You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/kb/1secure/how_to_confirm_permissions_for_active_directory_5._domains_0.collection_ad_domaincontrollers.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,10 +23,10 @@ How can you verify if the account used in Netwrix Enterprise Auditor (NEA) for t
23
23
24
24
The AD_DomainControllers job for the NEA Active Directory module uses the following permissions for a least privilege model:
25
25
26
-
-[Read access to CN=Servers, %SITEDN% and its children](#testcnsiteandchild)
27
-
-[Read access to %PARTITIONDNS% and its children](#testpartandchild)
28
-
-[Read access to %SCHEMADN%](#testschem)
29
-
-[Read access to %SITESDN% and its children](#testsiteandchild)
26
+
- Read access to CN=Servers, %SITEDN% and its children
Copy file name to clipboardExpand all lines: docs/kb/accessanalyzer/bulk-import-error-sql-logic-error-unknown-database-strucmap.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ This error message is the result of a discrepancy or corruption in the database'
38
38
39
39
## Resolutions
40
40
41
-
Please try both of the following resolutions. Start with resetting the hosts, and if the error persists, try [repairing the database](#repair). For both approaches, run the **Bulk Import Maintenance**, targeting the host(s) having the problem.
41
+
Please try both of the following resolutions. Start with resetting the hosts, and if the error persists, try repairing the database. For both approaches, run the **Bulk Import Maintenance**, targeting the host(s) having the problem.
Copy file name to clipboardExpand all lines: docs/kb/auditor/customize-notifications-and-reports-in-password-expiration-notifier.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,12 +39,12 @@ How to customize Netwrix Auditor Netwrix Password Reset notifications and report
39
39
40
40
> **IMPORTANT:** Netwrix Password Reset uses UTF-8 encoding. Your email client should be set up to either automatically or explicitly detect UTF-8 encoding to correctly translate characters.
41
41
42
-
- [Locate templates](#locateTemplates)
43
-
- [Insert an image to the user notification email template](#addImage)
44
-
- [Insert a hyperlink to the user notification email template](#addHyperlink)
45
-
- [Change the font size of the user notification email template](#changeFontSize)
46
-
- [Include an attribute in the email template](#addAttribute)
47
-
- [Edit email header and footer](#editHeader)
42
+
- Locate templates
43
+
- Insert an image to the user notification email template
44
+
- Insert a hyperlink to the user notification email template
45
+
- Change the font size of the user notification email template
Copy file name to clipboardExpand all lines: docs/kb/directorymanager/enforce_group_naming_convention_and_input_validation_with_regular_expressions.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,8 +21,8 @@ This article explains how to enforce group naming conventions and input validati
21
21
22
22
Enforcing naming standards is especially important when users have access to Active Directory via the User portal. The process involves two main steps:
23
23
24
-
-[Create a display type](#create-display-type)
25
-
-[Associate the display type with the desired field](#associate-display-type)
24
+
- Create a display type
25
+
- Associate the display type with the desired field
Copy file name to clipboardExpand all lines: docs/kb/general/how-to-configure-google-drive-for-crawling.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,7 +142,7 @@ NOTE: For your convenience, the scopes are listed as comma-delimited. Google spl
142
142
1. Log in to Netwrix Cloud Permission Analyzer.
143
143
2. Read the **Get Started** section. Click **Continue**.
144
144
3. In the Google Drive connection settings, provide the Google Drive administrator account under which you logged in to the **Google Cloud Platform** web console.
145
-
4. Click **Import JSON file with Google service account settings** and select the file you downloaded on [step 4](#Key).
145
+
4. Click **Import JSON file with Google service account settings** and select the file you downloaded on step 4.
146
146
5. IMPORTANT! **Configure scope** – add your shared and/or personal Google Drives to the list. You can use a wildcard (`*`) if you want to crawl all drives in your Google Drive.
147
147
148
148
NOTE: By default, Netwrix Cloud Permission Analyzer collects Google Drive data once a day. If you modify your Google Drive configuration and save your changes, the product initiates data collection automatically.
This article outlines the process of adding Microsoft Entra ID (formerly Azure AD) to Netwrix Privilege Secure as an Authentication Connector via SAML. The article is split into two sections, [Steps for Microsoft Entra ID](#steps-for-microsoft-entra-id) and [Steps for Netwrix Privilege Secure](#steps-for-netwrix-privilege-secure). The Microsoft Entra ID section must be completed first.
