Skip to content

Commit 2be7380

Browse files
committed
Fix image paths and internal links for Access Analyzer KB reorganization
1 parent 42a29ad commit 2be7380

File tree

42 files changed

+124
-124
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+124
-124
lines changed

docs/kb/accessanalyzer/active-directory-auditing/active-directory-permissions-analyzer-reports-are-outdated.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ knowledge_article_id: kA04u000000HDhRCAW
2828

2929
Old data in the Active Directory Permissions Analyzer **(ADPA)** reports from deprecated Domains.
3030
Example of the incorrect data:
31-
![Chart Description automatically generated](./images/ka04u000000HdDV_0EM4u0000084aiy.png)
31+
![Chart Description automatically generated](./../0-images/ka04u000000HdDV_0EM4u0000084aiy.png)
3232

3333
## Cause
3434

@@ -42,28 +42,28 @@ To do so you can follow the steps below.
4242

4343
1. Create a new Job in the Netwrix Auditor console: right click the **Jobs Node** in the left-hand window and select **Create Job**:
4444

45-
![Graphical user interface, application Description automatically generated](./images/ka04u000000HdDV_0EM4u0000084aiz.png)
45+
![Graphical user interface, application Description automatically generated](./../0-images/ka04u000000HdDV_0EM4u0000084aiz.png)
4646

4747
Select the **Local host** in the jobs host list:
4848

49-
![Graphical user interface, application Description automatically generated](./images/ka04u000000HdDV_0EM4u0000084aj0.png)
49+
![Graphical user interface, application Description automatically generated](./../0-images/ka04u000000HdDV_0EM4u0000084aj0.png)
5050

5151
2. Click on the **Create Query**:
5252

53-
![Graphical user interface, application, Word Description automatically generated](./images/ka04u000000HdDV_0EM4u0000084aj1.png)
53+
![Graphical user interface, application, Word Description automatically generated](./../0-images/ka04u000000HdDV_0EM4u0000084aj1.png)
5454

5555
3. Configure the jobs query Properties.
5656
Under the **Data Sources** tab, select the **ADPERMISSIONS** option from the dropdown menu then click on **Configure**.
5757

58-
![Graphical user interface, application, Word Description automatically generated](./images/ka04u000000HdDV_0EM4u0000084aj2.png)
58+
![Graphical user interface, application, Word Description automatically generated](./../0-images/ka04u000000HdDV_0EM4u0000084aj2.png)
5959

6060
Select **Remove Tables** and click **Next**:
6161

62-
![Graphical user interface, text, application, email Description automatically generated](./images/ka04u000000HdDV_0EM4u0000084aj3.png)
62+
![Graphical user interface, text, application, email Description automatically generated](./../0-images/ka04u000000HdDV_0EM4u0000084aj3.png)
6363

6464
Check the Results option: Click **Next****Finish****Ok**.
6565

66-
![Graphical user interface, text, application Description automatically generated](./images/ka04u000000HdDV_0EM4u0000084aj4.png)
66+
![Graphical user interface, text, application Description automatically generated](./../0-images/ka04u000000HdDV_0EM4u0000084aj4.png)
6767

6868
4. Now run the new Job.
6969

docs/kb/accessanalyzer/active-directory-auditing/collecting-ad-summary.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,9 @@ Licensing of Netwrix Access Analyzer is based on the quantity of enabled AD user
3232
To find this data:
3333

3434
1. Ensure **.Active Directory Inventory** has recently run or run now. Navigate to **Jobs** > **.Active Directory Inventory** > **1-AD_Scan** and click **Run Now**
35-
![Group_001.png](./images/ka0Qk000000Dl4L_0EM4u000008M8wx.png)
35+
![Group_001.png](./../0-images/ka0Qk000000Dl4L_0EM4u000008M8wx.png)
3636

3737
2. Navigate to **Jobs** > **.Active Directory Inventory** > **1-AD_Scan** > **Results** > **Active Directory Summary**
3838

3939
3. Take a screenshot or otherwise capture the values displayed in **Total Users** and **Disabled Users**
40-
![Group_002.png](./images/ka0Qk000000Dl4L_0EM4u000008M8x2.png)
40+
![Group_002.png](./../0-images/ka0Qk000000Dl4L_0EM4u000008M8x2.png)

docs/kb/accessanalyzer/active-directory-auditing/deleted-ad-user-s-still-show-in-netwrix-access-analyzer-reports.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,9 +36,9 @@ A failure on the ADI scan that could be caused by a myriad of reasons.
3636
Run a full **AD Inventory Scan** by disabling differential scanning for the **1-AD_Scan** job using the steps below:
3737

