Skip to content

Commit f28d9d4

Browse files
Merge pull request #227 from netwrix/fix-broken-kb-anchors
Fix broken KB anchor links
2 parents 99bf00f + 40e9770 commit f28d9d4

11 files changed

+52
-52
lines changed

docs/kb/1secure/how_to_confirm_permissions_for_active_directory_5._domains_0.collection_ad_domaincontrollers.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ How can you verify if the account used in Netwrix Enterprise Auditor (NEA) for t
2323

2424
The AD_DomainControllers job for the NEA Active Directory module uses the following permissions for a least privilege model:
2525

26-
- [Read access to CN=Servers, %SITEDN% and its children](#testcnsiteandchild)
27-
- [Read access to %PARTITIONDNS% and its children](#testpartandchild)
28-
- [Read access to %SCHEMADN%](#testschem)
29-
- [Read access to %SITESDN% and its children](#testsiteandchild)
26+
- Read access to CN=Servers, %SITEDN% and its children
27+
- Read access to %PARTITIONDNS% and its children
28+
- Read access to %SCHEMADN%
29+
- Read access to %SITESDN% and its children
3030

3131
### General Steps to Start with `ldp.exe`
3232

docs/kb/accessanalyzer/bulk-import-error-sql-logic-error-unknown-database-strucmap.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ This error message is the result of a discrepancy or corruption in the database'
3838

3939
## Resolutions
4040

41-
Please try both of the following resolutions. Start with resetting the hosts, and if the error persists, try [repairing the database](#repair). For both approaches, run the **Bulk Import Maintenance**, targeting the host(s) having the problem.
41+
Please try both of the following resolutions. Start with resetting the hosts, and if the error persists, try repairing the database. For both approaches, run the **Bulk Import Maintenance**, targeting the host(s) having the problem.
4242

4343
### Reset the Host(s)
4444

docs/kb/auditor/best-practices-for-securing-netwrix-auditor.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,12 +29,12 @@ This article outlines best practices for securing Netwrix Auditor, including lim
2929

3030
## Instructions
3131

32-
- [Limiting Access to the Netwrix Auditor Host](#limitaccess)
33-
- [Maintaining Roles in Netwrix Auditor](#maintainroles)
34-
- [Monitoring Netwrix Auditor Services](#monitorservices)
35-
- [Enabling Native Microsoft Security Tools](#MSsectools)
36-
- [Auditing Related Systems via Netwrix Auditor](#auditrelsys)
37-
- [Making Regular Offline Backups of the Long-Term Archive](#offlinebackups)
32+
- Limiting Access to the Netwrix Auditor Host
33+
- Maintaining Roles in Netwrix Auditor
34+
- Monitoring Netwrix Auditor Services
35+
- Enabling Native Microsoft Security Tools
36+
- Auditing Related Systems via Netwrix Auditor
37+
- Making Regular Offline Backups of the Long-Term Archive
3838

3939
### Limiting Access to the Netwrix Auditor Host
4040

docs/kb/auditor/customize-notifications-and-reports-in-password-expiration-notifier.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,12 +39,12 @@ How to customize Netwrix Auditor Netwrix Password Reset notifications and report
3939
4040
> **IMPORTANT:** Netwrix Password Reset uses UTF-8 encoding. Your email client should be set up to either automatically or explicitly detect UTF-8 encoding to correctly translate characters.
4141
42-
- [Locate templates](#locateTemplates)
43-
- [Insert an image to the user notification email template](#addImage)
44-
- [Insert a hyperlink to the user notification email template](#addHyperlink)
45-
- [Change the font size of the user notification email template](#changeFontSize)
46-
- [Include an attribute in the email template](#addAttribute)
47-
- [Edit email header and footer](#editHeader)
42+
- Locate templates
43+
- Insert an image to the user notification email template
44+
- Insert a hyperlink to the user notification email template
45+
- Change the font size of the user notification email template
46+
- Include an attribute in the email template
47+
- Edit email header and footer
4848
4949
### Locate templates
5050

docs/kb/directorymanager/enforce_group_naming_convention_and_input_validation_with_regular_expressions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ This article explains how to enforce group naming conventions and input validati
2121

2222
Enforcing naming standards is especially important when users have access to Active Directory via the User portal. The process involves two main steps:
2323

24-
- [Create a display type](#create-display-type)
25-
- [Associate the display type with the desired field](#associate-display-type)
24+
- Create a display type
25+
- Associate the display type with the desired field
2626

