{"id":3069,"date":"2025-06-20T12:16:19","date_gmt":"2025-06-20T12:16:19","guid":{"rendered":"https:\/\/phishia.fr\/?p=3069"},"modified":"2025-11-21T15:04:16","modified_gmt":"2025-11-21T15:04:16","slug":"understanding-edr-siem-soar-and-xdr-the-complementarity-of-cyber-defense","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/monitoring\/understanding-edr-siem-soar-and-xdr-the-complementarity-of-cyber-defense\/","title":{"rendered":"Understanding EDR, SIEM, SOAR and XDR: the complementary nature of cyber defense"},"content":{"rendered":"<p>The vocabulary of cybersecurity sometimes resembles a jungle of acronyms. Yet understanding the nuances between EDR, SIEM, SOAR and XDR is essential: their role and mode of operation determine the depth of visibility your team has, and the speed with which it can react. Before exploring each brick, let's remember that these tools are not mutually exclusive; they complement each other to form the defensive fabric of a modern Security Operations Center (SOC) and a coherent defense.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">EDR: The terminal sentinel<\/h2>\n\n\n\n<p>L'<strong>Endpoint Detection &amp; Response<\/strong> is placed as close as possible to the terminal. It records every process execution, every memory call, every outgoing connection, then reacts within seconds: isolating the workstation, deleting a malicious binary or even restoring an encrypted file. EDR excels in proximity: we know exactly how the threat is installed on the host. Its weakness lies in this same proximity: outside the terminal, it sees nothing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SIEM: memory and alert engine<\/h2>\n\n\n\n<p>Visit <strong>Security Information &amp; Event Management<\/strong>is not concerned with a single host, but with the long term and the breadth of the enterprise. It collects logs from servers, firewalls, SaaS or business applications, stores them for months and applies correlations to detect weak signals. Where an EDR closes a door as soon as it is slammed, a SIEM spends its time leafing through the logbook: it tracks down a badge used in two countries at the same time, spots a dormant account that resurfaces the day before an audit. The essential difference is twofold: the EDR acts quickly but locally, while the SIEM sees far and wide but remains passive - it alerts without touching the system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SOAR: the answer orchestrator<\/h2>\n\n\n\n<p>When the EDR reports an intrusion and the SIEM shows that an admin account has been reused everywhere, the <strong>Security Orchestration, Automation &amp; Response <\/strong>enters the scene. Its role is to convert the alert into action: enrich an IOC via a Threat Intel service, block a domain on the proxy, deactivate the user in the directory, then log everything in the ITSM. No previous tool does this natively, so SOAR weaves the thread between immediate detection (EDR) and global context (SIEM). But, by comparison, it also inherits their constraints: it depends on the quality of EDR data, the relevance of SIEM rules and, above all, the ability of the SOC to maintain these playbooks. Without this discipline, automation can quickly become a maze of broken scripts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">XDR: extended and correlated vision<\/h2>\n\n\n\n<p><strong>Extended Detection &amp; Response<\/strong> starts from the EDR database: same agent, same speed in capturing telemetry. However, it decides to open up the perimeter: it also ingests network flows, messaging logs, cloud identities, and sometimes even events already collected in the SIEM. It then applies a native correlation - lighter to implement than that of a SIEM - and proposes SOAR-style direct actions: cut off an account, impose MFA, forbid a hash on all workstations. It can thus be seen as an extended EDR: the instinct of an EDR to block quickly, the transverse view of a SIEM to understand, and a touch of automation inherited from SOAR to react without coding complex playbooks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion:<\/h2>\n\n\n\n<p>Since none of these bricks alone covers the entire defense cycle, the real challenge is to assemble them seamlessly. That's what phishiaSOC is all about: exploiting the granularity of your EDR, extending the horizon of your SIEM, injecting an XDR layer to gain correlation and, where relevant, automating key actions without imposing the burden of a full SOAR. By adapting the combination to the maturity and constraints of each customer, phishiaSOC gives you the right scope at the right time - and, above all, the panoramic view you've been missing to anticipate the next attack.<\/p>\n\n\n\n<p><strong>Would you like to find out how a managed EDR or managed SOC solution can enhance your company's security?<\/strong><br><strong><em><a href=\"https:\/\/phishia.fr\/en\/contact\/\">Contact Phishia<\/a><\/em><\/strong> for a diagnosis and personalized demonstration.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>The vocabulary of cybersecurity sometimes resembles a jungle of acronyms. Yet understanding the nuances between EDR, SIEM, SOAR and XDR is essential: their role and mode of operation determine the depth of visibility your team has, and the speed with which it can react. Before exploring each brick, let's remind ourselves that these [...]