diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fOGR.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fOGR.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fOGR.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fOGR.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fTch.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fTch.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fTch.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fTch.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fb5Z.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fb5Z.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fb5Z.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fb5Z.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fbGr.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fbGr.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fbGr.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fbGr.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fbNJ.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fbNJ.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fbNJ.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fbNJ.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fbTl.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fbTl.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fbTl.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fbTl.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fbWz.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fbWz.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004M3Z_0EMQk000005fbWz.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004M3Z_0EMQk000005fbWz.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lrve.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lrve.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lrve.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lrve.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005ls6y.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005ls6y.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005ls6y.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005ls6y.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lsoU.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lsoU.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lsoU.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lsoU.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lwId.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lwId.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lwId.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lwId.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lxoA.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lxoA.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lxoA.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lxoA.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lzGU.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lzGU.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lzGU.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lzGU.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m13n.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m13n.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m13n.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m13n.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3Ov.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3Ov.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3Ov.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3Ov.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3VN.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3VN.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3VN.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3VN.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3gf.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3gf.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3gf.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3gf.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lrve.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lrve.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lrve.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lrve.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005ls6y.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005ls6y.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005ls6y.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005ls6y.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lsoU.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lsoU.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lsoU.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lsoU.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lwId.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lwId.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lwId.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lwId.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lxoA.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lxoA.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lxoA.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lxoA.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lzGU.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lzGU.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005lzGU.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005lzGU.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005m13n.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005m13n.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005m13n.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005m13n.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005m3Ov.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005m3Ov.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005m3Ov.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005m3Ov.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005m3VN.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005m3VN.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005m3VN.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005m3VN.png diff --git a/docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005m3gf.png b/docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005m3gf.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk0000004Rkn_0EMQk000005m3gf.png rename to docs/kb/endpointprotector/0-images/ka0Qk0000004Rkn_0EMQk000005m3gf.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000DeHN_0EMQk00000CJ50H.png b/docs/kb/endpointprotector/0-images/ka0Qk000000DeHN_0EMQk00000CJ50H.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000DeHN_0EMQk00000CJ50H.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000DeHN_0EMQk00000CJ50H.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Dein_0EMQk00000CV0zJ.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Dein_0EMQk00000CV0zJ.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Dein_0EMQk00000CV0zJ.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Dein_0EMQk00000CV0zJ.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Drsv_0EMQk00000CB41O.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Drsv_0EMQk00000CB41O.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Drsv_0EMQk00000CB41O.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Drsv_0EMQk00000CB41O.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000DsH7_0EMQk00000CB1Rh.png b/docs/kb/endpointprotector/0-images/ka0Qk000000DsH7_0EMQk00000CB1Rh.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000DsH7_0EMQk00000CB1Rh.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000DsH7_0EMQk00000CB1Rh.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Dynx_0EMQk00000CKudS.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Dynx_0EMQk00000CKudS.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Dynx_0EMQk00000CKudS.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Dynx_0EMQk00000CKudS.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000DzDl_0EMQk00000BuWDN.png b/docs/kb/endpointprotector/0-images/ka0Qk000000DzDl_0EMQk00000BuWDN.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000DzDl_0EMQk00000BuWDN.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000DzDl_0EMQk00000BuWDN.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000DzDl_0EMQk00000BuWGb.png b/docs/kb/endpointprotector/0-images/ka0Qk000000DzDl_0EMQk00000BuWGb.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000DzDl_0EMQk00000BuWGb.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000DzDl_0EMQk00000BuWGb.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000DzDl_0EMQk00000BuWID.png b/docs/kb/endpointprotector/0-images/ka0Qk000000DzDl_0EMQk00000BuWID.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000DzDl_0EMQk00000BuWID.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000DzDl_0EMQk00000BuWID.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000DzDl_0EMQk00000BuWJp.png b/docs/kb/endpointprotector/0-images/ka0Qk000000DzDl_0EMQk00000BuWJp.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000DzDl_0EMQk00000BuWJp.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000DzDl_0EMQk00000BuWJp.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000DzFN_0EMQk00000C8zgv.png b/docs/kb/endpointprotector/0-images/ka0Qk000000DzFN_0EMQk00000C8zgv.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000DzFN_0EMQk00000C8zgv.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000DzFN_0EMQk00000C8zgv.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000DzNR_0EMQk00000BmNLl.png b/docs/kb/endpointprotector/0-images/ka0Qk000000DzNR_0EMQk00000BmNLl.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000DzNR_0EMQk00000BmNLl.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000DzNR_0EMQk00000BmNLl.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Dzor_0EMQk00000CAag4.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Dzor_0EMQk00000CAag4.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Dzor_0EMQk00000CAag4.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Dzor_0EMQk00000CAag4.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Dzor_0EMQk00000CAfxR.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Dzor_0EMQk00000CAfxR.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Dzor_0EMQk00000CAfxR.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Dzor_0EMQk00000CAfxR.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Dzor_0EMQk00000CAgof.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Dzor_0EMQk00000CAgof.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Dzor_0EMQk00000CAgof.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Dzor_0EMQk00000CAgof.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Dzs5_0EMQk00000CAOoZ.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Dzs5_0EMQk00000CAOoZ.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Dzs5_0EMQk00000CAOoZ.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Dzs5_0EMQk00000CAOoZ.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Dzth_0EMQk00000CJ1Co.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Dzth_0EMQk00000CJ1Co.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Dzth_0EMQk00000CJ1Co.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Dzth_0EMQk00000CJ1Co.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Dzth_0EMQk00000CJ9iD.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Dzth_0EMQk00000CJ9iD.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Dzth_0EMQk00000CJ9iD.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Dzth_0EMQk00000CJ9iD.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Dzth_0EMQk00000CJA4n.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Dzth_0EMQk00000CJA4n.