{"id":2157,"date":"2016-09-28T09:08:24","date_gmt":"2016-09-28T07:08:24","guid":{"rendered":"http:\/\/lestfrexgn.cluster020.hosting.ovh.net\/?p=2157"},"modified":"2016-09-27T22:14:56","modified_gmt":"2016-09-27T20:14:56","slug":"sccm-installation-du-pack-devaluation-de-vulnerabilites","status":"publish","type":"post","link":"https:\/\/les2t.fr\/fr_fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/","title":{"rendered":"SCCM \u2013 Installation du pack d\u2019\u00e9valuation de vuln\u00e9rabilit\u00e9s"},"content":{"rendered":"<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1620 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png\" alt=\"sccmlogo\" width=\"274\" height=\"167\" \/><\/a><\/p>\n<p>La vuln\u00e9rabilit\u00e9 des machines et donc la s\u00e9curit\u00e9 des entreprises est un sujet des plus pr\u00e9occupant. SCCM permet de cr\u00e9er et de mettre en place des Baselines analysant en masse les ordinateurs. Ce travail peut \u00eatre long et fastidieux, c\u2019est pourquoi Microsoft fourni un pack contenant une s\u00e9rie de Baselines d\u00e9j\u00e0 d\u00e9fini pr\u00eate \u00e0 \u00eatre import\u00e9e.<\/p>\n<p><!--more--><\/p>\n<p>Ce pack contient des Baseline pour IIS, SQL server, et Windows ansi qu&rsquo;un fichier Word d\u00e9crivant les r\u00e8gles .<\/p>\n<ul>\n<li>Pour l\u2019installer, commencez par le t\u00e9l\u00e9charger : <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=51948\" target=\"_blank\">ICI<\/a><\/li>\n<li>Ex\u00e9cutez-le \u00ab ConfigMgr_VACP.msi \u00bb et suivez les instructions. Celui-ci installera un fichier VACP.cab dans le chemin sp\u00e9cifi\u00e9.<\/li>\n<li>Ouvrez ensuite votre console SCCM et v\u00e9rifier que dans vos param\u00e8tres clients la strat\u00e9gie d\u2019ex\u00e9cution de PowerShell est bien sur Bypass.<\/li>\n<li>Allez ensuite dans Assets and compliance\\Compliance settings \\Configuration Baselines.<\/li>\n<li>Faites un clic droit \u00ab Import Configuration Data \u00bb Un assistant s\u2019ouvre.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2158 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-1-300x263.jpg\" alt=\"sccm-pack-baselines-1\" width=\"300\" height=\"263\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-1-300x263.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-1.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Cliquez sur add et choisissez le fichier .cab<\/li>\n<\/ul>\n<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2159 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-2-300x263.jpg\" alt=\"sccm-pack-baselines-2\" width=\"300\" height=\"263\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-2-300x263.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-2.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Faire suivant puis close<\/li>\n<\/ul>\n<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2160 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-3-300x263.jpg\" alt=\"sccm-pack-baselines-3\" width=\"300\" height=\"263\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-3-300x263.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-3.jpg 504w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Les Baselines apparaissent dans votre console.<\/li>\n<li>Pour les d\u00e9ployer faites un clic droit Deploy sur la premi\u00e8re.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2161 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-4-300x218.jpg\" alt=\"sccm-pack-baselines-4\" width=\"300\" height=\"218\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-4-300x218.jpg 300w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-4-220x161.jpg 220w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-4.jpg 493w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<ul>\n<li>Ajouter ensuite les autres<\/li>\n<\/ul>\n<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2162 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-5-298x300.jpg\" alt=\"sccm-pack-baselines-5\" width=\"298\" height=\"300\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-5-298x300.jpg 298w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-5-150x150.jpg 150w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-5-50x50.jpg 50w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-5-65x65.jpg 65w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-5.jpg 504w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/><\/a><\/p>\n<ul>\n<li>Et s\u00e9lectionnez la collection de d\u00e9ploiement<\/li>\n<\/ul>\n<p><a href=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2163 aligncenter\" src=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-6-298x300.jpg\" alt=\"sccm-pack-baselines-6\" width=\"298\" height=\"300\" srcset=\"https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-6-298x300.jpg 298w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-6-150x150.jpg 150w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-6-50x50.jpg 50w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-6-65x65.jpg 65w, https:\/\/les2t.fr\/wp-content\/uploads\/2016\/09\/SCCM-Pack-Baselines-6.jpg 504w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La vuln\u00e9rabilit\u00e9 des machines et donc la s\u00e9curit\u00e9 des entreprises est un sujet des plus pr\u00e9occupant. SCCM permet de cr\u00e9er et de mettre en place des Baselines analysant en masse les ordinateurs. Ce travail peut \u00eatre long et fastidieux, c\u2019est pourquoi Microsoft fourni un pack contenant une s\u00e9rie de Baselines d\u00e9j\u00e0 d\u00e9fini pr\u00eate \u00e0 \u00eatre [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[198],"tags":[247,113,193,14,36,164,220,22,160,48],"class_list":["post-2157","post","type-post","status-publish","format-standard","hentry","category-sccm","tag-baselines","tag-configmgr","tag-configmgr-1511","tag-configmgr-2012","tag-microsoft","tag-sccm-2012","tag-securite","tag-system-center-configuration-manager","tag-truc-et-astuces","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SCCM \u2013 Installation du pack d\u2019\u00e9valuation de