Skip to content

Commit 84e2f4f

Browse files
authored
Merge pull request #57 from netwrix/Farzana/NTM3.0-sidebar
Sidebar-review of NTM 3.0 completed
2 parents 4803845 + afd6c69 commit 84e2f4f

File tree

34 files changed

+101
-154
lines changed

34 files changed

+101
-154
lines changed

docs/threatmanager/3.0/administration/configuration/policies/honeytoken.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Policies.
3333
**Step 2 –** On the Policies page, expand the Honeytokens list and select the related Honeytoken
3434
policy from the Policies list. Or, select the policy from the Policies table in the Overview box.
3535

36-
![honeytoken](/img/product_docs/threatprevention/7.5/admin/configuration/honeytoken.webp)
36+
![honeytoken](/img/product_docs/threatmanager/3.0/administration/configuration/policies/Honeytoken.webp)
3737

3838
**Step 3 –** On the Configuration tab of the policy, fill in the requested information and click
3939
**Copy LDAP Filter**. The Copy LDAP Filter button will automatically copy the exact string that is
@@ -64,7 +64,7 @@ select the other **LDAP Monitoring** event type in the list above.
6464
Threat Manager.
6565

6666
_Remember,_ the Honeytoken tab of the
67-
[Netwrix Threat Manager Configuration Window](/docs/threatmanager/3.0/threatprevention/admin/configuration/threatmanagerconfiguration.md)
67+
[Netwrix Threat Manager Configuration Window](/docs/threatmanager/3.0/install/integration/threatprevention/threatmanagerconfiguration.md)
6868
must be configured in order to successfully send LDAP monitoring data to Threat Manager.
6969

7070
### Configure LDAP Monitoring in the Activity Monitor

docs/threatmanager/3.0/administration/configuration/systemsettings/useraccess.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -211,7 +211,7 @@ The password for the built-in ADMIN account has been updated.
211211
The Settings section provides the ability to customize the user login page and configure the token
212212
expiration time for authenticated users.
213213

214-
![Settings section of the User Access page](/img/product_docs/activitymonitor/8.0/config/dellpowerscale/settings.webp)
214+
![Settings section of the User Access page](/img/product_docs/threatmanager/3.0/administration/configuration/systemsettings/Settings.webp)
215215

216216
- One page login (Login, password, MFA code on one page) – Combines username and password, and
217217
multi-factor authentication on a single page

docs/threatmanager/3.0/administration/configuration/threatdetection/threatdetection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,10 @@ disabled.
2525

2626
The Threats list divides the threats into sections:
2727

28-
- [Active Directory Threats](/docs/threatmanager/3.0/overview/threats/activedirectory.md)
29-
- [Entra ID Threats](/docs/threatmanager/3.0/overview/threats/entraid.md)
30-
- [File System Threats](/docs/threatmanager/3.0/overview/threats/filesystem.md)
31-
- [General Threats](/docs/threatmanager/3.0/overview/threats/general.md)
28+
- [Active Directory Threats](/docs/threatmanager/3.0/threats/activedirectory.md)
29+
- [Entra ID Threats](/docs/threatmanager/3.0/threats/entraid.md)
30+
- [File System Threats](/docs/threatmanager/3.0/threats/filesystem.md)
31+
- [General Threats](/docs/threatmanager/3.0/threats/general.md)
3232
- Threat Detection Page
3333

3434
Select a threat from the list to display the threat's configuration options to the right of the

docs/threatmanager/3.0/administration/investigations/options/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Every investigation has the following options at the top of the page:
1818
[Edit or Duplicate an Investigation](/docs/threatmanager/3.0/administration/investigations/options/edit.md) topic for additional information.
1919
- Create threat – In addition to preconfigured threats, a user can create a custom threat when
2020
certain events are considered to be dangerous in the environment, for example, when one of the
21-
privileged users makes file changes. See the [Custom Threats](/docs/threatmanager/3.0/overview/threats/custom.md)topic for
21+
privileged users makes file changes. See the [Custom Threats](/docs/threatmanager/3.0/threats/custom.md)topic for
2222
additional information.
2323
- Subscriptions – Click the Subscriptions link to open the Subscription to window. You can specify
2424
recipients to receive this report as an email attachment in a specified format. See the

docs/threatmanager/3.0/administration/playbooks/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ The Action Log window contains a Logs tab and a Step Details tab.
155155

156156
The Logs tab displays logs for the playbook execution.
157157

158-
![This screenshot displays the Logs tab on the Action Log window.](/img/product_docs/threatmanager/3.0/administration/playbooks/logstab.webp)
158+
![This screenshot displays the Logs tab on the Action Log window.](/img/product_docs/threatmanager/3.0/administration/playbooks/action/logstab.webp)
159159

160160
The Logs tab displays a table with the following columns:
161161

docs/threatmanager/3.0/administration/threats/threats.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -56,10 +56,10 @@ The Type section displays the threat types which can be selected for filtering.
5656
to filter by is dynamic, depending upon the type of threats detected. See the following topics for
5757
additional information:
5858

