{"id":37363,"date":"2025-05-13T09:06:36","date_gmt":"2025-05-13T13:06:36","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=37363"},"modified":"2025-05-14T02:45:49","modified_gmt":"2025-05-14T06:45:49","slug":"how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/","title":{"rendered":"How to Monitor PowerShell Activity and Detect PowerShell Exploitation Vulnerabilities"},"content":{"rendered":"<div class=\"inner_content\">\n<p>Why should you monitor PowerShell?&#8230;. PowerShell is a powerful automation tool, however its capabilities also make it <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/detecting-powershell-exploitation\/\">a prime target for exploitation<\/a> by cyber attackers. Implementing a robust, automated PowerShell monitoring solution is now essential to detect and prevent exploitation attacks before they compromise your systems. PowerShell is a powerful scripting tool that can automate tasks and manage systems, but its flexibility also makes it a target for abuse.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Monitoring_PowerShell_Executions_-_An_Overview\"><\/span>Monitoring PowerShell Executions \u2013 An Overview<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>PowerShell is often exploited to execute malicious scripts. Hence, observability on which PowerShell scripts are run, and tracking when they are run, is an important part of a Digital Operational Resilience Strategy (in the EU this could include meeting regulatory standards such as <a href=\"https:\/\/www.eginnovations.com\/blog\/what-is-the-digital-operational-resilience-act-dora-everything-you-need-to-know-about-dora-compliance\/\">DORA<\/a>).<\/li>\n<li><a href=\"https:\/\/blog.netwrix.com\/powershell-execution-policy\">PowerShell execution policies<\/a> are a safety feature that controls the conditions under which PowerShell loads configuration files and runs scripts.<\/li>\n<li>The ability to monitor PowerShell execution policy settings is important because it helps ensure that only authorized scripts are run.<\/li>\n<li>The execution policy of a PowerShell script can be: AllSigned, ByPass, RemoteSigned, Restricted, Unrestricted.<\/li>\n<\/ul>\n<p>I covered the basics of PowerShell Exploitation recently in another article, see: <a href=\"https:\/\/www.eginnovations.com\/blog\/detecting-powershell-exploitation\/\">Detecting PowerShell Exploitation | eG Innovations<\/a>. This article covers specific advance, proactive monitoring capabilities for enterprise use cases. The earlier article covers a broader range of techniques you can use to safeguard your organization from PowerShell vulnerabilities.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"An_Explanation_of_PowerShell_Execution_Policies\"><\/span>An Explanation of PowerShell Execution Policies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table class=\"table_design\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<td>Restricted<\/td>\n<td>No scripts are allowed to run (default in most Windows systems).<\/td>\n<\/tr>\n<tr>\n<td>AllSigned<\/td>\n<td>Only scripts signed by a trusted publisher can be run.<\/td>\n<\/tr>\n<tr>\n<td>RemoteSigned<\/td>\n<td>Scripts downloaded from the internet must be signed by a trusted publisher, but locally created scripts can run without a signature.<\/td>\n<\/tr>\n<tr>\n<td>Unrestricted<\/td>\n<td>All scripts can run, but a warning is given for downloaded scripts.<\/td>\n<\/tr>\n<tr>\n<td>Bypass<\/td>\n<td>No restrictions; all scripts run without warnings.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Analyzing PowerShell executions can highlight potential vulnerabilities with applications executing on a system.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_eG_Enterpise_Monitors_and_Alerts_on_PowerShell_Vulnerabilities\"><\/span>How eG Enterpise Monitors and Alerts on PowerShell Vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"margin-bottom: 15px;\">eG Enterprise will track:<\/p>\n<ul>\n<li>The systems PowerShell execution policy e.g. RemoteSigned<\/li>\n<li>How many PowerShell scripts were executed during the last measurement period that were unsigned (detailed diagnostics are collected that will report what these scripts are)<\/li>\n<li>Whether any PowerShell scripts were executed with an unrestricted execution policy and detailed diagnostics of which ones these were (if any)<\/li>\n<li>Whether any PowerShell scripts were executed with a bypass execution policy and detailed diagnostics of which these were<\/li>\n<li>Whether any PowerShell scripts were executed with a remote signed execution policy and detailed diagnostics identifying them<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-execution-check-zoom.jpg\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-37369 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-execution-check.webp\" alt=\"PowerShell scripts that are executed as listed within the Security Checks test - allowing admins to proactively monitor for potential PowerShell Exploitation vulnerabilities\" width=\"750\" height=\"102\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-execution-check.webp 750w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-execution-check-300x41.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-execution-check-310x42.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-execution-check-140x19.webp 140w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 1: Note how the magnifying glass icon (detailed diagnostics) appears when diagnostic drill down information is available &#8211; clicking on this icon will access the information needed to monitor PowerShell proactively<\/div>\n<div class=\"img_caption\"><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-script-files-zoom.jpg\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-37370 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-script-files.webp\" alt=\"Detailed diagnostics shown in eG Enterprise console, these allow admins to monitor PowerShell with the granularity needed to identify vulnerabilities that could be exploited \" width=\"750\" height=\"277\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-script-files.webp 750w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-script-files-300x111.