{"id":3102,"date":"2024-09-11T11:15:29","date_gmt":"2024-09-11T09:15:29","guid":{"rendered":"https:\/\/www.solutions-exchange.fr\/?page_id=3102"},"modified":"2024-09-11T11:41:38","modified_gmt":"2024-09-11T09:41:38","slug":"formulaire-demande-acces-video-3-vulnerabilites","status":"publish","type":"page","link":"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/","title":{"rendered":"Formulaire demande acc\u00e8s vid\u00e9o 3 vuln\u00e9rabilit\u00e9s"},"content":{"rendered":"<p>[vc_row rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb49&Prime;][vc_column width=\u00a0\u00bb1\/2&Prime;]<div class=\"eut-empty-space\" style=\"height: 32px;\"><\/div>[vc_column_text]<\/p>\n<h5><span style=\"color: white;\">Webinar Solutions Exchange<\/span><\/h5>\n<p>[\/vc_column_text]<div class=\"eut-empty-space\" style=\"height: 100px;\"><\/div>[vc_column_text]<\/p>\n<h4><span style=\"color: white;\">Acc\u00e9dez \u00e0 la vid\u00e9o du webinar<br \/>\n<\/span><\/h4>\n<h4><span style=\"color: white;\">Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter<\/span><\/h4>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; vertical_content_position=\u00a0\u00bbmiddle\u00a0\u00bb text_align=\u00a0\u00bbright\u00a0\u00bb rc_bg_type=\u00a0\u00bbcolor\u00a0\u00bb rc_bg_color=\u00a0\u00bb#ffffff\u00a0\u00bb]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f3107-o1\" lang=\"fr-FR\" dir=\"ltr\" data-wpcf7-id=\"3107\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php\/wp-json\/wp\/v2\/pages\/3102#wpcf7-f3107-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formulaire de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"3107\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"fr_FR\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f3107-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"5\" align=\"center\">\n\t<tbody>\n\t\t<tr>\n\t\t\t<td align=\"center\" bgcolor=\"white\" >\n\t\t\t\t<p>Pr\u00e9nom:\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t\t<td bgcolor=\"white\" >\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"FirstName\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"FirstName\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t\t<td align=\"center\" bgcolor=\"white\" >\n\t\t\t\t<p>Nom:\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t\t<td bgcolor=\"white\" >\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t\t<td align=\"center\" bgcolor=\"white\" >\n\t\t\t\t<p>Email:\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t\t<td bgcolor=\"white\" >\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t\t<td align=\"center\" bgcolor=\"white\" >\n\t\t\t\t<p>Soci\u00e9t\u00e9:\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t\t<td bgcolor=\"white\" >\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"Socit\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"Socit\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t\t<td bgcolor=\"white\" >\n\t\t\t\t<p>T\u00e9l\u00e9phone:\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t\t<td bgcolor=\"white\" >\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"Telephone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"Telephone\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t<\/tr>\n\t\t<tr>\n\t\t\t<td bgcolor=\"white\" >\n\t\t\t\t<p>Saisissez le code :\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t\t<td bgcolor=\"white\" >\n\t\t\t\t<p><input type=\"hidden\" name=\"_wpcf7_captcha_challenge_captcha-778\" value=\"1590719778\" \/><img loading=\"lazy\" decoding=\"async\" class=\"wpcf7-form-control wpcf7-captchac wpcf7-captcha-captcha-778\" width=\"72\" height=\"24\" alt=\"captcha\" src=\"https:\/\/www.solutions-exchange.fr\/wp-content\/uploads\/wpcf7_captcha\/1590719778.png\" \/><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"captcha-778\"><input size=\"4\" maxlength=\"4\" class=\"wpcf7-form-control wpcf7-captchar\" autocomplete=\"off\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"captcha-778\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/td>\n\t\t<\/tr>\n\t<\/tbody>\n<\/table>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Envoyez\" \/>\n<\/p><input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":true,\"openpopup_id\":3114}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<p>[\/vc_column_text][vc_column_text]C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les sujets ont \u00e9t\u00e9 choisis \u00e0 l&rsquo;\u00e9coute de vos besoins.