{"id":29043,"date":"2023-05-29T06:04:06","date_gmt":"2023-05-29T06:04:06","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=29043"},"modified":"2023-05-29T06:04:12","modified_gmt":"2023-05-29T06:04:12","slug":"reportly","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/reportly\/","title":{"rendered":"Reportly : An AzureAD User Activity Report Tool"},"content":{"rendered":"\n<p><strong>Reportly <\/strong>is an AzureAD user activity report tool.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/sap8899\/reportly#about-the-tool\"><\/a><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">About the tool<\/h2>\n\n\n\n<p>This is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious user and a time frame and will receive a report detailing the following:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Information about the user<\/li>\n\n\n\n<li>Actions taken by the user<\/li>\n\n\n\n<li>Actions taken on the user<\/li>\n\n\n\n<li>User login and failure logs<\/li>\n<\/ol>\n\n\n\n<p><strong>Example_video<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-video\"><video controls src=\"https:\/\/user-images.githubusercontent.com\/88736901\/202284687-9862e097-a5d6-4557-a474-d99e37269c2e.mp4\"><\/video><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Usage<\/h2>\n\n\n\n<p>When running the tool, a link to authentication and a device code will show, follow the link and enter the code to authenticate. <a href=\"https:\/\/user-images.githubusercontent.com\/88736901\/202486022-ba2d97b3-3754-4a65-b191-8df87c9b24f9.png\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfFe1aUg1ojzM0PKQpbTwfVNX1ansKdDArqvHogSZ2rHBhaQ-21ZH-JE3IEPVo1fXXia-Jus3xY_IU7kYPhfA5SVfJ0NfR9-dnVZOIvJfe2Wo8LhY6F69JR8024LYCJ_JlIC5czajwJbMz9N8Y6jtyfSEk5N6jtfOCrZZIS0S0p2EmanRzEKdtkdcx\/s16000\/usage.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>Insert User principal name of a suspicious user.<br>Insert start and end times in the following format: 2022-11-16<br><strong>I recommend a range of no longer then a week.<\/strong><\/p>\n\n\n\n<p>After authentication, in order to create a full report choose the option &#8220;5&#8221; <a href=\"https:\/\/user-images.githubusercontent.com\/88736901\/202486220-211a797c-bd10-4852-aa8d-ac29a893590e.png\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjbJIodHfvseOQ-p79Mbd_NJRDio7bZg7xtey6ZFYNwjdMuTkg5hzAQSotVcVuaLZ1GpUFB7-lIqhfC1eCJwB6jvfZTy-H_CUUd7EZ7ENCNW7dZpGwRrxSDZqKFgwAIpZAxKi6el8yuMDyR3vXwmgsHK4IGxcwiv5gC1mjZCikjVSq98eTGqyBwO-j2\/s16000\/image5.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>When the report will be ready the tool will print &#8220;Your report is ready!&#8221;. The reports are created in the executable&#8217;s directory.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/sap8899\/reportly#installation\"><\/a><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Installation<\/h2>\n\n\n\n<p>In order to use the tool you will need an AzureAD application with the following <strong>delegated<\/strong> microsoft graph api permissions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AuditLog.Read.All<\/li>\n\n\n\n<li>GroupMember.Read.All<\/li>\n\n\n\n<li>RoleManagement.Read.Directory<\/li>\n\n\n\n<li>User.Read<\/li>\n\n\n\n<li>User.Read.All<\/li>\n<\/ul>\n\n\n\n<p><strong>dont forget to grant admin consent<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhzjOELMPeEahBQNEIDC-_593bR_PhW2q6aE0ka6VoHhOsZXrZV9clUqT13dzl4tEHBxoVlChKr6B14LLyDtDP4czTmYtWBQn9qd8Fa8N2F0gt6Cl5j5vh-UoqqOmtJtW04vNIOPbF9Qu7wWlY0qMKbP0qjxYC07MWs1VuHELLS1OYX3DVLphVHiLL4\/s16000\/1111.png\" alt=\"\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To create an application go to &#8220;App registration&#8221; tab and select &#8220;New registration&#8221; option.