{"id":3600,"date":"2022-12-13T13:25:25","date_gmt":"2022-12-13T13:25:25","guid":{"rendered":"https:\/\/trustcenter.solutions2share.com\/documentation\/architektur-und-sicherheit\/file-manager"},"modified":"2024-05-13T09:27:08","modified_gmt":"2024-05-13T09:27:08","slug":"file-manager","status":"publish","type":"manual_documentation","link":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager","title":{"rendered":"File Manager"},"content":{"rendered":"\n<p>Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von File Manager sicher sind und wissen, wie wir bei der Datenerfassung vorgehen.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Hinweis<\/h3>\n\n\n\n<p>Der Inhalt dieser Seite kann sich \u00e4ndern. Wir empfehlen dir, dich viertelj\u00e4hrlich \u00fcber Aktualisierungen zu informieren.<\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Praktiken der Datenverwaltung<\/h3>\n\n\n\n<p>Mit seinen verschiedenen Funktionen greift der File Manager auf verschiedene Arten von Daten zu, verarbeitet und speichert sie:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tenants<\/li>\n\n\n\n<li>Teams<\/li>\n\n\n\n<li>Benutzerdaten<\/li>\n\n\n\n<li>Tasks<\/li>\n<\/ul>\n\n\n\n<p>Hier siehst du, wie wir die Daten f\u00fcr diese verschiedenen Kategorien verwalten:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Daten<\/strong> <\/td><td><strong>Accessed<\/strong> <\/td><td><strong>Cached<\/strong> <\/td><td><strong>Stored<\/strong> <\/td><\/tr><tr><td>Tenants <\/td><td>\u2714&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>\u2714&nbsp;<\/td><\/tr><tr><td>Tenant Einstellungen <\/td><td>\u2714&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>\u2714&nbsp;<\/td><\/tr><tr><td>Teams <\/td><td>\u2714&nbsp;<\/td><td>\u2714&nbsp;<\/td><td>\u2714&nbsp;<\/td><\/tr><tr><td>Teams Kan\u00e4le <\/td><td>\u2714&nbsp;<\/td><td>\u2714&nbsp;<\/td><td>\u2714&nbsp;<\/td><\/tr><tr><td>Teams Dateien <\/td><td>\u2714&nbsp;<\/td><td>\u2714&nbsp;<\/td><td>\u2714&nbsp;<\/td><\/tr><tr><td>Benutzerdaten <\/td><td>\u2714&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><\/tr><tr><td>Tasks <\/td><td>\u2714&nbsp;<\/td><td>\ud83d\udeab&nbsp;<\/td><td>\u2714&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"graph-fm\">Microsoft Graph<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Scope<\/strong> <\/td><td><strong>Beschreibung<\/strong> <\/td><td><strong>Begr\u00fcndung<\/strong> <\/td><td><strong>Erforderliche Zustimmung der Administration<\/strong> <\/td><\/tr><tr><td><code>User.ReadBasic.All<\/code> <\/td><td>Erm\u00f6glicht das Lesen von Name, Vor- und Nachname, E-Mail-Adresse und Foto des Benutzers <\/td><td>Zum Abrufen der Basisdaten des angemeldeten Benutzers. <\/td><td>Nein <\/td><\/tr><tr><td><code>Files.ReadWrite.All<\/code> <\/td><td>Erm\u00f6glicht das Lesen, Erstellen, Aktualisieren und L\u00f6schen aller Dateien, auf die der angemeldete Benutzer Zugriff hat. <\/td><td>Um Dateivorg\u00e4nge durchzuf\u00fchren. <\/td><td>Nein <\/td><\/tr><tr><td><code>Sites.ReadWrite.All<\/code> <\/td><td>Erm\u00f6glicht es der Anwendung, Dokumente und Listenelemente in allen Websitesammlungen im Namen des angemeldeten Benutzers zu bearbeiten oder zu l\u00f6schen. <\/td><td>Um die Listen und Bibliotheken der SharePoint-Website zu bearbeiten <\/td><td>Nein <\/td><\/tr><tr><td><code>Channel.ReadBasic.All<\/code> <\/td><td>Erm\u00f6glicht das Lesen von Kanalnamen und Kanalbeschreibungen im Namen des angemeldeten Benutzers. <\/td><td>Zum Abrufen der grundlegenden Angaben zu den Kan\u00e4len des Teams. <\/td><td>Nein <\/td><\/tr><tr><td><code>Team.ReadBasic.All<\/code> <\/td><td>Erm\u00f6glicht es, die Namen und Beschreibungen der Teams im Namen des angemeldeten Benutzers zu lesen. <\/td><td>Um die grundlegenden Details des Teams abzurufen. <\/td><td>Nein <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Microsoft Teams Apps Sicherheit und Compliance<\/h3>\n\n\n\n<p>Um Unternehmen die Informationen zur Verf\u00fcgung zu stellen, die sie ben\u00f6tigen, um Entscheidungen \u00fcber die von ihnen verwendeten Microsoft Teams-Apps und Add-Ins zu beschleunigen und zu informieren, arbeitet Microsoft mit seinen Microsoft 365-Entwicklerpartnern zusammen. Diese Informationen werden durch Informationen aus dem App-Katalog von Microsoft Cloud App Security und durch Informationen erg\u00e4nzt, die von den Entwicklern bereitgestellt werden, wenn sie ihre Apps einreichen. Diese Informationen zur Sicherheit, zum Umgang mit Daten und zur Einhaltung von Vorschriften sollen Unternehmen dabei helfen, die Risiken bei der Nutzung dieser Anwendungen zu bewerten und zu bew\u00e4ltigen.