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Dzth_0EMQk00000CJA4n.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Dzth_0EMQk00000CJA4n.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000E5mD_0EMQk00000CnKbO.png b/docs/kb/endpointprotector/0-images/ka0Qk000000E5mD_0EMQk00000CnKbO.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000E5mD_0EMQk00000CnKbO.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000E5mD_0EMQk00000CnKbO.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000E7Pp_0EMQk00000C51uD.png b/docs/kb/endpointprotector/0-images/ka0Qk000000E7Pp_0EMQk00000C51uD.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000E7Pp_0EMQk00000C51uD.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000E7Pp_0EMQk00000C51uD.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000E7ZV_0EMQk00000C52IP.png b/docs/kb/endpointprotector/0-images/ka0Qk000000E7ZV_0EMQk00000C52IP.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000E7ZV_0EMQk00000C52IP.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000E7ZV_0EMQk00000C52IP.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000E7fx_0EMQk00000C51as.png b/docs/kb/endpointprotector/0-images/ka0Qk000000E7fx_0EMQk00000C51as.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000E7fx_0EMQk00000C51as.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000E7fx_0EMQk00000C51as.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000E7fx_0EMQk00000C51pO.png b/docs/kb/endpointprotector/0-images/ka0Qk000000E7fx_0EMQk00000C51pO.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000E7fx_0EMQk00000C51pO.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000E7fx_0EMQk00000C51pO.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000EPcr_0EMQk00000C8ekY.png b/docs/kb/endpointprotector/0-images/ka0Qk000000EPcr_0EMQk00000C8ekY.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000EPcr_0EMQk00000C8ekY.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000EPcr_0EMQk00000C8ekY.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000EPcr_0EMQk00000C8gO9.png b/docs/kb/endpointprotector/0-images/ka0Qk000000EPcr_0EMQk00000C8gO9.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000EPcr_0EMQk00000C8gO9.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000EPcr_0EMQk00000C8gO9.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ES65_0EMQk00000C528j.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ES65_0EMQk00000C528j.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ES65_0EMQk00000C528j.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ES65_0EMQk00000C528j.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ES65_0EMQk00000C52DZ.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ES65_0EMQk00000C52DZ.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ES65_0EMQk00000C52DZ.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ES65_0EMQk00000C52DZ.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ES7h_0EMQk00000Cp0a9.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ES7h_0EMQk00000Cp0a9.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ES7h_0EMQk00000Cp0a9.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ES7h_0EMQk00000Cp0a9.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ES7h_0EMQk00000Cp0ez.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ES7h_0EMQk00000Cp0ez.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ES7h_0EMQk00000Cp0ez.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ES7h_0EMQk00000Cp0ez.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ESKb_0EMQk00000C8iL7.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ESKb_0EMQk00000C8iL7.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ESKb_0EMQk00000C8iL7.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ESKb_0EMQk00000C8iL7.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ESMD_0EMQk00000C8gT0.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ESMD_0EMQk00000C8gT0.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ESMD_0EMQk00000C8gT0.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ESMD_0EMQk00000C8gT0.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ESkP_0EMQk00000C7Jbh.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ESkP_0EMQk00000C7Jbh.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ESkP_0EMQk00000C7Jbh.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ESkP_0EMQk00000C7Jbh.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ESnd_0EMQk00000C7Bfn.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ESnd_0EMQk00000C7Bfn.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ESnd_0EMQk00000C7Bfn.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ESnd_0EMQk00000C7Bfn.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ESnd_0EMQk00000C7LTp.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ESnd_0EMQk00000C7LTp.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ESnd_0EMQk00000C7LTp.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ESnd_0EMQk00000C7LTp.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ESsT_0EMQk00000C77qh.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ESsT_0EMQk00000C77qh.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ESsT_0EMQk00000C77qh.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ESsT_0EMQk00000C77qh.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ETF3_0EMQk00000C8rLD.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ETF3_0EMQk00000C8rLD.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ETF3_0EMQk00000C8rLD.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ETF3_0EMQk00000C8rLD.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ETF3_0EMQk00000C8rxt.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ETF3_0EMQk00000C8rxt.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ETF3_0EMQk00000C8rxt.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ETF3_0EMQk00000C8rxt.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ETJt_0EMQk00000C8uB1.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ETJt_0EMQk00000C8uB1.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ETJt_0EMQk00000C8uB1.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ETJt_0EMQk00000C8uB1.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ETJt_0EMQk00000C8uNt.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ETJt_0EMQk00000C8uNt.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ETJt_0EMQk00000C8uNt.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ETJt_0EMQk00000C8uNt.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000ETN7_0EMQk00000C91kL.png b/docs/kb/endpointprotector/0-images/ka0Qk000000ETN7_0EMQk00000C91kL.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000ETN7_0EMQk00000C91kL.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000ETN7_0EMQk00000C91kL.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Ea6r_0EMQk00000CAcMt.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Ea6r_0EMQk00000CAcMt.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Ea6r_0EMQk00000CAcMt.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Ea6r_0EMQk00000CAcMt.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Ea6r_0EMQk00000CAivK.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Ea6r_0EMQk00000CAivK.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Ea6r_0EMQk00000CAivK.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Ea6r_0EMQk00000CAivK.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Ea6r_0EMQk00000CAkDx.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Ea6r_0EMQk00000CAkDx.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Ea6r_0EMQk00000CAkDx.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Ea6r_0EMQk00000CAkDx.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000EaBh_0EMQk00000CD9g6.png b/docs/kb/endpointprotector/0-images/ka0Qk000000EaBh_0EMQk00000CD9g6.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000EaBh_0EMQk00000CD9g6.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000EaBh_0EMQk00000CD9g6.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000EaoP_0EMQk00000BmIKT.png b/docs/kb/endpointprotector/0-images/ka0Qk000000EaoP_0EMQk00000BmIKT.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000EaoP_0EMQk00000BmIKT.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000EaoP_0EMQk00000BmIKT.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAOF3.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAOF3.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAOF3.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAOF3.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAOGf.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAOGf.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAOGf.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAOGf.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAOIH.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAOIH.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAOIH.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAOIH.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAOJt.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAOJt.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAOJt.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAOJt.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAON7.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAON7.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Eb4X_0EMQk00000CAON7.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Eb4X_0EMQk00000CAON7.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000Eb9N_0EMQk00000CAPJB.png b/docs/kb/endpointprotector/0-images/ka0Qk000000Eb9N_0EMQk00000CAPJB.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000Eb9N_0EMQk00000CAPJB.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000Eb9N_0EMQk00000CAPJB.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000EbSj_0EMQk00000CAaeP.png b/docs/kb/endpointprotector/0-images/ka0Qk000000EbSj_0EMQk00000CAaeP.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000EbSj_0EMQk00000CAaeP.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000EbSj_0EMQk00000CAaeP.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000EbSj_0EMQk00000CAmm2.png b/docs/kb/endpointprotector/0-images/ka0Qk000000EbSj_0EMQk00000CAmm2.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000EbSj_0EMQk00000CAmm2.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000EbSj_0EMQk00000CAmm2.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000EcJx_0EMQk00000C91kM.png b/docs/kb/endpointprotector/0-images/ka0Qk000000EcJx_0EMQk00000C91kM.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000EcJx_0EMQk00000C91kM.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000EcJx_0EMQk00000C91kM.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000FAYX_0EMQk00000CAOoY.png b/docs/kb/endpointprotector/0-images/ka0Qk000000FAYX_0EMQk00000CAOoY.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000FAYX_0EMQk00000CAOoY.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000FAYX_0EMQk00000CAOoY.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000FAYX_0EMQk00000CAPiz.png b/docs/kb/endpointprotector/0-images/ka0Qk000000FAYX_0EMQk00000CAPiz.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000FAYX_0EMQk00000CAPiz.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000FAYX_0EMQk00000CAPiz.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000FAYX_0EMQk00000DgyY9.png b/docs/kb/endpointprotector/0-images/ka0Qk000000FAYX_0EMQk00000DgyY9.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000FAYX_0EMQk00000DgyY9.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000FAYX_0EMQk00000DgyY9.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000FAdN_0EMQk00000Dgxc5.png b/docs/kb/endpointprotector/0-images/ka0Qk000000FAdN_0EMQk00000Dgxc5.