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjmEH4ZMh1rQvxelQsysJeti3aK920OPptlVT8p2ZjJixB5pxzcQ1r3jCNBW2OQRnXgL0-X2A0LvZum9foNWKniTVDi9M9Nv_wzMZ-PKnusA1rFPoIV5jFh2x8AICkC6jKSQzFim1Vs7Y__BoL2k_efQbh7Uz4OS8nN92YW5TbdQpKEQdMnqdGAu-nM\/s16000\/202.png\" alt=\"\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Also, when creating the application, make sure you mark the following option as &#8220;yes&#8221;:<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiKkMfcrCdD6alpKSuwlshOX5g2J_Y4PB7BwRDG2g6Azj-eRjc9a-bGqVfzx5I5AjpBm0aeSfILGtntCAnFzWuCbArVImhEkd7Dj3wKSIxaFlhmmSypQ68IQ6By3_CzsuJh7gSYBpjwPIrRWxltPhWwXoeQazqFk70YGnMRV1y9qTUfgzuSQsxDTAbU\/s16000\/33333.png\" alt=\"\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>you can find this property under the application&#8217;s &#8220;Authentication&#8221; tab.<\/li>\n<\/ul>\n\n\n\n<p>Add a secret to the application.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjie9xaS5upGUOEvUl6HasGVfHyhvgU2VQpVo8C9piepT599C7L0pkElw9VYdATR65uGilT9wbR0u-byQ7eIqRjL9CVt95P17_V7NNiLRyQs9gUXy6ZTom7e9bThuEf5xJErfBUUiWscW5S-l3lc95g3iggNGHnH9b52xR2h1_YHiTT6xkA-EXg0ngm\/s16000\/44444.png\" alt=\"\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Go to &#8220;Certificates &amp; secrets&#8221;<\/li>\n\n\n\n<li>Add a secret<\/li>\n\n\n\n<li>Immediately copy the secret to the config file (after you watch it once, it disappears)<\/li>\n<\/ul>\n\n\n\n<p>After you created the application you need to fill the config.cfg file:<br>clientId = application id<br>clientSecret = application secret<br>tenantId = tenant id<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/github.com\/sap8899\/reportly\" target=\"_blank\" rel=\"noreferrer noopener\">Click Here To Download<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-background\" style=\"background-color:#f4f4f4\"><strong>Please consider&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/kali-linux-tutorials\/\" target=\"_blank\" rel=\"noreferrer noopener\">following and supporting<\/a>&nbsp;us to stay updated with the latest info<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reportly is an AzureAD user activity report tool. About the tool This is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious user and a time frame and will receive a report detailing the following: Example_video Usage When running the tool, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":29053,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[6035,6033,6034],"class_list":["post-29043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-azuread","tag-reportly","tag-user-activity-report-tool"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Reportly - An AzureAD User Activity Report Tool<\/title>\n<meta name=\"description\" content=\"Reportly is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/reportly\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reportly - An AzureAD User Activity Report Tool\" \/>\n<meta property=\"og:description\" content=\"Reportly is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/reportly\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-29T06:04:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-29T06:04:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/reportly\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/reportly\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Reportly : An AzureAD User Activity Report