Skip to content

Commit 42745c4

Browse files
committed
replaced all \_ with _
1 parent f57326f commit 42745c4

File tree

2,520 files changed

+13415
-14398
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,520 files changed

+13415
-14398
lines changed

.cursor/rules/mdx-stuff.mdc

Lines changed: 0 additions & 12 deletions
This file was deleted.

.deployment

Lines changed: 0 additions & 2 deletions
This file was deleted.

docs/accessanalyzer/config/activedirectory/access.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -84,18 +84,18 @@ For Registry Data Collector
8484

8585
A least privilege model can be configured based on your auditing needs and the data collection jobs you will be using. The following jobs and their corresponding data collectors can be run with a least privilege permissions model.
8686

87-
1-AD\_Scan Job Permissions
87+
1-AD_Scan Job Permissions
8888

89-
The ADInventory Data Collector in the .Active Directory Inventory > 1-AD\_Scan Job has the following minimum requirements, which must be configured at the Domain level in Active Directory:
89+
The ADInventory Data Collector in the .Active Directory Inventory > 1-AD_Scan Job has the following minimum requirements, which must be configured at the Domain level in Active Directory:
9090

9191
- Read access to directory tree
9292
- List Contents & Read Property on the Deleted Objects Container
9393

9494
__NOTE:__ See the Microsoft [Searching for Deleted Objects](https://technet.microsoft.com/en-us/library/cc978013.aspx) article and the Microsoft [Dsacls](https://technet.microsoft.com/en-us/library/cc771151(v=ws.11).aspx) article for additional information.
9595

96-
AD\_WeakPasswords Job Permissions
96+
AD_WeakPasswords Job Permissions
9797

98-
The PasswordSecurity Data Collector in the 2.Users > AD\_WeakPasswords Job has the following minimum requirements:
98+
The PasswordSecurity Data Collector in the 2.Users > AD_WeakPasswords Job has the following minimum requirements:
9999

100100
- At the domain level:
101101

@@ -105,27 +105,27 @@ The PasswordSecurity Data Collector in the 2.Users > AD\_WeakPasswords Job has t
105105
- Replicating Directory Changes in a Filtered Set
106106
- Replication Synchronization
107107

108-
AD\_CPassword Job Permissions
108+
AD_CPassword Job Permissions
109109

110-
While the PowerShell Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 4.Group Policy > AD\_CPasswords job. The minimum requirements for running this job are:
110+
While the PowerShell Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 4.Group Policy > AD_CPasswords job. The minimum requirements for running this job are:
111111

112112
- Read access to SYSVOL on the targeted Domain Controller(s) and all of its children
113113

114-
AD\_GroupPolicy Job Permissions
114+
AD_GroupPolicy Job Permissions
115115

116-
While the GroupPolicy Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 4.Group Policy > AD\_GroupPolicy Job. The minimum requirements for running this job are:
116+
While the GroupPolicy Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 4.Group Policy > AD_GroupPolicy Job. The minimum requirements for running this job are:
117117

118118
- Requires Read permissions on Group Policy Objects
119119

120-
AD\_PasswordPolicies Job Permissions
120+
AD_PasswordPolicies Job Permissions
121121

122-
While the LDAP Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 4.Group Policy > AD\_PasswordPolicies Job. The minimum requirements for running this job are:
122+
While the LDAP Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 4.Group Policy > AD_PasswordPolicies Job. The minimum requirements for running this job are:
123123

124124
- Requires Read permissions on the Password Settings Container
125125

126-
AD\_DomainControllers Job Permissions
126+
AD_DomainControllers Job Permissions
127127

128-
While the LDAP Data Collector and Active Directory Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > 0.Collection > AD\_DomainControllers Job. The minimum requirements for running this job are:
128+
While the LDAP Data Collector and Active Directory Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > 0.Collection > AD_DomainControllers Job. The minimum requirements for running this job are:
129129

130130
- Read access to CN=Servers,%SITEDN% and its children
131131
- Read access to: %PARTITIONDNS% and its children
@@ -134,22 +134,22 @@ While the LDAP Data Collector and Active Directory Data Collector typically requ
134134

135135
See the [Variable Definitions](#variable-definitions) for variable definitions.
136136

137-
AD\_DSRM Job Permissions
137+
AD_DSRM Job Permissions
138138

139-
While the Registry Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > 0.Collection > AD\_DSRM Job. The minimum requirements for running this job are:
139+
While the Registry Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > 0.Collection > AD_DSRM Job. The minimum requirements for running this job are:
140140

141141
- Requires read access to the following Registry key and its children:
142-
HKEY\_LOCAL\_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
142+
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
143143