vuln\u00e9rabilit\u00e9s - Les2T<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/les2t.fr\/fr_fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SCCM \u2013 Installation du pack d\u2019\u00e9valuation de vuln\u00e9rabilit\u00e9s - Les2T\" \/>\n<meta property=\"og:description\" content=\"La vuln\u00e9rabilit\u00e9 des machines et donc la s\u00e9curit\u00e9 des entreprises est un sujet des plus pr\u00e9occupant. SCCM permet de cr\u00e9er et de mettre en place des Baselines analysant en masse les ordinateurs. Ce travail peut \u00eatre long et fastidieux, c\u2019est pourquoi Microsoft fourni un pack contenant une s\u00e9rie de Baselines d\u00e9j\u00e0 d\u00e9fini pr\u00eate \u00e0 \u00eatre [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/les2t.fr\/fr_fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/\" \/>\n<meta property=\"og:site_name\" content=\"Les2T\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-28T07:08:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png\" \/>\n<meta name=\"author\" content=\"TRARBACH Jean-Yves\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"TRARBACH Jean-Yves\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/\",\"url\":\"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/\",\"name\":\"SCCM \u2013 Installation du pack d\u2019\u00e9valuation de vuln\u00e9rabilit\u00e9s - Les2T\",\"isPartOf\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png\",\"datePublished\":\"2016-09-28T07:08:24+00:00\",\"author\":{\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\"},\"breadcrumb\":{\"@id\":\"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#primaryimage\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/les2t.fr\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SCCM \u2013 Installation du pack d\u2019\u00e9valuation de vuln\u00e9rabilit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#website\",\"url\":\"https:\/\/les2t.fr\/fr_fr\/\",\"name\":\"Les2T\",\"description\":\"| BLOG  IT |\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e\",\"name\":\"TRARBACH Jean-Yves\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"contentUrl\":\"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg\",\"caption\":\"TRARBACH Jean-Yves\"},\"description\":\"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT\",\"sameAs\":[\"https:\/\/les2t.fr\/jean-yves-trarbach\/\"],\"url\":\"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SCCM \u2013 Installation du pack d\u2019\u00e9valuation de vuln\u00e9rabilit\u00e9s - Les2T","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/les2t.fr\/fr_fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/","og_locale":"fr_FR","og_type":"article","og_title":"SCCM \u2013 Installation du pack d\u2019\u00e9valuation de vuln\u00e9rabilit\u00e9s - Les2T","og_description":"La vuln\u00e9rabilit\u00e9 des machines et donc la s\u00e9curit\u00e9 des entreprises est un sujet des plus pr\u00e9occupant. SCCM permet de cr\u00e9er et de mettre en place des Baselines analysant en masse les ordinateurs. Ce travail peut \u00eatre long et fastidieux, c\u2019est pourquoi Microsoft fourni un pack contenant une s\u00e9rie de Baselines d\u00e9j\u00e0 d\u00e9fini pr\u00eate \u00e0 \u00eatre [&hellip;]","og_url":"https:\/\/les2t.fr\/fr_fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/","og_site_name":"Les2T","article_published_time":"2016-09-28T07:08:24+00:00","og_image":[{"url":"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png","type":"","width":"","height":""}],"author":"TRARBACH Jean-Yves","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"TRARBACH Jean-Yves","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/","url":"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/","name":"SCCM \u2013 Installation du pack d\u2019\u00e9valuation de vuln\u00e9rabilit\u00e9s - Les2T","isPartOf":{"@id":"https:\/\/les2t.fr\/fr_fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#primaryimage"},"image":{"@id":"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#primaryimage"},"thumbnailUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png","datePublished":"2016-09-28T07:08:24+00:00","author":{"@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e"},"breadcrumb":{"@id":"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#primaryimage","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2015\/12\/sccmlogo.png"},{"@type":"BreadcrumbList","@id":"https:\/\/les2t.fr\/sccm-installation-du-pack-devaluation-de-vulnerabilites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/les2t.fr\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"SCCM \u2013 Installation du pack d\u2019\u00e9valuation de vuln\u00e9rabilit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/les2t.fr\/fr_fr\/#website","url":"https:\/\/les2t.fr\/fr_fr\/","name":"Les2T","description":"| BLOG  IT |","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/les2t.fr\/fr_fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/d96bb4f512f9aeb12dc923def245768e","name":"TRARBACH Jean-Yves","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/les2t.fr\/fr_fr\/#\/schema\/person\/image\/","url":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","contentUrl":"https:\/\/les2t.fr\/wp-content\/uploads\/2023\/02\/JeanYvestrarbach-96x96.jpg","caption":"TRARBACH Jean-Yves"},"description":"Head Of Modern Workplace Metsys MVP Windows &amp; devices For IT","sameAs":["https:\/\/les2t.fr\/jean-yves-trarbach\/"],"url":"https:\/\/les2t.fr\/fr_fr\/author\/kounac\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/2157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/comments?post=2157"}],"version-history":[{"count":0,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/posts\/2157\/revisions"}],"wp:attachment":[{"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/media?parent=2157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/categories?post=2157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/les2t.fr\/fr_fr\/wp-json\/wp\/v2\/tags?post=2157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}