Tool\",\"datePublished\":\"2023-05-29T06:04:06+00:00\",\"dateModified\":\"2023-05-29T06:04:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/reportly\/\"},\"wordCount\":313,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/reportly\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png\",\"keywords\":[\"AzureAD\",\"Reportly\",\"User Activity Report Tool\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/reportly\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/reportly\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/reportly\/\",\"name\":\"Reportly - An AzureAD User Activity Report Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/reportly\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/reportly\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png\",\"datePublished\":\"2023-05-29T06:04:06+00:00\",\"dateModified\":\"2023-05-29T06:04:12+00:00\",\"description\":\"Reportly is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/reportly\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/reportly\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reportly - An AzureAD User Activity Report Tool","description":"Reportly is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/reportly\/","og_locale":"en_US","og_type":"article","og_title":"Reportly - An AzureAD User Activity Report Tool","og_description":"Reportly is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious","og_url":"https:\/\/kalilinuxtutorials.com\/reportly\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-05-29T06:04:06+00:00","article_modified_time":"2023-05-29T06:04:12+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/reportly\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/reportly\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Reportly : An AzureAD User Activity Report Tool","datePublished":"2023-05-29T06:04:06+00:00","dateModified":"2023-05-29T06:04:12+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/reportly\/"},"wordCount":313,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/reportly\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png","keywords":["AzureAD","Reportly","User Activity Report Tool"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/reportly\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/reportly\/","url":"https:\/\/kalilinuxtutorials.com\/reportly\/","name":"Reportly - An AzureAD User Activity Report Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/reportly\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/reportly\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png","datePublished":"2023-05-29T06:04:06+00:00","dateModified":"2023-05-29T06:04:12+00:00","description":"Reportly is a tool that will help blue teams during a cloud incident. When running the tool, the researcher will enter as input a suspicious","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/reportly\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/reportly\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiq4PJy6jBq0fPHIYhHV79yyYLK58ewnR_6iVETcMue0cl7cstYvABqFgBxoezCUEPjE4DBEJ6u0ITWiZWqFZ3d9pNVjoGRHTNgCbmxsXvOj8y3y7Ub_VDXLKp1PNPGcp8JxAAtWwF0dzU-4-J1gtF_qd2rLgz-wn3TSRa6AHMyVJmnknWeR7LfZ7mj\/s16000\/reportly.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":26006,"url":"https:\/\/kalilinuxtutorials.com\/azurert\/","url_meta":{"origin":29043,"position":0},"title":"AzureRT : A Powershell Module Implementing Various Azure Red Team Tactics","author":"R K","date":"July 19, 2022","format":false,"excerpt":"AzureRT is a Powershell module implementing various cmdlets to interact with Azure and Azure AD from an offensive perspective. Helpful utilities dealing with access token based authentication, switching from\u00a0Az\u00a0to\u00a0AzureAD\u00a0and\u00a0az cli\u00a0interfaces, easy