144-
AD\_TimeSync Job Permissions
144+
AD_TimeSync Job Permissions
145145

146-
While the Registry Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > 0.Collection > AD\_TimeSync Job. The minimum requirements for running this job are:
146+
While the Registry Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > 0.Collection > AD_TimeSync Job. The minimum requirements for running this job are:
147147

148-
- Requires Read access to the following Registry keys and its children: HKEY\_LOCAL\_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time
148+
- Requires Read access to the following Registry keys and its children: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time
149149

150-
AD\_DomainInfo Job Permissions
150+
AD_DomainInfo Job Permissions
151151

152-
While the LDAP Data Collector and Active Directory Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > AD\_DomainInfo Job. The minimum requirements for running this job, which must be configured at the Domain level in Active Directory, are:
152+
While the LDAP Data Collector and Active Directory Data Collector typically requires Domain Administrator permissions when targeting a domain controller, that level of access is not required to run the 5.Domains > AD_DomainInfo Job. The minimum requirements for running this job, which must be configured at the Domain level in Active Directory, are:
153153

154154
- Read access to: %DOMAINDN% and its children
155155
- Read access to: CN=System,%DOMAINDN% and its children
@@ -158,9 +158,9 @@ While the LDAP Data Collector and Active Directory Data Collector typically requ
158158

159159
See the [Variable Definitions](#variable-definitions) for variable definitions.
160160

161-
AD\_ActivityCollection Job Permission
161+
AD_ActivityCollection Job Permission
162162

163-
The ADActivity Data Collector in the 6.Activity > 0.Collection > AD\_ActivityCollection Job has the following minimum requirements:
163+
The ADActivity Data Collector in the 6.Activity > 0.Collection > AD_ActivityCollection Job has the following minimum requirements:
164164

165165
- Netwrix Activity Monitor API Access activity data
166166
- Netwrix Activity Monitor API Read

docs/accessanalyzer/config/activedirectory/activity.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ __Step 3 –__ Configure the following:
9090

9191
- Configure the desired number of days for the __Period to keep Log files__. This is the number of days the log files are kept on the API server configured in the sections above. This needs to be set to a greater value than the days between Access Analyzer scans.
9292

93-
- For example, if Access Analyzer runs the __AD\_ActivityCollection__ Job once a week (every 7 days), then the Activity Monitor output should be configured to retain at least 10 days of log files.
93+
- For example, if Access Analyzer runs the __AD_ActivityCollection__ Job once a week (every 7 days), then the Activity Monitor output should be configured to retain at least 10 days of log files.
9494
- Check the __This log file is for StealthAUDIT__ box.
9595
- Optionally select the __Enable periodic AD Status Check event reporting__ checkbox. When enabled, the agent will send out status messages every five minutes to verify whether the connection is still active.
9696

@@ -126,13 +126,13 @@ __Step 8 –__ Click __Save__ and then __OK__ to confirm the changes to the job
126126

127127
The Connection Profile will now be used for AD Activity collection.
128128

129-
## Configure the AD\_ActivityCollection Job
129+
## Configure the AD_ActivityCollection Job
130130

131-
The Access Analyzer requires additional configurations in order to collect domain activity data. Follow the steps to configure the __AD\_ActivityCollection__ Job.
131+
The Access Analyzer requires additional configurations in order to collect domain activity data. Follow the steps to configure the __AD_ActivityCollection__ Job.
132132

133133
__NOTE:__ Ensure that the __.Active Directory Inventory__ Job Group has been successfully run against the target domain.
134134

135-
__Step 1 –__ Navigate to the __Jobs____Active Directory__ > __6.Activity__ > __0.Collection__ > __AD\_ActivityCollection__ Job. Select the __Configure__ > __Queries__ node.
135+
__Step 1 –__ Navigate to the __Jobs____Active Directory__ > __6.Activity__ > __0.Collection__ > __AD_ActivityCollection__ Job. Select the __Configure__ > __Queries__ node.
136136

137137
__Step 2 –__ Click __Query Properties__. The Query Properties window displays.
138138

@@ -159,7 +159,7 @@ __Step 9 –__ On the Scope page, set the Timespan as desired. There are two opt
159159
- Relative Timespan – Set the number of days of activity logs to collect when the scan is run
160160
- Absolute Timespan – Set the date range for activity logs to collect when the scan is run
161161

162-
___RECOMMENDED:___ The threshold should be set to ensure the logs are collected before the Activity Monitor domain output log retention expires. For example, if Access Analyzer runs the __AD\_ActivityCollection__ Job once a week (every 7 days), then the Activity Monitor output should be configured to retain at least 10 days of log files.
162+
___RECOMMENDED:___ The threshold should be set to ensure the logs are collected before the Activity Monitor domain output log retention expires. For example, if Access Analyzer runs the __AD_ActivityCollection__ Job once a week (every 7 days), then the Activity Monitor output should be configured to retain at least 10 days of log files.
163163

