{"id":59927,"date":"2020-07-07T12:00:13","date_gmt":"2020-07-07T12:00:13","guid":{"rendered":"https:\/\/www.stellarinfo.com\/blog\/?p=59927"},"modified":"2024-08-20T05:48:10","modified_gmt":"2024-08-20T05:48:10","slug":"essential-features-of-pst-forensic-tool","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/","title":{"rendered":"Outlook PST Forensics: Concept and Application"},"content":{"rendered":"<?xml encoding=\"utf-8\" ?><?xml encoding=\"utf-8\" ?><blockquote class=\"note_alert\">\n<p><strong>Summary<\/strong>: In this blog, we highlighted how we could do a forensic investigation of Outlook emails. First, we mentioned enterprise-oriented features, such as calendaring, contact managing, task managing, journal logging, and note-taking. After this, we emphasized the importance of using a PST forensics tool, such as the recovery of Deleted and Tampered Emails, advanced search functions, etc. We also mentioned how one email forensics software, Stellar Email Forensic, fulfills every criterion for a forensic PST viewer tool.<\/p>\n<\/blockquote><p>Microsoft Outlook is a popular email client used by organizations of all sizes. This is mainly because it comes packed with many enterprise-oriented features, such as calendaring, contact managing, task managing, journal logging, note-taking, etc.<\/p><p>When you need to do a forensic investigation of Outlook emails, you can use the export option in the application to extract the mailbox data. This data is saved in a PST file.<\/p><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"600\" src=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg\" alt=\"Must have features in a PST forensics tool\" class=\"wp-image-60212 apply-gradient-on-post-images\" srcset=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg 1000w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1-300x180.jpg 300w, https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1-768x461.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div><h2 class=\"wp-block-heading\" id=\"features-of-a-pst-forensics-tool\"><strong><strong>Features of a PST Forensics Tool<\/strong><\/strong><\/h2><p>An advanced PST forensics tool can help you to search for the relevant emails in the Outlook mailbox, create reports, and collect evidence. There are several PST forensics tools available but a tool that is easy to use with a simple user interface should be preferred.<\/p><p>The following are some essential features that you should seek in a PST forensics tool:<\/p><h3 class=\"wp-block-heading\" id=\"h-1-recovery-of-deleted-and-tampered-emails\">1. <strong><strong>Recovery of Deleted and Tampered Emails<\/strong><\/strong><\/h3><p>To conduct a successful Outlook email forensics investigation, you need to collect all the emails, including the deleted emails, from the PST files. So, the PST forensics tool in consideration should be able to recover the deleted emails from the PST file. When an email is deleted from a PST file, it remains in the file. However, the client cannot access that deleted email. So, the ideal PST forensics tool should be able to find and recover the deleted email.<\/p><p>A PST forensics tool can also help in the case of tampered emails. For instance, if someone has spoilt email evidence by tampering with the email header, the PST forensics tool would still be able to display the email header fields. This can serve as a great utility for identifying the discrepancies.<\/p><h3 class=\"wp-block-heading\" id=\"h-2-advanced-search-functions\"><strong>2. Advanced Search Functions<\/strong><\/h3><p>You can open a PST file with Microsoft Outlook and perform searches to find the information. However, the search functions offered by Outlook are limited and rudimentary. To perform advanced searches, you should use a dedicated PST forensics tool. It can help you to filter certain file types in the email attachments sent or received or scan emails sent during a particular period by certain users. It can also help you to search items by using Boolean Search or Regular Expression Search.<\/p><h3 class=\"wp-block-heading\" id=\"h-3-case-management\"><strong>3. Case Management<\/strong><\/h3><p>It is a challenge to conduct formal email forensics investigation when it comes to managing a large number of emails and other mailbox data. During an investigation, you may need to examine many PST files, mark several important emails and attachments, and document a wide range of events. These tasks demand a lot of time and effort. So, you should choose an easy-to-use PST forensics tool that supports the management of multiple cases simultaneously.<\/p><p>Your choice of a PST forensics tool should have case management features, such as email bookmarking and tagging, log maintenance, and generation of reports like investigation reports, evidence summary reports, etc. These features can help you simplify the otherwise complex investigation tasks and facilitate evidence collection.