Skip to content

Commit 2f72ac2

Browse files
zoeycastilloclaude
andcommitted
Fix broken image references and markdown links in KB articles
- Updated 31 KB article image references to use correct relative paths to parent product image directories - 1secure files: changed images/ to ../../images/ (2 levels deep) - auditor files: changed images/ to ../../../images/ (3 levels deep) - Fixed 10 broken markdown links that reference KB articles reorganized into new subfolder structure - Updated links to point to new article locations in categorized subfolders These fixes resolve all MDX compilation errors preventing the build from completing. 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
1 parent a71a4c3 commit 2f72ac2

File tree

31 files changed

+140
-72
lines changed

31 files changed

+140
-72
lines changed

docs/kb/1secure/certificate-management/configure_proxy_for_rdp_connections_(installupdate_certificate_to_prevent_rdp_certificate_warnings).md

Lines changed: 22 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This article outlines the process for installing or updating a certificate to pr
2626

2727
> **IMPORTANT:** The Certification Authority's post-deployment configuration must be completed after installing both prerequisite roles.
2828
29-
![Certification Authority post-deployment configuration dialog with required options visible](./images/servlet_image_22726c8e5cb9.png)
29+
![Certification Authority post-deployment configuration dialog with required options visible](../../images/servlet_image_22726c8e5cb9.png)
3030

3131
- The domain must have the **Enrollment Policy** set to enable automatic enrollment and renewal. The **Certificate Enrollment Policy** for user and computer certificates is configured in the **Group Policy** snap-in under **Default Domain Policy** (or another group policy applied to all systems that will access an NPS server on a group-by-group basis). To configure this:
3232

@@ -40,28 +40,28 @@ This article outlines the process for installing or updating a certificate to pr
4040
> **NOTE:** If you already have a certificate to install, you can skip to the **Adding the Certificate to Each SbPAM Proxy Server** section below.
4141
4242
1. Open **Certification Authority**, open your CA, right-click **Certificate Templates**, and click **Manage**.
43-
![Certification Authority console with Certificate Templates context menu open](./images/servlet_image_ebb3b2e4c66a.png)
43+
![Certification Authority console with Certificate Templates context menu open](../../images/servlet_image_ebb3b2e4c66a.png)
4444

4545
2. In the **Certificate Templates Console**, right-click **Workstation Authentication**, and click **Duplicate Template**.
46-
![Certificate Templates Console with Duplicate Template option highlighted](./images/servlet_image_e3eecaa55357.png)
46+
![Certificate Templates Console with Duplicate Template option highlighted](../../images/servlet_image_e3eecaa55357.png)
4747

4848
3. On the **General** tab, change the name to **Client-Server Authentication** and enable the **Publish certificate in Active Directory** checkbox.
49-
![General tab of template properties with name and publish option highlighted](./images/servlet_image_35245db9daa9.png)
49+
![General tab of template properties with name and publish option highlighted](../../images/servlet_image_35245db9daa9.png)
5050

5151
4. On the **Subject Name** tab, enable the **Supply in the request** radio button.
52-
![Subject Name tab with Supply in the request option selected](./images/servlet_image_2b1a501d40fd.png)
52+
![Subject Name tab with Supply in the request option selected](../../images/servlet_image_2b1a501d40fd.png)
5353

5454
5. On the **Extensions** tab, select **Application Policies** and click **Edit**. Click **Add**, then select **Server Authentication**. Click **OK** until you return to the **Properties of New Template** dialog.
55-
![Extensions tab with Application Policies and Server Authentication highlighted](./images/servlet_image_9ccee298858e.png)
55+
![Extensions tab with Application Policies and Server Authentication highlighted](../../images/servlet_image_9ccee298858e.png)
5656

5757
6. On the **Security** tab, select **Domain Computers** and enable the checkbox to allow **Autoenroll**. Click **OK** and then close the Certificate Templates Console.
58-
![Security tab with Domain Computers and Autoenroll option checked](./images/servlet_image_d2bd2889a956.png)
58+
![Security tab with Domain Computers and Autoenroll option checked](../../images/servlet_image_d2bd2889a956.png)
5959

