{"id":11104,"date":"2025-06-15T15:06:35","date_gmt":"2025-06-15T13:06:35","guid":{"rendered":"https:\/\/webhosting.de\/postfix-fortgeschrittene-konfiguration-sicherheit-hosting-mailhub\/"},"modified":"2025-06-15T15:06:35","modified_gmt":"2025-06-15T13:06:35","slug":"postfix-advanced-configuration-security-hosting-mailhub","status":"publish","type":"post","link":"https:\/\/webhosting.de\/en\/postfix-fortgeschrittene-konfiguration-sicherheit-hosting-mailhub\/","title":{"rendered":"Postfix for advanced users: Optimal configuration, security and automation"},"content":{"rendered":"<p>The topic <strong>Postfix Advanced<\/strong> deals with the key aspects for the secure, flexible and high-performance configuration of email servers. In professional hosting environments, Postfix plays a central role in ensuring reliable delivery, authentication and integrity of emails.<\/p>\n\n<h2>Key points<\/h2>\n<ul>\n  <li><strong>main.cf<\/strong> and <strong>master.cf<\/strong> enable targeted configuration for complex setups<\/li>\n  <li><strong>Transportation rules<\/strong> and alias management open up individual redirects<\/li>\n  <li><strong>Security measures<\/strong> such as SMTP-AUTH, SPF, DKIM and DMARC ensure delivery security<\/li>\n  <li><strong>Monitoring<\/strong>, logging and automation increase reliability and maintainability<\/li>\n  <li><strong>Cluster operation<\/strong> and external relays optimize scalability and deliverability<\/li>\n<\/ul>\n\n\n<figure class=\"wp-block-image size-full is-resized\">\n  <img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/webhosting.de\/wp-content\/uploads\/2025\/06\/advanced-postfix-setup-9735.webp\" alt=\"\" width=\"1536\" height=\"1024\"\/>\n<\/figure>\n\n\n<h2>main.cf: Fine-tuning for productive mail environments<\/h2>\n<p>In the file <strong>main.cf<\/strong> I define central settings that shape the character of the mail server. Especially in multi-domain configurations, it is important to define the parameters <code>myhostname<\/code>, <code>mydomain<\/code> and <code>mydestination<\/code> consistently in order to avoid returns and mail loops.<\/p>\n<p>With the help of <code>virtual_alias_maps<\/code> I transfer the address logic from static config files to flexible backend systems such as MySQL or LDAP. This allows email aliases, forwarding and domains to be managed dynamically. I make sure to regularly update hash files with <code>postmap<\/code> to update.<\/p>\n<p>Particular attention is paid to the <strong>transport_maps<\/strong>. Here I specifically control via which relay certain target addresses are to be delivered - essential when operating splitting gateways between internal and external networks.<\/p>\n<p>The contribution <a href=\"https:\/\/webhosting.de\/en\/postfix-settings-guide-tips-mailserver-setup-email-security-maildir\/\">Postfix settings &amp; Maildir tips<\/a> provides additional insights into optimization strategies at server level.<\/p>\n\n<p>In addition, it is worthwhile to <strong>Tuning parameters<\/strong> in <strong>main.cf<\/strong> explicitly in order to increase performance and security. For example, the setting <code>smtp_tls_security_level<\/code> can be set to \"may\" or \"encrypt\", provided that it is ensured that communication with the target server is always encrypted. Especially in productive environments, I recommend <code>smtp_tls_security_level = encrypt<\/code>to enforce end-to-end encryption where this is technically possible. Also relevant is the fine-tuning of the <code>queue_run_delay<\/code> and <code>minimum_backoff_time<\/code>to specify how often Postfix attempts to redeliver undeliverable mails. Especially in the event of temporary network problems, this can prevent messages from ending up nowhere or being bounced too quickly.<\/p>\n<p>Another option is <code>disable_dns_lookups<\/code>to selectively deactivate DNS queries, for example when working within a closed internal network. This can reduce latencies, but requires precise knowledge of the internal DNS and routing structures. For large mail volumes, it is also advisable to set the parameter <code>default_destination_concurrency_limit<\/code> in order to enable greater simultaneity in SMTP delivery and avoid bottlenecks.<\/p>\n\n\n<figure class=\"wp-block-image size-full is-resized\">\n  <img decoding=\"async\" src=\"https:\/\/webhosting.de\/wp-content\/uploads\/2025\/06\/postfix-optimization-tech-savy-2471.webp\" alt=\"\" width=\"1536\" height=\"1024\"\/>\n<\/figure>\n\n\n<h2>Implement advanced security measures correctly<\/h2>\n<p>Postfix not only enables encrypted connections via TLS, but also specific control over who can use the server. I activate <strong>SMTP-AUTH<\/strong>by <code>smtpd_sasl_auth_enable = yes<\/code> and integrate compatible SASL backends. This allows users to actively authenticate themselves before sending emails.