{"id":72225,"date":"2026-03-22T23:36:12","date_gmt":"2020-10-02T18:00:40","guid":{"rendered":"https:\/\/computingforgeeks.com\/?p=72225"},"modified":"2026-03-22T23:37:50","modified_gmt":"2026-03-22T20:37:50","slug":"install-windows-service-update-services-wsus","status":"publish","type":"post","link":"https:\/\/computingforgeeks.com\/install-windows-service-update-services-wsus\/","title":{"rendered":"Install WSUS on Windows Server 2025"},"content":{"rendered":"\n<p>Windows Server Update Services (WSUS) is a server role that lets you centrally manage and distribute Windows updates across your network. Instead of each machine pulling updates independently from Microsoft Update, WSUS downloads patches once and distributes them to all clients &#8211; saving bandwidth, giving you control over which updates get deployed, and letting you enforce compliance across the organization.<\/p>\n\n\n\n<p>This guide walks through installing and configuring WSUS on Windows Server 2025, from role installation through client GPO configuration and ongoing maintenance. By the end, you will have a fully functional WSUS server managing updates for your domain-joined machines. For the official reference, see the <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/administration\/windows-server-update-services\/get-started\/windows-server-update-services-wsus\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft WSUS documentation<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Prerequisites<\/h2>\n\n\n\n<p>Before starting, make sure you have the following in place:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows Server 2025 installed and joined to your Active Directory domain<\/li>\n\n<li>At least 10 GB of free disk space for the WSUS content store (more for large environments &#8211; 100 GB+ recommended)<\/li>\n\n<li>Administrator access to the server<\/li>\n\n<li>Internet access for downloading updates from Microsoft Update<\/li>\n\n<li>Active Directory with <a href=\"https:\/\/computingforgeeks.com\/how-to-install-active-directory-domain-services-in-windows-server\/\" target=\"_blank\" rel=\"noreferrer noopener\">Group Policy management<\/a> for pushing WSUS settings to clients<\/li>\n\n<li>Firewall rules allowing outbound HTTPS (TCP 443) to Microsoft Update servers and inbound TCP 8530\/8531 from client machines<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Step 1: Install the WSUS Role<\/h2>\n\n\n\n<p>You can install WSUS through Server Manager or PowerShell. Both methods accomplish the same thing &#8211; pick whichever you prefer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Method 1: Server Manager<\/h3>\n\n\n\n<p>Open Server Manager and click <strong>Add Roles and Features<\/strong>. Walk through the wizard:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Select <strong>Role-based or feature-based installation<\/strong><\/li>\n\n<li>Choose your destination server from the server pool<\/li>\n\n<li>Under Server Roles, check <strong>Windows Server Update Services<\/strong><\/li>\n\n<li>When prompted to add required features (IIS, .NET Framework, etc.), click <strong>Add Features<\/strong><\/li>\n\n<li>On the Role Services page, keep both <strong>WID Connectivity<\/strong> and <strong>WSUS Services<\/strong> checked. Uncheck <strong>SQL Server Connectivity<\/strong> unless you plan to use an external SQL Server instance<\/li>\n\n<li>Click through to the confirmation page and click <strong>Install<\/strong><\/li>\n<\/ul>\n\n\n\n<p>The installation takes several minutes. When it finishes, do not close the wizard yet &#8211; you will see a post-installation task notification.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Method 2: PowerShell<\/h3>\n\n\n\n<p>Open an elevated PowerShell window and run the following command to install WSUS with the Windows Internal Database (WID):<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Install-WindowsFeature -Name UpdateServices -IncludeManagementTools<\/code><\/pre>\n\n\n\n<p>The output confirms the installation was successful when you see <code>Success<\/code> as the exit code and <code>True<\/code> under the Success column:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Success Restart Needed Exit Code      Feature Result\n------- -------------- ---------      --------------\nTrue    No             Success        {Windows Server Update Services, ...}<\/code><\/pre>\n\n\n\n<p>A restart is typically not required, but check the <code>Restart Needed<\/code> column to be sure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 2: Configure WSUS Storage Location<\/h2>\n\n\n\n<p>Before WSUS can function, you need to specify where update files are stored on disk. Create a dedicated directory for WSUS content. A separate volume or partition is recommended for production environments so update files do not fill your system drive.