<br \/>\n<strong>Pourquoi participer \u00e0 ce webinaire\u00a0?<\/strong><br \/>\nL&rsquo;Active Directory est le c\u0153ur de votre organisation et constitue toujours la cible principale.<br \/>\nNe laissons aucune faille que les attaquants pourraient exploiter pour s&rsquo;introduire dans vos infrastructures.<br \/>\nDans ce webinaire, nous allons examiner 3 vuln\u00e9rabilit\u00e9s de l&rsquo;Active Directory souvent n\u00e9glig\u00e9es et fr\u00e9quemment exploit\u00e9es par des actions malveillantes.<br \/>\nNous discuterons de la mani\u00e8re dont ces vuln\u00e9rabilit\u00e9s peuvent \u00eatre d\u00e9tect\u00e9es \u00e0 l&rsquo;aide d&rsquo;outils natifs et nous verrons comment ces menaces peuvent \u00eatre \u00e9vit\u00e9es gr\u00e2ce \u00e0 une solution SIEM et les avantages de ce choix.<\/p>\n<p><strong>Agenda :<\/strong><br \/>\n<strong>Vuln\u00e9rabilit\u00e9s de l&rsquo;Active Directory \u00e0 surveiller :<\/strong><\/p>\n<ul>\n<li>Comptes d&rsquo;utilisateurs non privil\u00e9gi\u00e9s avec des permissions \u00e9lev\u00e9es.<\/li>\n<li>Mots de passe faibles, mots de passe non expirants, et comptes utilisateurs sans mot de passe requis.<\/li>\n<li>Identifiants stock\u00e9s dans SYSVOL et les pr\u00e9f\u00e9rences de strat\u00e9gie de groupe (GPP).<\/li>\n<\/ul>\n<p><strong>D\u00e9tection de ces vuln\u00e9rabilit\u00e9s AD :<\/strong><\/p>\n<ul>\n<li>Comment chacune de ces vuln\u00e9rabilit\u00e9s peut-elle \u00eatre d\u00e9tect\u00e9e \u00e0 l&rsquo;aide de PowerShell ?<\/li>\n<li>\u00c0 quel point serait-t-il plus simple et plus facile de d\u00e9tecter ces \u00e9v\u00e9nements \u00e0 l&rsquo;aide d&rsquo;un outil SIEM ?<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb49&Prime;][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Webinar Solutions Exchange [\/vc_column_text][vc_column_text] Acc\u00e9dez \u00e0 la vid\u00e9o du webinar Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; vertical_content_position=\u00a0\u00bbmiddle\u00a0\u00bb text_align=\u00a0\u00bbright\u00a0\u00bb rc_bg_type=\u00a0\u00bbcolor\u00a0\u00bb rc_bg_color=\u00a0\u00bb#ffffff\u00a0\u00bb][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] [\/vc_column_text][vc_column_text]C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-3102","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Formulaire demande acc\u00e8s vid\u00e9o 3 vuln\u00e9rabilit\u00e9s - Solutions Exchange<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Formulaire demande acc\u00e8s vid\u00e9o 3 vuln\u00e9rabilit\u00e9s - Solutions Exchange\" \/>\n<meta property=\"og:description\" content=\"[vc_row rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb49&Prime;][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Webinar Solutions Exchange [\/vc_column_text][vc_column_text] Acc\u00e9dez \u00e0 la vid\u00e9o du webinar Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; vertical_content_position=\u00a0\u00bbmiddle\u00a0\u00bb text_align=\u00a0\u00bbright\u00a0\u00bb rc_bg_type=\u00a0\u00bbcolor\u00a0\u00bb rc_bg_color=\u00a0\u00bb#ffffff\u00a0\u00bb][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] [\/vc_column_text][vc_column_text]C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/\" \/>\n<meta property=\"og:site_name\" content=\"Solutions Exchange\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-11T09:41:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/formulaire-demande-acces-video-3-vulnerabilites\\\/\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/formulaire-demande-acces-video-3-vulnerabilites\\\/\",\"name\":\"Formulaire demande acc\u00e8s vid\u00e9o 3 vuln\u00e9rabilit\u00e9s - Solutions Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\"},\"datePublished\":\"2024-09-11T09:15:29+00:00\",\"dateModified\":\"2024-09-11T09:41:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/formulaire-demande-acces-video-3-vulnerabilites\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/formulaire-demande-acces-video-3-vulnerabilites\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/index.php\\\/formulaire-demande-acces-video-3-vulnerabilites\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formulaire demande acc\u00e8s vid\u00e9o 3 vuln\u00e9rabilit\u00e9s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/#website\",\"url\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/\",\"name\":\"Solutions Exchange\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.solutions-exchange.