<\/p>\n<p>In combination with <code>smtpd_recipient_restrictions<\/code> and <code>smtpd_relay_restrictions<\/code> I prevent the server from being misused as an open relay. I add sensible policies to the rules such as <code>permit_sasl_authenticated<\/code> or <code>reject_unauth_destination<\/code>.<\/p>\n<p>To safeguard the domain reputation, the implementation of <strong>SPF, DKIM<\/strong> and <strong>DMARC<\/strong> essential. I use Policyd for SPF, <code>opendkim<\/code> for signatures and choose a DMARC policy that prevents illegitimization. Services like <code>postfix-policyd-spf-python<\/code> facilitate integration into running systems.<\/p>\n\n<p>It is also recommended, <strong>Greylisting<\/strong> to consider. The principle behind it: Unknown senders are temporarily rejected on the first delivery attempt - legitimate servers try again, while many spam bots only make one attempt. For greylisting under Postfix, for example <code>postgrey<\/code> to control the flood of spam. You can also <strong>RBL lists<\/strong> (Realtime Blackhole Lists) in the <code>smtp_recipient_restrictions<\/code> to block known sources of spam at an early stage.<\/p>\n<p>Another core element of advanced security strategies is the separation of <strong>Inbound and outbound mail servers<\/strong>. By operating two physically (or virtually) separate instances of Postfix, incoming mail traffic can be managed independently of outgoing mail. Admins can then configure comprehensive security filters such as SpamAssassin, rspamd or ClamAV for virus scans on the incoming system. On the outgoing system, tight controls or rate limits can be defined for user accounts to prevent spam from being sent.<\/p>\n\n<h2>master.cf: Targeted control of services<\/h2>\n<p>In the file <strong>master.cf<\/strong> I specifically control which mail services work on which ports and with which parameters. For example, I define my own SMTP instances with a customized filter chain or decide whether services are operated in the chroot.<\/p>\n<p>I maintain the resource usage of individual processes directly in this file, for example to bundle mail filters on separate queues. For external mail filters such as Amavis or rspamd, I create a <code>master.cf<\/code> dedicated services and use <code>content_filter<\/code>to integrate them.<\/p>\n<p>For parallel setups with different input classes (e.g. stable vs. beta systems), I can use separate instances to control how mails are processed and forwarded.<\/p>\n\n<p>At <code>master.cf<\/code> administrators can also, for example <strong>Restrictions based on the number of processes<\/strong> so that there is no system overload when there is a high volume of mail. The option <code>-o<\/code> (override) within a service such as <code>smtp<\/code> or <code>submission<\/code> allows individual parameters of <code>main.cf<\/code> can be overwritten in a targeted manner. For example, you can use different TLS settings for the submission port (port 587) than for the standard SMTP port 25, assuming you want to consistently restrict the submission port to TLS with authentication, while port 25 is still responsible for accepting external emails without authentication. All of this can be configured within the <code>master.cf<\/code> flexibly.<\/p>\n<p>Another highlight is the option of <code>dnsblog<\/code> and <code>verify<\/code>-services separately. This allows you to run DNS blacklists in an isolated process and minimize setting errors. The targeted separation of individual services ensures increased transparency in the event of faults and makes debugging easier.<\/p>\n\n<h2>Optimized delivery logic with transport_maps<\/h2>\n<p>I realize individual routing strategies with <strong>transport_maps<\/strong>. I forward certain domains directly to specialized relays, define exceptions for internal systems or set up domains for dedicated cluster nodes.<\/p>\n<p>This function plays a decisive role in hybrid infrastructures with several mail servers or when switching from your own servers to external SMTP relays. Postfix allows the use of <code>relayhost<\/code> even auth-based delivery to services such as Amazon SES or Sendinblue.<\/p>\n<p><a href=\"https:\/\/webhosting.de\/en\/postfix-basics-installation-configuration-guide\/\">Postfix configuration basics<\/a> help you get started with these mechanisms.<\/p>\n\n<p>It is important to note that extensive <em>transport_maps<\/em>-rules to maintain an overview. The more domains or target systems there are in the network, the more sensible central control via a database becomes. All routing information can be maintained in a MySQL or PostgreSQL table and Postfix accesses it dynamically. In this way, administrators no longer have to maintain text files and access information via <code>postmap<\/code> update, but receive a live-based configuration that adapts seamlessly to growing requirements.