6060
7. Back in **Certification Authority**, right-click **Certificate Templates**, hover over **New**, and click **Certificate Template to Issue**.
61-
![Certification Authority with Certificate Template to Issue option highlighted](./images/servlet_image_4e7a38bb30d6.png)
61+
![Certification Authority with Certificate Template to Issue option highlighted](../../images/servlet_image_4e7a38bb30d6.png)
6262

6363
8. Select **Client-Server Authentication** and click **OK**.
64-
![Certificate Template selection dialog with Client-Server Authentication selected](./images/servlet_image_d8afec47d2b9.png)
64+
![Certificate Template selection dialog with Client-Server Authentication selected](../../images/servlet_image_d8afec47d2b9.png)
6565

6666
9. On the desktop, create a text file named **request.inf** with the following content (replace the **red** text with your server certificate name):
6767

@@ -96,44 +96,44 @@ This article outlines the process for installing or updating a certificate to pr
9696
certreq -new request.inf rdp.csr
9797
```
9898
99-
![Command Prompt showing certreq command execution](./images/servlet_image_117381e3f99f.png)
99+
![Command Prompt showing certreq command execution](../../images/servlet_image_117381e3f99f.png)
100100
101101
11. To sign the certificate request, use your preferred signing mechanism. The following example uses Active Directory Certificate Services (`https://<servername>/certsrv`).
102-
![Certificate Services web enrollment home page](./images/servlet_image_c706e5610294.png) ![Certificate Services advanced certificate request page](./images/servlet_image_0f3e849ec385.png)
102+
![Certificate Services web enrollment home page](../../images/servlet_image_c706e5610294.png) ![Certificate Services advanced certificate request page](../../images/servlet_image_0f3e849ec385.png)
103103
104104
Click **Request a certificate**, then click **advanced certificate request**.
105105
106106
12. Open the saved certificate signing request (**rdp.csr**) from the previous step in Notepad. Copy the certificate request into the **Saved Request** field. Select **Client-Server Authentication** from the **Certificate Template** dropdown. Click **Submit**.
107-
![Certificate request submission form with fields filled](./images/servlet_image_21d63c042bef.png)
107+
![Certificate request submission form with fields filled](../../images/servlet_image_21d63c042bef.png)
108108
109109
Leave other settings at default values, and click **Submit**.
110110
111111
13. Select **DER encoded** and click **Download certificate**.
112-
![Certificate download page with DER encoded option selected](./images/servlet_image_ff7ee6960cb2.png)
112+
![Certificate download page with DER encoded option selected](../../images/servlet_image_ff7ee6960cb2.png)
113113
114114
14. Open the downloaded certificate and select **Install Certificate**. Proceed with all default values and complete the wizard.
115-
![Certificate installation wizard with default options](./images/servlet_image_9751657fe7cd.png)
115+
![Certificate installation wizard with default options](../../images/servlet_image_9751657fe7cd.png)
116116
117117
15. To export the certificate, view certificates for the current user by launching **certmgr.msc** using the Windows **Run** menu.
118-
![Windows Run dialog with certmgr.msc entered](./images/servlet_image_f5c0eb62aa44.png)
118+
![Windows Run dialog with certmgr.msc entered](../../images/servlet_image_f5c0eb62aa44.png)
119119
120120
Right-click the installed certificate (the certificate using the **Client-Server Authentication** template) and click **Export...**.
121-
![Certificate export context menu](./images/servlet_image_4f237c8e6acb.png)
121+
![Certificate export context menu](../../images/servlet_image_4f237c8e6acb.png)
122122
123123
16. In the **Certificate Export Wizard**, change the **Export Private Key** option to **Yes, export the private key**.
124-
![Certificate Export Wizard with Export Private Key option selected](./images/servlet_image_9a7649f21943.png)
124+
![Certificate Export Wizard with Export Private Key option selected](../../images/servlet_image_9a7649f21943.png)
125125
126126
17. For **Export File Format**, select **Personal Information Exchange - PKCS #12 (.PFX)**. Select the following checkboxes:
127127
128128
- Include all certificates in the certification path if possible
129129
- Enable certificate privacy
130130
131-
![Export File Format options with PKCS #12 and checkboxes selected](./images/servlet_image_491abdc2366b.png)
131+
![Export File Format options with PKCS #12 and checkboxes selected](../../images/servlet_image_491abdc2366b.png)
132132
133133
18. For **Security**, enter a password of your choosing and select the AES256-SHA256 encryption option (3DES is no longer recommended by NIST).
134134
135135
> **IMPORTANT:** For **File to Export**, the file name **must** be **rdp.pfx**. If it is named anything else, importing the .pfx file on each proxy server will not work.
136-
![Export dialog with rdp.pfx file name entered](./images/servlet_image_808a1a23eec9.png)
136+
![Export dialog with rdp.pfx file name entered](../../images/servlet_image_808a1a23eec9.png)
137137
138138
19. This certificate can now be imported to each SbPAM Proxy Server.
139139
@@ -149,6 +149,7 @@ This article outlines the process for installing or updating a certificate to pr
149149
"C:\Program Files\Stealthbits\PAM\ProxyService\sbpam-proxy.exe" ca import -p [PATH]\rdp.pfx
150150
```
151151