2727
## Instructions
2828

docs/kb/directorymanager/uninstall-or-fully-remove-directory-manager.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -51,14 +51,14 @@ This article explains how to uninstall Netwrix Directory Manager (formerly Group
5151
1. Click **Uninstall Directory Manager** on the installer to remove the application files from your computer.
5252
2. Remove the following components to completely uninstall Directory Manager:
5353

54-
- [Directory Manager installation directory](#remove-the-directory-manager-installation-directory)
55-
- [Other relevant directories](#remove-other-relevant-directories)
56-
- [Directory Manager DLLs](#remove-directory-manager-dlls)
57-
- [Registry keys](#remove-registry-keys)
58-
- [Services files](#remove-directory-manager-services-files)
59-
- [Self-Service and Password Center portal files](#remove-portal-files)
60-
- [Directory Manager application pool](#remove-the-directory-manager-application-pool)
61-
- [Directory Manager certificates](#remove-directory-manager-certificates)
54+
- Directory Manager installation directory
55+
- Other relevant directories
56+
- Directory Manager DLLs
57+
- Registry keys
58+
- Services files
59+
- Self-Service and Password Center portal files
60+
- Directory Manager application pool
61+
- Directory Manager certificates
6262

6363
### Remove the Directory Manager Installation Directory
6464

docs/kb/general/how-to-configure-google-drive-for-crawling.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ NOTE: For your convenience, the scopes are listed as comma-delimited. Google spl
142142
1. Log in to Netwrix Cloud Permission Analyzer.
143143
2. Read the **Get Started** section. Click **Continue**.
144144
3. In the Google Drive connection settings, provide the Google Drive administrator account under which you logged in to the **Google Cloud Platform** web console.
145-
4. Click **Import JSON file with Google service account settings** and select the file you downloaded on [step 4](#Key).
145+
4. Click **Import JSON file with Google service account settings** and select the file you downloaded on step 4.
146146
5. IMPORTANT! **Configure scope** – add your shared and/or personal Google Drives to the list. You can use a wildcard (`*`) if you want to crawl all drives in your Google Drive.
147147

148148
NOTE: By default, Netwrix Cloud Permission Analyzer collects Google Drive data once a day. If you modify your Google Drive configuration and save your changes, the product initiates data collection automatically.

docs/kb/privilegesecure/add-microsoft-entra-id-as-an-authentication-connector-saml.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ knowledge_article_id: kA04u0000000HRHCA2
2626

2727
## Summary
2828

29-
This article outlines the process of adding Microsoft Entra ID (formerly Azure AD) to Netwrix Privilege Secure as an Authentication Connector via SAML. The article is split into two sections, [Steps for Microsoft Entra ID](#steps-for-microsoft-entra-id) and [Steps for Netwrix Privilege Secure](#steps-for-netwrix-privilege-secure). The Microsoft Entra ID section must be completed first.
29+
This article outlines the process of adding Microsoft Entra ID (formerly Azure AD) to Netwrix Privilege Secure as an Authentication Connector via SAML. The article is split into two sections, Steps for Microsoft Entra ID and Steps for Netwrix Privilege Secure. The Microsoft Entra ID section must be completed first.
3030

3131
## Instructions
3232

@@ -70,11 +70,11 @@ This article outlines the process of adding Microsoft Entra ID (formerly Azure A
7070

7171
8. In the left sidebar, click on **Users and Groups**. Add a Microsoft Entra ID user to this page (**Add user/group** button near the top).
7272

73-
This user should be accessible to whoever will complete the [Steps for Netwrix Privilege Secure](#steps-for-netwrix-privilege-secure), as they need to be able to log in to this user to complete the Authentication Connector Configuration Wizard for SAML in Netwrix Privilege Secure.
73+
This user should be accessible to whoever will complete the Steps for Netwrix Privilege Secure, as they need to be able to log in to this user to complete the Authentication Connector Configuration Wizard for SAML in Netwrix Privilege Secure.
7474

7575
9. Sign-out of Microsoft Entra ID.
7676

77-
10. At this point, you should have the following pieces of information for use in the [Steps for Netwrix Privilege Secure](#steps-for-netwrix-privilege-secure):
77+
10. At this point, you should have the following pieces of information for use in the Steps for Netwrix Privilege Secure:
7878

7979
- **Certificate (Base64)**
8080
- **Login URL**
@@ -90,7 +90,7 @@ This article outlines the process of adding Microsoft Entra ID (formerly Azure A
9090
![User-added image](images/ka0Qk0000003IQD_0EM4u000004bUkn.png)
9191

