{"id":44625,"date":"2015-07-27T09:27:52","date_gmt":"2015-07-27T16:27:52","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=44625"},"modified":"2025-05-15T00:57:37","modified_gmt":"2025-05-15T07:57:37","slug":"dridex-best-practices","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/","title":{"rendered":"Dridex Best Practices"},"content":{"rendered":"<p>Limiter et prot\u00e9ger votre entreprise contre les attaques de type Dridex\u00a0peut se faire \u00e0\u00a0diff\u00e9rents niveaux d&#8217;interception : Fichiers, Registre, URL et IP, et cel\u00e0 \u00e0 travers plusieurs technologies des gammes de produits McAfee. La protection contre ce type de codes malveillants extr\u00eament volatile n\u00e9cessite une approche multi niveaux et une coordination entre les diff\u00e9rents outils.<\/p>\n<p>Pour tous les d\u00e9tails sur DRIDEX et le downloalder l&#8217;accompagnement:<\/p>\n<ol>\n<li><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25689\">https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25689<\/a> \u2013 W97M\/Downloader<\/li>\n<li><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25982\">https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25982<\/a> \u2013 Dridex<\/li>\n<\/ol>\n<h2><strong><u><em>Au niveau de vos Endpoints:<\/em><\/u><\/strong><\/h2>\n<p>Il est primordial au niveau du Endpoint de mettre en place et d&#8217;activer les d\u00e9tections par r\u00e9putations \u00e0 travers le <a href=\"https:\/\/www.mcafee.com\/enterprise\/fr-fr\/products\/global-threat-intelligence-esm.html\">Global Threat Intelligence<\/a> sur toutes les technologies utilis\u00e9es.<\/p>\n<p>Il est possible de plus au regard du fonctionnement des codes DRIDEX d&#8217;activer des r\u00e9gles de d\u00e9tections au niveau de la protection d&#8217;acc\u00e9s de Virusscan Enterprise.<\/p>\n<p>Pour plus de d\u00e9tails sur les \u00e9tapes \u00e0 suivre pour mettre en place les r\u00e9gles de protections ou d&#8217;alertes d&#8217;acc\u00e9s :<\/p>\n<p><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB81095\">How to create a user-defined Access Protection Rule from a VSE 8.x or ePO 5.x console<\/a><\/p>\n<p><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB54812\">How to use wildcards when creating exclusions in VirusScan Enterprise 8.x<\/a><\/p>\n<p>DRIDEX pr\u00e9sente un comportement dans lequel il se copie dans le r\u00e9pertoire Admin d&#8217;Application Data en utilisant le terme Edge ou edg et une valeur num\u00e9rique al\u00e9atoire, voici des exemples :<\/p>\n<h2><strong>Win XP:<\/strong><\/h2>\n<p><strong>\u00a0<\/strong><strong>C:\\Documents and Settings\\Administrator\\Application Data\\Local Settings\\edge or edg[random.hex].exe<\/strong><\/p>\n<p><strong>\u00a0<\/strong><strong>WIN7:<\/strong><\/p>\n<p><strong>C:\\Users\\Administrator\\Appdata\\local\\edge or edg[random.hex].exe<\/strong><\/p>\n<p>Nos utilisateurs peuvent ainsi utiliser une r\u00e9gles d&#8217;Access Protection pour restreindre ou auditer la cr\u00e9ation de nouveaux fichiers ou repertoires :<\/p>\n<p>Selectionner <strong>New files being created<\/strong> et ajouter les information suivantes : <strong>File or folder name to block:<\/strong><\/p>\n<ul>\n<li>[OS installed drive]\\Documents and Settings\\[administrator]Application Data\\Local Settings\\edge or edg[random.hex].exe<\/li>\n<\/ul>\n<p><em>[random. hex] peut \u00eatre remplac\u00e9 par \u2018*\u2019 ou par un \u00e9l\u00e9ment plus pr\u00e9cis ce qui peut donner par exemple *.tmp ou edge123.tmp.