3838
1. Navigate to **Access Analyzer > Jobs > .Active Directory Inventory > 1-AD_Scan > Configure > Queries > Query Properties > Configure > Options**.
39-
![Image_2024-11-19_15-36-30.png](./images/ka0Qk000000DYa9_0EMQk00000AdoIX.png)
39+
![Image_2024-11-19_15-36-30.png](./../0-images/ka0Qk000000DYa9_0EMQk00000AdoIX.png)
4040
2. Uncheck the box for **Collect only updates since the last scan**.
41-
![Image_2024-11-19_15-37-33.png](./images/ka0Qk000000DYa9_0EMQk00000AdoSD.png)
41+
![Image_2024-11-19_15-37-33.png](./../0-images/ka0Qk000000DYa9_0EMQk00000AdoSD.png)
4242
3. Click **Next** through the end of the Active Directory Inventory DC Wizard.
4343
4. Re-run the **1-AD_Scan** job.
4444
5. Select the previously-unchecked box for **Collect only updates since the last scan**.

docs/kb/accessanalyzer/database-auditing-and-configuration/how-to-drop-data-collected-from-sql-servers-using-the-databases-module.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -37,32 +37,32 @@ This article explains how to drop data collected from SQL Servers using the Data
3737
> **NOTE:** You can create a separate folder (e.g., Sandbox) for custom jobs.
3838
3939
1. Right-click the **custom** or **Jobs** folder and select **Create Job** `Ctrl+Alt+A`.
40-
![ ](./images/ka0Qk000000DG6z_0EMQk00000BvYY7.png)
40+
![ ](./../0-images/ka0Qk000000DG6z_0EMQk00000BvYY7.png)
4141
2. Navigate to the **Configure** node of the NewJob and select the **Queries** node.
42-
![ ](./images/ka0Qk000000DG6z_0EMQk00000BvhTJ.png)
42+
![ ](./../0-images/ka0Qk000000DG6z_0EMQk00000BvhTJ.png)
4343
3. Click the **Create Query** button.
44-
![ ](./images/ka0Qk000000DG6z_0EMQk00000BvhZl.png)
44+
![ ](./../0-images/ka0Qk000000DG6z_0EMQk00000BvhZl.png)
4545
4. In the General tab, designate a clear **Name** and **Description** (e.g., `DropSQLHostData`).
4646
5. In the Data Source tab, select **SQL** from the **Data Collector** dropdown menu.
47-
![ ](./images/ka0Qk000000DG6z_0EMQk00000Bvheb.png)
47+
![ ](./../0-images/ka0Qk000000DG6z_0EMQk00000Bvheb.png)
4848
6. Click **Configure** to launch the SQL Data Collector Configuration Wizard.
49-
![ ](./images/ka0Qk000000DG6z_0EMQk00000BvhgD.png)
49+
![ ](./../0-images/ka0Qk000000DG6z_0EMQk00000BvhgD.png)
5050
7. On the Wizard Category page, select the **Utilities > Remove Storage Tables** option under the appropriate database type and click **Next** to drop all collected SQL data for SQL Servers.
51-
![Category page with Utilities > Remove Storage Tables option highlighted](./images/ka0Qk000000DG6z_0EMQk00000BvdWA.png)
51+
![Category page with Utilities > Remove Storage Tables option highlighted](./../0-images/ka0Qk000000DG6z_0EMQk00000BvdWA.png)
5252
8. To complete the query, ensure you have selected the desired Available Properties, click **Next**, and then **Finish**. Last, click **OK**.
5353
9. To run the job, you can either select **Run now** from the job windowpane or right-click the job and select **Run Job**.
54-
![ ](./images/ka0Qk000000DG6z_0EMQk00000Bvjzl.png)
54+
![ ](./../0-images/ka0Qk000000DG6z_0EMQk00000Bvjzl.png)
5555

5656
### Drop Data for Specific Hosts/Instances for SQL Servers or Drop Specific Data for SQL Hosts/Instances
5757

5858
1. Follow steps 1–6 detailed above.
5959
2. On the SQL Data Collector Configuration Wizard Category page, select the **Utilities > Remove Storage Data** option and click **Next**.
60-
![Category page with Utilities > Remove Storage Data option highlighted](./images/ka0Qk000000DG6z_0EMQk00000Bvk6D.png)
60+
![Category page with Utilities > Remove Storage Data option highlighted](./../0-images/ka0Qk000000DG6z_0EMQk00000Bvk6D.png)
6161
3. On the Filters page, select the databases/instances via the **Filter Options** drop-down menu:
6262
- All database objects
6363
- Only select database objects
6464
- When using this option, select the database objects you want to delete in the **Available database objects** pane, then click **Add**.
65-
![Available database objects pane with Add highlighted](./images/ka0Qk000000DG6z_0EMQk00000Bvbfg.png)
65+
![Available database objects pane with Add highlighted](./../0-images/ka0Qk000000DG6z_0EMQk00000Bvbfg.png)
6666
4. On the Settings page, select the type of data you would like to remove for your specified hosts:
6767
- Permissions
6868
- Audits

docs/kb/accessanalyzer/entra-id-and-azure-integration/manually-setting-up-entra-id-auditing-for-netwrix-access-analyzer.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -37,17 +37,17 @@ While it is always recommended to use the `AZ_RegisterAzureAppAuth` instant job
3737
1. Open the Microsoft Entra admin center: https://entra.microsoft.com/#home.
3838