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-script-files-310x114.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-script-files-140x52.webp 140w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/div>\n<div class=\"img_caption\">Figure 2: Detailed diagnostics contain filter and search criteria to help operators understand the usage of the PowerShell scripts<\/div>\n<h2><span class=\"ez-toc-section\" id=\"Security_and_Compliance_Reports_on_PowerShell_Vulnerabilities\"><\/span>Security and Compliance Reports on PowerShell Vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>eG Enterprise includes out-of-the-box reports on PowerShell executions, no query languages required. As with all eG Enterprise reports these can be scheduled and automatically archived or distributed to those with the appropriate permissions for audit and stakeholder visibility purposes.<\/p>\n<p>Reports can be generated on both live and historical data as needed too.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-37387 size-full\" style=\"width: 400px;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/powershell-reports.webp?67\" alt=\"Screenshot of eG Enterprise console and the Reporter tab - the list of reports by function under the tab is shown. These reports include out-of-the-box compliance reports on PowerShell Executions\" width=\"592\" height=\"1158\" \/><\/p>\n<div class=\"img_caption\">Figure 3: The pre-built PowerShell Report is found under \u201cSecurity and Compliance\u201d family under the eG Enterprise Reporter tab.<\/div>\n<p>PowerShell Execution reports can be combined with other reports via \u201c<a class=\"link\" href=\"https:\/\/www.eginnovations.com\/documentation\/The-eG-Reporter\/How-to-Save-the-Reports-as-a-Booklet.htm\" target=\"blank\">booklet<\/a>\u201d functionality to provide comprehensive regular reports covering multiple domains\/functionality areas. This prevents stakeholders receiving multiple disparate documents or reports.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/PowerShell-policies-zoom.jpg\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-37375 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/PowerShell-policies.webp\" alt=\"Details of the PowerShell reports are shown. Graphs and metrics regarding PowerShell scripts executed are shown within eG Enterprise. \" width=\"750\" height=\"402\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/PowerShell-policies.webp 750w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/PowerShell-policies-300x161.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/PowerShell-policies-310x166.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/PowerShell-policies-140x75.webp 140w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 4: Ready-to-go-reports can provide the whole organization with a clear overview and understanding of their PowerShell usage and can be used to audit PowerShell execution policies<\/div>\n<h2><span class=\"ez-toc-section\" id=\"A_Comprehensive_PowerShell_Security_Strategy\"><\/span>A Comprehensive PowerShell Security Strategy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Of course, monitoring and auditing PowerShell execution and execution policies is only one part of a robust PowerShell risk management strategy. I\u2019ve written before about other steps you can take to ensure you are protected from vulnerabilities associated with PowerShell. Please see: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/detecting-powershell-exploitation\/\">Detecting PowerShell Exploitation | eG Innovations<\/a> for more detailed information.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Learn_More_About_a_Few_Other_Ways_to_Proactively_Secure_and_Protect_Your_IT_Systems\"><\/span>Learn More About a Few Other Ways to Proactively Secure and Protect Your IT Systems:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/detecting-powershell-exploitation\/\">Detecting PowerShell Exploitation | eG Innovations<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/active-directory-sign-in-logs\/\">Azure AD Monitoring \u2013 Sign In Logs &amp; Attack Detection<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/secure-monitoring-tcp-ports\/\">Secure Monitoring &#8211; Open TCP Ports are a security risk<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/how-to-protect-your-it-ops-from-cloud-outages\/\">How to Protect your IT Ops from Cloud Outages<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-windows-event-log\/\">What are Windows Event Logs? &#8230; And how to monitor Windows Events<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Why should you monitor PowerShell?