<\/em><\/p>\n<h2><strong>Example Access Protection Rules<\/strong><\/h2>\n<p><strong>Windows 7:<\/strong><\/p>\n<p><strong>\u00a0<\/strong><strong>Windows XP:<\/strong><\/p>\n<p>Pour la DLL dropp\u00e9e:<\/p>\n<p><strong>Il est possible aussi de bloquer des \u00e9l\u00e9ments de DRIDEX via <a href=\"https:\/\/www.mcafee.com\/enterprise\/fr-fr\/products\/host-ips-for-server.html\">Host Intrusion Prevention<\/a><\/strong><\/p>\n<ul>\n<li>Pour blacklister une application avec une signature personnalis\u00e9e <a href=\"https:\/\/www.mcafee.com\/enterprise\/fr-fr\/products\/host-ips-for-server.html\">Host Intrusion Prevention<\/a> (Host IPS) <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB71329\">KB71329<\/a>.<\/li>\n<li>Pour bloquer un binaire \u00e0 travers une r\u00e8gle <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB71794\">KB71794<\/a>.<\/li>\n<li>Pour cr\u00e9er une r\u00e8gle qui prot\u00e9ge contre le hooking entre executables <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB71794\">KB71794<\/a>.<\/li>\n<\/ul>\n<p>*** Disclaimer: Usage of *.* in access protection rules will prevent all types of files from running and being accessed from that specific location. If specifying a process path under \u201cProcesses to Include\u201d, the use of wildcards for Folder Names may lead to unexpected behavior. Users are requested to make this rule as specific as possible.<\/p>\n<h2><strong><u>Au niveau des passerelles mails :<\/u><\/strong><\/h2>\n<p>Il n&#8217;est pas n\u00e9cessaire de repasser trop de temps sur les basiques mais n\u00e9anmoins r\u00e9enforcer l&#8217;attention des utilisateurs reste clef :<\/p>\n<ul>\n<li>Ne pas ouvrir les pi\u00e8ces jointes venant d&#8217;exp\u00e9diteur inconnu<\/li>\n<li>Si un email parait trop int\u00e9ressant, sur-vendeur, ou \u00e9trange supprimez le<\/li>\n<li>Aucun organisme ne vous demande jamais vos coordonn\u00e9es bancaires<\/li>\n<\/ul>\n<p>Le renforcement des r\u00e9gles dans les passerelles mails permet aussi de limiter les impacts de DRIDEX via\u00a0:<\/p>\n<ul>\n<li>Interdiction des executables en pi\u00e8ces jointes<\/li>\n<li>L&#8217;activation de la fonction : Find all macros and treat as infected<\/li>\n<\/ul>\n<h2><strong><u>Nouvelles technologies:<\/u><\/strong><\/h2>\n<p>Il est a noter que la technologie Threat Intelligence Exchange associ\u00e9e \u00e0 <a href=\"https:\/\/www.mcafee.com\/enterprise\/fr-fr\/products\/advanced-threat-defense.html\">Advanced Threat Defense<\/a> vous permet de prot\u00e9ger vos employ\u00e9s des attaques de type DRIDEX. De plus ces technologies vous permettent aussi d&#8217;utiliser les IOCs d&#8217;autres sources afin d&#8217;augmenter votre niveau de protection global: <a href=\"https:\/\/www.youtube.com\/watch?v=Wxvizasvj8k&amp;feature=player_embedded\">https:\/\/www.youtube.com\/watch?v=Wxvizasvj8k&amp;feature=player_embedded<\/a><\/p>\n<p>Dans TIE la r\u00e9gle : \u00a0Malware Dropped by Infected Microsoft Office Documents permet une anticipation de la menace, plus d&#8217;information sur : <a href=\"https:\/\/community.mcafee.com\/docs\/DOC-6908\">https:\/\/community.mcafee.com\/docs\/DOC-6908<\/a><\/p>\n<p>Enfin <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/application-change-control.html\" target=\"_blank\" rel=\"noopener noreferrer\">Application Control<\/a> permet une couverture optimale sur les machines.<\/p>\n<h2><strong><u>Conclusion:<\/u><\/strong><\/h2>\n<p>M\u00eame si les techniques utilis\u00e9es par DRIDEX ne sont pas nouvelles il est toujours compliqu\u00e9 de bloquer toutes les variantes avec une approche uniquement bas\u00e9e sur les signatures. L&#8217;activation de <a href=\"https:\/\/www.mcafee.com\/enterprise\/fr-fr\/products\/global-threat-intelligence-esm.html\">GTI<\/a> , la soumission d&#8217;\u00e9chantillons permettent une am\u00e9lioration significative du taux de couverture. La meilleure approche \u00e9tant l&#8217;utilisation de la S\u00e9curit\u00e9 Connect\u00e9e \u00e0 travers <a href=\"https:\/\/www.mcafee.com\/enterprise\/fr-fr\/products\/threat-intelligence-exchange.html\">TIE<\/a>, et <a href=\"https:\/\/www.mcafee.com\/enterprise\/fr-fr\/products\/advanced-threat-defense.html\">ATD<\/a> afin de travailler sur le comportement et d\u00e9couvrir les patients z\u00e9ros afin de prot\u00e9ger le reste de l&#8217;infrastructure \u00e0 travers le partage d&#8217;intelligence <a href=\"https:\/\/community.mcafee.com\/docs\/DOC-6462\">https:\/\/community.mcafee.com\/docs\/DOC-6462<\/a><\/p>\n<p>Merci \u00e0 mes coll\u00e9gues, Emmanuel Flores, Vinoo Thomas et John Health.