<\/p>\n<p>An additional trick is the use of <code>sender_dependent_relayhost_maps<\/code>. This allows you to define a specific relay for different sender addresses (or domains). This is particularly practical if you operate several brands or customer domains on the same server and want to deliver each domain via a different provider. This allows you to store a separate authentication for each sender, for example to protect the reputation of the respective domain and to separate the mail signing cleanly.<\/p>\n\n\n<figure class=\"wp-block-image size-full is-resized\">\n  <img decoding=\"async\" src=\"https:\/\/webhosting.de\/wp-content\/uploads\/2025\/06\/postfix-optimale-konfiguration-9843.webp\" alt=\"\" width=\"1536\" height=\"1024\"\/>\n<\/figure>\n\n\n<h2>Clustering &amp; load balancing with Postfix<\/h2>\n<p>For scaling setups, I distribute the mail traffic across several servers. Each node receives a customized configuration via tools such as <code>rsync<\/code> or <code>git<\/code>. Load balancers distribute the delivery load and reduce the risk of failure.<\/p>\n<p>I combine DNS failover for MX records with active cluster monitoring. Mail queues are monitored locally, logs are centralized via rsyslog. This structure can be implemented using <code>hostname_filter<\/code> precisely, even with 3+ parallel instances.<\/p>\n<p>For complete high availability, I recommend automated monitoring with Prometheus Exporter for Postfix.<\/p>\n\n<p>Especially with distributed systems, the <strong>Synchronization of mailbox data<\/strong> an important point. If, in addition to Postfix <code>dovecot<\/code> (for IMAP and POP3), you should specify exactly where the maildir or mbox files are located and how they are synchronized in the event of failures. A frequently used method is real-time replication - for example via <code>dsync<\/code> with dovecot. This ensures that the database always remains consistent if a node fails. For external SMTP relays that are only to handle outgoing mail, it is recommended to use mechanisms such as <code>HAProxy<\/code> or <code>keepalived<\/code> which distribute the traffic to the active nodes.<\/p>\n<p>If you integrate several data centers, you can use <strong>Geo-redundancy<\/strong> ensure that mail reception and dispatch is guaranteed even in the event of regional network problems. The prerequisite for this is a homogeneous Postfix environment with identical <code>main.cf<\/code> and <code>master.cf<\/code>-files. DNS entries should then point to nearby locations in order to minimize latencies and cushion global failure scenarios.<\/p>\n\n<h2>Automation, logging &amp; notifications<\/h2>\n<p>A maintenance-free mail server is based on automation. I manage new users and aliases with scripts that are directly <code>postmap<\/code> or feed database tables. This avoids manual errors on servers with hundreds of domains.<\/p>\n<p>I forward status mails such as queue warnings directly to admins or monitoring services. I use <code>mailq<\/code> and log rotation via <code>logrotate.d<\/code>to keep Postfix logs clear and long-lasting. Critical mails end up in defined catchall inboxes for manual checking.<\/p>\n\n\n<figure class=\"wp-block-image size-full is-resized\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/webhosting.de\/wp-content\/uploads\/2025\/06\/postfix-konfiguration-2023-5371.webp\" alt=\"\" width=\"1536\" height=\"1024\"\/>\n<\/figure>\n\n\n<p>The integration of <strong>Monitoring tools<\/strong>The Prometheus tool, for example, makes it easier to continuously record key figures such as the number of emails sent, delivery times or error rates. With alarm definitions, you can be notified via Slack, email or SMS as soon as certain threshold values are exceeded. This is particularly valuable in order to be able to react immediately in the event of sudden spam volumes or technical faults.<\/p>\n<p>Another important point is the <strong>Fault diagnosis<\/strong> via meaningful logs. Filters such as <code>grep<\/code> or tools like <code>plogsumm<\/code>to quickly detect suspicious activities. If you want to go deeper into debugging, you can temporarily change the log level via <code>postconf -e \"debug_peer_level=2\"<\/code> but must be careful not to flood the system with unnecessary information. After successfully solving a problem, you should reset the debug output to keep the log files lean.<\/p>\n\n<h2>Avoid sources of error and rectify them efficiently<\/h2>\n<p>I regularly test whether <strong>Mail loops<\/strong> by sending myself emails via different domains. If deliveries happen several times, there is usually an error in the <code>mydestination<\/code>-configuration or in the DNS.<\/p>\n<p>If a TLS error occurs, I check immediately <code>postfix check<\/code> and view the file permissions of the certificates. Especially often <code>privkey.pem<\/code> not readable for \"postfix\". I set <code>chown<\/code> and <code>postfix reload<\/code>to correct the error.