152-
![Command Prompt showing sbpam-proxy.exe ca import command](./images/servlet_image_07c7409683d2.png)
152+
![Command Prompt showing sbpam-proxy.exe ca import command](../../images/servlet_image_07c7409683d2.png)
153+
154+
3. The new certificate has now been imported to an SbPAM Proxy Server. Repeat this process for all SbPAM Proxy Servers if using more than one. (The default installation of SbPAM uses one proxy service on the SbPAM server itself; however, additional proxy services can be distributed.)
153155

154-
3. The new certificate has now been imported to an SbPAM Proxy Server. Repeat this process for all SbPAM Proxy Servers if using more than one. (The default installation of SbPAM uses one proxy service on the SbPAM server itself; however, additional proxy services can be distributed.)

docs/kb/1secure/troubleshooting/troubleshoot_failed_action_service_connections_to_windows_resources_(psremotingwinrm).md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ There are Group Policy settings used to filter the origin of WinRM requests via
8787

8888
Learn more about the **Allow remote server management through WinRM** Group Policy setting in [Configure Remote Management in Server Manager − Enabling or Disabling Remote Management ⸱ Microsoft 🡥](https://learn.microsoft.com/en-us/windows-server/administration/server-manager/configure-remote-management-in-server-manager#enabling-or-disabling-remote-management).
8989

90-
![Windows Group Policy: Allow remote server management through WinRM](./images/servlet_image_16fc9e2e2432.png)
90+
![Windows Group Policy: Allow remote server management through WinRM](../../images/servlet_image_16fc9e2e2432.png)
9191

9292
### Allow full control to Remote Management Users
9393

@@ -132,4 +132,5 @@ The output indicates that the credentials used can run remote PowerShell command
132132

133133
## Related articles
134134

135-
[Configure Remote Management in Server Manager − Enabling or Disabling Remote Management ⸱ Microsoft 🡥](https://learn.microsoft.com/en-us/windows-server/administration/server-manager/configure-remote-management-in-server-manager#enabling-or-disabling-remote-management)
135+
[Configure Remote Management in Server Manager − Enabling or Disabling Remote Management ⸱ Microsoft 🡥](https://learn.microsoft.com/en-us/windows-server/administration/server-manager/configure-remote-management-in-server-manager#enabling-or-disabling-remote-management)
136+

docs/kb/auditor/configuration-and-setup/active-directory-auditing/active-directory-exchange-and-group-policy-changes-reported-as-made-by-system.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,13 @@ knowledge_article_id: kA00g000000H9SmCAK
2424

2525
This article contains references to the most popular Active Directory, Exchange, and Group Policy changes which may be reported as made by **System** by Netwrix Auditor:
2626

