Skip to content

Commit bae147e

Browse files
authored
Merge pull request #133 from netwrix/Ayesha/NTP7.4-Cleanup
Ayesha - NTP 7.4 cleanup
2 parents 805324a + 6276b75 commit bae147e

File tree

233 files changed

+2786
-1537
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

233 files changed

+2786
-1537
lines changed
File renamed without changes.

docs/threatprevention/7.4/admin/agents/agentmanagement/clearqueue.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,11 @@ SQLite Agent Queue option dumps the queue and all pending events are lost.
1212

1313
Follow the steps to clear the SQLite Agent queue for an Agent:
1414

15-
**CAUTION:** These events are permanently deleted and are not processed by the Enterprise Manager on
15+
:::warning
16+
These events are permanently deleted and are not processed by the Enterprise Manager on
1617
reconnection. This option is for diagnostic and troubleshooting purposes only.
18+
:::
19+
1720

1821
**Step 1 –** Click Agents in the left pane to launch the Agents interface.
1922

@@ -26,10 +29,13 @@ to connect to the target machine and query information about shares. A local Adm
2629
on the target machine should have access to the system shares. Click **OK** after entering the
2730
credentials.
2831

29-
**NOTE:** The wizard does not block access to the Administration Console and can be minimized while
32+
:::note
33+
The wizard does not block access to the Administration Console and can be minimized while
3034
actions are in progress. If this wizard is hidden by clicking outside of the dialog box, a flashing
3135
blue link displays on the upper right corner of the interface with the action name displayed. Click
3236
this link to bring back the focus to the wizard.
37+
:::
38+
3339

3440
**Step 4 –** On the Access Verification window, the given credentials either succeed or fail during
3541
a prerequisites or verification check.
@@ -38,8 +44,11 @@ a prerequisites or verification check.
3844
of prior to the next attempt.
3945
- Success – Click **Next** to begin clearing the SQLite Agent Queue
4046

41-
**NOTE:** Closing the Administration Console while this action is in process causes problems with
47+
:::note
48+
Closing the Administration Console while this action is in process causes problems with
4249
data collection.
50+
:::
51+
4352

4453
**Step 5 –** The Clear Agent Queue window displays the task in progress and then its status as
4554
either:

docs/threatprevention/7.4/admin/agents/agentmanagement/harden.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,13 @@ to connect to the target machine and query information about shares. A local Adm
2222
on the target machine should have access to the system shares. Click **OK** after entering the
2323
credentials.
2424

25-
**NOTE:** The wizard does not block access to the Administration Console and can be minimized while
25+
:::note
26+
The wizard does not block access to the Administration Console and can be minimized while
2627
actions are in progress. If this wizard is hidden by clicking outside of the dialog box, a flashing
2728
blue link displays on the upper right corner of the interface with the action name displayed. Click
2829
this link to bring back the focus to the wizard.
30+
:::
31+
2932

3033
**Step 4 –** On the Access Verification window, the given credentials either succeed or fail during
3134
a prerequisites or verification check.
@@ -34,8 +37,11 @@ a prerequisites or verification check.
3437
of prior to the next attempt.
3538
- Success – Click **Next** to begin hardening the Agent.
3639

37-
**NOTE:** Closing the Administration Console while this action is in process causes problems with
40+
:::note
41+
Closing the Administration Console while this action is in process causes problems with
3842
data collection.
43+
:::
44+
3945

4046
**Step 5 –** The Harden Agent window displays the task in progress and then its status as either:
4147

docs/threatprevention/7.4/admin/agents/agentmanagement/removeserver.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,11 @@ The Agents Interface displays a list of servers where the Agent has been deploye
1010
remove a server from this list for any reason, such as when the Agent is no longer required on the
1111
server.
1212

13-
**NOTE:** If the server has a deployed Agent, it will be added back to the list the next time the
13+
:::note
14+
If the server has a deployed Agent, it will be added back to the list the next time the
1415
Agent sends information to the Enterprise Manager.
16+
:::
17+
1518

1619
Follow the steps to remove a server from the list on the Agents Interface.
1720

docs/threatprevention/7.4/admin/agents/agentmanagement/soften.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,13 @@ to connect to the target machine and query information about shares. A local Adm
2222
on the target machine should have access to the system shares. Click **OK** after entering the
2323
credentials.
2424