<\/p>\n\n\n\n<p>Create the content directory:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>New-Item -Path \"D:\\WSUS\" -ItemType Directory -Force<\/code><\/pre>\n\n\n\n<p>Now run the WSUS post-installation task to initialize the content directory and database:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>& \"C:\\Program Files\\Update Services\\Tools\\wsusutil.exe\" postinstall CONTENT_DIR=D:\\WSUS<\/code><\/pre>\n\n\n\n<p>The post-install process takes a minute or two. When finished, it confirms the configuration was completed:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Post install has successfully completed<\/code><\/pre>\n\n\n\n<p>If you used Server Manager, you can also trigger this from the notification flag in Server Manager by clicking <strong>Launch Post-Installation tasks<\/strong>. The PowerShell method above gives you explicit control over the content path.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 3: Run the WSUS Configuration Wizard<\/h2>\n\n\n\n<p>Open the WSUS management console. From Server Manager, go to <strong>Tools<\/strong> and select <strong>Windows Server Update Services<\/strong>. The first time you open the console, the configuration wizard launches automatically.<\/p>\n\n\n\n<p>Walk through the wizard pages:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Microsoft Update Improvement Program<\/strong> &#8211; opt in or out based on your organization&#8217;s policy<\/li>\n\n<li><strong>Choose Upstream Server<\/strong> &#8211; select <strong>Synchronize from Microsoft Update<\/strong> unless this is a downstream WSUS server<\/li>\n\n<li><strong>Specify Proxy Server<\/strong> &#8211; configure your proxy if outbound internet access requires one. Skip if direct access works<\/li>\n\n<li><strong>Connect to Upstream Server<\/strong> &#8211; click <strong>Start Connecting<\/strong>. This downloads the list of available products and classifications from Microsoft. It takes several minutes depending on your internet speed<\/li>\n\n<li><strong>Choose Languages<\/strong> &#8211; select only the languages you need. English is the minimum for most environments. Fewer languages means less disk space and faster syncs<\/li>\n<\/ul>\n\n\n\n<p>Do not start the initial synchronization from this wizard yet &#8211; configure products and classifications first (next step) so you only download what you actually need.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 4: Select Products and Classifications<\/h2>\n\n\n\n<p>Choosing the right products and update classifications prevents WSUS from downloading hundreds of gigabytes of patches you will never deploy. In the WSUS console, go to <strong>Options<\/strong> then <strong>Products and Classifications<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Products Tab<\/h3>\n\n\n\n<p>Check only the operating systems and applications in your environment. A typical selection includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows Server 2025<\/li>\n\n<li>Windows Server 2022 (if you still run it)<\/li>\n\n<li>Windows 11<\/li>\n\n<li>Windows 10 (if still in your fleet)<\/li>\n\n<li>Microsoft Defender Antivirus<\/li>\n\n<li>Microsoft Edge<\/li>\n\n<li>Microsoft 365 Apps (if using Click-to-Run Office)<\/li>\n<\/ul>\n\n\n\n<p>Resist the urge to select everything. Each checked product adds to sync time and storage requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Classifications Tab<\/h3>\n\n\n\n<p>Classifications control the type of updates WSUS downloads. Recommended selections:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Critical Updates<\/strong> &#8211; security and reliability fixes<\/li>\n\n<li><strong>Security Updates<\/strong> &#8211; patches for security vulnerabilities<\/li>\n\n<li><strong>Update Rollups<\/strong> &#8211; cumulative monthly rollups<\/li>\n\n<li><strong>Definition Updates<\/strong> &#8211; antivirus and antimalware signatures<\/li>\n\n<li><strong>Service Packs<\/strong> &#8211; major cumulative updates<\/li>\n<\/ul>\n\n\n\n<p>Skip <strong>Drivers<\/strong> and <strong>Feature Packs<\/strong> unless you have a specific need &#8211; drivers alone can consume significant storage. Click <strong>OK<\/strong> to save your selections.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 5: Configure Automatic Approval Rules<\/h2>\n\n\n\n<p>Automatic approval rules save time by approving certain update types without manual intervention. In the WSUS console, go to <strong>Options<\/strong> then <strong>Automatic Approvals<\/strong>.