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Limiter et prot\u00e9ger votre entreprise contre les attaques de type Dridex\u00a0peut se faire \u00e0\u00a0diff\u00e9rents niveaux d&#8217;interception : Fichiers, Registre, URL&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[12076],"tags":[14803,12097],"coauthors":[16309],"class_list":["post-44625","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-malware-fr-fr","tag-phishing-fr-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lutter contre Dridex<\/title>\n<meta name=\"description\" content=\"Dridex comportement et m\u00e9thodes de blocages\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lutter contre Dridex\" \/>\n<meta property=\"og:description\" content=\"Dridex comportement et m\u00e9thodes de blocages\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-27T16:27:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-15T07:57:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Dridex Best Practices\",\"datePublished\":\"2015-07-27T16:27:52+00:00\",\"dateModified\":\"2025-05-15T07:57:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"keywords\":[\"malware\",\"Phishing\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/\",\"name\":\"Lutter contre Dridex\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\"},\"datePublished\":\"2015-07-27T16:27:52+00:00\",\"dateModified\":\"2025-05-15T07:57:37+00:00\",\"description\":\"Dridex comportement et m\u00e9thodes de blocages\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Dridex Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lutter contre Dridex","description":"Dridex comportement et m\u00e9thodes de blocages","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Lutter contre Dridex","og_description":"Dridex comportement et m\u00e9thodes de blocages","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-07-27T16:27:52+00:00","article_modified_time":"2025-05-15T07:57:37+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Dridex Best Practices","datePublished":"2015-07-27T16:27:52+00:00","dateModified":"2025-05-15T07:57:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/"},"wordCount":795,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"keywords":["malware","Phishing"],"articleSection":["McAfee Labs"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/","name":"Lutter contre Dridex","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website"},"datePublished":"2015-07-27T16:27:52+00:00","dateModified":"2025-05-15T07:57:37+00:00","description":"Dridex comportement et m\u00e9thodes de blocages","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/dridex-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Dridex Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/44625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/comments?post=44625"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/44625\/revisions"}],"predecessor-version":[{"id":213403,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/44625\/revisions\/213403"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media?parent=44625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/categories?post=44625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/tags?post=44625"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/coauthors?post=44625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}