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Formulaire demande acc\u00e8s vid\u00e9o 3 vuln\u00e9rabilit\u00e9s - Solutions Exchange","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/","og_locale":"fr_FR","og_type":"article","og_title":"Formulaire demande acc\u00e8s vid\u00e9o 3 vuln\u00e9rabilit\u00e9s - Solutions Exchange","og_description":"[vc_row rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb49&Prime;][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Webinar Solutions Exchange [\/vc_column_text][vc_column_text] Acc\u00e9dez \u00e0 la vid\u00e9o du webinar Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; vertical_content_position=\u00a0\u00bbmiddle\u00a0\u00bb text_align=\u00a0\u00bbright\u00a0\u00bb rc_bg_type=\u00a0\u00bbcolor\u00a0\u00bb rc_bg_color=\u00a0\u00bb#ffffff\u00a0\u00bb][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] [\/vc_column_text][vc_column_text]C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les [&hellip;]","og_url":"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/","og_site_name":"Solutions Exchange","article_modified_time":"2024-09-11T09:41:38+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/","url":"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/","name":"Formulaire demande acc\u00e8s vid\u00e9o 3 vuln\u00e9rabilit\u00e9s - Solutions Exchange","isPartOf":{"@id":"https:\/\/www.solutions-exchange.fr\/#website"},"datePublished":"2024-09-11T09:15:29+00:00","dateModified":"2024-09-11T09:41:38+00:00","breadcrumb":{"@id":"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.solutions-exchange.fr\/index.php\/formulaire-demande-acces-video-3-vulnerabilites\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.solutions-exchange.fr\/"},{"@type":"ListItem","position":2,"name":"Formulaire demande acc\u00e8s vid\u00e9o 3 vuln\u00e9rabilit\u00e9s"}]},{"@type":"WebSite","@id":"https:\/\/www.solutions-exchange.fr\/#website","url":"https:\/\/www.solutions-exchange.fr\/","name":"Solutions Exchange","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.solutions-exchange.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"zuperla-eutf-large-rect-horizontal":false,"zuperla-eutf-small-square":false,"zuperla-eutf-small-rect-horizontal":false,"zuperla-eutf-small-rect-vertical":false,"zuperla-eutf-medium-square":false,"zuperla-eutf-medium-rect-horizontal":false,"zuperla-eutf-medium-rect-vertical":false,"zuperla-eutf-fullscreen":false},"uagb_author_info":{"display_name":"admin6583","author_link":"https:\/\/www.solutions-exchange.fr\/index.php\/author\/admin6583\/"},"uagb_comment_info":0,"uagb_excerpt":"[vc_row rc_bg_type=\u00a0\u00bbimage\u00a0\u00bb rc_bg_image=\u00a0\u00bb49&Prime;][vc_column width=\u00a0\u00bb1\/2&Prime;][vc_column_text] Webinar Solutions Exchange [\/vc_column_text][vc_column_text] Acc\u00e9dez \u00e0 la vid\u00e9o du webinar Les 3 vuln\u00e9rabilit\u00e9s les plus souvent n\u00e9glig\u00e9es dans Active Directory et comment les d\u00e9tecter [\/vc_column_text][\/vc_column][vc_column width=\u00a0\u00bb1\/2&Prime; vertical_content_position=\u00a0\u00bbmiddle\u00a0\u00bb text_align=\u00a0\u00bbright\u00a0\u00bb rc_bg_type=\u00a0\u00bbcolor\u00a0\u00bb rc_bg_color=\u00a0\u00bb#ffffff\u00a0\u00bb][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] [\/vc_column_text][vc_column_text]C\u2019est la rentr\u00e9e, toute l\u2019\u00e9quipe Solutions Exchange a le plaisir de vous retrouver en vous proposant de nouveaux webinaires dont les\u2026","_links":{"self":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/3102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/comments?post=3102"}],"version-history":[{"count":5,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/3102\/revisions"}],"predecessor-version":[{"id":3104,"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/pages\/3102\/revisions\/3104"}],"wp:attachment":[{"href":"https:\/\/www.solutions-exchange.fr\/index.php\/wp-json\/wp\/v2\/media?parent=3102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}