3939
2. Navigate to **Identity > Applications > App registrations** and select **+ New registration**.
40-
![Entra App Registration](./images/ka0Qk000000DYVJ_0EMQk00000B6ziP.png)
40+
![Entra App Registration](./../0-images/ka0Qk000000DYVJ_0EMQk00000B6ziP.png)
4141

4242
3. On the **Register an application** page, set the following:
4343
- **Name:** Something meaningful, e.g., `NEA_EntraID`.
4444
- **Support account types:** Accounts in this org. directory only.
4545

4646
4. From the **Application Overview** page, navigate to **Manage > API Permissions** and select **Add a permission**.
47-
![API Permissions](./images/ka0Qk000000DYVJ_0EMQk00000B6i4s.png)
47+
![API Permissions](./../0-images/ka0Qk000000DYVJ_0EMQk00000B6i4s.png)
4848

4949
5. From the **Request API permissions** page, select **Microsoft Graph**.
50-
![Request API permissions](./images/ka0Qk000000DYVJ_0EMQk00000B6qwr.png)
50+
![Request API permissions](./../0-images/ka0Qk000000DYVJ_0EMQk00000B6qwr.png)
5151

5252
- Add the following **Delegated Permissions**:
5353
- `Group.Read.All` – Read all groups
@@ -57,20 +57,20 @@ While it is always recommended to use the `AZ_RegisterAzureAppAuth` instant job
5757
- `Directory.Read.All` – Read directory data
5858

5959
6. After adding the aforementioned permissions, grant them admin consent by selecting **Grant admin consent for `\{TENANT NAME\}`**.
60-
![Grant admin consent](./images/ka0Qk000000DYVJ_0EMQk00000B6f5O.png)
60+
![Grant admin consent](./../0-images/ka0Qk000000DYVJ_0EMQk00000B6f5O.png)
6161

6262
7. Navigate to the Entra app registration and on the **Certificates & secrets** page, select **+ New client secret**.
63-
![Certificates & secrets](./images/ka0Qk000000DYVJ_0EMQk00000B6fbf.png)
63+
![Certificates & secrets](./../0-images/ka0Qk000000DYVJ_0EMQk00000B6fbf.png)
6464

6565
8. On the **Add a client secret** page, add the following:
6666
- **Description:** Something meaningful, e.g., `Access Analyzer Entra ID`.
6767
- **Expires:** Usually recommended to set this to the longest option OR per the organization’s internal certificate expiration timeframe.
6868

6969
9. After creating the client secret, copy the secret **Value** to a notepad.
70-
![Client secret value](./images/ka0Qk000000DYVJ_0EMQk00000B6d20.png)
70+
![Client secret value](./../0-images/ka0Qk000000DYVJ_0EMQk00000B6d20.png)
7171

7272
10. Next, navigate to the **Overview** tab and copy the **Application (client) ID** which is needed for the Netwrix Access Analyzer Connection Profile.
73-
![Application client ID](./images/ka0Qk000000DYVJ_0EMQk00000B6kbK.png)
73+
![Application client ID](./../0-images/ka0Qk000000DYVJ_0EMQk00000B6kbK.png)
7474

7575
## Netwrix Access Analyzer Connection Profile
7676

docs/kb/accessanalyzer/exchange-online-integration/the-autodiscover-service-couldn-t-be-located.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ To resolve this error, follow the steps below:
4343
1. Open the **Query Properties** for the EWSMailbox task.
4444
2. Select **View XML**.
4545

46-
![View XML screenshot](./images/ka0Qk000000CDO5_0EMQk000008w1gf.png)
46+
![View XML screenshot](./../0-images/ka0Qk000000CDO5_0EMQk000008w1gf.png)
4747

4848
3. Insert the following code that best matches your environment within the ` <EWS_PROPERTIES></EWS_PROPERTIES> ` tags. This is located near the bottom of the XML.
4949

@@ -83,11 +83,11 @@ To resolve this error, follow the steps below:
8383

8484
4. On the **Query Properties** window, select **Configure**.
8585

86-
![Configure button screenshot](./images/ka0Qk000000CDO5_0EMQk000008vjWt.png)
86+
![Configure button screenshot](./../0-images/ka0Qk000000CDO5_0EMQk000008vjWt.png)
8787

