You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/kb/1secure/certificate-management/configure_proxy_for_rdp_connections_(installupdate_certificate_to_prevent_rdp_certificate_warnings).md
+22-21Lines changed: 22 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ This article outlines the process for installing or updating a certificate to pr
26
26
27
27
> **IMPORTANT:** The Certification Authority's post-deployment configuration must be completed after installing both prerequisite roles.
28
28
29
-

29
+

30
30
31
31
- The domain must have the **Enrollment Policy** set to enable automatic enrollment and renewal. The **Certificate Enrollment Policy** for user and computer certificates is configured in the **Group Policy** snap-in under **Default Domain Policy** (or another group policy applied to all systems that will access an NPS server on a group-by-group basis). To configure this:
32
32
@@ -40,28 +40,28 @@ This article outlines the process for installing or updating a certificate to pr
40
40
> **NOTE:** If you already have a certificate to install, you can skip to the **Adding the Certificate to Each SbPAM Proxy Server** section below.
41
41
42
42
1. Open **Certification Authority**, open your CA, right-click **Certificate Templates**, and click **Manage**.
43
-

43
+

44
44
45
45
2. In the **Certificate Templates Console**, right-click **Workstation Authentication**, and click **Duplicate Template**.
46
-

46
+

47
47
48
48
3. On the **General** tab, change the name to **Client-Server Authentication** and enable the **Publish certificate in Active Directory** checkbox.
49
-

49
+

50
50
51
51
4. On the **Subject Name** tab, enable the **Supply in the request** radio button.
52
-

52
+

53
53
54
54
5. On the **Extensions** tab, select **Application Policies** and click **Edit**. Click **Add**, then select **Server Authentication**. Click **OK** until you return to the **Properties of New Template** dialog.
55
-

55
+

56
56
57
57
6. On the **Security** tab, select **Domain Computers** and enable the checkbox to allow **Autoenroll**. Click **OK** and then close the Certificate Templates Console.
58
-

58
+

59
59
60
60
7. Back in **Certification Authority**, right-click **Certificate Templates**, hover over **New**, and click **Certificate Template to Issue**.
61
-

61
+

62
62
63
63
8. Select **Client-Server Authentication** and click **OK**.
64
-

64
+

65
65
66
66
9. On the desktop, create a text file named **request.inf** with the following content (replace the **red** text with your server certificate name):
67
67
@@ -96,44 +96,44 @@ This article outlines the process for installing or updating a certificate to pr
11. To sign the certificate request, use your preferred signing mechanism. The following example uses Active Directory Certificate Services (`https://<servername>/certsrv`).
102
-
 
102
+
 
103
103
104
104
Click **Request a certificate**, then click **advanced certificate request**.
105
105
106
106
12. Open the saved certificate signing request (**rdp.csr**) from the previous step in Notepad. Copy the certificate request into the **Saved Request** field. Select **Client-Server Authentication** from the **Certificate Template** dropdown. Click **Submit**.
107
-

107
+

108
108
109
109
Leave other settings at default values, and click **Submit**.
110
110
111
111
13. Select **DER encoded** and click **Download certificate**.
112
-

112
+

113
113
114
114
14. Open the downloaded certificate and select **Install Certificate**. Proceed with all default values and complete the wizard.
115
-

115
+

116
116
117
117
15. To export the certificate, view certificates for the current user by launching **certmgr.msc** using the Windows **Run** menu.
118
-

118
+

119
119
120
120
Right-click the installed certificate (the certificate using the **Client-Server Authentication** template) and click **Export...**.
16. In the **Certificate Export Wizard**, change the **Export Private Key** option to **Yes, export the private key**.
124
-

124
+

125
125
126
126
17. For **Export File Format**, select **Personal Information Exchange - PKCS #12 (.PFX)**. Select the following checkboxes:
127
127
128
128
- Include all certificates in the certification path if possible
129
129
- Enable certificate privacy
130
130
131
-

131
+

132
132
133
133
18. For **Security**, enter a password of your choosing and select the AES256-SHA256 encryption option (3DES is no longer recommended by NIST).
134
134
135
135
> **IMPORTANT:** For **File to Export**, the file name **must** be **rdp.pfx**. If it is named anything else, importing the .pfx file on each proxy server will not work.
136
-