<\/p><h3 class=\"wp-block-heading\" id=\"h-4-support-for-large-pst-files\"><strong>4. Support for Large PST Files<\/strong><\/h3><p>Investigators often need to examine multiple mailboxes while conducting email forensic investigation. To correlate the events, read and analyze the email messages, and identify tampered evidence, the investigators would need to examine several mailboxes (saved in Outlook PST files) in a single process. It&rsquo;s important that the PST forensics tool supports examination of multiple PST files at the same time.<\/p><h3 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h3><p>Email forensics is a domain replete with all kinds of challenges. However, with the right tool, you can achieve high productivity and get reliable results. A top-of-the-line PST forensics tool should have all the above-mentioned features.&nbsp;<strong><a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software.php\" target=\"_blank\" rel=\"noreferrer noopener\">Stellar Email Forensic<\/a><\/strong>&nbsp;is one such tool that ticks all the right boxes.<\/p><p class=\"has-blue-background-color has-background\"><strong>Stellar Email Forensic<\/strong>&nbsp;is an advanced enterprise-based eDiscovery and email forensics software that supports more than 25 widely-used file formats, such as PST, <a href=\"https:\/\/www.stellarinfo.com\/blog\/forensic-analysis-of-exchange-edb-files\/\" target=\"_blank\" rel=\"noreferrer noopener\">EDB<\/a>, OST, MBOX, etc. It comes with features, such as <em><strong>Boolean Search<\/strong><\/em>, <strong><em>Regular Expression Search<\/em><\/strong>, bookmarking, tagging, report generation, <a href=\"https:\/\/www.stellarinfo.com\/blog\/challenges-in-recovering-deleted-emails-from-email-clients-and-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">deleted email recovery<\/a>, <a href=\"https:\/\/www.stellarinfo.com\/blog\/bulk-email-forensics-for-legal-professionals\/\" target=\"_blank\" rel=\"noreferrer noopener\">bulk email forensics<\/a>, generation of <a href=\"https:\/\/www.stellarinfo.com\/blog\/hash-values-in-digital-forensics\/\" target=\"_blank\" rel=\"noreferrer noopener\">MD5 and SHA1<\/a> hash values of the original email files, and much more. You can&nbsp;<a href=\"https:\/\/www.stellarinfo.com\/email-forensics-software\/buy-now.php\" target=\"_blank\" rel=\"noreferrer noopener\">download<\/a> Stellar Email Forensic&nbsp;to start your email investigation now.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: In this blog, we highlighted how we could do a forensic&hellip; <a class=\"more-link\" href=\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\">Continue reading <span class=\"screen-reader-text\">Outlook PST Forensics: Concept and Application<\/span><\/a><\/p>\n","protected":false},"author":39,"featured_media":60212,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1245],"tags":[3449,1240,3452,3451,3448,3450,610,1479],"class_list":["post-59927","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-forensics","tag-case-management","tag-email-forensics","tag-forensics","tag-mail-tampering","tag-outlook-forensics","tag-outlook-pst-file","tag-pst","tag-pst-forensics","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are the Essential Features of a PST Forensic Software?<\/title>\n<meta name=\"description\" content=\"A top-notch PST forensic tool must have certain features. Learn about these features in detail and understand why they are important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the Essential Features of a PST Forensic Software?\" \/>\n<meta property=\"og:description\" content=\"A top-notch PST forensic tool must have certain features. Learn about these features in detail and understand why they are important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-07T12:00:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T05:48:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhinav Sethi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhinav Sethi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\"},\"author\":{\"name\":\"Abhinav Sethi\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\"},\"headline\":\"Outlook PST Forensics: Concept and Application\",\"datePublished\":\"2020-07-07T12:00:13+00:00\",\"dateModified\":\"2024-08-20T05:48:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\"},\"wordCount\":755,\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg\",\"keywords\":[\"CASE MANAGEMENT\",\"email forensics\",\"forensics\",\"mail tampering\",\"Outlook Forensics\",\"outlook pst file\",\"PST\",\"PST forensics\"],\"articleSection\":[\"Email Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\",\"name\":\"What are the Essential Features of a PST Forensic Software?\",\"isPartOf\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg\",\"datePublished\":\"2020-07-07T12:00:13+00:00\",\"dateModified\":\"2024-08-20T05:48:10+00:00\",\"author\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\"},\"description\":\"A top-notch PST forensic tool must have certain features. Learn about these features in detail and understand why they are important.