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000FAdN_0EMQk00000Dgxc5.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000FAdN_0EMQk00000Dgxc5.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000FFRl_0EMQk00000C7FeY.png b/docs/kb/endpointprotector/0-images/ka0Qk000000FFRl_0EMQk00000C7FeY.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000FFRl_0EMQk00000C7FeY.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000FFRl_0EMQk00000C7FeY.png diff --git a/docs/kb/endpointprotector/images/ka0Qk000000FKT3_0EMQk00000CAP34.png b/docs/kb/endpointprotector/0-images/ka0Qk000000FKT3_0EMQk00000CAP34.png similarity index 100% rename from docs/kb/endpointprotector/images/ka0Qk000000FKT3_0EMQk00000CAP34.png rename to docs/kb/endpointprotector/0-images/ka0Qk000000FKT3_0EMQk00000CAP34.png diff --git a/docs/kb/endpointprotector/images/servlet_image_01861a9421d2.png b/docs/kb/endpointprotector/0-images/servlet_image_01861a9421d2.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_01861a9421d2.png rename to docs/kb/endpointprotector/0-images/servlet_image_01861a9421d2.png diff --git a/docs/kb/endpointprotector/images/servlet_image_055f8013da42.png b/docs/kb/endpointprotector/0-images/servlet_image_055f8013da42.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_055f8013da42.png rename to docs/kb/endpointprotector/0-images/servlet_image_055f8013da42.png diff --git a/docs/kb/endpointprotector/images/servlet_image_06bccc2709d5.png b/docs/kb/endpointprotector/0-images/servlet_image_06bccc2709d5.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_06bccc2709d5.png rename to docs/kb/endpointprotector/0-images/servlet_image_06bccc2709d5.png diff --git a/docs/kb/endpointprotector/images/servlet_image_089dc363ae67.png b/docs/kb/endpointprotector/0-images/servlet_image_089dc363ae67.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_089dc363ae67.png rename to docs/kb/endpointprotector/0-images/servlet_image_089dc363ae67.png diff --git a/docs/kb/endpointprotector/images/servlet_image_13588715e752.png b/docs/kb/endpointprotector/0-images/servlet_image_13588715e752.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_13588715e752.png rename to docs/kb/endpointprotector/0-images/servlet_image_13588715e752.png diff --git a/docs/kb/endpointprotector/images/servlet_image_138e8d943c1b.png b/docs/kb/endpointprotector/0-images/servlet_image_138e8d943c1b.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_138e8d943c1b.png rename to docs/kb/endpointprotector/0-images/servlet_image_138e8d943c1b.png diff --git a/docs/kb/endpointprotector/images/servlet_image_18cc5d89ac43.png b/docs/kb/endpointprotector/0-images/servlet_image_18cc5d89ac43.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_18cc5d89ac43.png rename to docs/kb/endpointprotector/0-images/servlet_image_18cc5d89ac43.png diff --git a/docs/kb/endpointprotector/images/servlet_image_1a8a53e40ad6.png b/docs/kb/endpointprotector/0-images/servlet_image_1a8a53e40ad6.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_1a8a53e40ad6.png rename to docs/kb/endpointprotector/0-images/servlet_image_1a8a53e40ad6.png diff --git a/docs/kb/endpointprotector/images/servlet_image_1e592ef62413.png b/docs/kb/endpointprotector/0-images/servlet_image_1e592ef62413.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_1e592ef62413.png rename to docs/kb/endpointprotector/0-images/servlet_image_1e592ef62413.png diff --git a/docs/kb/endpointprotector/images/servlet_image_1ec78e31c389.png b/docs/kb/endpointprotector/0-images/servlet_image_1ec78e31c389.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_1ec78e31c389.png rename to docs/kb/endpointprotector/0-images/servlet_image_1ec78e31c389.png diff --git a/docs/kb/endpointprotector/images/servlet_image_263da6ad1bf4.png b/docs/kb/endpointprotector/0-images/servlet_image_263da6ad1bf4.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_263da6ad1bf4.png rename to docs/kb/endpointprotector/0-images/servlet_image_263da6ad1bf4.png diff --git a/docs/kb/endpointprotector/images/servlet_image_2ab25cdeee54.png b/docs/kb/endpointprotector/0-images/servlet_image_2ab25cdeee54.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_2ab25cdeee54.png rename to docs/kb/endpointprotector/0-images/servlet_image_2ab25cdeee54.png diff --git a/docs/kb/endpointprotector/images/servlet_image_2f2abfe498d8.png b/docs/kb/endpointprotector/0-images/servlet_image_2f2abfe498d8.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_2f2abfe498d8.png rename to docs/kb/endpointprotector/0-images/servlet_image_2f2abfe498d8.png diff --git a/docs/kb/endpointprotector/images/servlet_image_3f1c3b331cfe.png b/docs/kb/endpointprotector/0-images/servlet_image_3f1c3b331cfe.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_3f1c3b331cfe.png rename to docs/kb/endpointprotector/0-images/servlet_image_3f1c3b331cfe.png diff --git a/docs/kb/endpointprotector/images/servlet_image_40736f16d061.png b/docs/kb/endpointprotector/0-images/servlet_image_40736f16d061.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_40736f16d061.png rename to docs/kb/endpointprotector/0-images/servlet_image_40736f16d061.png diff --git a/docs/kb/endpointprotector/images/servlet_image_5271b231d0a2.png b/docs/kb/endpointprotector/0-images/servlet_image_5271b231d0a2.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_5271b231d0a2.png rename to docs/kb/endpointprotector/0-images/servlet_image_5271b231d0a2.png diff --git a/docs/kb/endpointprotector/images/servlet_image_5840481544b9.png b/docs/kb/endpointprotector/0-images/servlet_image_5840481544b9.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_5840481544b9.png rename to docs/kb/endpointprotector/0-images/servlet_image_5840481544b9.png diff --git a/docs/kb/endpointprotector/images/servlet_image_5843306691b5.png b/docs/kb/endpointprotector/0-images/servlet_image_5843306691b5.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_5843306691b5.png rename to docs/kb/endpointprotector/0-images/servlet_image_5843306691b5.png diff --git a/docs/kb/endpointprotector/images/servlet_image_60b30f91932d.png b/docs/kb/endpointprotector/0-images/servlet_image_60b30f91932d.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_60b30f91932d.png rename to docs/kb/endpointprotector/0-images/servlet_image_60b30f91932d.png diff --git a/docs/kb/endpointprotector/images/servlet_image_618265510504.png b/docs/kb/endpointprotector/0-images/servlet_image_618265510504.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_618265510504.png rename to docs/kb/endpointprotector/0-images/servlet_image_618265510504.png diff --git a/docs/kb/endpointprotector/images/servlet_image_65b2f6cd5406.png b/docs/kb/endpointprotector/0-images/servlet_image_65b2f6cd5406.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_65b2f6cd5406.png rename to docs/kb/endpointprotector/0-images/servlet_image_65b2f6cd5406.png diff --git a/docs/kb/endpointprotector/images/servlet_image_6bd0b54ef795.png b/docs/kb/endpointprotector/0-images/servlet_image_6bd0b54ef795.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_6bd0b54ef795.png rename to docs/kb/endpointprotector/0-images/servlet_image_6bd0b54ef795.png diff --git a/docs/kb/endpointprotector/images/servlet_image_72f774ab3bed.png b/docs/kb/endpointprotector/0-images/servlet_image_72f774ab3bed.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_72f774ab3bed.png rename to docs/kb/endpointprotector/0-images/servlet_image_72f774ab3bed.png diff --git a/docs/kb/endpointprotector/images/servlet_image_744e12be3cff.png b/docs/kb/endpointprotector/0-images/servlet_image_744e12be3cff.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_744e12be3cff.png rename to docs/kb/endpointprotector/0-images/servlet_image_744e12be3cff.png diff --git a/docs/kb/endpointprotector/images/servlet_image_7abe59223977.png b/docs/kb/endpointprotector/0-images/servlet_image_7abe59223977.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_7abe59223977.png rename to docs/kb/endpointprotector/0-images/servlet_image_7abe59223977.png diff --git a/docs/kb/endpointprotector/images/servlet_image_7fc401abe1e3.png b/docs/kb/endpointprotector/0-images/servlet_image_7fc401abe1e3.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_7fc401abe1e3.png rename to docs/kb/endpointprotector/0-images/servlet_image_7fc401abe1e3.png diff --git a/docs/kb/endpointprotector/images/servlet_image_823648e31f8f.png b/docs/kb/endpointprotector/0-images/servlet_image_823648e31f8f.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_823648e31f8f.png rename to docs/kb/endpointprotector/0-images/servlet_image_823648e31f8f.png diff --git a/docs/kb/endpointprotector/images/servlet_image_8cfbf5692849.png b/docs/kb/endpointprotector/0-images/servlet_image_8cfbf5692849.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_8cfbf5692849.png rename to docs/kb/endpointprotector/0-images/servlet_image_8cfbf5692849.png diff --git a/docs/kb/endpointprotector/images/servlet_image_8da7245d9529.png b/docs/kb/endpointprotector/0-images/servlet_image_8da7245d9529.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_8da7245d9529.png rename to docs/kb/endpointprotector/0-images/servlet_image_8da7245d9529.png diff --git a/docs/kb/endpointprotector/images/servlet_image_910151bbafe1.png b/docs/kb/endpointprotector/0-images/servlet_image_910151bbafe1.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_910151bbafe1.png rename to docs/kb/endpointprotector/0-images/servlet_image_910151bbafe1.png diff --git a/docs/kb/endpointprotector/images/servlet_image_96e38073d295.png b/docs/kb/endpointprotector/0-images/servlet_image_96e38073d295.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_96e38073d295.png rename to docs/kb/endpointprotector/0-images/servlet_image_96e38073d295.png diff --git a/docs/kb/endpointprotector/images/servlet_image_97c005a48040.png b/docs/kb/endpointprotector/0-images/servlet_image_97c005a48040.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_97c005a48040.png rename to docs/kb/endpointprotector/0-images/servlet_image_97c005a48040.png diff --git a/docs/kb/endpointprotector/images/servlet_image_9aa4123f77f5.png b/docs/kb/endpointprotector/0-images/servlet_image_9aa4123f77f5.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_9aa4123f77f5.png rename to docs/kb/endpointprotector/0-images/servlet_image_9aa4123f77f5.png diff --git a/docs/kb/endpointprotector/images/servlet_image_9e6a518233f7.png b/docs/kb/endpointprotector/0-images/servlet_image_9e6a518233f7.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_9e6a518233f7.png rename to docs/kb/endpointprotector/0-images/servlet_image_9e6a518233f7.png diff --git a/docs/kb/endpointprotector/images/servlet_image_a0bcad6af822.png b/docs/kb/endpointprotector/0-images/servlet_image_a0bcad6af822.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_a0bcad6af822.png rename to docs/kb/endpointprotector/0-images/servlet_image_a0bcad6af822.png diff --git a/docs/kb/endpointprotector/images/servlet_image_b9e7bd968d5d.png b/docs/kb/endpointprotector/0-images/servlet_image_b9e7bd968d5d.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_b9e7bd968d5d.png rename to docs/kb/endpointprotector/0-images/servlet_image_b9e7bd968d5d.png diff --git a/docs/kb/endpointprotector/images/servlet_image_baa2795f8fd3.png b/docs/kb/endpointprotector/0-images/servlet_image_baa2795f8fd3.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_baa2795f8fd3.png rename to docs/kb/endpointprotector/0-images/servlet_image_baa2795f8fd3.png diff --git a/docs/kb/endpointprotector/images/servlet_image_bd860b27c3ec.png b/docs/kb/endpointprotector/0-images/servlet_image_bd860b27c3ec.