136
+

137
137
138
138
19. This certificate can now be imported to each SbPAM Proxy Server.
139
139
@@ -149,6 +149,7 @@ This article outlines the process for installing or updating a certificate to pr
149
149
"C:\Program Files\Stealthbits\PAM\ProxyService\sbpam-proxy.exe" ca import -p [PATH]\rdp.pfx
150
150
```
151
151
152
-

152
+

153
+
154
+
3. The new certificate has now been imported to an SbPAM Proxy Server. Repeat this process for all SbPAM Proxy Servers if using more than one. (The default installation of SbPAM uses one proxy service on the SbPAM server itself; however, additional proxy services can be distributed.)
153
155
154
-
3. The new certificate has now been imported to an SbPAM Proxy Server. Repeat this process for all SbPAM Proxy Servers if using more than one. (The default installation of SbPAM uses one proxy service on the SbPAM server itself; however, additional proxy services can be distributed.)
Copy file name to clipboardExpand all lines: docs/kb/1secure/troubleshooting/troubleshoot_failed_action_service_connections_to_windows_resources_(psremotingwinrm).md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,7 +87,7 @@ There are Group Policy settings used to filter the origin of WinRM requests via
87
87
88
88
Learn more about the **Allow remote server management through WinRM** Group Policy setting in [Configure Remote Management in Server Manager − Enabling or Disabling Remote Management ⸱ Microsoft 🡥](https://learn.microsoft.com/en-us/windows-server/administration/server-manager/configure-remote-management-in-server-manager#enabling-or-disabling-remote-management).
89
89
90
-

90
+

91
91
92
92
### Allow full control to Remote Management Users
93
93
@@ -132,4 +132,5 @@ The output indicates that the credentials used can run remote PowerShell command
132
132
133
133
## Related articles
134
134
135
-
[Configure Remote Management in Server Manager − Enabling or Disabling Remote Management ⸱ Microsoft 🡥](https://learn.microsoft.com/en-us/windows-server/administration/server-manager/configure-remote-management-in-server-manager#enabling-or-disabling-remote-management)
135
+
[Configure Remote Management in Server Manager − Enabling or Disabling Remote Management ⸱ Microsoft 🡥](https://learn.microsoft.com/en-us/windows-server/administration/server-manager/configure-remote-management-in-server-manager#enabling-or-disabling-remote-management)
Copy file name to clipboardExpand all lines: docs/kb/auditor/configuration-and-setup/active-directory-auditing/active-directory-exchange-and-group-policy-changes-reported-as-made-by-system.md
This article contains references to the most popular Active Directory, Exchange, and Group Policy changes which may be reported as made by **System** by Netwrix Auditor:
26
26
27
-
-[Alert Reported Change Made by System](/docs/kb/auditor/alert-reported-change-made-by-system.md).
27
+
-[Alert Reported Change Made by System](/docs/kb/auditor/reports-alerts-and-notifications/report-generation/alert-reported-change-made-by-system.md).
28
28
-[System Changed Object Path after Account Name Change](/docs/kb/auditor/system-changed-object-path-after-account-name-change.md).
-[System Changed Directory Objects for Foreign Security Principals](/docs/kb/auditor/system-changed-directory-objects-for-foreign-security-principals.md).
31
31
-[Workstation Field Reported as Unknown](/docs/kb/auditor/workstation-field-reported-as-unknown.md)
32
32
-[Duplicate Configuration and Schema Changes for All Monitored Domains in Forest Made by System](/docs/kb/auditor/duplicate-configuration-and-schema-changes-for-all-monitored-domains-in-forest-made-by-system.md).
33
33
-[System Changed Service Principle Name Attribute](/docs/kb/auditor/system-changed-service-principle-name-attribute.md).
> **NOTE:** This tool should **NOT** be used to revert the changes caused by raising the forest functional level. For additional information, refer to the following article: Object Restore for Active Directory.
Copy file name to clipboardExpand all lines: docs/kb/auditor/configuration-and-setup/active-directory-auditing/reducing-the-used-active-directory-and-entra-id-license-counts.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,11 +58,11 @@ Refer to the following steps to exclude OUs and user objects from the monitoring
58
58
2. Select the relevant AD monitoring plan and click **Edit**.
59
59
3. Select the data source and click **Edit data source**.
60
60
61
-

61
+

62
62
63
63
4. In the left pane, select the **Objects** tab. Select the **Exclude these objects** checkbox, then click **Add** to exclude objects from the monitoring scope. After adding the objects, click **Save & Close**.