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#primaryimage\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg\",\"contentUrl\":\"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stellarinfo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Outlook PST Forensics: Concept and Application\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#website\",\"url\":\"https:\/\/www.stellarinfo.com\/blog\/\",\"name\":\"Stellar Data Recovery Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4\",\"name\":\"Abhinav Sethi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g\",\"caption\":\"Abhinav Sethi\"},\"description\":\"Abhinav Sethi is a Senior Writer at Stellar. He writes articles, blog posts, knowledge-bases, case studies, etc. for different technologies. He also has a keen interest in digital forensics and helps forward-thinking companies fight different threats with apt solutions.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/abhinav-sethi-126b123a\/\"],\"url\":\"https:\/\/www.stellarinfo.com\/blog\/author\/abhinav\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the Essential Features of a PST Forensic Software?","description":"A top-notch PST forensic tool must have certain features. Learn about these features in detail and understand why they are important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/","og_locale":"en_US","og_type":"article","og_title":"What are the Essential Features of a PST Forensic Software?","og_description":"A top-notch PST forensic tool must have certain features. Learn about these features in detail and understand why they are important.","og_url":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/","og_site_name":"Stellar Data Recovery Blog","article_published_time":"2020-07-07T12:00:13+00:00","article_modified_time":"2024-08-20T05:48:10+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg","type":"image\/jpeg"}],"author":"Abhinav Sethi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhinav Sethi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/"},"author":{"name":"Abhinav Sethi","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4"},"headline":"Outlook PST Forensics: Concept and Application","datePublished":"2020-07-07T12:00:13+00:00","dateModified":"2024-08-20T05:48:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/"},"wordCount":755,"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg","keywords":["CASE MANAGEMENT","email forensics","forensics","mail tampering","Outlook Forensics","outlook pst file","PST","PST forensics"],"articleSection":["Email Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/","url":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/","name":"What are the Essential Features of a PST Forensic Software?","isPartOf":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg","datePublished":"2020-07-07T12:00:13+00:00","dateModified":"2024-08-20T05:48:10+00:00","author":{"@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4"},"description":"A top-notch PST forensic tool must have certain features. Learn about these features in detail and understand why they are important.","breadcrumb":{"@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#primaryimage","url":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg","contentUrl":"https:\/\/www.stellarinfo.com\/blog\/wp-content\/uploads\/2020\/07\/Must-Have-Features-in-a-PST-Forensic-Tool-1.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.com\/blog\/essential-features-of-pst-forensic-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Outlook PST Forensics: Concept and Application"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.com\/blog\/#website","url":"https:\/\/www.stellarinfo.com\/blog\/","name":"Stellar Data Recovery Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/59813a3d157f4d3a68949bce854241f4","name":"Abhinav Sethi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stellarinfo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f7b5067a858b11bbdea64a56366ad4f686cef22d39ccc50363bc5346e80a6de?s=96&d=mm&r=g","caption":"Abhinav Sethi"},"description":"Abhinav Sethi is a Senior Writer at Stellar. He writes articles, blog posts, knowledge-bases, case studies, etc. for different technologies. He also has a keen interest in digital forensics and helps forward-thinking companies fight different threats with apt solutions.","sameAs":["https:\/\/www.linkedin.com\/in\/abhinav-sethi-126b123a\/"],"url":"https:\/\/www.stellarinfo.com\/blog\/author\/abhinav\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/59927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/comments?post=59927"}],"version-history":[{"count":16,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/59927\/revisions"}],"predecessor-version":[{"id":172580,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/posts\/59927\/revisions\/172580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media\/60212"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/media?parent=59927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/categories?post=59927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.com\/blog\/wp-json\/wp\/v2\/tags?post=59927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}