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<h3 class=\"wp-block-heading\">Hinweis<\/h3>\n\n\n\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365-app-certification\/teams\/witivio-booking-room-pro\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft 365 App Compliance Programm<\/a><\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">Architektur und Flow Diagramm<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"1024\" src=\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-801x1024.png\" alt=\"\" class=\"wp-image-3966\" srcset=\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-801x1024.png 801w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-235x300.png 235w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-768x981.png 768w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-1202x1536.png 1202w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-600x767.png 600w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13.png 1249w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Resource Endpoints<\/h3>\n\n\n\n<p>Der gesamte Datenverkehr von und zur File Manager-Plattform erfolgt \u00fcber das HTTPS-Protokoll an Port 443. Im Folgenden findest du eine kurze Beschreibung der einzelnen Abl\u00e4ufe:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Name<\/strong> <\/td><td><strong>Kommentare<\/strong> <\/td><\/tr><tr><td>https:\/\/licensing.solutions2share.com\/ <\/td><td>Lizenzierung <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Dependencies<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Name<\/strong> <\/td><td><strong>Version<\/strong> <\/td><td><strong>URL<\/strong> <\/td><td><strong>Lizenz<\/strong> <\/td><\/tr><tr><td>Microsoft.ApplicationInsights.AspNetCore <\/td><td>2.17.0  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.ApplicationInsights.Log4NetAppender <\/td><td>2.17.0  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.AspNetCore.SpaServices.Extensions <\/td><td>3.1.8  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.EntityFrameworkCore <\/td><td>3.1.8  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.EntityFrameworkCore.SqlServer <\/td><td>3.1.8  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.EntityFrameworkCore.Tools <\/td><td>3.1.8  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.Extensions.Caching.SqlServer <\/td><td>6.0.4  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>log4net <\/td><td>2.0.11  <\/td><td>https:\/\/licenses.nuget.org\/Apache-2.0 <\/td><td>Apache-2.0 <\/td><\/tr><tr><td>Microsoft.Graph <\/td><td>3.15.0  <\/td><td>https:\/\/www.nuget.org\/packages\/Microsoft.Graph\/5.0.0-preview.14\/License <\/td><td>MS <\/td><\/tr><tr><td>Microsoft.Identity.Client <\/td><td>4.19.0  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.Extensions.Configuration.UserSecrets <\/td><td>3.1.8  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.Graph.Core <\/td><td>1.21.0  <\/td><td>https:\/\/www.nuget.org\/packages\/Microsoft.Graph.Core\/3.0.0-preview.17\/License <\/td><td>MS <\/td><\/tr><tr><td>System.IdentityModel.Tokens.Jwt <\/td><td>6.7.1  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><tr><td>Microsoft.EntityFrameworkCore.Sqlite <\/td><td>3.1.8  <\/td><td>https:\/\/licenses.nuget.org\/MIT <\/td><td>MIT <\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"author":1,"featured_media":0,"parent":3404,"menu_order":19,"template":"","manualdocumentationcategory":[72],"manual_doc_tag":[],"class_list":["post-3600","manual_documentation","type-manual_documentation","status-publish","hentry","manualdocumentationcategory-trust-center-de"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>File Manager - Trust Center by Solutions2Share<\/title>\n<meta name=\"description\" content=\"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von File Manager sicher sind und wissen, wie wir bei der Datenerfassung vorgehen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"File Manager - Trust Center by Solutions2Share\" \/>\n<meta property=\"og:description\" content=\"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von File Manager sicher sind und wissen, wie wir bei der Datenerfassung vorgehen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager\" \/>\n<meta property=\"og:site_name\" content=\"Trust Center by Solutions2Share\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/solutions2share\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-13T09:27:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-801x1024.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/architektur-und-sicherheit\\\/file-manager\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/architektur-und-sicherheit\\\/file-manager\",\"name\":\"File Manager - Trust Center by Solutions2Share\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/architektur-und-sicherheit\\\/file-manager#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/architektur-und-sicherheit\\\/file-manager#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/image-13-801x1024.png\",\"datePublished\":\"2022-12-13T13:25:25+00:00\",\"dateModified\":\"2024-05-13T09:27:08+00:00\",\"description\":\"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von File Manager sicher sind und wissen, wie wir bei der Datenerfassung vorgehen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/architektur-und-sicherheit\\\/file-manager#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/architektur-und-sicherheit\\\/file-manager\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/architektur-und-sicherheit\\\/file-manager#primaryimage\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/image-13-801x1024.png\",\"contentUrl\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/image-13-801x1024.