64
64
65
-

65
+

66
66
67
67
Refer to the following examples to learn about how the exclusion rules work for **Objects**. The same logic applies to the inclusion rules:
68
68
@@ -99,3 +99,5 @@ To exclude specific Entra ID users from the license count, populate the `omitUPN
99
99
-[Determining the Number of Enabled Microsoft Entra ID Accounts](/docs/kb/auditor/determining-the-number-of-enabled-microsoft-entra-id-accounts.md)
Copy file name to clipboardExpand all lines: docs/kb/auditor/configuration-and-setup/file-server-auditing/cannot-establish-a-connection-to-a-windows-file-server-compression-service.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,5 +47,8 @@ After that, the **Netwrix Auditor Application Deployment Service** appears on th
47
47
48
48
### Related Articles
49
49
50
-
-[How to Investigate Compression Services Errors](/docs/kb/auditor/how-to-investigate-compression-services-errors.md)
50
+
-[How to Investigate Compression Services Errors](/docs/kb/auditor/troubleshooting-and-errors/data-collection-errors/how-to-investigate-compression-services-errors.md)
51
51
-[Windows File Servers — Enable Remote Registry Service — v10.8.](https://docs.netwrix.com/docs/auditor/10_8/configuration/fileservers/windows/remoteregistryservice)
Copy file name to clipboardExpand all lines: docs/kb/auditor/configuration-and-setup/file-server-auditing/child-item-with-this-name-already-exists-in-file-server-monitoring-plan.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,5 +42,8 @@ The licensing data was corrupted.
42
42
## Resolution
43
43
44
44
- In case you've encountered the issue after a recent upgrade, wait for 24 hours to see if the issue is resolved on its own.
45
-
- Reapply the license file. Refer to the following article for additional information: [How to Apply Netwrix Auditor License](/docs/kb/auditor/how-to-apply-netwrix-auditor-license.md).
45
+
- Reapply the license file. Refer to the following article for additional information: [How to Apply Netwrix Auditor License](/docs/kb/auditor/system-administration/licensing-and-compliance/how-to-apply-netwrix-auditor-license.md).
46
46
- In case reapplying the license did not help, contact [Netwrix Technical Support](https://www.netwrix.com/open_a_ticket.html).
Copy file name to clipboardExpand all lines: docs/kb/auditor/configuration-and-setup/file-server-auditing/error-netwrix-auditor-for-file-servers-audit-service-terminated-unexpectedly.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,4 +59,7 @@ If you are currently on a 10.5 version and build other than 10950, perform the p
59
59
60
60
## Related articles
61
61
62
-
-[How to Upgrade Netwrix Auditor](/docs/kb/auditor/how-to-upgrade-netwrix-auditor.md)
62
+
-[How to Upgrade Netwrix Auditor](/docs/kb/auditor/system-administration/migration-and-upgrade/how-to-upgrade-netwrix-auditor.md)
Copy file name to clipboardExpand all lines: docs/kb/auditor/configuration-and-setup/file-server-auditing/symbolic-link-cannot-be-followed-error-in-file-server-monitoring-plan.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ Enable all symbolic link types.
52
52
53
53
Once executed, you'll see the settings for symbolic links (enabled or disabled).
2. To enable a symlink type, run the following command:
58
58
@@ -63,3 +63,5 @@ Enable all symbolic link types.
63
63
The `R2L:1` stands for remote-to-local enabled. You can change `R` to `L` and vice versa to enable the disabled symlink.
64
64
65
65
Learn more about fsutil syntax in the Microsoft documentation: https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/fsutil-behavior (fsutil behavior ⸱ Microsoft)
Copy file name to clipboardExpand all lines: docs/kb/auditor/configuration-and-setup/file-server-auditing/volume-shadow-copy-service-support-in-netwrix-auditor-for-file-servers.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,8 +32,10 @@ The **Volume Shadow Copy Service** (hereafter **VSS**) can be enabled via **Netw
32
32
1. Navigate to **Managed Objects -> your_File_Servers_Managed_Object_name -> File Servers.**
33
33
2. Click **Configure** next to **Advanced Settings** and select the **Enable file versioning and rollback capabilities (based on Volume Shadow Copy).**
The **Shadow Copy** data is stored on the audited file server. **VSS** is a built-in **Windows** service, and when you enable the VSS support, **Netwrix Auditor** just triggers creation of a snapshot. If you have not configured **VSS**, you may want to turn it off (especially if you do not have enough space on that server). To know precisely where the **Shadow Copy** data is stored, refer to the **Shadow Copy** information on the drive volume.
0 commit comments