Skip to content
Merged
  •  
  •  
  •  
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,10 @@ Use Groups Details page to edit selected group attributes.
Highlight the attribute to edit. Add or delete attributes using the buttons to the right of Insert
field.

**NOTE:** The options at the bottom of the page vary based on the highlighted attribute.
:::note
The options at the bottom of the page vary based on the highlighted attribute.
:::


- Insert field – Use the drop-down list to select a field (column) from the source table. Then,
click the blue arrow to insert the item into the Value box.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,10 @@ here. To change the order, select an operation and use the **Down** and **Up** b

## Delete Objects

**CAUTION:** Once deleted, objects from Active Directory cannot be restored.
:::warning
Once deleted, objects from Active Directory cannot be restored.
:::


Select this operation to delete objects from Active Directory, such as users, groups, or computers.
The source table determines which objects are deleted from the Active Directory. Therefore, this
Expand Down
38 changes: 21 additions & 17 deletions docs/accessanalyzer/11.6/admin/action/activedirectory/overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,9 +10,12 @@ Use the Active Directory Action Module to make bulk changes to objects in Micros
(AD) such as deleting users or changing group memberships. It is available with a special Enterprise
Auditor license.

**CAUTION:** Be careful when using this action module. Make sure that only the changes required are
:::warning
Be careful when using this action module. Make sure that only the changes required are
applied and only to those target systems desired. Actions perform their functions on all rows in a
table.
:::


Enterprise Auditor action modules contain one or more selectable operations. Each operation performs
its function on a single object per row from the source table defined in the action.
Expand All @@ -30,22 +33,23 @@ target objects along with the field type to indicate the type of data contained
The Operations page lists the operations that may be performed by the Active Directory Action
Module. Each operation may have its own source table column requirements as follows:

| Operation | Requirements |
| ----------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Clear/Set SID History | Column containing SID History information |
| Computer Details | No specific columns required |
| Disable/Enable Computers | No specific columns required |
| Create Groups | No specific columns required |
| Create Users | Column containing the user logon name **_RECOMMENDED:_** It is recommended that the source table has columns containing the following information: - First Name - Last name - Initials - Full name - Password - OU in which to create the user (This can also be created on the Create Users page) |
| Delete Objects (Users, Groups, Computers, etc.) | No specific columns required |
| Disable/Enable Users | No specific columns required |
| Group Details | No specific columns required |
| Group Membership | Column containing the target group OU or the target group NT style name |
| Groups Remove All Members | No specific columns required |
| Move Objects | Column containing an OU (Alternatively, type in the OU or click the ellipsis (…) to select an OU) |
| Set/Reset Users Password | No specific columns required |
| Unlock Users | No specific columns required |
| User Details | No specific columns required |
| Operation | Requirements |
| ----------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| Clear/Set SID History | Column containing SID History information |
| Computer Details | No specific columns required |
| Disable/Enable Computers | No specific columns required |
| Create Groups | No specific columns required |
| Create Users | Column containing the user logon name <br />**_RECOMMENDED:_** It is recommended that the source table has columns containing the following information: <ul><li>First Name</li><li>Last name</li><li>Initials</li><li>Full name</li><li>Password</li><li>OU in which to create the user (This can also be created on the Create Users page)</li></ul> |
| Delete Objects (Users, Groups, Computers, etc.) | No specific columns required |
| Disable/Enable Users | No specific columns required |
| Group Details | No specific columns required |
| Group Membership | Column containing the target group OU or the target group NT style name |
| Groups Remove All Members | No specific columns required |
| Move Objects | Column containing an OU (Alternatively, type in the OU or click the ellipsis (…) to select an OU) |
| Set/Reset Users Password | No specific columns required |
| Unlock Users | No specific columns required |
| User Details | No specific columns required |


## Configuration

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,5 +33,8 @@ Use the following options to configure the action:
- E-Mail
- Employee (employeeID)

**NOTE:** While one field is usually sufficient to identify AD objects, if specifying multiple
:::note
While one field is usually sufficient to identify AD objects, if specifying multiple
fields, each field type can only be used once.

:::
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,10 @@ Use this page to select and connect to a sample host, via which a set of remote
variables for use in scoping the action are loaded. Then, on the Target page, use the environment
variables to build dynamic file path locations for the selected operation.

**NOTE:** The environment variables from the local system load by default.
:::note
The environment variables from the local system load by default.
:::


![File System Action Module Wizard Environment page](/img/product_docs/accessanalyzer/11.6/admin/action/filesystem/environment.webp)

Expand Down
7 changes: 5 additions & 2 deletions docs/accessanalyzer/11.6/admin/action/filesystem/options.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,14 +46,17 @@ Select from the following additional operations:

- Batch size – Specify the batch size.

Start Process
**Start Process**

Select the desired start process.

**CAUTION:** Due to system security limitations, some applications and programs cannot be restarted
:::warning
Due to system security limitations, some applications and programs cannot be restarted
or run remotely using this option. Additionally, starting interactive processes (such as Word,
Excel, and so on) will load them into memory, but may not make them available for interaction by the
end user.
:::


Use the fields provided to select target items and hosts from the drop-down lists and populate the
Set working directory field, or edit the field manually. The Preview field updates based on the
Expand Down
Loading
Loading