to use pre-made attacks such as Runbook-based command execution and more. The Most Valuable Cmdlets This toolkit brings lots\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNB2Xfb9CkYuXZ0reJFhqTFgNI6xRx4IUHwcFvG2YBFM8rDbU5mcRcXm-zr10C6bWLYeG7O8Dym692SqORxWZ0JGUP1RWY2jxxcPnyaZQ69BbN-WDPl9jnU7qtXbIy4VIjqaAmouv5zHjk3pljNuoEjrWBSTXtgPbiHGp4Y0hdr2AdId1hq7BYEGzS\/s728\/azure_redteam%20%282%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNB2Xfb9CkYuXZ0reJFhqTFgNI6xRx4IUHwcFvG2YBFM8rDbU5mcRcXm-zr10C6bWLYeG7O8Dym692SqORxWZ0JGUP1RWY2jxxcPnyaZQ69BbN-WDPl9jnU7qtXbIy4VIjqaAmouv5zHjk3pljNuoEjrWBSTXtgPbiHGp4Y0hdr2AdId1hq7BYEGzS\/s728\/azure_redteam%20%282%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNB2Xfb9CkYuXZ0reJFhqTFgNI6xRx4IUHwcFvG2YBFM8rDbU5mcRcXm-zr10C6bWLYeG7O8Dym692SqORxWZ0JGUP1RWY2jxxcPnyaZQ69BbN-WDPl9jnU7qtXbIy4VIjqaAmouv5zHjk3pljNuoEjrWBSTXtgPbiHGp4Y0hdr2AdId1hq7BYEGzS\/s728\/azure_redteam%20%282%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiNB2Xfb9CkYuXZ0reJFhqTFgNI6xRx4IUHwcFvG2YBFM8rDbU5mcRcXm-zr10C6bWLYeG7O8Dym692SqORxWZ0JGUP1RWY2jxxcPnyaZQ69BbN-WDPl9jnU7qtXbIy4VIjqaAmouv5zHjk3pljNuoEjrWBSTXtgPbiHGp4Y0hdr2AdId1hq7BYEGzS\/s728\/azure_redteam%20%282%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":11773,"url":"https:\/\/kalilinuxtutorials.com\/powerzure\/","url_meta":{"origin":29043,"position":1},"title":"PowerZure : PowerShell Framework To Assess Azure Security","author":"R K","date":"November 9, 2020","format":false,"excerpt":"PowerZure is a PowerShell project created to assess and exploit resources within Microsoft\u2019s cloud platform, Azure. PowerZure was created out of the need for a framework that can both perform reconnaissance and exploitation of Azure, AzureAD, and the associated resources. CLI vs. Portal A common question is why use PowerZure\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":25482,"url":"https:\/\/kalilinuxtutorials.com\/ssoh-no\/","url_meta":{"origin":29043,"position":2},"title":"SSOh-No : User Enumeration And Password Spraying Tool For Testing Azure AD","author":"R K","date":"June 23, 2022","format":false,"excerpt":"SSOh-No is designed to enumerate users, password spray and perform brute force attacks against any organisation that utilises Azure AD or O365. Generally, this endpoint provides extremely verbose errors which can be leveraged to enumerate users and validate their passwords via brute force\/spraying attacks, while also failing to log any\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsFVQjA_hlnWO3GJ1qXQY8Dt4nMiP-hDyhesJdtbbRTrFmYj8pnduBx-E0wkmYFzR8elloAAmycebIE94ei_oCzxkjbEGLCO3MwWxetaih2YHYyuKzObckt_dh3QIB1DRfV5YVsKJ_Z6K77CoCUPTvTFoGpxd5N8ppah2YpVDgeGoB3P6FkvIWSDjR\/s728\/passwordspray.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsFVQjA_hlnWO3GJ1qXQY8Dt4nMiP-hDyhesJdtbbRTrFmYj8pnduBx-E0wkmYFzR8elloAAmycebIE94ei_oCzxkjbEGLCO3MwWxetaih2YHYyuKzObckt_dh3QIB1DRfV5YVsKJ_Z6K77CoCUPTvTFoGpxd5N8ppah2YpVDgeGoB3P6FkvIWSDjR\/s728\/passwordspray.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsFVQjA_hlnWO3GJ1qXQY8Dt4nMiP-hDyhesJdtbbRTrFmYj8pnduBx-E0wkmYFzR8elloAAmycebIE94ei_oCzxkjbEGLCO3MwWxetaih2YHYyuKzObckt_dh3QIB1DRfV5YVsKJ_Z6K77CoCUPTvTFoGpxd5N8ppah2YpVDgeGoB3P6FkvIWSDjR\/s728\/passwordspray.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhsFVQjA_hlnWO3GJ1qXQY8Dt4nMiP-hDyhesJdtbbRTrFmYj8pnduBx-E0wkmYFzR8elloAAmycebIE94ei_oCzxkjbEGLCO3MwWxetaih2YHYyuKzObckt_dh3QIB1DRfV5YVsKJ_Z6K77CoCUPTvTFoGpxd5N8ppah2YpVDgeGoB3P6FkvIWSDjR\/s728\/passwordspray.