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_bd860b27c3ec.png rename to docs/kb/endpointprotector/0-images/servlet_image_bd860b27c3ec.png diff --git a/docs/kb/endpointprotector/images/servlet_image_c1cc54905886.png b/docs/kb/endpointprotector/0-images/servlet_image_c1cc54905886.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_c1cc54905886.png rename to docs/kb/endpointprotector/0-images/servlet_image_c1cc54905886.png diff --git a/docs/kb/endpointprotector/images/servlet_image_cc8577ae8f6b.png b/docs/kb/endpointprotector/0-images/servlet_image_cc8577ae8f6b.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_cc8577ae8f6b.png rename to docs/kb/endpointprotector/0-images/servlet_image_cc8577ae8f6b.png diff --git a/docs/kb/endpointprotector/images/servlet_image_d1e926f5d4e6.png b/docs/kb/endpointprotector/0-images/servlet_image_d1e926f5d4e6.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_d1e926f5d4e6.png rename to docs/kb/endpointprotector/0-images/servlet_image_d1e926f5d4e6.png diff --git a/docs/kb/endpointprotector/images/servlet_image_d669c51c8b7d.png b/docs/kb/endpointprotector/0-images/servlet_image_d669c51c8b7d.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_d669c51c8b7d.png rename to docs/kb/endpointprotector/0-images/servlet_image_d669c51c8b7d.png diff --git a/docs/kb/endpointprotector/images/servlet_image_df060b1c08ad.png b/docs/kb/endpointprotector/0-images/servlet_image_df060b1c08ad.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_df060b1c08ad.png rename to docs/kb/endpointprotector/0-images/servlet_image_df060b1c08ad.png diff --git a/docs/kb/endpointprotector/images/servlet_image_e95427bb0c8e.png b/docs/kb/endpointprotector/0-images/servlet_image_e95427bb0c8e.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_e95427bb0c8e.png rename to docs/kb/endpointprotector/0-images/servlet_image_e95427bb0c8e.png diff --git a/docs/kb/endpointprotector/images/servlet_image_e9d389c827d7.png b/docs/kb/endpointprotector/0-images/servlet_image_e9d389c827d7.png similarity index 100% rename from docs/kb/endpointprotector/images/servlet_image_e9d389c827d7.png rename to docs/kb/endpointprotector/0-images/servlet_image_e9d389c827d7.png diff --git a/docs/kb/endpointprotector/ad_admins_not_able_to_log_in.md b/docs/kb/endpointprotector/administration-security-and-monitoring/ad_admins_not_able_to_log_in.md similarity index 90% rename from docs/kb/endpointprotector/ad_admins_not_able_to_log_in.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/ad_admins_not_able_to_log_in.md index b11cb50b1b..bf38676bcb 100644 --- a/docs/kb/endpointprotector/ad_admins_not_able_to_log_in.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/ad_admins_not_able_to_log_in.md @@ -6,7 +6,8 @@ keywords: - AD Authentication - Endpoint Protector sidebar_label: AD Admin Login Issues -tags: [] +tags: + - administration-security-and-monitoring title: "AD Admins Not Able to Log In" knowledge_article_id: kA0Qk0000002B31KAE products: @@ -25,4 +26,4 @@ This article explains how to resolve issues where Active Directory (AD) administ 2. Navigate to **System Configuration** > **System Security** to ensure they match the configuration shown below. - ![Password settings in System Security section of Endpoint Protector](./images/servlet_image_40736f16d061.png) \ No newline at end of file + ![Password settings in System Security section of Endpoint Protector](./../0-images/servlet_image_40736f16d061.png) \ No newline at end of file diff --git a/docs/kb/endpointprotector/configure-session-timeout-in-the-administration-interface.md b/docs/kb/endpointprotector/administration-security-and-monitoring/configure-session-timeout-in-the-administration-interface.md similarity index 96% rename from docs/kb/endpointprotector/configure-session-timeout-in-the-administration-interface.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/configure-session-timeout-in-the-administration-interface.md index b0437c4503..259fc98aa1 100644 --- a/docs/kb/endpointprotector/configure-session-timeout-in-the-administration-interface.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/configure-session-timeout-in-the-administration-interface.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Configure Session Timeout in the Administration In -tags: [] +tags: + - administration-security-and-monitoring title: "Configure Session Timeout in the Administration Interface" knowledge_article_id: kA0Qk0000002B7WKAU --- diff --git a/docs/kb/endpointprotector/configure-session-timeout-settings-for-the-administration-interface.md b/docs/kb/endpointprotector/administration-security-and-monitoring/configure-session-timeout-settings-for-the-administration-interface.md similarity index 93% rename from docs/kb/endpointprotector/configure-session-timeout-settings-for-the-administration-interface.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/configure-session-timeout-settings-for-the-administration-interface.md index c2e46f6a2b..4c0fecb42e 100644 --- a/docs/kb/endpointprotector/configure-session-timeout-settings-for-the-administration-interface.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/configure-session-timeout-settings-for-the-administration-interface.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Configure Session Timeout Settings for the Adminis -tags: [] +tags: + - administration-security-and-monitoring title: "Configure Session Timeout Settings for the Administration Interface" knowledge_article_id: kA0Qk0000002BDxKAM --- @@ -29,7 +30,7 @@ Netwrix Endpoint Protector Server includes a session timeout feature for the Adm ## Instructions 1. Go to **System Configuration** > **System Settings** > **Session Settings** in the Netwrix Endpoint Protector Management Console. - ![Session Settings in System Configuration of Endpoint Protector](./images/ka0Qk000000ESnd_0EMQk00000C7Bfn.png) + ![Session Settings in System Configuration of Endpoint Protector](./../0-images/ka0Qk000000ESnd_0EMQk00000C7Bfn.png) 2. Modify the session timeout settings as needed: - **Session Timeout**: Set the amount of time (between `5` and `60` minutes) a user can be inactive before the session expires. @@ -38,4 +39,4 @@ Netwrix Endpoint Protector Server includes a session timeout feature for the Adm > **NOTE:** If **Session Timeout** is set to `5` minutes and **Timeout Counter** is set to `60` seconds, after `4` minutes of inactivity a pop-up window will notify you that you will be logged out in `60` seconds. 3. If no activity occurs during the countdown, Netwrix Endpoint Protector displays a message indicating the session will expire. You can choose to log out or continue your session, which resets the session timeout interval. - ![Session expiration warning in Endpoint Protector Management Console](./images/ka0Qk000000ESnd_0EMQk00000C7LTp.png) + ![Session expiration warning in Endpoint Protector Management Console](./../0-images/ka0Qk000000ESnd_0EMQk00000C7LTp.png) diff --git a/docs/kb/endpointprotector/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app.md b/docs/kb/endpointprotector/administration-security-and-monitoring/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app.md similarity index 94% rename from docs/kb/endpointprotector/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app.md index 4d20cb97d5..1edb8a1eed 100644 --- a/docs/kb/endpointprotector/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app.md @@ -6,7 +6,8 @@ keywords: - Google Authenticator - Endpoint Protector sidebar_label: Enable 2FA for System Admins -tags: [] +tags: + - administration-security-and-monitoring title: "Enable Two-Factor Authentication for System Admins with Google Authenticator App" knowledge_article_id: kA0Qk0000002B34KAE products: @@ -24,7 +25,7 @@ This article explains how to enable two-factor authentication (2FA) for system a 1. Navigate to **System Configuration > System Administrators** in Endpoint Protector. 2. Find the system administrator and toggle the switch labeled **Two Factor Authenticator** to **On**. -![Two Factor Authenticator toggle for system administrator in Endpoint Protector](./images/servlet_image_618265510504.png) +![Two Factor Authenticator toggle for system administrator in Endpoint Protector](./../0-images/servlet_image_618265510504.png) 3. Scan the **QR Code** with the **Google Authenticator app** or enter the provided code into the app to configure the authenticator app. 4. Enter the authentication code from the app into the **Google 2FA Validation** field in Endpoint Protector after importing the account. diff --git a/docs/kb/endpointprotector/error-computers-displayed-as-unlicensed-under-list-of-computers.md b/docs/kb/endpointprotector/administration-security-and-monitoring/error-computers-displayed-as-unlicensed-under-list-of-computers.md similarity index 97% rename from docs/kb/endpointprotector/error-computers-displayed-as-unlicensed-under-list-of-computers.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/error-computers-displayed-as-unlicensed-under-list-of-computers.md index 4b4e64338c..438602a14c 100644 --- a/docs/kb/endpointprotector/error-computers-displayed-as-unlicensed-under-list-of-computers.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/error-computers-displayed-as-unlicensed-under-list-of-computers.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: 'Error: Computers Displayed as "Unlicensed" Under List of Computers' -tags: [] +tags: + - administration-security-and-monitoring title: 'Error: Computers Displayed as "Unlicensed" Under List of Computers' knowledge_article_id: kA0Qk0000002B6HKAU --- diff --git a/docs/kb/endpointprotector/export-event-logs-from-reports-and-analysis.md b/docs/kb/endpointprotector/administration-security-and-monitoring/export-event-logs-from-reports-and-analysis.md similarity index 80% rename from docs/kb/endpointprotector/export-event-logs-from-reports-and-analysis.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/export-event-logs-from-reports-and-analysis.md index 3caa2e1d8e..2a573fa8b4 100644 --- a/docs/kb/endpointprotector/export-event-logs-from-reports-and-analysis.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/export-event-logs-from-reports-and-analysis.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Export Event Logs from Reports and Analysis -tags: [] +tags: + - administration-security-and-monitoring title: "Export Event Logs from Reports and Analysis" knowledge_article_id: kA0Qk0000002B13KAE --- @@ -29,9 +30,9 @@ This article explains how to export selected event logs from the **Reports and A 1. On the Endpoint Protector server, navigate to **Reports and Analysis**. 2. Apply a filter for the desired event logs. - ![Applying filter for Blocked events in Reports and Analysis](./images/ka0Qk000000Ea6r_0EMQk00000CAcMt.png) + ![Applying filter for Blocked events in Reports and Analysis](./../0-images/ka0Qk000000Ea6r_0EMQk00000CAcMt.png) 3. Click the **Create Export** button at the bottom of the list to generate an export file. 4. Download the generated `.csv` or `.xlsx` file from **View Export List**. - ![View Export List in Reports and Analysis](./images/ka0Qk000000Ea6r_0EMQk00000CAkDx.png) + ![View Export List in Reports and Analysis](./../0-images/ka0Qk000000Ea6r_0EMQk00000CAkDx.png) 5. Access and review the exported file as needed. - ![Example of exported event log file](./images/ka0Qk000000Ea6r_0EMQk00000CAivK.png) + ![Example of exported event log file](./../0-images/ka0Qk000000Ea6r_0EMQk00000CAivK.png) diff --git a/docs/kb/endpointprotector/how-to-check-the-history-and-email-status-of-alerts.