Skip to content

Commit 3575a97

Browse files
committed
Everything done. Broken links, images, sidebar.
1 parent dbed34f commit 3575a97

File tree

19 files changed

+73
-84
lines changed

19 files changed

+73
-84
lines changed

docs/threatmanager/3.0/administration/configuration/policies/honeytoken.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Policies.
3333
**Step 2 –** On the Policies page, expand the Honeytokens list and select the related Honeytoken
3434
policy from the Policies list. Or, select the policy from the Policies table in the Overview box.
3535

36-
![honeytoken](/img/product_docs/threatprevention/7.5/admin/configuration/honeytoken.webp)
36+
![honeytoken](/img/product_docs/threatmanager/3.0/administration/configuration/policies/Honeytoken.webp)
3737

3838
**Step 3 –** On the Configuration tab of the policy, fill in the requested information and click
3939
**Copy LDAP Filter**. The Copy LDAP Filter button will automatically copy the exact string that is

docs/threatmanager/3.0/administration/configuration/threatdetection/threatdetection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,10 @@ disabled.
2525

2626
The Threats list divides the threats into sections:
2727

28-
- [Active Directory Threats](/docs/threatmanager/3.0/documentation/threats/activedirectory.md)
29-
- [Entra ID Threats](/docs/threatmanager/3.0/documentation/threats/entraid.md)
30-
- [File System Threats](/docs/threatmanager/3.0/documentation/threats/filesystem.md)
31-
- [General Threats](/docs/threatmanager/3.0/documentation/threats/general.md)
28+
- [Active Directory Threats](/docs/threatmanager/3.0/threats/activedirectory.md)
29+
- [Entra ID Threats](/docs/threatmanager/3.0/threats/entraid.md)
30+
- [File System Threats](/docs/threatmanager/3.0/threats/filesystem.md)
31+
- [General Threats](/docs/threatmanager/3.0/threats/general.md)
3232
- Threat Detection Page
3333

3434
Select a threat from the list to display the threat's configuration options to the right of the

docs/threatmanager/3.0/administration/investigations/options/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Every investigation has the following options at the top of the page:
1818
[Edit or Duplicate an Investigation](/docs/threatmanager/3.0/administration/investigations/options/edit.md) topic for additional information.
1919
- Create threat – In addition to preconfigured threats, a user can create a custom threat when
2020
certain events are considered to be dangerous in the environment, for example, when one of the
21-
privileged users makes file changes. See the [Custom Threats](/docs/threatmanager/3.0/documentation/threats/custom.md)topic for
21+
privileged users makes file changes. See the [Custom Threats](/docs/threatmanager/3.0/threats/custom.md)topic for
2222
additional information.
2323
- Subscriptions – Click the Subscriptions link to open the Subscription to window. You can specify
2424
recipients to receive this report as an email attachment in a specified format. See the

docs/threatmanager/3.0/administration/threats/threats.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -56,10 +56,10 @@ The Type section displays the threat types which can be selected for filtering.
5656
to filter by is dynamic, depending upon the type of threats detected. See the following topics for
5757
additional information:
5858

59-
- [Active Directory Threats](/docs/threatmanager/3.0/documentation/threats/activedirectory.md)
60-
- [Entra ID Threats](/docs/threatmanager/3.0/documentation/threats/entraid.md)
61-
- [File System Threats](/docs/threatmanager/3.0/documentation/threats/filesystem.md)
62-
- [General Threats](/docs/threatmanager/3.0/documentation/threats/general.md)
59+
- [Active Directory Threats](/docs/threatmanager/3.0/threats/activedirectory.md)
60+
- [Entra ID Threats](/docs/threatmanager/3.0/threats/entraid.md)
61+
- [File System Threats](/docs/threatmanager/3.0/threats/filesystem.md)
62+
- [General Threats](/docs/threatmanager/3.0/threats/general.md)
6363

6464
### Level
6565

docs/threatmanager/3.0/documentation/_category_.json

Lines changed: 0 additions & 10 deletions
This file was deleted.

docs/threatmanager/3.0/documentation/overview.md

Lines changed: 0 additions & 52 deletions
This file was deleted.

docs/threatmanager/3.0/documentation/gettingstarted.md renamed to docs/threatmanager/3.0/gettingstarted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Getting Started with Threat Manager"
33
description: "Getting Started with Threat Manager"
4-
sidebar_position: 10
4+
sidebar_position: 2
55
---
66