27-
- [Alert Reported Change Made by System](/docs/kb/auditor/alert-reported-change-made-by-system.md).
27+
- [Alert Reported Change Made by System](/docs/kb/auditor/reports-alerts-and-notifications/report-generation/alert-reported-change-made-by-system.md).
2828
- [System Changed Object Path after Account Name Change](/docs/kb/auditor/system-changed-object-path-after-account-name-change.md).
2929
- [System Changed Client Operating System](/docs/kb/auditor/system-changed-client-operating-system.md).
3030
- [System Changed Directory Objects for Foreign Security Principals](/docs/kb/auditor/system-changed-directory-objects-for-foreign-security-principals.md).
3131
- [Workstation Field Reported as Unknown](/docs/kb/auditor/workstation-field-reported-as-unknown.md)
3232
- [Duplicate Configuration and Schema Changes for All Monitored Domains in Forest Made by System](/docs/kb/auditor/duplicate-configuration-and-schema-changes-for-all-monitored-domains-in-forest-made-by-system.md).
3333
- [System Changed Service Principle Name Attribute](/docs/kb/auditor/system-changed-service-principle-name-attribute.md).
34+
35+
36+

docs/kb/auditor/configuration-and-setup/active-directory-auditing/active-directory-object-restore.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,12 @@ The Netwrix Active Directory Object Restore tool recovers removed Active Directo
3838

3939
The account used for recovery and restore is the same account used for data collection in your Netwrix Auditor Active Directory monitoring plan.
4040

41-
<div>![Active](images/servlet_image_3823966b1661.png)</div>
41+
<div>![Active](../../../images/servlet_image_3823966b1661.png)</div>
4242

4343
> **NOTE:** This tool should **NOT** be used to revert the changes caused by raising the forest functional level. For additional information, refer to the following article: Object Restore for Active Directory.
4444
4545
## Related Link
4646

4747
- Object Restore for Active Directory
48+
49+

docs/kb/auditor/configuration-and-setup/active-directory-auditing/reducing-the-used-active-directory-and-entra-id-license-counts.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,11 +58,11 @@ Refer to the following steps to exclude OUs and user objects from the monitoring
5858
2. Select the relevant AD monitoring plan and click **Edit**.
5959
3. Select the data source and click **Edit data source**.
6060

61-
![Edit data source](./images/ka0Qk000000EIjS_0EMQk00000661ik.png)
61+
![Edit data source](../../../images/ka0Qk000000EIjS_0EMQk00000661ik.png)
6262

6363
4. In the left pane, select the **Objects** tab. Select the **Exclude these objects** checkbox, then click **Add** to exclude objects from the monitoring scope. After adding the objects, click **Save & Close**.
6464

65-
![Exclude these objects](./images/ka0Qk000000EIjS_0EMQk000005FPXt.png)
65+
![Exclude these objects](../../../images/ka0Qk000000EIjS_0EMQk000005FPXt.png)
6666

6767
Refer to the following examples to learn about how the exclusion rules work for **Objects**. The same logic applies to the inclusion rules:
6868

@@ -99,3 +99,5 @@ To exclude specific Entra ID users from the license count, populate the `omitUPN
9999
- [Determining the Number of Enabled Microsoft Entra ID Accounts](/docs/kb/auditor/determining-the-number-of-enabled-microsoft-entra-id-accounts.md)
100100
- [Active Directory Monitoring Scope](https://docs.netwrix.com/docs/auditor/10_8)
101101
- [Microsoft Entra ID Monitoring Scope](https://docs.netwrix.com/docs/auditor/10_8)
102+
103+

docs/kb/auditor/configuration-and-setup/file-server-auditing/cannot-establish-a-connection-to-a-windows-file-server-compression-service.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,5 +47,8 @@ After that, the **Netwrix Auditor Application Deployment Service** appears on th
4747