29
+
This article outlines the process of adding Microsoft Entra ID (formerly Azure AD) to Netwrix Privilege Secure as an Authentication Connector via SAML. The article is split into two sections, Steps for Microsoft Entra ID and Steps for Netwrix Privilege Secure. The Microsoft Entra ID section must be completed first.
30
30
31
31
## Instructions
32
32
@@ -70,11 +70,11 @@ This article outlines the process of adding Microsoft Entra ID (formerly Azure A
70
70
71
71
8. In the left sidebar, click on **Users and Groups**. Add a Microsoft Entra ID user to this page (**Add user/group** button near the top).
72
72
73
-
This user should be accessible to whoever will complete the [Steps for Netwrix Privilege Secure](#steps-for-netwrix-privilege-secure), as they need to be able to log in to this user to complete the Authentication Connector Configuration Wizard for SAML in Netwrix Privilege Secure.
73
+
This user should be accessible to whoever will complete the Steps for Netwrix Privilege Secure, as they need to be able to log in to this user to complete the Authentication Connector Configuration Wizard for SAML in Netwrix Privilege Secure.
74
74
75
75
9. Sign-out of Microsoft Entra ID.
76
76
77
-
10. At this point, you should have the following pieces of information for use in the [Steps for Netwrix Privilege Secure](#steps-for-netwrix-privilege-secure):
77
+
10. At this point, you should have the following pieces of information for use in the Steps for Netwrix Privilege Secure:
78
78
79
79
-**Certificate (Base64)**
80
80
-**Login URL**
@@ -90,7 +90,7 @@ This article outlines the process of adding Microsoft Entra ID (formerly Azure A
4. On the **Configure Client** page of that wizard, use the **Login URL** in the **Signin URI** field (the **Login URL** was obtained in the [Steps for Microsoft Entra ID](#steps-for-microsoft-entra-id)). All fields should now be filled in.
93
+
4. On the **Configure Client** page of that wizard, use the **Login URL** in the **Signin URI** field (the **Login URL** was obtained in the Steps for Microsoft Entra ID). All fields should now be filled in.
@@ -99,8 +99,8 @@ This article outlines the process of adding Microsoft Entra ID (formerly Azure A
99
99
On the page that loads (Microsoft Entra ID sign-in page), **DO NOT SIGN-IN**. Instead, once you've verified that the sign-in page loaded properly, click the back button in the browser to return to Netwrix Privilege Secure (the connection test was successful if Microsoft Entra ID didn't display an error).
100
100
101
101
6. Click **Next** to advance in the Authentication Connector Configuration Wizard. You’ll now be on the wizard's **Test Login** page.
102
-
7. Open the certificate obtained during the [Steps for Microsoft Entra ID](#steps-for-microsoft-entra-id). Copy the text between `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----` into the **Certificate** field in the Authentication Connector Configuration Wizard.
103
-
8. Click **Login**, and log in as the Microsoft Entra ID user associated with the Enterprise Application from Step 8 in the [Steps for Microsoft Entra ID](#steps-for-microsoft-entra-id). Upon successful sign-in, you’ll be redirected back to the wizard in Netwrix Privilege Secure.
102
+
7. Open the certificate obtained during the Steps for Microsoft Entra ID. Copy the text between `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----` into the **Certificate** field in the Authentication Connector Configuration Wizard.
103
+
8. Click **Login**, and log in as the Microsoft Entra ID user associated with the Enterprise Application from Step 8 in the Steps for Microsoft Entra ID. Upon successful sign-in, you’ll be redirected back to the wizard in Netwrix Privilege Secure.
104
104
105
105
If the sign-in was successful, the Provider User Name/Id will display. This is passed to the UserTokenController so that the user information can be extracted. Click **Next**.
Copy file name to clipboardExpand all lines: docs/kb/privilegesecure/slack-integration-send-slack-message.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,5 +63,5 @@ settings:
63
63
4. The PowerShell window should quickly execute the script and close.
64
64
5. Log in to the SbPAM console. (If SbPAM was already open, be sure to refresh the console.)
65
65
6. In SbPAM, navigate to **Activities**, select an **Activity**, and click the green plus sign in either the **Pre-Session** or **Post-Session**. Note that the **Send Message to Slack** activity step is now available.
66
-
7. Provide the URL from [step 6 of Preparing Your Slack App](#URL2) when configuring the action step.
66
+
7. Provide the URL from step 6 of Preparing Your Slack App when configuring the action step.
0 commit comments