164164
__Step 10 –__ Set the Retention period as desired. This is the number of days Access Analyzer keeps the collected data in the SQL Server database.
165165

@@ -179,9 +179,9 @@ The query is now configured to target the Activity Monitor API Server to collect
179179

180180
### (Optional) Configure Import of AD Activity into Netwrix Access Information Center
181181

182-
AD Activity data can be imported into Netwrix Access Information Center by the __AD\_ActivityCollection__ Job. However, this is disabled by default. Follow the steps to enable the importing of AD activity data into the Access Information Center.
182+
AD Activity data can be imported into Netwrix Access Information Center by the __AD_ActivityCollection__ Job. However, this is disabled by default. Follow the steps to enable the importing of AD activity data into the Access Information Center.
183183

184-
__Step 1 –__ Navigate to the __Jobs____Active Directory__ > __6.Activity__ > __0.Collection__ > __AD\_ActivityCollection__ Job.
184+
__Step 1 –__ Navigate to the __Jobs____Active Directory__ > __6.Activity__ > __0.Collection__ > __AD_ActivityCollection__ Job.
185185

186186
__Step 2 –__ On the job's Overview page, enable the import of AD Events.
187187

@@ -195,4 +195,4 @@ __Step 3 –__ On the job's Overview page, enable the import of authentication E
195195

196196
__Step 4 –__ Optionally, modify the __List of attributes to track for Object Modified changes__ and __Number of days to retain activity data in the AIC__ parameters.
197197

198-
The __AD\_ActivityCollection__ Job is now configured to import both AD events and authentication events into the Netwrix Access Information Center.
198+
The __AD_ActivityCollection__ Job is now configured to import both AD events and authentication events into the Netwrix Access Information Center.

docs/accessanalyzer/config/activedirectory/filearchive.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ __Step 3 –__ Configure the following:
4343

4444
- Configure the desired number of days for the __Period to keep Log files__. This is the number of days the log files are kept on the API server configured in the sections above. This needs to be set to a greater value than the days between Access Analyzer scans.
4545

46-
- For example, if Access Analyzer runs the __AD\_ActivityCollection__ Job once a week (every 7 days), then the Activity Monitor output should be configured to retain at least 10 days of log files.
46+
- For example, if Access Analyzer runs the __AD_ActivityCollection__ Job once a week (every 7 days), then the Activity Monitor output should be configured to retain at least 10 days of log files.
4747
- Check the __This log file is for StealthAUDIT__ box.
4848
- Optionally select the __Enable periodic AD Status Check event reporting__ checkbox. When enabled, the agent will send out status messages every five minutes to verify whether the connection is still active.
4949

@@ -81,13 +81,13 @@ __Step 8 –__ Click __Save__ and then __OK__ to confirm the changes to the job
8181

8282
The Connection Profile will now be used for AD Activity collection.
8383

84-
## Configure the AD\_ActivityCollection Job
84+
## Configure the AD_ActivityCollection Job
8585

86-
Access Analyzer requires additional configurations in order to collect domain activity data. Follow the steps to configure the __AD\_ActivityCollection__ Job.
86+
Access Analyzer requires additional configurations in order to collect domain activity data. Follow the steps to configure the __AD_ActivityCollection__ Job.
8787

8888
__NOTE:__ Ensure that the .Active Directory Inventory Job Group has been successfully run against the target domain.
8989

90-
__Step 1 –__ Navigate to the __Jobs____Active Directory__ > __6.Activity__ > __0.Collection__ > __AD\_ActivityCollection__ Job. Select the __Configure__ > __Queries__ node.
90+
__Step 1 –__ Navigate to the __Jobs____Active Directory__ > __6.Activity__ > __0.Collection__ > __AD_ActivityCollection__ Job. Select the __Configure__ > __Queries__ node.
9191

9292
__Step 2 –__ Click __Query Properties__. The Query Properties window displays.
9393

@@ -108,7 +108,7 @@ __Step 6 –__ On the Scope page, set the Timespan as desired. There are two opt
108108
- Relative Timespan – Set the number of days of activity logs to collect when the scan is run
109109
- Absolute Timespan – Set the date range for activity logs to collect when the scan is run
110110

111-
___RECOMMENDED:___ The threshold should be set to ensure the logs are collected before the Activity Monitor domain output log retention expires. For example, if Access Analyzer runs the __AD\_ActivityCollection__ Job once a week (every 7 days), then the Activity Monitor output should be configured to retain at least 10 days of log files.
111+
___RECOMMENDED:___ The threshold should be set to ensure the logs are collected before the Activity Monitor domain output log retention expires. For example, if Access Analyzer runs the __AD_ActivityCollection__ Job once a week (every 7 days), then the Activity Monitor output should be configured to retain at least 10 days of log files.
112112