9292
3. Click on **Configuration Wizard**.
93-
4. On the **Configure Client** page of that wizard, use the **Login URL** in the **Signin URI** field (the **Login URL** was obtained in the [Steps for Microsoft Entra ID](#steps-for-microsoft-entra-id)). All fields should now be filled in.
93+
4. On the **Configure Client** page of that wizard, use the **Login URL** in the **Signin URI** field (the **Login URL** was obtained in the Steps for Microsoft Entra ID). All fields should now be filled in.
9494

9595
![User-added image](images/ka0Qk0000003IQD_0EM4u000004bUks.png)
9696

@@ -99,8 +99,8 @@ This article outlines the process of adding Microsoft Entra ID (formerly Azure A
9999
On the page that loads (Microsoft Entra ID sign-in page), **DO NOT SIGN-IN**. Instead, once you've verified that the sign-in page loaded properly, click the back button in the browser to return to Netwrix Privilege Secure (the connection test was successful if Microsoft Entra ID didn't display an error).
100100

101101
6. Click **Next** to advance in the Authentication Connector Configuration Wizard. You’ll now be on the wizard's **Test Login** page.
102-
7. Open the certificate obtained during the [Steps for Microsoft Entra ID](#steps-for-microsoft-entra-id). Copy the text between `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----` into the **Certificate** field in the Authentication Connector Configuration Wizard.
103-
8. Click **Login**, and log in as the Microsoft Entra ID user associated with the Enterprise Application from Step 8 in the [Steps for Microsoft Entra ID](#steps-for-microsoft-entra-id). Upon successful sign-in, you’ll be redirected back to the wizard in Netwrix Privilege Secure.
102+
7. Open the certificate obtained during the Steps for Microsoft Entra ID. Copy the text between `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----` into the **Certificate** field in the Authentication Connector Configuration Wizard.
103+
8. Click **Login**, and log in as the Microsoft Entra ID user associated with the Enterprise Application from Step 8 in the Steps for Microsoft Entra ID. Upon successful sign-in, you’ll be redirected back to the wizard in Netwrix Privilege Secure.
104104

105105
If the sign-in was successful, the Provider User Name/Id will display. This is passed to the UserTokenController so that the user information can be extracted. Click **Next**.
106106

docs/kb/privilegesecure/slack-integration-send-slack-message.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,5 +63,5 @@ settings:
6363
4. The PowerShell window should quickly execute the script and close.
6464
5. Log in to the SbPAM console. (If SbPAM was already open, be sure to refresh the console.)
6565
6. In SbPAM, navigate to **Activities**, select an **Activity**, and click the green plus sign in either the **Pre-Session** or **Post-Session**. Note that the **Send Message to Slack** activity step is now available.
66-
7. Provide the URL from [step 6 of Preparing Your Slack App](#URL2) when configuring the action step.
66+
7. Provide the URL from step 6 of Preparing Your Slack App when configuring the action step.
6767
![image.png](images/ka0Qk0000001ELt_0EMQk000001ovYn.png)

docs/kb/privilegesecurediscovery/netwrix-privilege-secure-for-discovery-best-practices.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -38,20 +38,20 @@ This article will help you to understand Netwrix Privilege Secure for Discovery
3838

3939
> **NOTE:** Implementations can vary for organizational specifics
4040
41-
- [Netwrix Privilege Secure for Discovery Main Accounts](#ma)
42-
- [Service Accounts](#sa)
43-
- [Local Administrator, RID500, Account](#RID500)
44-
- [AD Cleanup](#adc)
45-
- [Groups for Access](#groups)
46-
- [GPO Changes](#gpo)
47-
- [Firewall Requirements](#firewall)
48-
- [VPN Access](#vpn)
49-
- [DMZ Access](#dmz)
50-
- [Multiple Domains](#Domains)
51-
- [DR Instance](#DR)
52-
- [Test Environments](#env)
53-
- [Load Balancing](#bal)
54-
- [JITA vs Deny](#jita)
41+
- Netwrix Privilege Secure for Discovery Main Accounts
42+
- Service Accounts
43+
- Local Administrator, RID500, Account
44+
- AD Cleanup
45+
- Groups for Access
46+
- GPO Changes
47+
- Firewall Requirements
48+
- VPN Access
49+
- DMZ Access
50+
- Multiple Domains
51+
- DR Instance
52+
- Test Environments
53+
- Load Balancing
54+
- JITA vs Deny
5555

5656
<a id="ma"></a>
5757
## Netwrix Privilege Secure for Discovery Main Accounts

0 commit comments

Comments
 (0)