<\/p>","protected":false},"author":1,"featured_media":3070,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-3069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comprendre EDR, SIEM, SOAR et XDR : la compl\u00e9mentarit\u00e9 de la cyber-d\u00e9fense - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/understanding-edr-siem-soar-and-xdr-the-complementarity-of-cyber-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comprendre EDR, SIEM, SOAR et XDR : la compl\u00e9mentarit\u00e9 de la cyber-d\u00e9fense - Phishia\" \/>\n<meta property=\"og:description\" content=\"Le vocabulaire de la cybers\u00e9curit\u00e9 ressemble parfois \u00e0 une jungle d\u2019acronymes. Pourtant, saisir la nuance entre EDR, SIEM, SOAR et XDR est essentiel : leur r\u00f4le et leur mode de fonctionnement d\u00e9terminent la profondeur de visibilit\u00e9 dont votre \u00e9quipe dispose et la vitesse \u00e0 laquelle elle peut r\u00e9agir. Avant d\u2019explorer chaque brique, rappelons que ces [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/understanding-edr-siem-soar-and-xdr-the-complementarity-of-cyber-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-20T12:16:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T15:04:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1536\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hugo Lanier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hugo Lanier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/\"},\"author\":{\"name\":\"Hugo Lanier\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\"},\"headline\":\"Comprendre EDR, SIEM, SOAR et XDR : la compl\u00e9mentarit\u00e9 de la cyber-d\u00e9fense\",\"datePublished\":\"2025-06-20T12:16:19+00:00\",\"dateModified\":\"2025-11-21T15:04:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/\"},\"wordCount\":783,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png\",\"articleSection\":[\"Surveillance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/\",\"name\":\"Comprendre EDR, SIEM, SOAR et XDR : la compl\u00e9mentarit\u00e9 de la cyber-d\u00e9fense - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png\",\"datePublished\":\"2025-06-20T12:16:19+00:00\",\"dateModified\":\"2025-11-21T15:04:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png\",\"width\":1024,\"height\":1536},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/surveillance\\\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Surveillance\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/surveillance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Comprendre EDR, SIEM, SOAR et XDR : la compl\u00e9mentarit\u00e9 de la cyber-d\u00e9fense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/af585567417266884c2f7f470cb09a6f\",\"name\":\"Hugo Lanier\",\"sameAs\":[\"https:\\\/\\\/phishia.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding EDR, SIEM, SOAR and XDR: the complementary nature of cyber defense - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/monitoring\/understanding-edr-siem-soar-and-xdr-the-complementarity-of-cyber-defense\/","og_locale":"en_US","og_type":"article","og_title":"Comprendre EDR, SIEM, SOAR et XDR : la compl\u00e9mentarit\u00e9 de la cyber-d\u00e9fense - Phishia","og_description":"Le vocabulaire de la cybers\u00e9curit\u00e9 ressemble parfois \u00e0 une jungle d\u2019acronymes. Pourtant, saisir la nuance entre EDR, SIEM, SOAR et XDR est essentiel : leur r\u00f4le et leur mode de fonctionnement d\u00e9terminent la profondeur de visibilit\u00e9 dont votre \u00e9quipe dispose et la vitesse \u00e0 laquelle elle peut r\u00e9agir. Avant d\u2019explorer chaque brique, rappelons que ces [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/monitoring\/understanding-edr-siem-soar-and-xdr-the-complementarity-of-cyber-defense\/","og_site_name":"Phishia","article_published_time":"2025-06-20T12:16:19+00:00","article_modified_time":"2025-11-21T15:04:16+00:00","og_image":[{"width":1024,"height":1536,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png","type":"image\/png"}],"author":"Hugo Lanier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hugo Lanier","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/"},"author":{"name":"Hugo Lanier","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f"},"headline":"Comprendre EDR, SIEM, SOAR et XDR : la compl\u00e9mentarit\u00e9 de la cyber-d\u00e9fense","datePublished":"2025-06-20T12:16:19+00:00","dateModified":"2025-11-21T15:04:16+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/"},"wordCount":783,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png","articleSection":["Surveillance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/","url":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/","name":"Understanding EDR, SIEM, SOAR and XDR: the complementary nature of cyber defense - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png","datePublished":"2025-06-20T12:16:19+00:00","dateModified":"2025-11-21T15:04:16+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/06\/20250620_1412_Cybersecurite-Visuelle_simple_compose_01jy6m034beassh0vja7zp68bs.png","width":1024,"height":1536},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/surveillance\/comprendre-edr-siem-soar-et-xdr-la-complementarite-de-la-cyber-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Surveillance","item":"https:\/\/phishia.fr\/blog\/category\/surveillance\/"},{"@type":"ListItem","position":3,"name":"Comprendre EDR, SIEM, SOAR et XDR : la compl\u00e9mentarit\u00e9 de la cyber-d\u00e9fense"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f","name":"Hugo Lanier","sameAs":["https:\/\/phishia.fr"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=3069"}],"version-history":[{"count":1,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3069\/revisions"}],"predecessor-version":[{"id":3071,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/3069\/revisions\/3071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/3070"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=3069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=3069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=3069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}