Skip to content

Commit 934356b

Browse files
Merge pull request #122 from netwrix/hassaan/passpolenf-10.2-fixes
Merging this branch to dev.
2 parents 4c8196d + be0bfc3 commit 934356b

File tree

74 files changed

+697
-2507
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

74 files changed

+697
-2507
lines changed

docs/passwordpolicyenforcer/10.2/administration/administration_overview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,11 @@ not jeopardize network security.
2020
You can also use Password Policy Enforcer to ensure that passwords are compatible with other
2121
systems, and to synchronize passwords with other networks and applications.
2222

23-
**NOTE:** The
23+
:::note
24+
The
2425
[Evaluation](/docs/passwordpolicyenforcer/10.2/evaluation/evaluation_overview.md)
2526
topic contains step-by-step instructions to help you quickly install, configure, and evaluate
2627
Password Policy Enforcer. Read the Evaluation topic if you are using Password Policy Enforcer for
2728
the first time.
29+
30+
:::

docs/passwordpolicyenforcer/10.2/administration/connecting.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,11 @@ Enforcer view.
2929

3030
**Step 4 –** Enter the **name** or **IP address** of a domain controller, then click **OK**.
3131

32-
**NOTE:** You cannot make changes to the Password Policy Enforcer configuration while the management
32+
:::note
33+
You cannot make changes to the Password Policy Enforcer configuration while the management
3334
console is connected to a read-only domain controller.
35+
:::
36+
3437

3538
## Connecting to a Local Configuration
3639

@@ -50,9 +53,18 @@ Enforcer view.
5053

5154
**Step 3 –** Select the **Local** option, then click **OK**.
5255

53-
**NOTE:** Domain configurations are stored in the CN=Password Policy Enforcer 10.0,CN=System object.
56+
:::note
57+
Domain configurations are stored in the CN=Password Policy Enforcer 10.0,CN=System object.
58+
:::
59+
5460

55-
**NOTE:** Local configurations are stored in the HKLM\SOFTWARE\ANIXIS\Password Policy Enforcer 10.0\
61+
:::note
62+
Local configurations are stored in the HKLM\SOFTWARE\ANIXIS\Password Policy Enforcer 10.0\
5663
registry key.
64+
:::
65+
66+
67+
:::note
68+
Users with write permission to these objects can configure Password Policy Enforcer.
5769

58-
**NOTE:** Users with write permission to these objects can configure Password Policy Enforcer.
70+
:::

docs/passwordpolicyenforcer/10.2/administration/hibpupdater.md

Lines changed: 23 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,14 @@ location.
3232

3333
The HIBP Updater is installed when you install the Password Policy Enforcer Management Server.
3434

35-
**_RECOMMENDED:_** Only run this from one server.
35+
:::info
36+
Only run this from one server.
37+
:::
38+
3639

3740
**Step 1 –** To access the HIBP Updater, navigate to the installation location:
3841

39-
...\Program Files (x86)\Password Policy Enforcer\HIBP\
42+
**...\Program Files (x86)\Password Policy Enforcer\HIBP\**
4043

4144
![hibpfolder](/img/product_docs/passwordpolicyenforcer/10.2/administration/hibpfolder.webp)
4245

@@ -48,18 +51,24 @@ Password Policy Enforcer utilizes the Passwords Hash database to check if users
4851
password (i.e. during a password reset) matches the hash of a compromised password from a data
4952
breach.
5053

51-
**NOTE:** First-time configuration of this window requires downloading the HIBP database from the
54+
:::note
55+
First-time configuration of this window requires downloading the HIBP database from the
5256
Netwrix website.
57+
:::
58+
5359

5460
![passwordhashdatabase](/img/product_docs/passwordpolicyenforcer/10.2/administration/passwordhashdatabase.webp)
5561

56-
**CAUTION:** Ensure the initial update of the database occurs during non-office hours. Due to the
62+
:::warning
63+
Ensure the initial update of the database occurs during non-office hours. Due to the
5764
size of the hash file, this download takes up a significant amount of CPU and download time.
65+
:::
66+
5867

5968
- Passwords Hash Database Folder – Central location of the Pwned database on the application server.
6069
The default path is:
6170