<\/p>\n<p>Auth problems are mostly in <code>\/etc\/postfix\/sasl_passwd<\/code> to find. I pay attention to format, rights and that the file with <code>postmap<\/code> has been converted correctly.<\/p>\n\n<p>It is also important that you <strong>DNS and reverse DNS entries<\/strong> checked. Many providers mark emails as potential spam if the PTR entries do not correctly point to the hostname specification of the mail server. A faulty reverse DNS can also have a negative impact on the operation of DKIM and DMARC. It is also worthwhile, <code>mailq<\/code> or <code>postqueue -p<\/code> regularly to determine whether an unusually large number of emails are accumulating in the queue. This indicates delivery problems, which in most cases are caused by incorrect DNS settings, routing errors or spam filter misconfigurations.<\/p>\n<p>If emails end up in recipients' spam folders despite the correct settings, you should check your own IP addresses and domains in <strong>Blocklists<\/strong> check. Special tools such as <code>mxtoolbox.com<\/code> (as an independent service, not a new link in the article) provide information on whether an IP address is on an RBL. Regular checks help to maintain the reputation of the mail server.<\/p>\n\n<h2>WordPress &amp; hosting integration with Postfix<\/h2>\n<p>Many hosters rely on automated mail services with Postfix in the background. I recommend <strong>webhoster.de<\/strong> for projects with WordPress, as Let's Encrypt certificates are automatically integrated and redirects are easily controlled.<\/p>\n<p>Especially with multisite setups, Postfix can be used via a secure relay, which reduces server load to a minimum. The connection via APIs and configurable interface tools makes operation much easier.<\/p>\n<p>You can find out more in the article <a href=\"https:\/\/webhosting.de\/en\/postfix-perfect-forward-secrecy-pfs\/\">Perfect Forward Secrecy for Postfix<\/a>.<\/p>\n\n\n<figure class=\"wp-block-image size-full is-resized\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/webhosting.de\/wp-content\/uploads\/2025\/06\/postfix-advanced-setup-2743.webp\" alt=\"\" width=\"1536\" height=\"1024\"\/>\n<\/figure>\n\n\n<p>Within a WordPress environment, you can also use plugins such as \"WP Mail SMTP\" to optimize the email functionality. These plugins directly integrate SMTP settings, authentication data and SSL\/TLS options. This ensures that contact forms or system messages run smoothly and securely via the configured Postfix server. Especially with highly frequented websites, it is essential that no mails end up in the SPAM folder - the combination of secure relay, correct DNS entries (SPF, DKIM) and a clean Postfix configuration prevents reputational damage.<\/p>\n<p>If you operate your own vServer or dedicated server, you also have the freedom, <strong>dynamic IP addresses<\/strong> to avoid. A clean Fix-IP area contributes enormously to good <em>Deliverability<\/em> with. The existing integration with hosting providers such as webhoster.de ensures that certificate management and mail routing are largely automated, which minimizes sources of error and reduces administration effort.<\/p>\n\n<h2>Hosting recommendation for demanding Postfix use<\/h2>\n<p>If I have to operate several domains, backups and certificates within a productive environment, I rely on providers that offer me integrated solutions. The following table shows three tested providers:<\/p>\n\n<table>\n  <thead>\n    <tr>\n      <th>Provider<\/th>\n      <th>Availability<\/th>\n      <th>Simplicity<\/th>\n      <th>Additional functions<\/th>\n      <th>Recommendation<\/th>\n    <\/tr>\n  <\/thead>\n  <tbody>\n    <tr>\n      <td>webhoster.de<\/td>\n      <td>99,99%<\/td>\n      <td>Very high<\/td>\n      <td>Automation, WordPress integration, mail filter<\/td>\n      <td>1st place<\/td>\n    <\/tr>\n    <tr>\n      <td>Provider B<\/td>\n      <td>99,8%<\/td>\n      <td>High<\/td>\n      <td>Standard<\/td>\n      <td>2nd place<\/td>\n    <\/tr>\n    <tr>\n      <td>Provider C<\/td>\n      <td>99,5%<\/td>\n      <td>Medium<\/td>\n      <td>Few<\/td>\n      <td>3rd place<\/td>\n    <\/tr>\n  <\/tbody>\n<\/table>\n\n\n<figure class=\"wp-block-image size-full is-resized\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/webhosting.de\/wp-content\/uploads\/2025\/06\/postfix-optimale-konfiguration-3621.webp\" alt=\"\" width=\"1536\" height=\"1024\"\/>\n<\/figure>\n\n\n<p>For professional projects in particular, fully automatic backups, flexible upgrades and the integration of monitoring services are among the decisive criteria when choosing a hoster. With <em>webhoster.de<\/em> additional functions such as automatic certificate management, API-based domain management and customer-specific DNS settings can be conveniently managed via the customer interface. This is particularly helpful if users frequently create new subdomains or email addresses - and ensures a dynamic, scalable infrastructure without constant manual intervention.