Skip to content

Commit 923821d

Browse files
Merge pull request #134 from netwrix/stuart/enterprise-auditor-116
Enterprise Auditor and AIC 11.6 Updates
2 parents bae147e + 0fa02d8 commit 923821d

File tree

1,101 files changed

+10049
-4819
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,101 files changed

+10049
-4819
lines changed

docs/accessanalyzer/11.6/admin/action/activedirectory/operations/groupdetails.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,10 @@ Use Groups Details page to edit selected group attributes.
1313
Highlight the attribute to edit. Add or delete attributes using the buttons to the right of Insert
1414
field.
1515

16-
**NOTE:** The options at the bottom of the page vary based on the highlighted attribute.
16+
:::note
17+
The options at the bottom of the page vary based on the highlighted attribute.
18+
:::
19+
1720

1821
- Insert field – Use the drop-down list to select a field (column) from the source table. Then,
1922
click the blue arrow to insert the item into the Value box.

docs/accessanalyzer/11.6/admin/action/activedirectory/operations/operations.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,10 @@ here. To change the order, select an operation and use the **Down** and **Up** b
3535

3636
## Delete Objects
3737

38-
**CAUTION:** Once deleted, objects from Active Directory cannot be restored.
38+
:::warning
39+
Once deleted, objects from Active Directory cannot be restored.
40+
:::
41+
3942

4043
Select this operation to delete objects from Active Directory, such as users, groups, or computers.
4144
The source table determines which objects are deleted from the Active Directory. Therefore, this

docs/accessanalyzer/11.6/admin/action/activedirectory/overview.md

Lines changed: 21 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,12 @@ Use the Active Directory Action Module to make bulk changes to objects in Micros
1010
(AD) such as deleting users or changing group memberships. It is available with a special Enterprise
1111
Auditor license.
1212

13-
**CAUTION:** Be careful when using this action module. Make sure that only the changes required are
13+
:::warning
14+
Be careful when using this action module. Make sure that only the changes required are
1415
applied and only to those target systems desired. Actions perform their functions on all rows in a
1516
table.
17+
:::
18+
1619

1720
Enterprise Auditor action modules contain one or more selectable operations. Each operation performs
1821
its function on a single object per row from the source table defined in the action.
@@ -30,22 +33,23 @@ target objects along with the field type to indicate the type of data contained
3033
The Operations page lists the operations that may be performed by the Active Directory Action
3134
Module. Each operation may have its own source table column requirements as follows:
3235

33-
| Operation | Requirements |
34-
| ----------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
35-
| Clear/Set SID History | Column containing SID History information |
36-
| Computer Details | No specific columns required |
37-
| Disable/Enable Computers | No specific columns required |
38-
| Create Groups | No specific columns required |
39-
| Create Users | Column containing the user logon name **_RECOMMENDED:_** It is recommended that the source table has columns containing the following information: - First Name - Last name - Initials - Full name - Password - OU in which to create the user (This can also be created on the Create Users page) |
40-
| Delete Objects (Users, Groups, Computers, etc.) | No specific columns required |
41-
| Disable/Enable Users | No specific columns required |
42-
| Group Details | No specific columns required |
43-
| Group Membership | Column containing the target group OU or the target group NT style name |
44-
| Groups Remove All Members | No specific columns required |
45-
| Move Objects | Column containing an OU (Alternatively, type in the OU or click the ellipsis (…) to select an OU) |
46-
| Set/Reset Users Password | No specific columns required |
47-
| Unlock Users | No specific columns required |
48-
| User Details | No specific columns required |
36+
| Operation | Requirements |
37+
| ----------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
38+
| Clear/Set SID History | Column containing SID History information |
39+
| Computer Details | No specific columns required |
40+
| Disable/Enable Computers | No specific columns required |
41+
| Create Groups | No specific columns required |
42+
| Create Users | Column containing the user logon name <br />**_RECOMMENDED:_** It is recommended that the source table has columns containing the following information: <ul><li>First Name</li><li>Last name</li><li>Initials</li><li>Full name</li><li>Password</li><li>OU in which to create the user (This can also be created on the Create Users page)</li></ul> |
43+
| Delete Objects (Users, Groups, Computers, etc.) | No specific columns required |
44+
| Disable/Enable Users | No specific columns required |
45+
| Group Details | No specific columns required |
46+
| Group Membership | Column containing the target group OU or the target group NT style name |
47+
| Groups Remove All Members | No specific columns required |
48+
| Move Objects | Column containing an OU (Alternatively, type in the OU or click the ellipsis (…) to select an OU) |
49+
| Set/Reset Users Password | No specific columns required |
50+
| Unlock Users | No specific columns required |
51+
| User Details | No specific columns required |
52+
4953

5054
## Configuration
5155

docs/accessanalyzer/11.6/admin/action/activedirectory/target.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,5 +33,8 @@ Use the following options to configure the action:
3333
- E-Mail
3434
- Employee (employeeID)
3535

36-
**NOTE:** While one field is usually sufficient to identify AD objects, if specifying multiple
36+
:::note
37+
While one field is usually sufficient to identify AD objects, if specifying multiple
3738
fields, each field type can only be used once.
39+
40+
:::

docs/accessanalyzer/11.6/admin/action/filesystem/environment.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,10 @@ Use this page to select and connect to a sample host, via which a set of remote
1313
variables for use in scoping the action are loaded. Then, on the Target page, use the environment
1414
variables to build dynamic file path locations for the selected operation.
1515

16-
**NOTE:** The environment variables from the local system load by default.
16+
:::note
17+
The environment variables from the local system load by default.
18+
:::
19+
1720

1821
![File System Action Module Wizard Environment page](/img/product_docs/accessanalyzer/11.6/admin/action/filesystem/environment.webp)
1922

docs/accessanalyzer/11.6/admin/action/filesystem/options.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,14 +46,17 @@ Select from the following additional operations:
4646

4747
- Batch size – Specify the batch size.
4848

49-
Start Process
49+
**Start Process**
5050

5151
Select the desired start process.
5252

53-
**CAUTION:** Due to system security limitations, some applications and programs cannot be restarted
53+
:::warning
54+
Due to system security limitations, some applications and programs cannot be restarted
5455
or run remotely using this option. Additionally, starting interactive processes (such as Word,
5556
Excel, and so on) will load them into memory, but may not make them available for interaction by the
5657
end user.
58+
:::
59+
5760

5861
Use the fields provided to select target items and hosts from the drop-down lists and populate the
5962
Set working directory field, or edit the field manually. The Preview field updates based on the

0 commit comments

Comments
 (0)