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how-to-check-the-history-and-email-status-of-alerts.md similarity index 82% rename from docs/kb/endpointprotector/how-to-check-the-history-and-email-status-of-alerts.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how-to-check-the-history-and-email-status-of-alerts.md index f68ce846f2..ebfec5546f 100644 --- a/docs/kb/endpointprotector/how-to-check-the-history-and-email-status-of-alerts.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how-to-check-the-history-and-email-status-of-alerts.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Check the History and Email Status of Alert -tags: [] +tags: + - administration-security-and-monitoring title: "How to Check the History and Email Status of Alerts" knowledge_article_id: kA0Qk0000002B15KAE --- @@ -30,8 +31,8 @@ This article explains how to check the alert history, log details, and the statu 1. Navigate to the desired alert category, such as **System Alerts**, **Device Control Alerts**, **Content Aware Alerts**, or **EasyLock Alerts**. 2. Click **View History** to see the list of generated alerts. The alerts are listed under **Alerts History**. Each alert listed in **Alerts History** is also sent via email. - ![Alerts History page showing list of generated alerts](./images/ka0Qk000000Dzth_0EMQk00000CJ9iD.png) + ![Alerts History page showing list of generated alerts](./../0-images/ka0Qk000000Dzth_0EMQk00000CJ9iD.png) 3. In the **Actions** column for the desired alert, click the three-line menu, and then click **View**. - ![Actions column with View option highlighted](./images/ka0Qk000000Dzth_0EMQk00000CJ1Co.png) + ![Actions column with View option highlighted](./../0-images/ka0Qk000000Dzth_0EMQk00000CJ1Co.png) 4. The **Log Details** and **Alert Details** will be displayed, along with the **E-mail Status**. Here, you can see if the email was sent successfully from the Netwrix Endpoint Protector Server. - ![Log Details and E-mail Status section showing email delivery status](./images/ka0Qk000000Dzth_0EMQk00000CJA4n.png) + ![Log Details and E-mail Status section showing email delivery status](./../0-images/ka0Qk000000Dzth_0EMQk00000CJA4n.png) diff --git a/docs/kb/endpointprotector/how-to-identify-and-remove-duplicate-computers.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how-to-identify-and-remove-duplicate-computers.md similarity index 92% rename from docs/kb/endpointprotector/how-to-identify-and-remove-duplicate-computers.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how-to-identify-and-remove-duplicate-computers.md index ddd4625624..43c6385e1f 100644 --- a/docs/kb/endpointprotector/how-to-identify-and-remove-duplicate-computers.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how-to-identify-and-remove-duplicate-computers.md @@ -16,7 +16,8 @@ products: - endpoint-protector visibility: public sidebar_label: How to Identify and Remove Duplicate Computers -tags: [] +tags: + - administration-security-and-monitoring title: "How to Identify and Remove Duplicate Computers" knowledge_article_id: kA0Qk0000002B5xKAE --- @@ -31,6 +32,6 @@ This article explains how to identify and remove duplicate computers in Netwrix 1. In the Netwrix Endpoint Protector Console, navigate to the **Device Control** menu and select **Computers**. 2. In the Filters section, select **Duplicates** > **Yes** > **Apply**. - ![Filtering for duplicate computers in Netwrix Endpoint Protector](./images/ka0Qk000000ETN7_0EMQk00000C91kL.png) + ![Filtering for duplicate computers in Netwrix Endpoint Protector](./../0-images/ka0Qk000000ETN7_0EMQk00000C91kL.png) 3. Review the list of duplicate computers. You can further filter for **Licensed** and **Offline** computers. 4. Delete the unwanted duplicate entries to release the associated licenses. diff --git a/docs/kb/endpointprotector/how-to-set-fqdn-in-server-certificate-subject.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how-to-set-fqdn-in-server-certificate-subject.md similarity index 95% rename from docs/kb/endpointprotector/how-to-set-fqdn-in-server-certificate-subject.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how-to-set-fqdn-in-server-certificate-subject.md index ab86062bf0..144145e18b 100644 --- a/docs/kb/endpointprotector/how-to-set-fqdn-in-server-certificate-subject.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how-to-set-fqdn-in-server-certificate-subject.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Set FQDN in Server Certificate Subject -tags: [] +tags: + - administration-security-and-monitoring title: "How to Set FQDN in Server Certificate Subject" knowledge_article_id: kA0Qk0000002BB7KAM --- @@ -40,7 +41,7 @@ Yes, this is possible. Follow these steps to set the FQDN in the server certific 8. A green banner will appear at the top of the screen stating that the server certificate will be regenerated in a few minutes. You will be logged out from the user interface and will need to log in again. 9. Wait a few minutes until the certificate is regenerated. -![Server Certificate Stack configuration page with FQDN field highlighted](./images/ka0Qk000000Dynx_0EMQk00000CKudS.png) +![Server Certificate Stack configuration page with FQDN field highlighted](./../0-images/ka0Qk000000Dynx_0EMQk00000CKudS.png) ### Important Notes diff --git a/docs/kb/endpointprotector/how-to-update-endpoint-protector-or-unify-server.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how-to-update-endpoint-protector-or-unify-server.md similarity index 82% rename from docs/kb/endpointprotector/how-to-update-endpoint-protector-or-unify-server.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how-to-update-endpoint-protector-or-unify-server.md index 4ef3b088e5..6e6c8cab42 100644 --- a/docs/kb/endpointprotector/how-to-update-endpoint-protector-or-unify-server.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how-to-update-endpoint-protector-or-unify-server.md @@ -15,7 +15,8 @@ keywords: products: - general sidebar_label: How to Update Endpoint Protector or Unify Server -tags: [] +tags: + - administration-security-and-monitoring title: "How to Update Endpoint Protector or Unify Server" knowledge_article_id: kA0Qk0000001EfFKAU --- @@ -32,14 +33,14 @@ To find the version of the Netwrix Endpoint Protector server, follow the below s 2. Log in. 3. View the bottom right of the screen to find the version information. -![Netwrix Endpoint Protector version number](./images/ka0Qk0000004M3Z_0EMQk000005fb5Z.png) +![Netwrix Endpoint Protector version number](./../0-images/ka0Qk0000004M3Z_0EMQk000005fb5Z.png) To find the version of the Unify server, follow the below steps: 1. Log in to the Unify web console. 2. Check the top left for the version information. -![Unify version number](./images/ka0Qk0000004M3Z_0EMQk000005fOGR.png) +![Unify version number](./../0-images/ka0Qk0000004M3Z_0EMQk000005fOGR.png) ## Updating with Live Update @@ -53,9 +54,9 @@ To install the latest updates with Live Update, follow the below steps: 4. Check the box on the update(s) to be installed. 5. Select **Apply Updates.** -![How to check Live Update](./images/ka0Qk0000004M3Z_0EMQk000005fTch.png) +![How to check Live Update](./../0-images/ka0Qk0000004M3Z_0EMQk000005fTch.png) -![How to configure Live Update](./images/ka0Qk0000004M3Z_0EMQk000005fbGr.png) +![How to configure Live Update](./../0-images/ka0Qk0000004M3Z_0EMQk000005fbGr.png) ## Updating Using the Offline Patch Uploader @@ -71,7 +72,7 @@ To apply an offline update, follow the below steps: 6. Click **Ok.** 7. Wait for the system to apply the update. -![The button to activate offline patching](./images/ka0Qk0000004M3Z_0EMQk000005fbNJ.png) +![The button to activate offline patching](./../0-images/ka0Qk0000004M3Z_0EMQk000005fbNJ.png) ## Verifying an Update Installed @@ -82,6 +83,6 @@ To verify an update was applied to the Netwrix Endpoint Protector server, follow 3. Click on **View Applied EPP Software Updates.** 4. Look through the applied updates to see if the update was installed. -![The button to open the view of all updates](./images/ka0Qk0000004M3Z_0EMQk000005fbTl.png) +![The button to open the view of all updates](./../0-images/ka0Qk0000004M3Z_0EMQk000005fbTl.png) -![The list of all updates](./images/ka0Qk0000004M3Z_0EMQk000005fbWz.png) +![The list of all updates](./../0-images/ka0Qk0000004M3Z_0EMQk000005fbWz.png) diff --git a/docs/kb/endpointprotector/how_to_block_specific_ip_addresses_from_accessing_the_console.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_block_specific_ip_addresses_from_accessing_the_console.md similarity index 92% rename from docs/kb/endpointprotector/how_to_block_specific_ip_addresses_from_accessing_the_console.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how_to_block_specific_ip_addresses_from_accessing_the_console.md index 115636414b..780fb78a46 100644 --- a/docs/kb/endpointprotector/how_to_block_specific_ip_addresses_from_accessing_the_console.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_block_specific_ip_addresses_from_accessing_the_console.md @@ -6,7 +6,8 @@ keywords: - console access - login IP restrictions sidebar_label: Block Specific IP Addresses -tags: [] +tags: + - administration-security-and-monitoring title: "How to Block Specific IP Addresses from Accessing the Console" knowledge_article_id: kA0Qk0000002B78KAE products: @@ -27,7 +28,7 @@ To block specific IP addresses from accessing the console, configure login IP re 2. Right-click the administrator account you want to restrict and select **Edit**. 3. Turn on **Enforce login IP restrictions**. - ![Dialog box for enforcing login IP restrictions with the option enabled](./images/servlet_image_1e592ef62413.png) + ![Dialog box for enforcing login IP restrictions with the option enabled](./../0-images/servlet_image_1e592ef62413.png) 4. Enter the IP addresses from which the user is not allowed to log in. 5. Click **Save** to apply the changes. \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_export_the_list_of_computers,_users,_or_devices.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_export_the_list_of_computers,_users,_or_devices.md similarity index 88% rename from docs/kb/endpointprotector/how_to_export_the_list_of_computers,_users,_or_devices.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how_to_export_the_list_of_computers,_users,_or_devices.md index 6ba8d89b1c..240d3dab41 100644 --- a/docs/kb/endpointprotector/how_to_export_the_list_of_computers,_users,_or_devices.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_export_the_list_of_computers,_users,_or_devices.md @@ -8,7 +8,8 @@ keywords: - devices - Endpoint Protector sidebar_label: Exporting Lists -tags: [] +tags: + - administration-security-and-monitoring title: "How to Export the List of Computers, Users, or Devices" knowledge_article_id: kA0Qk0000002B6lKAE products: @@ -28,7 +29,7 @@ This article explains how to export the list of computers, users, or devices fro 1. Open the Endpoint Protector console and navigate to the **Device Control** section. 2. Select **Computers**, **Users**, or **Devices**. 3. Click **Choose action** and select **Export list of**... - ![Export list action in Device Control](./images/servlet_image_df060b1c08ad.png) + ![Export list action in Device Control](./../0-images/servlet_image_df060b1c08ad.png) 4. A banner appears at the top of the page indicating where the export file can be found. 5. On the **List of exports** page, navigate to **System Maintenance** > **Exported Entities**. 6. In the **Actions** menu, you can download or delete the exported list. @@ -38,7 +39,7 @@ This article explains how to export the list of computers, users, or devices fro 1. Open the Endpoint Protector console and navigate to the **Device Control** section. 