8888
5. On the **Scan options** window, uncheck the option for **Match job host against autodiscovered host**.
8989

90-
![Scan options screenshot](./images/ka0Qk000000CDO5_0EMQk000008w3KH.png)
90+
![Scan options screenshot](./../0-images/ka0Qk000000CDO5_0EMQk000008w3KH.png)
9191

9292
6. Proceed through the wizard by selecting **Next** and complete the process by clicking **Finish** to close out the **EWSMailbox DC Wizard**.
9393
7. Select **OK** to close the **Query Properties** window.

docs/kb/accessanalyzer/file-system-and-sensitive-data-discovery/display-new-names-of-renamed-files-in-access-information-center.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,4 +32,4 @@ How to establish the new name a file was renamed to in Netwrix Access Analyzer?
3232
2. Right-click the header bar and select **Target Path**.
3333
3. The **Target Path** will show the new name of the renamed file.
3434

35-
![Activity Details showing Target Path](./images/ka04u000000wwHf_0EM4u000008pesA.png)
35+
![Activity Details showing Target Path](./../0-images/ka04u000000wwHf_0EM4u000008pesA.png)

docs/kb/accessanalyzer/file-system-and-sensitive-data-discovery/how-to-optimize-seek-system-scans-with-system-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ To comfortably scan 4 file systems using a dedicated proxy server, the optimized
5757
2. Verify the number of SDD scan processes:
5858
- On the **Sensitive Data Settings** page of the FSAA Data Collector query settings, set the **Number of SDD Scan Processes** to reflect the available CPU threads on the scanning server. This number should not exceed `1-2x` the number of available CPU threads. By default, this is set to `2`.
5959

60-
![Sensitive Data Settings page example](./images/ka0Qk000000D59x_0EMQk00000BK3Rd.png)
60+
![Sensitive Data Settings page example](./../0-images/ka0Qk000000D59x_0EMQk00000BK3Rd.png)
6161

6262
> **NOTE:** If the scan server has other responsibilities (e.g., NEA Console server, busy file server, SQL server), take those into account when configuring how many CPU threads should be allocated for SDD scan processes.
6363

docs/kb/accessanalyzer/file-system-and-sensitive-data-discovery/how-to-view-stored-sensitive-data-discovery-sdd-matches.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ You can view stored SDD matches using one of the following methods.
4242
1. Select the server.
4343
2. In the right **Reports** pane, select **Sensitive Content Details**.
4444

45-
![rtaImage.png](./images/ka0Qk0000009j17_00N0g000004CA0p_0EMQk000002m1YX.png)
45+
![rtaImage.png](./../0-images/ka0Qk0000009j17_00N0g000004CA0p_0EMQk000002m1YX.png)
4646

4747
For additional information, refer to: Resource Audit Overview − Sensitive Content Reports · v11.6
4848
https://docs.netwrix.com/docs/accessanalyzer/12_0)
@@ -56,7 +56,7 @@ https://docs.netwrix.com/docs/accessanalyzer/12_0)
5656

5757
> **IMPORTANT:** Check the **Reviewers are able to see the sensitive data match if available** checkbox for the review to contain sensitive data matches.
5858
59-
![rtaImage1.png](./images/ka0Qk0000009j17_00N0g000004CA0p_0EMQk000002m1a9.png)
59+
![rtaImage1.png](./../0-images/ka0Qk0000009j17_00N0g000004CA0p_0EMQk000002m1a9.png)
6060

6161
### Netwrix Access Analyzer − Custom report
6262

docs/kb/accessanalyzer/installation-and-upgrades/access-analyzer-upgrade-workflow-aic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ knowledge_article_id: ka0Qk000000GIqbIAG
2020
# Upgrading Access Information Center (AIC)
2121

2222
> **NOTE:**
23-
> - Return to the main workflow page: [Access Analyzer Upgrade Workflow Articles](/docs/kb/accessanalyzer/access-analyzer-upgrade-workflow.md).
24-
> - Return to the previous section: [Completing Access Analyzer Upgrade](/docs/kb/accessanalyzer/access-analyzer-upgrade-workflow-post-upgrade.md).
23+
> - Return to the main workflow page: [Access Analyzer Upgrade Workflow Articles](/docs/kb/accessanalyzer/installation-and-upgrades/access-analyzer-upgrade-workflow.md).
24+
> - Return to the previous section: [Completing Access Analyzer Upgrade](/docs/kb/accessanalyzer/installation-and-upgrades/access-analyzer-upgrade-workflow-post-upgrade.md).
2525
2626
## Overview
2727

0 commit comments

Comments
 (0)