62-
…\HIBP\DB
71+
**…\HIBP\DB**
6372

6473
- Update Type:
6574

@@ -68,10 +77,13 @@ size of the hash file, this download takes up a significant amount of CPU and do
6877
instead of downloading the full HIBP database. This option is enabled after a full download of
6978
the HIBP database has completed.
7079

71-
**NOTE:** Only the full HIBP database file obtained from the Netwrix website has version
80+
:::note
81+
Only the full HIBP database file obtained from the Netwrix website has version
7282
information. That full HIBP database file can be obtained using the Website option.
7383
Alternately, the HIBP database can be obtained outside of the application by downloading it
7484
directly from the Netwrix website using an FTP connection:
85+
:::
86+
7587

7688
- [https://releases.netwrix.com/resources/stealthintercept/stealthintercept-hibp-database-1.0.0.zip](https://releases.netwrix.com/resources/stealthintercept/stealthintercept-hibp-database-1.0.0.zip)
7789
- [https://releases.netwrix.com/resources/stealthintercept/stealthintercept-hibp-database-1.0.0.zip.sha256.txt](https://releases.netwrix.com/resources/stealthintercept/stealthintercept-hibp-database-1.0.0.zip.sha256.txt)
@@ -102,7 +114,7 @@ files. Copy the hash files into the Sysvol share on one domain controller, and t
102114
System will copy the files into the Sysvol share of all other domain controllers. Configure the
103115
Compromised rule to read the files from:
104116

105-
\\127.0.0.1\sysvol\your.domain\filename.db
117+
**\\127.0.0.1\sysvol\your.domain\filename.db**
106118

107119
See the
108120
[Compromised Rule](/docs/passwordpolicyenforcer/10.2/administration/rules/compromised_rule.md)
@@ -114,8 +126,11 @@ local policies. If you are using Password Policy Enforcer for local policies and
114126
to receive hash file updates, then use the Sysvol share for file replication and a script or
115127
scheduled task to copy the file to a local folder.
116128

117-
**CAUTION:** %SystemRoot%. hash files should only be read from a local disk. Using shared hash files
129+
:::warning
130+
%SystemRoot%. hash files should only be read from a local disk. Using shared hash files
118131
degrades performance, and could jeopardize security.
132+
:::
133+
119134

120135
## Scheduler
121136

docs/passwordpolicyenforcer/10.2/administration/installation/automated_installation.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,11 @@ button.
7070

7171
**Step 4 –** Enter the full **UNC path to PPE10.1.msi** in the Open dialog box.
7272

73-
**NOTE:** You must enter a UNC path so that other computers can access this file over the network.
73+
:::note
74+
You must enter a UNC path so that other computers can access this file over the network.
7475
For example: \\file server\distribution point share\PPE10.1.msi
76+
:::
77+
7578

7679
**Step 5 –** Click **Open**.
7780

docs/passwordpolicyenforcer/10.2/administration/installation/disable_windows_rules.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,10 @@ Settings**, **Account Policies**, and **Password Policy** items.
4444

4545
![installing_ppe_3](/img/product_docs/passwordpolicyenforcer/10.2/evaluation/preparing_the_computer.webp)
4646

47-
**NOTE:** You do not have to disable all the Windows password policy rules to use Password Policy
47+
:::note
48+
You do not have to disable all the Windows password policy rules to use Password Policy
4849
Enforcer. You can use a combination of Password Policy Enforcer and Windows rules together if you
4950
like. Just remember that a password is only accepted if it complies with the rules enforced by both
5051
Windows and Password Policy Enforcer.
52+
53+
:::

docs/passwordpolicyenforcer/10.2/administration/installation/installation.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,13 @@ topic for additional information.
1717
- Fifteen megabytes free disk space
1818
- Eight megabytes free RAM (72 megabytes if using Argon2 hashes)
1919

20-
**NOTE:** Users do not have to change their password immediately after Password Policy Enforcer is
20+
:::note
21+
Users do not have to change their password immediately after Password Policy Enforcer is
2122
installed. They can continue using their current password until it expires, even if their current
2223
password does not comply with the password policy. Installing Password Policy Enforcer does not
2324
extend the Active Directory schema.
25+
:::
26+
2427