<\/p>\n\n\n\n<p>The default rule approves Definition Updates for all computers. This is a good starting point &#8211; you always want antivirus signatures deployed immediately. To create additional rules:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Click <strong>New Rule<\/strong><\/li>\n\n<li>Check <strong>When an update is in a specific classification<\/strong><\/li>\n\n<li>Click the blue <strong>any classification<\/strong> link and select <strong>Critical Updates<\/strong> and <strong>Security Updates<\/strong><\/li>\n\n<li>Under <strong>Step 2<\/strong>, choose which computer group to apply it to (start with a test group, not All Computers)<\/li>\n\n<li>Name the rule something clear like &#8220;Auto-approve Security &#8211; Test Group&#8221;<\/li>\n\n<li>Click <strong>OK<\/strong> and make sure the rule is enabled<\/li>\n<\/ul>\n\n\n\n<p>For production environments, a staged approach works well: auto-approve for a test group first, then manually approve for production servers after a week of testing.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 6: Configure Client GPO for WSUS<\/h2>\n\n\n\n<p>Client machines need a Group Policy Object (GPO) telling them where to find your WSUS server. Open the Group Policy Management Console (<code>gpmc.msc<\/code>) on your domain controller and create a new GPO or edit an existing one linked to the OU containing your target machines.<\/p>\n\n\n\n<p>Navigate to <strong>Computer Configuration<\/strong> then <strong>Policies<\/strong> then <strong>Administrative Templates<\/strong> then <strong>Windows Components<\/strong> then <strong>Windows Update<\/strong>. Configure these settings:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Specify Intranet Microsoft Update Service Location<\/h3>\n\n\n\n<p>Set this to <strong>Enabled<\/strong> and enter your WSUS server URL in both fields:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Set the intranet update service: <code>http:\/\/wsus-server:8530<\/code><\/li>\n\n<li>Set the intranet statistics server: <code>http:\/\/wsus-server:8530<\/code><\/li>\n<\/ul>\n\n\n\n<p>Replace <code>wsus-server<\/code> with your actual WSUS server hostname. Port 8530 is the default HTTP port. Use 8531 if you configured WSUS for HTTPS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Configure Automatic Updates<\/h3>\n\n\n\n<p>Set this to <strong>Enabled<\/strong> and select one of these options:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>2 &#8211; Notify for download and auto install<\/strong> &#8211; user gets notified before download<\/li>\n\n<li><strong>3 &#8211; Auto download and notify for install<\/strong> &#8211; downloads automatically, user approves install<\/li>\n\n<li><strong>4 &#8211; Auto download and schedule the install<\/strong> &#8211; fully automatic, best for servers during maintenance windows<\/li>\n<\/ul>\n\n\n\n<p>For servers, option 4 with a scheduled install time during a maintenance window works best. For workstations, option 3 gives users visibility without blocking patches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enable Client-Side Targeting (Optional)<\/h3>\n\n\n\n<p>If you want to assign machines to WSUS computer groups via GPO instead of manually in the WSUS console, enable <strong>Enable client-side targeting<\/strong> and set the target group name. This is especially useful in large environments where you manage group membership through Active Directory OUs.<\/p>\n\n\n\n<p>After configuring the GPO, run the following on a client machine to force an immediate policy refresh:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>gpupdate \/force<\/code><\/pre>\n\n\n\n<p>Then trigger a Windows Update detection cycle so the client registers with WSUS:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>wuauclt \/detectnow \/reportnow<\/code><\/pre>\n\n\n\n<p>Within a few minutes, the client should appear in the WSUS console under the appropriate computer group.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 7: Synchronize Updates<\/h2>\n\n\n\n<p>With products and classifications configured, it is time to run the first synchronization. In the WSUS console, go to <strong>Synchronizations<\/strong> and click <strong>Synchronize Now<\/strong>.<\/p>\n\n\n\n<p>The initial sync downloads metadata for all updates matching your product and classification selections. Depending on how many products you selected, this can take anywhere from 15 minutes to several hours. Subsequent syncs are much faster since they only pull new changes.