25-
**NOTE:** The wizard does not block access to the Administration Console and can be minimized while
25+
:::note
26+
The wizard does not block access to the Administration Console and can be minimized while
2627
actions are in progress. If this wizard is hidden by clicking outside of the dialog box, a flashing
2728
blue link displays on the upper right corner of the interface with the action name displayed. Click
2829
this link to bring back the focus to the wizard.
30+
:::
31+
2932

3033
**Step 4 –** On the Access Verification window, the given credentials either succeed or fail during
3134
a prerequisites or verification check.
@@ -34,8 +37,11 @@ a prerequisites or verification check.
3437
of prior to the next attempt.
3538
- Success – Click **Next** to begin softening the Agent.
3639

37-
**NOTE:** Closing the Administration Console while this action is in process causes problems with
40+
:::note
41+
Closing the Administration Console while this action is in process causes problems with
3842
data collection.
43+
:::
44+
3945

4046
**Step 5 –** The Soften Agent window displays the task in progress and then its status as either:
4147

docs/threatprevention/7.4/admin/agents/agentmanagement/start.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,13 @@ to connect to the target machine and query information about shares. A local Adm
2222
on the target machine should have access to the system shares. Click **OK** after entering the
2323
credentials.
2424

25-
**NOTE:** The wizard does not block access to the Administration Console and can be minimized while
25+
:::note
26+
The wizard does not block access to the Administration Console and can be minimized while
2627
actions are in progress. If this wizard is hidden by clicking outside of the dialog box, a flashing
2728
blue link displays on the upper right corner of the interface with the action name displayed. Click
2829
this link to bring back the focus to the wizard.
30+
:::
31+
2932

3033
**Step 4 –** On the Start Agent window, the Agent will be started. One of two status messages
3134
display:

docs/threatprevention/7.4/admin/agents/agentmanagement/startpendingmodules.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,14 @@ Prevention administrator must start the Active Directory module. See the
1313
[Agent Safe Mode](/docs/threatprevention/7.4/admin/agents/safemode.md)
1414
topic for additional information.
1515

16-
**_RECOMMENDED:_** If multiple DCs are in the Start Pending Modules state, this means one of the
16+
:::info
17+
If multiple DCs are in the Start Pending Modules state, this means one of the
1718
monitored system DLLs was changed from when the Agent was last run. This could impact the operation
1819
of the Agent. It is recommended to enable the pending modules on one DC initially and verify that
1920
Threat Prevention is collecting events as expected from this specific DC and that the DC appears to
2021
be stable before starting the pending modules on additional DCs.
22+
:::
23+
2124

2225
Follow the steps to start pending modules on a server.
2326

docs/threatprevention/7.4/admin/agents/agentmanagement/stop.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,13 @@ to connect to the target machine and query information about shares. A local Adm
2121
on the target machine should have access to the system shares. Click **OK** after entering the
2222
credentials.
2323

24-
**NOTE:** The wizard does not block access to the Administration Console and can be minimized while
24+
:::note
25+
The wizard does not block access to the Administration Console and can be minimized while
2526
actions are in progress. If this wizard is hidden by clicking outside of the dialog box, a flashing
2627
blue link displays on the upper right corner of the interface with the action name displayed. Click
2728
this link to bring back the focus to the wizard.
29+
:::
30+
2831

2932
**Step 4 –** On the Stop Agent window, the Agent will be stopped. One of two status messages
3033
display:

docs/threatprevention/7.4/admin/agents/agentswindows/agentinstallerupdate.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ currently in use to the installer downloaded.
3939
- If the downloaded version is newer, the message displays both version numbers and provides an
4040
option to apply the update. Click **Apply Update**.
4141

42-
**NOTE:** When the Agent installer is replaced with a newer version, all Agents’ versions in the
42+
:::note
43+
When the Agent installer is replaced with a newer version, all Agents’ versions in the
4344
Agents interface are highlighted to indicate they are not the current version. Agents should then be
4445
updated to the new version, using the Upgrade Agent option on the right-click menu.
46+
47+
:::

docs/threatprevention/7.4/admin/agents/agentswindows/enrollmentsecretconfiguration.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,4 +46,7 @@ manually deploy the Agent. It has the following fields:
4646
- Click **Copy** to copy the enrollment secret and enter it in the Certificates window of the Agent
4747
Setup wizard during manual Agent installation.
4848

49-
**NOTE:** Restarting the Enterprise Manager cancels the current enrollment secret.
49+
:::note
50+
Restarting the Enterprise Manager cancels the current enrollment secret.
51+
52+
:::

0 commit comments

Comments
 (0)