2528
## Installation Types
2629

docs/passwordpolicyenforcer/10.2/administration/mailer/email_delivery_options.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,11 @@ Select the **Save email to a pickup folder** option to have the Password Policy
3333
emails to a folder for later delivery by a mail server. Click the **Browse** button to select a
3434
folder. The mail server must monitor this folder for new email.
3535

36-
**NOTE:** Saving email to a pickup folder is the fastest and most reliable delivery method. Use this
36+
:::note
37+
Saving email to a pickup folder is the fastest and most reliable delivery method. Use this
3738
option if your mail server supports pickup folders.
39+
:::
40+
3841

3942
The Password Policy Enforcer Mailer sends emails at 2:00 AM every day. Check the Windows Application
4043
Event Log to monitor its progress. You can also run the Password Policy Enforcer Mailer from the

docs/passwordpolicyenforcer/10.2/administration/mailer/mailer.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,11 @@ conditions.
3434
**Step 5 –** If you are prompted to Modify, Repair, or Remove the installation, select **Modify**,
3535
then click **Next**. Proceed to step 11. Do not disable the other features as described below.
3636

37-
**CAUTION:** If prompted to Modify, Repair, or Remove, do not modify any settings or disable any
37+
:::warning
38+
If prompted to Modify, Repair, or Remove, do not modify any settings or disable any
3839
features as described in steps 6 - 10.
40+
:::
41+
3942

4043
**Step 6 –** Click **Next** when the Password Policy Enforcer Installation Wizard opens.
4144

docs/passwordpolicyenforcer/10.2/administration/managementconsole/management_console.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,8 +53,14 @@ Password Policy Enforcer management console.
5353

5454
![configuring_ppe_1](/img/product_docs/passwordpolicyenforcer/10.2/administration/configuring_ppe_1.webp)
5555

56-
**NOTE:** If you are opening the management console for the first time, click **Yes** when asked if
56+
:::note
57+
If you are opening the management console for the first time, click **Yes** when asked if
5758
you would like to create a new Password Policy Enforcer configuration.
59+
:::
5860

59-
**NOTE:** Press F1 while using the management console to display help information for the current
61+
62+
:::note
63+
Press F1 while using the management console to display help information for the current
6064
window.
65+
66+
:::

docs/passwordpolicyenforcer/10.2/administration/managingpolicies/assigning_policies.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,18 +18,24 @@ Info Tech group, then any policy assigned to the Info Tech group also applies to
1818
Helpdesk group. If this behavior is not desired, then you can assign a different policy to the
1919
Helpdesk group.
2020

21-
**NOTE:** When a policy is assigned to a container, Password Policy Enforcer enforces the policy for
21+
:::note
22+
When a policy is assigned to a container, Password Policy Enforcer enforces the policy for
2223
all users in the container as well as any child containers. For example, if the Helpdesk and
2324
Managers OUs are children of the Info Tech OU, then any policy assigned to the Info Tech OU also
2425
applies to the two child OUs. If this behavior is not desired, then you can assign a different
2526
policy to a child OU.
27+
:::
28+
2629

2730
![managing_policies_3](/img/product_docs/passwordpolicyenforcer/10.2/administration/managing_policies_3.webp)
2831

29-
**NOTE:** When a domain policy is assigned to a user or group, Password Policy Enforcer stores the
32+
:::note
33+
When a domain policy is assigned to a user or group, Password Policy Enforcer stores the
3034
user or group SID in the configuration. The assignment remains valid even if the user or group is
3135
renamed. When a local policy is assigned to a user, Password Policy Enforcer stores the username in
3236
the configuration. The assignment is invalidated if the user is renamed.
37+
:::
38+
3339

3440
![managing_policies_4](/img/product_docs/passwordpolicyenforcer/10.2/administration/managing_policies_4.webp)
3541

@@ -70,8 +76,11 @@ Follow the steps to remove a policy assignment.
7076

7177
**Step 7 –** Click OK to close the Policy Properties page.
7278

73-
**NOTE:** Different assignment types can be used for a single policy. For example, you may assign
79+
:::note
80+
Different assignment types can be used for a single policy. For example, you may assign
7481
users to a policy by both OU and group at the same time.
82+
:::
83+
7584

7685
## Policy Assignment Conflicts
7786

0 commit comments

Comments
 (0)