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31276,"url":"https:\/\/kalilinuxtutorials.com\/awesome-bec\/","url_meta":{"origin":29043,"position":3},"title":"Awesome-BEC &#8211; Unveiling A Comprehensive Resource For Business Email Compromise Investigations","author":"Varshini","date":"November 14, 2023","format":false,"excerpt":"A Comprehensive Resource for Business Email Compromise Investigations.' In the ever-evolving landscape of cyber threats, business email compromise (BEC) remains a persistent and costly threat. This article explores Awesome-BEC, a curated repository of invaluable attack and defensive information, tools, and research dedicated to combating BEC attacks. Discover the wealth of\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFs0qjA7Sg-PMvScoWTDuAWmHL_hlhRggQ1Szz4rKosfuyAM-Ns00EPf1FOFpx20fXS8nx7j5Y2tcw7PqZPOpdcx4oxB9F2JG5Ca1AWS9kA2sgmm6hC8qZs10ZnP0tRUeef65aO-LtngTWgPpj8WIDqG8GZZlBC4C3Hn3sz_SfZuHdJbxjpUX7yjDbmA\/s16000\/BEC.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":22845,"url":"https:\/\/kalilinuxtutorials.com\/crt\/","url_meta":{"origin":29043,"position":4},"title":"CRT : CrowdStrike Reporting Tool for Azure","author":"R K","date":"March 14, 2022","format":false,"excerpt":"CRT is a tool to queries the following configurations in the Azure AD\/O365 tenant which can shed light on hard-to-find permissions and configuration settings in order to assist organizations in securing these environments. Exchange Online (O365): Federation ConfigurationFederation TrustClient Access Settings Configured on MailboxesMail Forwarding Rules for Remote DomainsMailbox SMTP\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhD2igjoH8CWeN5YpElrHGEHUhw7D7VXm9Ve1qoYVEMZABkXkkwYDlReQFyIrrbCJlaiV6Vx6D-KjJb01GVAy390675HZAmyg1grj9IY4zCSPjx3Rt_YwKGVXjXzZp4PjEymispebNZ_CbioUjNSaf-MEEXaXQzpKUL9gXLyh6AjR7M0G3pE7tf7G72=s760","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhD2igjoH8CWeN5YpElrHGEHUhw7D7VXm9Ve1qoYVEMZABkXkkwYDlReQFyIrrbCJlaiV6Vx6D-KjJb01GVAy390675HZAmyg1grj9IY4zCSPjx3Rt_YwKGVXjXzZp4PjEymispebNZ_CbioUjNSaf-MEEXaXQzpKUL9gXLyh6AjR7M0G3pE7tf7G72=s760 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhD2igjoH8CWeN5YpElrHGEHUhw7D7VXm9Ve1qoYVEMZABkXkkwYDlReQFyIrrbCJlaiV6Vx6D-KjJb01GVAy390675HZAmyg1grj9IY4zCSPjx3Rt_YwKGVXjXzZp4PjEymispebNZ_CbioUjNSaf-MEEXaXQzpKUL9gXLyh6AjR7M0G3pE7tf7G72=s760 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhD2igjoH8CWeN5YpElrHGEHUhw7D7VXm9Ve1qoYVEMZABkXkkwYDlReQFyIrrbCJlaiV6Vx6D-KjJb01GVAy390675HZAmyg1grj9IY4zCSPjx3Rt_YwKGVXjXzZp4PjEymispebNZ_CbioUjNSaf-MEEXaXQzpKUL9gXLyh6AjR7M0G3pE7tf7G72=s760 2x"},"classes":[]},{"id":11544,"url":"https:\/\/kalilinuxtutorials.com\/psmdatp\/","url_meta":{"origin":29043,"position":5},"title":"PSMDATP : PowerShell Module For Managing Microsoft Defender Advanced Threat Protection","author":"R K","date":"September 29, 2020","format":false,"excerpt":"Welcome to the Microsoft Defender Advanced Threat Protection PowerShell module: PSMDATP This module is a collection of easy-to-use cmdlets and functions designed to make it easy to interface with the Microsoft Defender Advanced Threat Protection API. Motivation I created this PowerShell module for MDATP for the following reasons: Advance my\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=29043"}],"version-history":[{"count":7,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29043\/revisions"}],"predecessor-version":[{"id":29052,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/29043\/revisions\/29052"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/29053"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=29043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=29043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=29043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}