GET /api/content/ee08ff0d-3377-4d7f-8d19-1230a0d7e865/
HTTP 200 OK
Allow: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 4245,
    "content_customizations": null,
    "shortcut_customizations": [
        {
            "id": 3541,
            "created_at": "2022-11-14T13:20:45.689648Z",
            "updated_at": "2022-11-14T13:20:45.694753Z",
            "action": "DOWNLOAD",
            "color": "#FFFFFF",
            "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/c7ba4e563b7b4d3ea5912feaf20a1a44/download_icon.svg",
            "additional_data": {
                "download_url": "https://media.celero.io/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/original_file.pdf"
            },
            "content": 4245
        }
    ],
    "content_thumbnail": {
        "original": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails/1.jpg",
        "high_quality": {
            "small": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/1.jpg",
            "medium": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/1_medium.jpg",
            "large": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/1_large.jpg",
            "microsite_preview": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/thumbnails_high_quality/preview.jpg"
        }
    },
    "edited_pages_metadata_count": {
        "all_pages_count": 9,
        "edited_pages_count": 0
    },
    "version": {
        "id": 4243,
        "version_number": 1,
        "version_details": {
            "uuid": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865",
            "created_at": "2022-11-14T13:20:46.385957Z",
            "updated_at": "2025-03-23T10:59:19.793162Z",
            "name": "Cognyte_TL_How_Security_Analytics_EB_SP",
            "is_live": true,
            "access_control": {
                "min_stage": "EVERYONE_ALLOWED",
                "stage_options": {
                    "UNVERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE",
                        "form_id": "default"
                    },
                    "VERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE"
                    },
                    "GDPR_CONSENT": {},
                    "PRIVATE": {},
                    "EVERYONE_ALLOWED": {}
                }
            },
            "tags": []
        },
        "created_at": "2022-11-14T13:20:46.398569Z",
        "updated_at": "2022-11-14T13:20:46.398611Z",
        "content_version_name": "How-Security-Analytics-Transforms-the-Crime-Terror-Landscape_SP",
        "is_active": true,
        "type": "DESKTOP",
        "content": 4245,
        "version": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865",
        "content_uuid": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865",
        "version_id": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865"
    },
    "custom_events": [],
    "content_action": null,
    "content_stats": {
        "version": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865",
        "visitors_count": 1,
        "lifetime_visitors_count": 8,
        "last_seen": "2025-05-12T10:31:14Z",
        "last_updated": "2025-05-15T12:22:05Z",
        "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"
    },
    "content_meta_tags": {
        "url_title": "cognyte-tl-how-security-analytics-eb-sp",
        "title": "How Security Analytics Transforms the Ba",
        "description": "LAS ANALÍTICAS LAS ANALÍTICAS DE SEGURIDAD DE SEGURIDAD ESTÁN TRANSFORMANDO LA LUCHA CONTRA EL CRIMEN Y EL TERRORISMO CONTRA EL CRIMEN Y EL TERRORISMO ¿CÓMO ? ",
        "og_enabled": true,
        "seo_enabled": true,
        "version": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865"
    },
    "keywords": [],
    "seo_content_version_name": "cognyte-tl-how-security-analytics-eb-sp",
    "html_snippets": null,
    "is_live": true,
    "shorten": "https://engage.cognyte.com/s/b05bd0b1/cognyte-tl-how-security-analytics-eb-sp/",
    "base_url": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0",
    "fonts": [
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/Oswald-Bold_a9.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/Oswald-Bold_ah.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/Oswald-ExtraLight_ad.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/Oswald-Light_aj.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/Oswald-Regular_ak.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/Oswald-SemiBold_af.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Bold_ac.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Bold_ae.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Light_aa.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Light_aa_1.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Light_aa_2.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Light_ai.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Medium_a8.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Medium_ab.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Regular_ag.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-Regular_al.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-SemiBold_a7.woff",
        "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0/fonts/WorkSans-SemiBold_a7_1.woff"
    ],
    "source_url": "/users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0",
    "content_type": [],
    "created_at": "2022-11-14T13:20:45.412072Z",
    "updated_at": "2025-05-16T00:03:29.174550Z",
    "original_name": "How-Security-Analytics-Transforms-the-Crime-Terror-Landscape_SP.pdf",
    "original_content_type": "application/pdf",
    "original_file_extension": "pdf",
    "original_file_size": 958285.0,
    "content_key": "users/557/content/ee0f01d506f7496bbe20ac8df77f9147/_WfSd2m0",
    "annotations": {
        "pages": [
            {
                "page": 3,
                "annotations": [
                    {
                        "type": "Link",
                        "bounds": [
                            261,
                            353,
                            358,
                            15
                        ],
                        "objref": "139",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cognyte.com/get-resource/analytics-platform/51e2038e383ecfc953bf1ab5a0747c63/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            74,
                            370,
                            193,
                            17
                        ],
                        "objref": "140",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cognyte.com/get-resource/analytics-platform/51e2038e383ecfc953bf1ab5a0747c63/"
                        }
                    }
                ]
            },
            {
                "page": 9,
                "annotations": [
                    {
                        "type": "Link",
                        "bounds": [
                            75,
                            1054,
                            116,
                            35
                        ],
                        "objref": "367",
                        "action": {
                            "type": "URI",
                            "uri": "https://analytics.cognyte.com/security-analytics-video-sp"
                        }
                    }
                ]
            }
        ]
    },
    "config": {
        "pagecount": 9,
        "title": "Untitled",
        "author": "",
        "subject": "",
        "keywords": "",
        "creator": "Adobe InDesign 16.3 (Windows)",
        "producer": "GPL Ghostscript 9.50",
        "creationdate": "D:20220119074709Z00'00'",
        "moddate": "D:20220119074709Z00'00'",
        "trapped": "",
        "fileName": "_WfSd2m0.pdf",
        "bounds": [
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ]
        ],
        "bookmarks": [],
        "thumbnailType": "jpg",
        "pageType": "html",
        "pageLabels": []
    },
    "uuid": "ee08ff0d-3377-4d7f-8d19-1230a0d7e865",
    "is_public": true,
    "description": "LAS ANALÍTICAS LAS ANALÍTICAS DE SEGURIDAD DE SEGURIDAD ESTÁN TRANSFORMANDO LA LUCHA CONTRA EL CRIMEN Y EL TERRORISMO CONTRA EL CRIMEN Y EL TERRORISMO ¿CÓMO ? ",
    "views_count": 131,
    "is_high_quality_thumbnails_available": true,
    "is_archived": false,
    "conversion_type": "DOCUMENT",
    "user": 557
}
Shortcut customizations

Lists are not currently supported in HTML input.

Shortcut customizations

Lists are not currently supported in HTML input.