2. Select **Computers**, **Users**, or **Devices**. 3. Click **Choose action** and select **Schedule export list**. - ![Schedule export action in Device Control](./images/servlet_image_7abe59223977.png) + ![Schedule export action in Device Control](./../0-images/servlet_image_7abe59223977.png) 4. Select the **frequency** and **start date** for the export. Click **Schedule**. 5. A banner appears at the top of the page confirming that the export has been scheduled. 6. On the **List of exports** page, navigate to **System Maintenance** > **Exported Entities**. diff --git a/docs/kb/endpointprotector/how_to_increase_the_200_entries_display_limitation.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_increase_the_200_entries_display_limitation.md similarity index 89% rename from docs/kb/endpointprotector/how_to_increase_the_200_entries_display_limitation.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how_to_increase_the_200_entries_display_limitation.md index df0e52ddbb..1454c31375 100644 --- a/docs/kb/endpointprotector/how_to_increase_the_200_entries_display_limitation.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_increase_the_200_entries_display_limitation.md @@ -6,7 +6,8 @@ keywords: - display limit - report searches sidebar_label: Increase Display Limit -tags: [] +tags: + - administration-security-and-monitoring title: "How to Increase the 200 Entries Display Limitation" knowledge_article_id: kA0Qk0000002B76KAE products: @@ -26,4 +27,4 @@ To increase the display limit, follow these steps: 1. Log in to the **Endpoint Protector** console. 2. Navigate to **Device Control** > **Global Settings** > **Maximum no. of records returned in a report search**. 3. Increase this limit to your desired amount. - ![Maximum number of records returned in a report search setting in Endpoint Protector](./images/servlet_image_1ec78e31c389.png) \ No newline at end of file + ![Maximum number of records returned in a report search setting in Endpoint Protector](./../0-images/servlet_image_1ec78e31c389.png) \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_locate_and_change_the_default_credentials_for_the_console.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_locate_and_change_the_default_credentials_for_the_console.md similarity index 96% rename from docs/kb/endpointprotector/how_to_locate_and_change_the_default_credentials_for_the_console.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how_to_locate_and_change_the_default_credentials_for_the_console.md index c0f6ac69c1..b521e475f5 100644 --- a/docs/kb/endpointprotector/how_to_locate_and_change_the_default_credentials_for_the_console.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_locate_and_change_the_default_credentials_for_the_console.md @@ -6,7 +6,8 @@ keywords: - default credentials - security sidebar_label: Change Default Credentials -tags: [] +tags: + - administration-security-and-monitoring title: "How to Locate and Change the Default Credentials for the Console" knowledge_article_id: kA0Qk0000002B6cKAE products: diff --git a/docs/kb/endpointprotector/how_to_select_multiple_computers_and_users_within_groups.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_select_multiple_computers_and_users_within_groups.md similarity index 93% rename from docs/kb/endpointprotector/how_to_select_multiple_computers_and_users_within_groups.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how_to_select_multiple_computers_and_users_within_groups.md index 3ced25b73c..7687265640 100644 --- a/docs/kb/endpointprotector/how_to_select_multiple_computers_and_users_within_groups.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_select_multiple_computers_and_users_within_groups.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - group management sidebar_label: Select Multiple Computers and Users -tags: [] +tags: + - administration-security-and-monitoring title: "How to Select Multiple Computers and Users Within Groups" knowledge_article_id: kA0Qk0000002B6FKAU products: @@ -25,7 +26,7 @@ This article explains how to select multiple computers and users within a group 2. Create a new group or open an existing group in **Edit mode**. 3. To select multiple computers/users, copy and paste the desired list of computers/users in the highlighted box on the right-hand side of the **Group Information** page. - ![Paste list of computers into left box for multiselection](./images/servlet_image_b9e7bd968d5d.png) + ![Paste list of computers into left box for multiselection](./../0-images/servlet_image_b9e7bd968d5d.png) 4. Click **Select all matched Items** to select all computers listed in the left box. 5. Selected computers are highlighted with blue check marks, and a green notification on the right side of the page shows how many items were matched. \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_set_up_active_directory_administrator_synchronization.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_active_directory_administrator_synchronization.md similarity index 97% rename from docs/kb/endpointprotector/how_to_set_up_active_directory_administrator_synchronization.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_active_directory_administrator_synchronization.md index 113fc5aace..2ebe931d0e 100644 --- a/docs/kb/endpointprotector/how_to_set_up_active_directory_administrator_synchronization.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_active_directory_administrator_synchronization.md @@ -6,7 +6,8 @@ keywords: - administrator synchronization - AD Authentication sidebar_label: Set Up AD Administrator Synchronization -tags: [] +tags: + - administration-security-and-monitoring title: "How to Set Up Active Directory Administrator Synchronization" knowledge_article_id: kA0Qk0000002B77KAE products: diff --git a/docs/kb/endpointprotector/how_to_set_up_e-mail_alerts.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_e-mail_alerts.md similarity index 97% rename from docs/kb/endpointprotector/how_to_set_up_e-mail_alerts.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_e-mail_alerts.md index fed7209d78..d2506b20d2 100644 --- a/docs/kb/endpointprotector/how_to_set_up_e-mail_alerts.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_e-mail_alerts.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - system events sidebar_label: Set Up E-mail Alerts -tags: [] +tags: + - administration-security-and-monitoring title: "How to Set Up E-mail Alerts" knowledge_article_id: kA0Qk0000002B6UKAU products: diff --git a/docs/kb/endpointprotector/how_to_set_up_external_storage.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_external_storage.md similarity index 96% rename from docs/kb/endpointprotector/how_to_set_up_external_storage.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_external_storage.md index da01f55ba2..433fbfa727 100644 --- a/docs/kb/endpointprotector/how_to_set_up_external_storage.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_external_storage.md @@ -6,7 +6,8 @@ keywords: - server performance - storage management sidebar_label: Set Up External Storage -tags: [] +tags: + - administration-security-and-monitoring title: "How to Set Up External Storage" knowledge_article_id: kA0Qk0000002B7LKAU products: diff --git a/docs/kb/endpointprotector/how_to_set_up_smtp_with_gmail.md b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_smtp_with_gmail.md similarity index 94% rename from docs/kb/endpointprotector/how_to_set_up_smtp_with_gmail.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_smtp_with_gmail.md index 52d9d7c14d..67b4cfaa7e 100644 --- a/docs/kb/endpointprotector/how_to_set_up_smtp_with_gmail.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/how_to_set_up_smtp_with_gmail.md @@ -6,7 +6,8 @@ keywords: - Gmail - Endpoint Protector sidebar_label: Set Up SMTP With Gmail -tags: [] +tags: + - administration-security-and-monitoring title: "How to Set Up SMTP With Gmail" knowledge_article_id: kA0Qk0000002B4LKAU products: @@ -37,7 +38,7 @@ This article explains how to configure SMTP settings in **Endpoint Protector** t - **Send test email to my account:** Enabled - **No-reply email address:** Default - ![SMTP configuration for Gmail in Endpoint Protector](./images/servlet_image_e9d389c827d7.png) + ![SMTP configuration for Gmail in Endpoint Protector](./../0-images/servlet_image_e9d389c827d7.png) 5. To use a custom no-reply email address, select **Custom** and enter your preferred email address, or leave the default. diff --git a/docs/kb/endpointprotector/managing-system-administrators-and-administrator-groups.md b/docs/kb/endpointprotector/administration-security-and-monitoring/managing-system-administrators-and-administrator-groups.md similarity index 98% rename from docs/kb/endpointprotector/managing-system-administrators-and-administrator-groups.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/managing-system-administrators-and-administrator-groups.md index 4f6f1fb2de..48b235c540 100644 --- a/docs/kb/endpointprotector/managing-system-administrators-and-administrator-groups.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/managing-system-administrators-and-administrator-groups.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Managing System Administrators and Administrator G -tags: [] +tags: + - administration-security-and-monitoring title: "Managing System Administrators and Administrator Groups" knowledge_article_id: kA0Qk0000002BCTKA2 --- diff --git a/docs/kb/endpointprotector/resetting-an-administrator-password.md b/docs/kb/endpointprotector/administration-security-and-monitoring/resetting-an-administrator-password.md similarity index 89% rename from docs/kb/endpointprotector/resetting-an-administrator-password.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/resetting-an-administrator-password.md index da1f8eb8bb..657043bc54 100644 --- a/docs/kb/endpointprotector/resetting-an-administrator-password.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/resetting-an-administrator-password.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Resetting an Administrator Password -tags: [] +tags: + - administration-security-and-monitoring title: "Resetting an Administrator Password" knowledge_article_id: kA0Qk0000002B2eKAE --- @@ -34,9 +35,9 @@ This article explains how to reset an administrator password on the Netwrix Endp 4. Check **Require password change at next login** to allow the administrator to set a password of their choice upon their next login. 5. Save the modifications. -![Edit administrator password fields in Endpoint Protector](./images/ka0Qk000000EbSj_0EMQk00000CAmm2.png) +![Edit administrator password fields in Endpoint Protector](./../0-images/ka0Qk000000EbSj_0EMQk00000CAmm2.png) -![Require password change at next login option in Endpoint Protector](./images/ka0Qk000000EbSj_0EMQk00000CAaeP.png) +![Require password change at next login option in Endpoint Protector](./../0-images/ka0Qk000000EbSj_0EMQk00000CAaeP.png) 6. If you encounter any issues and are unable to reset the password, create a support ticket via the [Netwrix Support portal](https://www.netwrix.com/support.html) for assistance. 7. If the server is hosted on your end, the support team will contact you to schedule a remote session for resetting the password in the server's backend. diff --git a/docs/kb/endpointprotector/review_administrator_activity_in_the_console.md b/docs/kb/endpointprotector/administration-security-and-monitoring/review_administrator_activity_in_the_console.md similarity index 95% rename from docs/kb/endpointprotector/review_administrator_activity_in_the_console.