113113
__Step 7 –__ Set the Retention period as desired. This is the number of days Access Analyzer keeps the collected data in the SQL Server database.
114114

docs/accessanalyzer/config/dellcelerravnx/installcee.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ __Step 1 –__ Open the Registry Editor (run regedit).
3131

3232
__Step 2 –__ Navigate to following location:
3333

34-
HKEY\_LOCAL\_MACHINE\SOFTWARE\EMC\CEE\CEPP\AUDIT\Configuration
34+
HKEY_LOCAL_MACHINE\SOFTWARE\EMC\CEE\CEPP\AUDIT\Configuration
3535

3636
__Step 3 –__ Right-click on __Enabled__ and select Modify. The Edit DWORD Value window opens.
3737

@@ -71,7 +71,7 @@ $ vi cepp.conf
7171

7272
> If a ```cepp.conf``` file already exists, it can be retrieved from the Data Movers for modification with the following command:
7373
74-
$ server\_file [DATA\_MOVER\_NAME] -get cepp.conf cepp.conf
74+
$ server_file [DATA_MOVER_NAME] -get cepp.conf cepp.conf
7575

7676
__Step 3 –__ Configure the ```cepp.conf``` file. For information on the ```cepp.conf``` file, see the Dell [Using the Common Event Enabler for Windows Platforms](https://www.dellemc.com/en-us/collaterals/unauth/technical-guides-support-information/products/storage-3/docu48055.pdf) guide instructions on how to add parameters or edit the values or existing parameters.
7777

@@ -95,19 +95,19 @@ The Activity Monitor requires the following parameters to be set in the ```cepp.
9595

9696
msrpcuser=[DOMAIN\DOMAINUSER]
9797

98-
pool name=[POOL\_NAME] \
98+
pool name=[POOL_NAME] \
9999

100-
servers=[IP\_ADDRESS1]|[IP\_ADDRESS2]|... \
100+
servers=[IP_ADDRESS1]|[IP_ADDRESS2]|... \
101101

102102
postevents=[EVENT1]|[EVENT2]|...
103103

104104
Example cepp.conf file format for the Activity Monitor:
105105

106106
msrpcuser=[DOMAIN\DOMAINUSER running CEE services]
107107

108-
pool name=[POOL\_NAME for configuration container] \
108+
pool name=[POOL_NAME for configuration container] \
109109

110-
servers=[IP\_ADDRESS where CEE is installed]|... \
110+
servers=[IP_ADDRESS where CEE is installed]|... \
111111

112112
postevents=[EVENT1]|[EVENT2]|...
113113

@@ -123,20 +123,20 @@ The Activity Monitor requires the following parameters to be set in the ```cepp.
123123

124124
__Step 4 –__ Move the ```cepp.conf``` file to the Data Mover(s) root file system. Run the following command:
125125

126-
$ server\_file [DATA\_MOVER\_NAME]‑put cepp.conf cepp.conf
126+
$ server_file [DATA_MOVER_NAME]‑put cepp.conf cepp.conf
127127

128128
__NOTE:__ Each Data Mover which runs Celerra Event Publishing Agent (CEPA) must have a ```cepp.conf``` file, but each configuration file can specify different events.
129129

130130
__Step 5 –__ (This step is required only if using the ```msrpcuser``` parameter) Register the MSRPC user (see Step 3 for additional information on this parameter). Before starting CEPA for the first time, the administrator must issue the following command from the Control Station and follow the prompts for entering information:
131131

132-
/nas/sbin/server\_user server\_2 -add -md5 -passwd [DOMAIN\DOMAINUSER for msrpcuser]
132+
/nas/sbin/server_user server_2 -add -md5 -passwd [DOMAIN\DOMAINUSER for msrpcuser]
133133

134134
__Step 6 –__ Start the CEPA facility on the Data Mover. Use the following command:
135135

136-
server\_cepp [DATA\_MOVER\_NAME] -service –start
136+
server_cepp [DATA_MOVER_NAME] -service –start
137137

138138
Then verify the CEPA status using the following command:
139139

140-
server\_cepp [DATA\_MOVER\_NAME] -service –status
140+
server_cepp [DATA_MOVER_NAME] -service –status
141141

142142
Once the ```cepp.config``` file has been configured, it is time to configure and enable monitoring with the Activity Monitor. See the [Netwrix Activity Monitor Documentation](https://helpcenter.netwrix.com/category/activitymonitor) for additional information.

0 commit comments

Comments
 (0)