59-
- [Active Directory Threats](/docs/threatmanager/3.0/overview/threats/activedirectory.md)
60-
- [Entra ID Threats](/docs/threatmanager/3.0/overview/threats/entraid.md)
61-
- [File System Threats](/docs/threatmanager/3.0/overview/threats/filesystem.md)
62-
- [General Threats](/docs/threatmanager/3.0/overview/threats/general.md)
59+
- [Active Directory Threats](/docs/threatmanager/3.0/threats/activedirectory.md)
60+
- [Entra ID Threats](/docs/threatmanager/3.0/threats/entraid.md)
61+
- [File System Threats](/docs/threatmanager/3.0/threats/filesystem.md)
62+
- [General Threats](/docs/threatmanager/3.0/threats/general.md)
6363

6464
### Level
6565

docs/threatmanager/3.0/overview/gettingstarted.md renamed to docs/threatmanager/3.0/gettingstarted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Getting Started with Threat Manager"
33
description: "Getting Started with Threat Manager"
4-
sidebar_position: 10
4+
sidebar_position: 2
55
---
66

77
# Getting Started with Threat Manager

docs/threatmanager/3.0/index.md

Lines changed: 52 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,52 @@
1-
# Threat Manager
1+
---
2+
title: "Netwrix Threat Manager v3.0 Documentation"
3+
description: "Netwrix Threat Manager v3.0"
4+
sidebar_position: 1
5+
---
6+
7+
# Netwrix Threat Manager v3.0 Documentation
8+
9+
Threat Manager detects and responds to abnormal behavior and advanced attacks against Active
10+
Directory and File Systems with unprecedented accuracy and speed. Threat Manager provides
11+
programmatic and automated response options when threats are identified. In addition to an extensive
12+
catalog of preconfigured response actions, Threat Manager can be configured to integrate with you
13+
own business processes using integrated PowerShell or webhook facilities.
14+
15+
Threat Manager can also deliver threat data to administrators in their preferred applications,
16+
including Microsoft Teams, Slack, ServiceNow, and a wide variety of SIEM platforms.
17+
18+
## Architecture
19+
20+
The following diagram is a visual representation of Threat Manager architecture. It maps out the
21+
physical implementation of Threat Manager components.
22+
23+
![Netwrix Threat Manager Architecture diagram](/img/product_docs/threatmanager/3.0/tmarch.webp)
24+
25+
## Administration
26+
27+
Organizations of virtually any size find it to be impossible, even counterproductive, to evaluate
28+
the substantial amount of file access events and Active Directory events occurring within their
29+
environments on any given day. To overcome this challenge and achieve proper visibility into this
30+
otherwise significant blind spot in an organization's cyber security program, Threat Manager®
31+
provides built-in threat analytics to highlight the most unusual behaviors that occur within an
32+
organization each day. Threat Manager also provides a method to deep dive into activity data using a
33+
series of customizable filters to discover threats unique to their organization.
34+
35+
## Supported Platforms
36+
37+
Supported platforms include the Active Directory and File system platforms supported for monitoring
38+
by either Netwrix Threat Prevention or Netwrix Activity Monitor. See the following product
39+
documentation for additional information:
40+
41+
- [Netwrix Threat Prevention Documentation](https://helpcenter.netwrix.com/category/threatprevention)
42+
- [Netwrix Activity Monitor Documentation](https://helpcenter.netwrix.com/category/activitymonitor)
43+
44+
## Threat Manager Threats
45+
46+
Threat Manager monitors the following threats. See each section for information on monitored threat
47+
types.
48+
49+
- [Active Directory Threats](/docs/threatmanager/3.0/threats/activedirectory.md)
50+
- [Entra ID Threats](/docs/threatmanager/3.0/threats/entraid.md)
51+
- [File System Threats](/docs/threatmanager/3.0/threats/filesystem.md)
52+
- [General Threats](/docs/threatmanager/3.0/threats/general.md)

docs/threatmanager/3.0/install/application.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,15 +32,15 @@ Run as administrator. Then skip to Step 2.
3232
**Step 3 –** Read the End User License Agreement and select the I accept the license agreement
3333
checkbox. Click **Next**.
3434

35-
![Netwrix Threat Manager Setup wizard Install Folder page](/img/product_docs/threatprevention/7.5/install/reportingmodule/folder.webp)
35+
![Netwrix Threat Manager Setup wizard Install Folder page](/img/product_docs/threatmanager/3.0/install/folder.webp)
3636

3737
**Step 4 –** By default, the installation directory is set to:
3838

3939
- Install Folder – C:\Program Files\STEALTHbits\StealthDEFEND
4040

4141
Optionally, enter a new path or use the **Browse** button to modify as desired. Click Next.
4242

43-
![Netwrix Threat Manager Setup wizard Connect to the Database page](/img/product_docs/threatprevention/7.5/install/database.webp)
43+
![Netwrix Threat Manager Setup wizard Connect to the Database page](/img/product_docs/threatmanager/3.0/install/Database.webp)
4444

4545
**Step 5 –** On the Database page, ensure the host and port are set correctly. If installing on the
4646
same server where the PostgreSQL database application was installed, this information will be

docs/threatmanager/3.0/install/database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ and select Run as administrator. Then skip to Step 2.
2222

2323
**Step 1 –** Click PostgreSQL Setup. The Netwrix PostgreSQL Setup wizard opens.
2424

25-
![Netwrix PostgreSQL Setup wizard](/img/product_docs/threatmanager/3.0/install/install.webp)
25+
![Netwrix PostgreSQL Setup wizard](/img/product_docs/threatmanager/3.0/install/installdb.webp)
2626

2727
**Step 2 –** Click Install.
2828

0 commit comments

Comments
 (0)