&#8230;. PowerShell is a powerful automation tool, however its capabilities also make it a prime target for exploitation by cyber attackers. Implementing a robust, automated PowerShell monitoring solution is now essential to detect and prevent exploitation attacks before they compromise your systems. PowerShell is a powerful scripting tool that can automate [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":37379,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"yes","_lmt_disable":"","footnotes":""},"categories":[409,366,383,388],"tags":[643,113,122,2273,1153,2283,165,166,2318,2125,2134,2319,494],"class_list":["post-37363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eg-enterprise","category-end-to-end-monitoring-e2e","category-it-infrastructure-monitoring","category-managed-service-providers-msps","tag-automation","tag-cloud-computing","tag-compliance-reports","tag-dora","tag-infrastructure-as-code","tag-iso27001","tag-it-security-and-compliance","tag-it-security-audit","tag-nis-2","tag-powershell","tag-powershell-exploitation","tag-soc-2","tag-system-administrator"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Monitor PowerShell Activity and Detect PowerShell Exploitation Vulnerabilities | eG Innovations<\/title>\n<meta name=\"description\" content=\"How to monitor PowerShell activity and execution policies and protect your from PowerShell exploitation attacks and vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Monitor PowerShell Activity and Detect PowerShell Exploitation Vulnerabilities | eG Innovations\" \/>\n<meta property=\"og:description\" content=\"PowerShell has unfortunately become a favored tool for malicious attackers. Find out how to monitor PowerShell activity and execution policies and how to protect your systems from PowerShell exploitation attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-13T13:06:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-14T06:45:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/Social-Banner-PowerShell-Exploitation-blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Babu Sundaram\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/virtualinfra76?lang=en\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Babu Sundaram\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Monitor PowerShell Activity and Detect PowerShell Exploitation Vulnerabilities | eG Innovations","description":"How to monitor PowerShell activity and execution policies and protect your from PowerShell exploitation attacks and vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"How to Monitor PowerShell Activity and Detect PowerShell Exploitation Vulnerabilities | eG Innovations","og_description":"PowerShell has unfortunately become a favored tool for malicious attackers. Find out how to monitor PowerShell activity and execution policies and how to protect your systems from PowerShell exploitation attacks.","og_url":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2025-05-13T13:06:36+00:00","article_modified_time":"2025-05-14T06:45:49+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/Social-Banner-PowerShell-Exploitation-blog.png","type":"image\/png"}],"author":"Babu Sundaram","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/virtualinfra76?lang=en","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Babu Sundaram","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/"},"author":{"name":"Babu Sundaram","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/5f7590f77be55ecf13f1b8d915ac39df"},"headline":"How to Monitor PowerShell Activity and Detect PowerShell Exploitation Vulnerabilities","datePublished":"2025-05-13T13:06:36+00:00","dateModified":"2025-05-14T06:45:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/"},"wordCount":716,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/Blog-Thumbnail-Banner-PowerShell-Exploitation-blog.png","keywords":["Automation","Cloud Computing","Compliance Reports","DORA","Infrastructure as code","ISO27001","IT Security and Compliance","IT Security Audit","NIS 2","PowerShell","PowerShell Exploitation","SOC 2","System administrator"],"articleSection":["eG Enterprise","End-to-End Monitoring (E2E)","IT Infrastructure Monitoring","Managed Service Providers (MSPs)"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/","url":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/","name":"How to Monitor PowerShell Activity and Detect PowerShell Exploitation Vulnerabilities | eG Innovations","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/Blog-Thumbnail-Banner-PowerShell-Exploitation-blog.png","datePublished":"2025-05-13T13:06:36+00:00","dateModified":"2025-05-14T06:45:49+00:00","description":"How to monitor PowerShell activity and execution policies and protect your from PowerShell exploitation attacks and vulnerabilities.","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/Blog-Thumbnail-Banner-PowerShell-Exploitation-blog.png","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/04\/Blog-Thumbnail-Banner-PowerShell-Exploitation-blog.png","width":362,"height":235},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/how-to-monitor-powershell-activity-and-detect-powershell-exploitation-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Monitor PowerShell Activity and Detect PowerShell Exploitation Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/5f7590f77be55ecf13f1b8d915ac39df","name":"Babu Sundaram","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d28fef01834f3b388d7d825216013937?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d28fef01834f3b388d7d825216013937?s=96&d=mm&r=g","caption":"Babu Sundaram"},"sameAs":["https:\/\/x.com\/https:\/\/twitter.com\/virtualinfra76?lang=en"],"url":"https:\/\/www.eginnovations.com\/blog\/author\/babusundaram\/"}]}},"modified_by":"eG Innovations","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/37363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=37363"}],"version-history":[{"count":1,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/37363\/revisions"}],"predecessor-version":[{"id":39235,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/37363\/revisions\/39235"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/37379"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=37363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=37363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=37363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}