<\/p>\n\n\n\n<p>To set up scheduled synchronization so WSUS stays current automatically, go to <strong>Options<\/strong> then <strong>Synchronization Schedule<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Select <strong>Synchronize automatically<\/strong><\/li>\n\n<li>Set the first synchronization time (pick off-peak hours like 02:00 AM)<\/li>\n\n<li>Set synchronizations per day to 1 (once daily is sufficient for most environments)<\/li>\n<\/ul>\n\n\n\n<p>You can also trigger synchronization from PowerShell if you prefer scripting your maintenance tasks:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$wsus = Get-WsusServer\n$subscription = $wsus.GetSubscription()\n$subscription.StartSynchronization()<\/code><\/pre>\n\n\n\n<p>Check synchronization status with:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$subscription.GetSynchronizationProgress()<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">Step 8: Approve and Deploy Updates<\/h2>\n\n\n\n<p>Once synchronization completes, you will see updates listed in the WSUS console under <strong>Updates<\/strong>. By default, updates require manual approval before clients install them (unless caught by an automatic approval rule).<\/p>\n\n\n\n<p>To approve updates manually:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Go to <strong>Updates<\/strong> then <strong>All Updates<\/strong><\/li>\n\n<li>Set the Approval filter to <strong>Unapproved<\/strong> and Status to <strong>Any<\/strong>, then click <strong>Refresh<\/strong><\/li>\n\n<li>Select the updates you want to deploy (hold Ctrl for multiple selections)<\/li>\n\n<li>Right-click and select <strong>Approve<\/strong><\/li>\n\n<li>Choose the computer group and set the approval to <strong>Approved for Install<\/strong><\/li>\n\n<li>Click <strong>OK<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Approved updates will be downloaded to your WSUS content store and distributed to clients at their next update check-in cycle. You can also approve from PowerShell for bulk operations:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Get-WsusUpdate -Classification Security | Approve-WsusUpdate -Action Install -TargetGroupName \"Test Servers\"<\/code><\/pre>\n\n\n\n<p>This approves all security updates for the &#8220;Test Servers&#8221; group in one command.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 9: Review Update Compliance<\/h2>\n\n\n\n<p>After approving and deploying updates, you need to track which machines are compliant. The WSUS console provides built-in reports for this. If you manage Windows <a href=\"https:\/\/computingforgeeks.com\/how-to-open-a-port-in-windows-server-firewall\/\" target=\"_blank\" rel=\"noreferrer noopener\">firewall rules<\/a> across your fleet, make sure reporting ports are open.<\/p>\n\n\n\n<p>Go to <strong>Computers<\/strong> in the WSUS console and check the status columns:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Needed<\/strong> &#8211; updates approved but not yet installed<\/li>\n\n<li><strong>Failed<\/strong> &#8211; updates that failed to install (investigate these first)<\/li>\n\n<li><strong>Installed\/Not Applicable<\/strong> &#8211; machines that are up to date<\/li>\n<\/ul>\n\n\n\n<p>For more detailed reporting, go to <strong>Reports<\/strong> in the WSUS console:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Update Status Summary<\/strong> &#8211; shows compliance percentage across all computer groups<\/li>\n\n<li><strong>Computer Status Summary<\/strong> &#8211; shows per-machine compliance<\/li>\n\n<li><strong>Update Detailed Status<\/strong> &#8211; shows which specific updates are installed, needed, or failed per machine<\/li>\n<\/ul>\n\n\n\n<p>You can also pull compliance data with PowerShell for custom reporting:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$wsus = Get-WsusServer\n$computerScope = New-Object Microsoft.UpdateServices.Administration.ComputerTargetScope\n$wsus.GetSummariesPerComputerTarget($updateScope, $computerScope)<\/code><\/pre>\n\n\n\n<p>Machines that show as <strong>Not yet reported<\/strong> either have not received the GPO yet or cannot reach the WSUS server. Check network connectivity and GPO application on those clients.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 10: WSUS Maintenance<\/h2>\n\n\n\n<p>WSUS requires regular maintenance to keep the database lean and the content store clean. Without it, the WSUS console becomes sluggish and synchronization slows down over time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Server Cleanup Wizard<\/h3>\n\n\n\n<p>Run the cleanup wizard monthly. In the WSUS console, go to <strong>Options<\/strong> then <strong>Server Cleanup Wizard<\/strong>. Check all options:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unused updates and update revisions<\/strong> &#8211; removes superseded updates that no computer needs<\/li>\n\n<li><strong>Computers not contacting the server<\/strong> &#8211; removes stale computer entries (machines decommissioned or rebuilt)<\/li>\n\n<li><strong>Unneeded update files<\/strong> &#8211; deletes downloaded update binaries that no longer match any approved update<\/li>\n\n<li><strong>Expired updates<\/strong> &#8211; removes updates Microsoft has marked as expired<\/li>\n\n<li><strong>Superseded updates<\/strong> &#8211; declines updates that have been replaced by newer ones<\/li>\n<\/ul>\n\n\n\n<p>Click <strong>Next<\/strong> and let the wizard run. On a busy WSUS server, this can take 15-30 minutes.