77
# Getting Started with Threat Manager

docs/threatmanager/3.0/index.md

Lines changed: 52 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,52 @@
1-
# Threat Manager
1+
---
2+
title: "Netwrix Threat Manager v3.0 Documentation"
3+
description: "Netwrix Threat Manager v3.0"
4+
sidebar_position: 1
5+
---
6+
7+
# Netwrix Threat Manager v3.0 Documentation
8+
9+
Threat Manager detects and responds to abnormal behavior and advanced attacks against Active
10+
Directory and File Systems with unprecedented accuracy and speed. Threat Manager provides
11+
programmatic and automated response options when threats are identified. In addition to an extensive
12+
catalog of preconfigured response actions, Threat Manager can be configured to integrate with you
13+
own business processes using integrated PowerShell or webhook facilities.
14+
15+
Threat Manager can also deliver threat data to administrators in their preferred applications,
16+
including Microsoft Teams, Slack, ServiceNow, and a wide variety of SIEM platforms.
17+
18+
## Architecture
19+
20+
The following diagram is a visual representation of Threat Manager architecture. It maps out the
21+
physical implementation of Threat Manager components.
22+
23+
![Netwrix Threat Manager Architecture diagram](/img/product_docs/threatmanager/3.0/tmarch.webp)
24+
25+
## Administration
26+
27+
Organizations of virtually any size find it to be impossible, even counterproductive, to evaluate
28+
the substantial amount of file access events and Active Directory events occurring within their
29+
environments on any given day. To overcome this challenge and achieve proper visibility into this
30+
otherwise significant blind spot in an organization's cyber security program, Threat Manager®
31+
provides built-in threat analytics to highlight the most unusual behaviors that occur within an
32+
organization each day. Threat Manager also provides a method to deep dive into activity data using a
33+
series of customizable filters to discover threats unique to their organization.
34+
35+
## Supported Platforms
36+
37+
Supported platforms include the Active Directory and File system platforms supported for monitoring
38+
by either Netwrix Threat Prevention or Netwrix Activity Monitor. See the following product
39+
documentation for additional information:
40+
41+
- [Netwrix Threat Prevention Documentation](https://helpcenter.netwrix.com/category/threatprevention)
42+
- [Netwrix Activity Monitor Documentation](https://helpcenter.netwrix.com/category/activitymonitor)
43+
44+
## Threat Manager Threats
45+
46+
Threat Manager monitors the following threats. See each section for information on monitored threat
47+
types.
48+
49+
- [Active Directory Threats](/docs/threatmanager/3.0/threats/activedirectory.md)
50+
- [Entra ID Threats](/docs/threatmanager/3.0/threats/entraid.md)
51+
- [File System Threats](/docs/threatmanager/3.0/threats/filesystem.md)
52+
- [General Threats](/docs/threatmanager/3.0/threats/general.md)

docs/threatmanager/3.0/install/firstlaunch/firstlaunch.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ password will be required to sign in.
3838
The built-in ADMIN account password is now set.
3939

4040
If the Enable MFA option is set to OFF, no additional configuration is required and the Threat
41-
Manager Console opens. See the [Getting Started with Threat Manager](/docs/threatmanager/3.0/documentation/gettingstarted.md) topic for
41+
Manager Console opens. See the [Getting Started with Threat Manager](/docs/threatmanager/3.0/gettingstarted.md) topic for
4242
next steps.
4343

4444
If the Enable MFA option is set to ON, registration of an MFA authenticator is required. Proceed to
@@ -64,4 +64,4 @@ of codes to access for account recovery, if needed.
6464
**Step 4 –** Click **Continue**.
6565

6666
Once MFA is configured for this account, the Threat Manager Console opens. See the
67-
[Getting Started with Threat Manager](/docs/threatmanager/3.0/documentation/gettingstarted.md) topic for next steps.
67+
[Getting Started with Threat Manager](/docs/threatmanager/3.0/gettingstarted.md) topic for next steps.

docs/threatmanager/3.0/install/upgrade/upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ sidebar_position: 70
88

99
This topic describes the steps needed for upgrading Threat Manager to the latest version.
1010

11-
See the [What's New](/docs/threatmanager/3.0/documentation/whatsnew.md) topic for details on new and improved features included with
11+
See the [What's New](/docs/threatmanager/3.0/whatsnew.md) topic for details on new and improved features included with
1212
each release.
1313

1414
## Considerations

0 commit comments

Comments
 (0)