocs.app\/wp-content\/uploads\/2022\/03\/Security-Reports-Team-Membership-Report-Screenshot-2022-03-20-214245.jpg 1081w\" data-sizes=\"(max-width: 874px) 100vw, 874px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 874px; --smush-placeholder-aspect-ratio: 874\/1024;\" \/><figcaption>Team Membership Report<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The security reports are some of the most popular reports and for good reason. They pull out security configuration data that is very difficult to view from the platform interface.<\/p>\n","protected":false},"author":2,"featured_media":1318,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1317","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-documentation"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/posts\/1317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/comments?post=1317"}],"version-history":[{"count":37,"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/posts\/1317\/revisions"}],"predecessor-version":[{"id":1590,"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/posts\/1317\/revisions\/1590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/media\/1318"}],"wp:attachment":[{"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/media?parent=1317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/categories?post=1317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/powerdocs.app\/index.php\/wp-json\/wp\/v2\/tags?post=1317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}