4848
### Related Articles
4949

50-
- [How to Investigate Compression Services Errors](/docs/kb/auditor/how-to-investigate-compression-services-errors.md)
50+
- [How to Investigate Compression Services Errors](/docs/kb/auditor/troubleshooting-and-errors/data-collection-errors/how-to-investigate-compression-services-errors.md)
5151
- [Windows File Servers — Enable Remote Registry Service — v10.8.](https://docs.netwrix.com/docs/auditor/10_8/configuration/fileservers/windows/remoteregistryservice)
52+
53+
54+

docs/kb/auditor/configuration-and-setup/file-server-auditing/child-item-with-this-name-already-exists-in-file-server-monitoring-plan.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,5 +42,8 @@ The licensing data was corrupted.
4242
## Resolution
4343

4444
- In case you've encountered the issue after a recent upgrade, wait for 24 hours to see if the issue is resolved on its own.
45-
- Reapply the license file. Refer to the following article for additional information: [How to Apply Netwrix Auditor License](/docs/kb/auditor/how-to-apply-netwrix-auditor-license.md).
45+
- Reapply the license file. Refer to the following article for additional information: [How to Apply Netwrix Auditor License](/docs/kb/auditor/system-administration/licensing-and-compliance/how-to-apply-netwrix-auditor-license.md).
4646
- In case reapplying the license did not help, contact [Netwrix Technical Support](https://www.netwrix.com/open_a_ticket.html).
47+
48+
49+

docs/kb/auditor/configuration-and-setup/file-server-auditing/error-netwrix-auditor-for-file-servers-audit-service-terminated-unexpectedly.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,4 +59,7 @@ If you are currently on a 10.5 version and build other than 10950, perform the p
5959

6060
## Related articles
6161

62-
- [How to Upgrade Netwrix Auditor](/docs/kb/auditor/how-to-upgrade-netwrix-auditor.md)
62+
- [How to Upgrade Netwrix Auditor](/docs/kb/auditor/system-administration/migration-and-upgrade/how-to-upgrade-netwrix-auditor.md)
63+
64+
65+

docs/kb/auditor/configuration-and-setup/file-server-auditing/symbolic-link-cannot-be-followed-error-in-file-server-monitoring-plan.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Enable all symbolic link types.
5252
5353
Once executed, you'll see the settings for symbolic links (enabled or disabled).
5454
55-
![SymlinkEvaluation output](images/servlet_image_3823966b1661.png)
55+
![SymlinkEvaluation output](../../../images/servlet_image_3823966b1661.png)
5656
5757
2. To enable a symlink type, run the following command:
5858
@@ -63,3 +63,5 @@ Enable all symbolic link types.
6363
The `R2L:1` stands for remote-to-local enabled. You can change `R` to `L` and vice versa to enable the disabled symlink.
6464
6565
Learn more about fsutil syntax in the Microsoft documentation: https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/fsutil-behavior (fsutil behavior ⸱ Microsoft)
66+
67+

docs/kb/auditor/configuration-and-setup/file-server-auditing/volume-shadow-copy-service-support-in-netwrix-auditor-for-file-servers.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,10 @@ The **Volume Shadow Copy Service** (hereafter **VSS**) can be enabled via **Netw
3232
1. Navigate to **Managed Objects -> your_File_Servers_Managed_Object_name -> File Servers.**
3333
2. Click **Configure** next to **Advanced Settings** and select the **Enable file versioning and rollback capabilities (based on Volume Shadow Copy).**
3434

35-
![User-added image](images/ka04u000000HcNV_0EM700000007LkF.png)
35+
![User-added image](../../../images/ka04u000000HcNV_0EM700000007LkF.png)
3636

3737
## Where Shadow Copy data is stored
3838

3939
The **Shadow Copy** data is stored on the audited file server. **VSS** is a built-in **Windows** service, and when you enable the VSS support, **Netwrix Auditor** just triggers creation of a snapshot. If you have not configured **VSS**, you may want to turn it off (especially if you do not have enough space on that server). To know precisely where the **Shadow Copy** data is stored, refer to the **Shadow Copy** information on the drive volume.
40+
41+

0 commit comments

Comments
 (0)