Skip to content

Commit 63735e1

Browse files
Merge pull request #119 from netwrix/stuart/anchor-fixes
Fixed Anchor Build Warnings
2 parents 0bf6450 + e596a04 commit 63735e1

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

docs/changetracker/8.0/install/agent/windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ In order to maximize performance, Gen 7 Agent operational files are located in
3333
_%PROGRAMDATA%\NNT\gen7agent.service_, similarly if you are ever required to provide the
3434
**rolling-log.txt** file to [Netwrix Support](https://www.netwrix.com/support.html) this is where it
3535
is located. See the
36-
[First Run – HubDetails.xml File](/docs/changetracker/8.0/admin/settingstab/devicegroups.md#first-run-hubdetailsxml-file)
36+
[First Run – HubDetails.xml File](/docs/changetracker/8.0/admin/settingstab/devicegroups.md#first-run--hubdetailsxml-file)
3737
topic for additional information on downloading the .xml file for agents.
3838
:::
3939

docs/endpointpolicymanager/knowledgebase/gettingstarted/knowledgebase/tipstricksandfaqs/eventcategories.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ sidebar_position: 180
88

99
## Feature Specific Events
1010

11-
[List of Endpoint Policy Manager Event Categories and IDs](#list-of-endpoint-policy-manager-event-categories-and-ids)
11+
[Remote Work Delivery Manager](#remote-work-delivery-manager)
1212

1313
[Feature Manager for Windows](#feature-manager-for-windows)
1414

docs/pingcastle/3.3/index.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ securing Active Directories.
4242
You can get more information about this methodology by visiting the
4343
website https://www.pingcastle.com/methodology/
4444

45-
# How to use PingCastle
45+
## How to use PingCastle
4646

4747
The following sections describe how to use PingCastle.
4848

@@ -168,7 +168,7 @@ the "interactive mode" can be activated manually using the command:
168168
PingCastle.exe --log --interactive
169169
```
170170

171-
# Performing an Active Directory health check
171+
## Performing an Active Directory health check
172172

173173
The report can be generated in the interactive mode by choosing
174174
"healthcheck" or just by pressing Enter. Indeed it is the default
@@ -240,7 +240,7 @@ link. It contains data to help identify the underlying objects.
240240

241241
![](/img/product_docs/pingcastle/basicuser/image14.png)
242242

243-
# Perform domain discovery
243+
## Perform domain discovery
244244

245245
**Option 1: performing multiple health check reports (recommended)**
246246

@@ -361,7 +361,7 @@ to find a specific IP address.
361361

362362
![](/img/product_docs/pingcastle/basicuser/image24.png)
363363

364-
# Deploying PingCastle
364+
## Deploying PingCastle
365365

366366
PingCastle has been designed to be scalable and used in a decentralized
367367
architecture.
@@ -668,7 +668,7 @@ You can query a PingCastle API server or build a client or server from
668668
The description of the API in swagger format can be found
669669
[here](https://gist.githubusercontent.com/vletoux/c6c565c8af07b4df5df65ed01ffeb917/raw/fca7a288050b7b17ba6024f2a23ef8c4d46fd813/pingcastle-swagger.json).
670670

671-
# Getting an overview with multiple reports
671+
## Getting an overview with multiple reports
672672

673673
How much users or computers to you have ? Should you purchase additional
674674
support for Windows XP or Windows 2003 ? Should you plan an
@@ -730,7 +730,7 @@ The third file is a map build on all trusts. See [domain discovery](#perform-dom
730730

731731
[Example](https://www.pingcastle.com/PingCastleFiles/ad_hc_summary_simple_node_map.html)
732732

733-
# Scanners
733+
## Scanners
734734

735735
PingCastle has some builtin program to check for specific features.
736736
These programs are called \"scanners\" and are accessible from the
@@ -828,7 +828,7 @@ Then enter the domain which will be used as a pivot
828828
PingCastle --scanner foreignusers --foreigndomain <remote domain or sid> --server <pivot domain>
829829
```
830830

831-
# Annex
831+
## Annex
832832

833833
**Command line reference**
834834

0 commit comments

Comments
 (0)