<\/p>\n<p>In a <strong>highly available Postfix environment<\/strong> you should also attach importance to redundant network connections and firewall concepts. The hoster should offer options to control incoming and outgoing traffic in detail so that individual IP addresses or ports can be blocked or forwarded if necessary without interrupting the entire service. The automated provision of Let's Encrypt certificates also simplifies the TLS configuration, especially if you serve a large number of domains.<\/p>\n\n<h2>Concluding overview<\/h2>\n<p>Anyone who is familiar with Postfix at the <strong>advanced configuration<\/strong> provides powerful tools for high-performance and secure mail environments. A good interplay of configuration, monitoring, filtering and automation is crucial.<\/p>\n<p>With the right environment and a reliable hosting partner such as webhoster.de, even critical email workloads can be operated stably - whether for agencies, system houses or business portals with thousands of emails per hour. In particular, the ability to control Postfix granularly helps to ensure long-term delivery reliability and the reputation of your own domains. Those who also rely on sophisticated monitoring mechanisms and automation close potential security gaps and ensure a smooth process.\n\nIn order to be prepared for growing requirements in the future, it is worth regularly reviewing your own mail server setups and integrating new technologies. This is because Postfix, in combination with modern services and protocols such as DMARC, DKIM and TLS optimizations, offers a proven, future-proof foundation to meet the increasing demands for security and speed.<\/p>","protected":false},"excerpt":{"rendered":"<p>Discover advanced Postfix configurations, security options and best practices for hosting professionals. Focus: Postfix for advanced users.<\/p>","protected":false},"author":1,"featured_media":11097,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[792],"tags":[],"class_list":["post-11104","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-postfix-emailserver-administration-anleitungen"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":null,"rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":null,"_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":null,"_edit_lock":null,"_oembed_e7b913c6c84084ed9702cb4feb012ddd":null,"_oembed_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":null,"_oembed_03514b67990db061d7c4672de26dc514":null,"_oembed_time_03514b67990db061d7c4672de26dc514":null,"rank_math_news_sitemap_robots":null,"rank_math_robots":null,"_eael_post_view_count":"3354","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":null,"_trp_automatically_translated_slug_lv":null,"_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":null,"_trp_automatically_translated_slug_ja":null,"_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":null,"_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_time_3efb2c3e76a18143e7207993a2a6939a":null,"_oembed_59808117857ddf57e478a31d79f76e4d":null,"_oembed_time_59808117857ddf57e478a31d79f76e4d":null,"_oembed_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":null,"_oembed_81002f7ee3604f645db4ebcfd1912acf":null,"_oembed_time_81002f7ee3604f645db4ebcfd1912acf":null,"_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":null,"_oembed_time_7ea3429961cf98fa85da9747683af827":null,"_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":null,"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":null,"rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":null,"rank_math_contentai_score":null,"ilj_limitincominglinks":null,"ilj_maxincominglinks":null,"ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":null,"ilj_linksperparagraph":null,"ilj_blacklistdefinition":null,"ilj_linkdefinition":null,"_eb_reusable_block_ids":null,"rank_math_focus_keyword":"Postfix Fortgeschrittene","rank_math_og_content_image":null,"_yoast_wpseo_metadesc":null,"_yoast_wpseo_content_score":null,"_yoast_wpseo_focuskeywords":null,"_yoast_wpseo_keywordsynonyms":null,"_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"11097","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/posts\/11104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/comments?post=11104"}],"version-history":[{"count":0,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/posts\/11104\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/media\/11097"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/media?parent=11104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/categories?post=11104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/en\/wp-json\/wp\/v2\/tags?post=11104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}