<\/p>\n\n\n\n<p>You can also run the cleanup from PowerShell to automate it in a scheduled task:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Invoke-WsusServerCleanup -CleanupObsoleteUpdates -CleanupUnneededContentFiles -CompressUpdates -DeclineExpiredUpdates -DeclineSupersededUpdates<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">SUSDB Database Maintenance<\/h3>\n\n\n\n<p>The WSUS database (SUSDB) uses Windows Internal Database by default and benefits from periodic index re-indexing. Without this, queries slow down and the WSUS console becomes unresponsive.<\/p>\n\n\n\n<p>Connect to the WID instance and run a re-index script. Open PowerShell and use <code>sqlcmd<\/code> to connect:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sqlcmd -S \\\\.\\pipe\\MICROSOFT##WID\\tsql\\query -i C:\\wsus-reindex.sql<\/code><\/pre>\n\n\n\n<p>The re-index SQL script is available from Microsoft&#8217;s documentation. Save it as <code>C:\\wsus-reindex.sql<\/code> and schedule it to run monthly alongside the cleanup wizard. The script rebuilds all indexes in the SUSDB database to keep query performance healthy.<\/p>\n\n\n\n<p>For environments managing more than 500 clients, consider migrating SUSDB to a full SQL Server instance. This gives you better performance, proper backup tools, and the ability to run maintenance without affecting WSUS availability. See the <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/administration\/windows-server-update-services\/deploy\/deploy-windows-server-update-services\" target=\"_blank\" rel=\"noreferrer noopener\">WSUS deployment guide<\/a> for SQL Server migration steps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>You now have a working WSUS server on Windows Server 2025 managing updates for your environment. The key to a well-run WSUS deployment is keeping product selections tight, running the cleanup wizard monthly, and monitoring compliance reports to catch machines that fall behind on patches.<\/p>\n\n\n\n<p>For production hardening, configure WSUS to use HTTPS (port 8531) with a proper SSL certificate, set up <a href=\"https:\/\/computingforgeeks.com\/enable-remote-desktop-protocol-rdp-on-windows-server\/\" target=\"_blank\" rel=\"noreferrer noopener\">remote desktop access<\/a> for remote management, and implement a staged approval workflow &#8211; test group first, production servers after validation. If you manage <a href=\"https:\/\/computingforgeeks.com\/install-and-configure-iis-web-server-on-windows-server\/\" target=\"_blank\" rel=\"noreferrer noopener\">IIS web servers<\/a>, keep their update cycle separate from database and domain controller servers to avoid simultaneous reboots.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Windows Server Update Services (WSUS) is a server role that lets you centrally manage and distribute Windows updates across your network. Instead of each machine pulling updates independently from Microsoft Update, WSUS downloads patches once and distributes them to all clients &#8211; saving bandwidth, giving you control over which updates get deployed, and letting you &#8230; <a title=\"Install WSUS on Windows Server 2025\" class=\"read-more\" href=\"https:\/\/computingforgeeks.com\/install-windows-service-update-services-wsus\/\" aria-label=\"Read more about Install WSUS on Windows Server 2025\">Read more<\/a><\/p>\n","protected":false},"author":7,"featured_media":72257,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[299,90],"tags":[527,2924,2919],"class_list":["post-72225","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","category-windows","tag-windows","tag-windows-server","tag-windows-server-2019"],"_links":{"self":[{"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/posts\/72225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/comments?post=72225"}],"version-history":[{"count":2,"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/posts\/72225\/revisions"}],"predecessor-version":[{"id":163679,"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/posts\/72225\/revisions\/163679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/media\/72257"}],"wp:attachment":[{"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/media?parent=72225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/categories?post=72225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computingforgeeks.com\/wp-json\/wp\/v2\/tags?post=72225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}