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/review_administrator_activity_in_the_console.md index 6979bf1bbc..87043852de 100644 --- a/docs/kb/endpointprotector/review_administrator_activity_in_the_console.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/review_administrator_activity_in_the_console.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - reports sidebar_label: Review Admin Activity -tags: [] +tags: + - administration-security-and-monitoring title: "Review Administrator Activity in the Console" knowledge_article_id: kA0Qk0000002B6hKAE products: diff --git a/docs/kb/endpointprotector/secure_endpoint_protector_web_console_with_an_ssl_certificate.md b/docs/kb/endpointprotector/administration-security-and-monitoring/secure_endpoint_protector_web_console_with_an_ssl_certificate.md similarity index 91% rename from docs/kb/endpointprotector/secure_endpoint_protector_web_console_with_an_ssl_certificate.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/secure_endpoint_protector_web_console_with_an_ssl_certificate.md index 636c84076b..367d8176c9 100644 --- a/docs/kb/endpointprotector/secure_endpoint_protector_web_console_with_an_ssl_certificate.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/secure_endpoint_protector_web_console_with_an_ssl_certificate.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - secure communications sidebar_label: Secure Endpoint Protector with SSL -tags: [] +tags: + - administration-security-and-monitoring title: "Secure Endpoint Protector Web Console with an SSL Certificate" knowledge_article_id: kA0Qk0000002B6XKAU products: @@ -24,5 +25,5 @@ This article explains how to add an SSL certificate to **Endpoint Protector** us 1. Navigate to the **Endpoint Protector Console** > **Appliance** > **Server Maintenance**. 2. Copy and paste the content from your `.pem` certificate into the **Body** and **Key** text boxes. 3. Ensure you include the **BEGIN** and **END** directives for both the certificate body and private key. - ![SSL certificate entry fields in Endpoint Protector Server Maintenance](./images/servlet_image_2ab25cdeee54.png) + ![SSL certificate entry fields in Endpoint Protector Server Maintenance](./../0-images/servlet_image_2ab25cdeee54.png) 4. Save the changes. \ No newline at end of file diff --git a/docs/kb/endpointprotector/set_password_validity_or_remove_password_expiration_for_administrators.md b/docs/kb/endpointprotector/administration-security-and-monitoring/set_password_validity_or_remove_password_expiration_for_administrators.md similarity index 91% rename from docs/kb/endpointprotector/set_password_validity_or_remove_password_expiration_for_administrators.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/set_password_validity_or_remove_password_expiration_for_administrators.md index 4e3ece4b15..e5d725f074 100644 --- a/docs/kb/endpointprotector/set_password_validity_or_remove_password_expiration_for_administrators.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/set_password_validity_or_remove_password_expiration_for_administrators.md @@ -6,7 +6,8 @@ keywords: - password expiration - administrator accounts sidebar_label: Set Password Validity -tags: [] +tags: + - administration-security-and-monitoring title: "Set Password Validity or Remove Password Expiration for Administrators" knowledge_article_id: kA0Qk0000002B32KAE products: @@ -26,4 +27,4 @@ Follow these steps to set a custom password validity period or remove password e 1. Navigate to **System Configuration > System Security** in Endpoint Protector. 2. In the **Advanced User Password Settings** section, select a custom validity period or choose to remove the expiry completely. -![Advanced User Password Settings section in System Security](./images/servlet_image_bd860b27c3ec.png) \ No newline at end of file +![Advanced User Password Settings section in System Security](./../0-images/servlet_image_bd860b27c3ec.png) \ No newline at end of file diff --git a/docs/kb/endpointprotector/set_up_a_siem_integration.md b/docs/kb/endpointprotector/administration-security-and-monitoring/set_up_a_siem_integration.md similarity index 97% rename from docs/kb/endpointprotector/set_up_a_siem_integration.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/set_up_a_siem_integration.md index 6f64dbc121..9307613279 100644 --- a/docs/kb/endpointprotector/set_up_a_siem_integration.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/set_up_a_siem_integration.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - Syslog-ng sidebar_label: Set Up SIEM Integration -tags: [] +tags: + - administration-security-and-monitoring title: "Set Up a SIEM Integration" knowledge_article_id: kA0Qk0000002B75KAE products: diff --git a/docs/kb/endpointprotector/set_up_automatic_license_release.md b/docs/kb/endpointprotector/administration-security-and-monitoring/set_up_automatic_license_release.md similarity index 93% rename from docs/kb/endpointprotector/set_up_automatic_license_release.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/set_up_automatic_license_release.md index c8a9155a78..65dcfdd3d6 100644 --- a/docs/kb/endpointprotector/set_up_automatic_license_release.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/set_up_automatic_license_release.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - License Management sidebar_label: Set Up Automatic License Release -tags: [] +tags: + - administration-security-and-monitoring title: "How to Set Up Automatic License Release" knowledge_article_id: kA0Qk0000002B6yKAE products: @@ -27,5 +28,5 @@ To set up Automatic License Release, log in to the Endpoint Protector web consol 2. In the Licensing window, click **View Licenses**. 3. Click the **Automatic Release License** button in the **View Licenses** window. 4. Toggle the **Automatic Release License** option. In the **Last Online** drop-down, select either a predefined value or enter a custom value (between 1 and 360 days). - ![Automatic License Release configuration in Endpoint Protector](./images/servlet_image_d1e926f5d4e6.png) + ![Automatic License Release configuration in Endpoint Protector](./../0-images/servlet_image_d1e926f5d4e6.png) 5. Click the **Schedule** button. All computers that were last seen longer than the defined value will have their license released. \ No newline at end of file diff --git a/docs/kb/endpointprotector/troubleshoot_two-factor_authentication_issues.md b/docs/kb/endpointprotector/administration-security-and-monitoring/troubleshoot_two-factor_authentication_issues.md similarity index 76% rename from docs/kb/endpointprotector/troubleshoot_two-factor_authentication_issues.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/troubleshoot_two-factor_authentication_issues.md index b3432a8006..bc0793ab67 100644 --- a/docs/kb/endpointprotector/troubleshoot_two-factor_authentication_issues.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/troubleshoot_two-factor_authentication_issues.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - troubleshooting sidebar_label: Troubleshoot 2FA Issues -tags: [] +tags: + - administration-security-and-monitoring title: "Troubleshoot Two-Factor Authentication Issues" knowledge_article_id: kA0Qk0000002B61KAE products: @@ -26,11 +27,11 @@ To troubleshoot issues with 2FA, try one or more of the following steps: 1. Ensure that the **Endpoint Protector** server date/time matches exactly with the date/time on the phone used to scan the QR code. This can be checked by following these steps: 1. In the **Endpoint Protector** console, go to **Appliance** > **Server Maintenance** and click **Synchronize time**. 2. Check the date and time on the phone. -2. Disable Two-Factor Authentication (2FA) in **Endpoint Protector**, then re-enable it. For detailed steps on enabling or disabling 2FA, see [Enable Two-Factor Authentication for System Admins with Google Authenticator App](/docs/kb/endpointprotector/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app). +2. Disable Two-Factor Authentication (2FA) in **Endpoint Protector**, then re-enable it. For detailed steps on enabling or disabling 2FA, see [Enable Two-Factor Authentication for System Admins with Google Authenticator App](/docs/kb/endpointprotector/administration-security-and-monitoring/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app). 3. Instead of scanning the QR code, manually enter the code in the **Google Authenticator** app. ## Related Links -- [Enable Two-Factor Authentication for System Admins with Google Authenticator App](/docs/kb/endpointprotector/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app) -- [Managing System Administrators and Administrator Groups](/docs/kb/endpointprotector/managing-system-administrators-and-administrator-groups) +- [Enable Two-Factor Authentication for System Admins with Google Authenticator App](/docs/kb/endpointprotector/administration-security-and-monitoring/enable_two-factor_authentication_for_system_admins_with_google_authenticator_app) +- [Managing System Administrators and Administrator Groups](/docs/kb/endpointprotector/administration-security-and-monitoring/managing-system-administrators-and-administrator-groups) - [Two-Factor Authentication](https://docs.netwrix.com/docs/endpointprotector/admin/systemconfiguration/adminandaccess#two-factor-authentication) diff --git a/docs/kb/endpointprotector/update-the-endpoint-protector-server-ip-address-on-a-windows-endpoint.md b/docs/kb/endpointprotector/administration-security-and-monitoring/update-the-endpoint-protector-server-ip-address-on-a-windows-endpoint.md similarity index 96% rename from docs/kb/endpointprotector/update-the-endpoint-protector-server-ip-address-on-a-windows-endpoint.md rename to docs/kb/endpointprotector/administration-security-and-monitoring/update-the-endpoint-protector-server-ip-address-on-a-windows-endpoint.md index 14741b1b70..5f1b30f7cf 100644 --- a/docs/kb/endpointprotector/update-the-endpoint-protector-server-ip-address-on-a-windows-endpoint.md +++ b/docs/kb/endpointprotector/administration-security-and-monitoring/update-the-endpoint-protector-server-ip-address-on-a-windows-endpoint.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Update the Endpoint Protector Server IP Address on -tags: [] +tags: + - administration-security-and-monitoring title: "Update the Endpoint Protector Server IP Address on a Windows Endpoint" knowledge_article_id: kA0Qk0000002B6EKAU --- @@ -40,7 +41,7 @@ This article explains how to review and change the Netwrix Endpoint Protector (E The current configuration details will be displayed as shown below. - ![Current configuration details in Netwrix Endpoint Protector Notifier](./images/ka0Qk000000EcJx_0EMQk00000C91kM.png) + ![Current configuration details in Netwrix Endpoint Protector Notifier](./../0-images/ka0Qk000000EcJx_0EMQk00000C91kM.png) 4. Open the folder containing the `SetServerIP` application and run `EppSetServer.exe`. 5. Enter the new EPP server IP address, communication port number, or department code. diff --git a/docs/kb/endpointprotector/allowing-chatgpt-access-via-deep-packet-inspection-allowlist.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/allowing-chatgpt-access-via-deep-packet-inspection-allowlist.md similarity index 97% rename from docs/kb/endpointprotector/allowing-chatgpt-access-via-deep-packet-inspection-allowlist.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/allowing-chatgpt-access-via-deep-packet-inspection-allowlist.md index aea831b408..80d76ab152 100644 --- a/docs/kb/endpointprotector/allowing-chatgpt-access-via-deep-packet-inspection-allowlist.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/allowing-chatgpt-access-via-deep-packet-inspection-allowlist.