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/architektur-und-sicherheit\\\/file-manager#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Architektur und Sicherheit\",\"item\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/architektur-und-sicherheit\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"File Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#website\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\",\"name\":\"Trust Center by Solutions2Share\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#organization\",\"name\":\"Trust Center by Solutions2Share\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/cropped-solutions2share-favicon.png\",\"contentUrl\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/cropped-solutions2share-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Trust Center by Solutions2Share\"},\"image\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/solutions2share\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/solutions2share\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/Solutions2Share\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"File Manager - Trust Center by Solutions2Share","description":"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von File Manager sicher sind und wissen, wie wir bei der Datenerfassung vorgehen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager","og_locale":"de_DE","og_type":"article","og_title":"File Manager - Trust Center by Solutions2Share","og_description":"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von File Manager sicher sind und wissen, wie wir bei der Datenerfassung vorgehen.","og_url":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager","og_site_name":"Trust Center by Solutions2Share","article_publisher":"https:\/\/www.facebook.com\/solutions2share","article_modified_time":"2024-05-13T09:27:08+00:00","og_image":[{"url":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-801x1024.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager","url":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager","name":"File Manager - Trust Center by Solutions2Share","isPartOf":{"@id":"https:\/\/trustcenter.solutions2share.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager#primaryimage"},"image":{"@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager#primaryimage"},"thumbnailUrl":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-801x1024.png","datePublished":"2022-12-13T13:25:25+00:00","dateModified":"2024-05-13T09:27:08+00:00","description":"Wir m\u00f6chten, dass unsere Kunden bei der Nutzung von File Manager sicher sind und wissen, wie wir bei der Datenerfassung vorgehen.","breadcrumb":{"@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager#primaryimage","url":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-801x1024.png","contentUrl":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-13-801x1024.png"},{"@type":"BreadcrumbList","@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit\/file-manager#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/trustcenter.solutions2share.com\/de"},{"@type":"ListItem","position":2,"name":"Architektur und Sicherheit","item":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/architektur-und-sicherheit"},{"@type":"ListItem","position":3,"name":"File Manager"}]},{"@type":"WebSite","@id":"https:\/\/trustcenter.solutions2share.com\/de#website","url":"https:\/\/trustcenter.solutions2share.com\/de","name":"Trust Center by Solutions2Share","description":"","publisher":{"@id":"https:\/\/trustcenter.solutions2share.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustcenter.solutions2share.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/trustcenter.solutions2share.com\/de#organization","name":"Trust Center by Solutions2Share","url":"https:\/\/trustcenter.solutions2share.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/trustcenter.solutions2share.com\/de#\/schema\/logo\/image\/","url":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2022\/12\/cropped-solutions2share-favicon.png","contentUrl":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2022\/12\/cropped-solutions2share-favicon.png","width":512,"height":512,"caption":"Trust Center by Solutions2Share"},"image":{"@id":"https:\/\/trustcenter.solutions2share.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/solutions2share","https:\/\/www.linkedin.com\/company\/solutions2share\/","https:\/\/www.youtube.com\/user\/Solutions2Share"]}]}},"_links":{"self":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation"}],"about":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/types\/manual_documentation"}],"author":[{"embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":6,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3600\/revisions"}],"predecessor-version":[{"id":3968,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3600\/revisions\/3968"}],"up":[{"embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3404"}],"wp:attachment":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/media?parent=3600"}],"wp:term":[{"taxonomy":"manualdocumentationcategory","embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manualdocumentationcategory?post=3600"},{"taxonomy":"manual_doc_tag","embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_doc_tag?post=3600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}