{"id":486,"date":"2023-02-06T12:48:07","date_gmt":"2023-02-06T12:48:07","guid":{"rendered":"https:\/\/cyber-experts.net\/?p=486"},"modified":"2023-04-05T11:52:56","modified_gmt":"2023-04-05T10:52:56","slug":"sccm","status":"publish","type":"post","link":"https:\/\/cyber-experts.net\/?p=486","title":{"rendered":"SCCM"},"content":{"rendered":"\n<p>System Center Configuration Manager&nbsp;<\/p>\n\n\n\n<p>Microsoft system center configuration manager is one of the most popular configuration management tools used in the windows platform<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/cyber-experts.net\/wp-content\/uploads\/2023\/02\/SCCM-1024x576.jpg\" alt=\"\" class=\"wp-image-487\" srcset=\"https:\/\/cyber-experts.net\/wp-content\/uploads\/2023\/02\/SCCM-1024x576.jpg 1024w, https:\/\/cyber-experts.net\/wp-content\/uploads\/2023\/02\/SCCM-300x169.jpg 300w, https:\/\/cyber-experts.net\/wp-content\/uploads\/2023\/02\/SCCM-768x432.jpg 768w, https:\/\/cyber-experts.net\/wp-content\/uploads\/2023\/02\/SCCM-1536x864.jpg 1536w, https:\/\/cyber-experts.net\/wp-content\/uploads\/2023\/02\/SCCM.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">SCCM<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>System Center Configuration Manager&nbsp; Microsoft system center configuration manager is one of the most popular configuration management tools used in the windows platform<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10],"tags":[],"class_list":["post-486","post","type-post","status-publish","format-standard","hentry","category-windows-server"],"_links":{"self":[{"href":"https:\/\/cyber-experts.net\/index.php?rest_route=\/wp\/v2\/posts\/486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-experts.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-experts.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-experts.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-experts.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=486"}],"version-history":[{"count":3,"href":"https:\/\/cyber-experts.net\/index.php?rest_route=\/wp\/v2\/posts\/486\/revisions"}],"predecessor-version":[{"id":516,"href":"https:\/\/cyber-experts.net\/index.php?rest_route=\/wp\/v2\/posts\/486\/revisions\/516"}],"wp:attachment":[{"href":"https:\/\/cyber-experts.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-experts.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-experts.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}