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Allowing ChatGPT Access via Deep Packet Inspection -tags: [] +tags: + - content-aware-protection-and-dpi title: "Allowing ChatGPT Access via Deep Packet Inspection Allowlist" knowledge_article_id: kA0Qk0000002B6PKAU --- diff --git a/docs/kb/endpointprotector/can-content-aware-protection-detect-sensitive-content-in-archived-files.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/can-content-aware-protection-detect-sensitive-content-in-archived-files.md similarity index 96% rename from docs/kb/endpointprotector/can-content-aware-protection-detect-sensitive-content-in-archived-files.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/can-content-aware-protection-detect-sensitive-content-in-archived-files.md index 8927abd6af..b199fce9e6 100644 --- a/docs/kb/endpointprotector/can-content-aware-protection-detect-sensitive-content-in-archived-files.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/can-content-aware-protection-detect-sensitive-content-in-archived-files.md @@ -17,7 +17,8 @@ products: - endpoint-protector visibility: public sidebar_label: Can Content Aware Protection Detect Sensitive Cont -tags: [] +tags: + - content-aware-protection-and-dpi title: "Can Content Aware Protection Detect Sensitive Content in Archived Files?" knowledge_article_id: kA0Qk0000002BNeKAM --- diff --git a/docs/kb/endpointprotector/can-optical-character-recognition-be-enabled-for-file-inspection.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/can-optical-character-recognition-be-enabled-for-file-inspection.md similarity index 89% rename from docs/kb/endpointprotector/can-optical-character-recognition-be-enabled-for-file-inspection.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/can-optical-character-recognition-be-enabled-for-file-inspection.md index 5ccdc5c208..04a7b3102d 100644 --- a/docs/kb/endpointprotector/can-optical-character-recognition-be-enabled-for-file-inspection.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/can-optical-character-recognition-be-enabled-for-file-inspection.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Can Optical Character Recognition Be Enabled for F -tags: [] +tags: + - content-aware-protection-and-dpi title: "Can Optical Character Recognition Be Enabled for File Inspection?" knowledge_article_id: kA0Qk0000002BDzKAM --- @@ -30,6 +31,6 @@ Yes, OCR is the process that converts an image of text into a machine-readable t You can enable OCR at the global, computer, user, or group level from the following location in the Endpoint Protector console: -![OCR enablement settings page in the EPP console](./images/ka0Qk000000DzFN_0EMQk00000C8zgv.png) +![OCR enablement settings page in the EPP console](./../0-images/ka0Qk000000DzFN_0EMQk00000C8zgv.png) Once enabled, the Endpoint Protector client can inspect the content of **JPEG**, **PNG**, **GIF**, **BMP**, and **TIFF** file types. Enabling this option will also update the global MIME Type Allowlists. diff --git a/docs/kb/endpointprotector/configure_content_aware_policy_priorities.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/configure_content_aware_policy_priorities.md similarity index 98% rename from docs/kb/endpointprotector/configure_content_aware_policy_priorities.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/configure_content_aware_policy_priorities.md index b0eed3a000..f3596bd138 100644 --- a/docs/kb/endpointprotector/configure_content_aware_policy_priorities.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/configure_content_aware_policy_priorities.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - file transfer management sidebar_label: Configure Content Aware Policy Priorities -tags: [] +tags: + - content-aware-protection-and-dpi title: "Configure Content Aware Policy Priorities" knowledge_article_id: kA0Qk0000002B4DKAU products: diff --git a/docs/kb/endpointprotector/content-aware-policy-configuration.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/content-aware-policy-configuration.md similarity index 99% rename from docs/kb/endpointprotector/content-aware-policy-configuration.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/content-aware-policy-configuration.md index 4de0842bba..09e3cd52d8 100644 --- a/docs/kb/endpointprotector/content-aware-policy-configuration.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/content-aware-policy-configuration.md @@ -17,7 +17,8 @@ keywords: products: - endpoint-protector sidebar_label: Content Aware Policy Configuration -tags: [] +tags: + - content-aware-protection-and-dpi title: "Content Aware Policy Configuration" knowledge_article_id: kA0Qk0000002BCYKA2 --- diff --git a/docs/kb/endpointprotector/content_aware_protection_tab_missing.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/content_aware_protection_tab_missing.md similarity index 96% rename from docs/kb/endpointprotector/content_aware_protection_tab_missing.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/content_aware_protection_tab_missing.md index a7d7fc7b69..27cdc65e74 100644 --- a/docs/kb/endpointprotector/content_aware_protection_tab_missing.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/content_aware_protection_tab_missing.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - CAP tab sidebar_label: CAP Tab Missing -tags: [] +tags: + - content-aware-protection-and-dpi title: "Content Aware Protection Tab Missing" knowledge_article_id: kA0Qk0000002B70KAE products: diff --git a/docs/kb/endpointprotector/create_exceptions_for_specific_file_extensions.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/create_exceptions_for_specific_file_extensions.md similarity index 96% rename from docs/kb/endpointprotector/create_exceptions_for_specific_file_extensions.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/create_exceptions_for_specific_file_extensions.md index 1604db9715..68798f4c93 100644 --- a/docs/kb/endpointprotector/create_exceptions_for_specific_file_extensions.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/create_exceptions_for_specific_file_extensions.md @@ -6,7 +6,8 @@ keywords: - file extensions - Device Control sidebar_label: Create Exceptions for File Extensions -tags: [] +tags: + - content-aware-protection-and-dpi title: "Create Exceptions for Specific File Extensions" knowledge_article_id: kA0Qk0000002B7FKAU products: diff --git a/docs/kb/endpointprotector/does-endpoint-protector-inspect-content-sent-through-thunderbird.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/does-endpoint-protector-inspect-content-sent-through-thunderbird.md similarity index 97% rename from docs/kb/endpointprotector/does-endpoint-protector-inspect-content-sent-through-thunderbird.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/does-endpoint-protector-inspect-content-sent-through-thunderbird.md index f282ed140d..68362e308d 100644 --- a/docs/kb/endpointprotector/does-endpoint-protector-inspect-content-sent-through-thunderbird.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/does-endpoint-protector-inspect-content-sent-through-thunderbird.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Does Endpoint Protector Inspect Content Sent Throu -tags: [] +tags: + - content-aware-protection-and-dpi title: "Does Endpoint Protector Inspect Content Sent Through Thunderbird?" knowledge_article_id: kA0Qk0000002BCdKAM --- diff --git a/docs/kb/endpointprotector/does_the_uninstall_attempt_event_confirm_agent_removal_from_the_client_machine.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/does_the_uninstall_attempt_event_confirm_agent_removal_from_the_client_machine.md similarity index 96% rename from docs/kb/endpointprotector/does_the_uninstall_attempt_event_confirm_agent_removal_from_the_client_machine.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/does_the_uninstall_attempt_event_confirm_agent_removal_from_the_client_machine.md index 9bddd2a1eb..a22b3da6a5 100644 --- a/docs/kb/endpointprotector/does_the_uninstall_attempt_event_confirm_agent_removal_from_the_client_machine.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/does_the_uninstall_attempt_event_confirm_agent_removal_from_the_client_machine.md @@ -8,7 +8,8 @@ keywords: products: - endpoint-protector sidebar_label: Uninstall Attempt Event Confirmation -tags: [] +tags: + - content-aware-protection-and-dpi title: Does the "Uninstall Attempt" Event Confirm Agent Removal from the Client Machine? knowledge_article_id: kA0Qk0000002B2kKAE --- diff --git a/docs/kb/endpointprotector/dpi-certificate-not-available-in-the-browser.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/dpi-certificate-not-available-in-the-browser.md similarity index 97% rename from docs/kb/endpointprotector/dpi-certificate-not-available-in-the-browser.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/dpi-certificate-not-available-in-the-browser.md index 0f79404ecc..fda9ef17d3 100644 --- a/docs/kb/endpointprotector/dpi-certificate-not-available-in-the-browser.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/dpi-certificate-not-available-in-the-browser.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: DPI Certificate Not Available in the Browser -tags: [] +tags: + - content-aware-protection-and-dpi title: "DPI Certificate Not Available in the Browser" knowledge_article_id: kA0Qk0000002B60KAE --- diff --git a/docs/kb/endpointprotector/enable-deep-packet-inspection-for-instant-messaging-applications.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enable-deep-packet-inspection-for-instant-messaging-applications.md similarity index 89% rename from docs/kb/endpointprotector/enable-deep-packet-inspection-for-instant-messaging-applications.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/enable-deep-packet-inspection-for-instant-messaging-applications.md index 37d918f1ac..5e8f253de2 100644 --- a/docs/kb/endpointprotector/enable-deep-packet-inspection-for-instant-messaging-applications.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enable-deep-packet-inspection-for-instant-messaging-applications.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Enable Deep Packet Inspection for Instant Messagin -tags: [] +tags: + - content-aware-protection-and-dpi title: "Enable Deep Packet Inspection for Instant Messaging Applications" knowledge_article_id: kA0Qk0000002B2uKAE --- @@ -33,7 +34,7 @@ The Netwrix Endpoint Protector (EPP) Client can inspect text written in instant 2. Enable **Deep Packet Inspection**. 3. Save the setting. -![Global Settings page with Deep Packet Inspection option highlighted](./images/ka0Qk000000DzDl_0EMQk00000BuWJp.png) +![Global Settings page with Deep Packet Inspection option highlighted](./../0-images/ka0Qk000000DzDl_0EMQk00000BuWJp.png) ### Enable Text Inspection @@ -41,7 +42,7 @@ The Netwrix Endpoint Protector (EPP) Client can inspect text written in instant 2. Enable **Text inspection**. 3. Save the setting. -![Deep Packet Inspection settings with Text inspection enabled](./images/ka0Qk000000DzDl_0EMQk00000BuWDN.png) +![Deep Packet Inspection settings with Text inspection enabled](./../0-images/ka0Qk000000DzDl_0EMQk00000BuWDN.png) ### Enable DPI for Instant Messaging Applications @@ -50,7 +51,7 @@ The Netwrix Endpoint Protector (EPP) Client can inspect text written in instant 3. Filter for the instant messaging applications you want to use with text inspection. Supported apps include Teams, Skype, Slack, Mattermost, and Google Chat. 4. Click the **Actions** button and select **Enable DPI** for each application. -![Deep Packet Inspection Applications list with Enable DPI action](./images/ka0Qk000000DzDl_0EMQk00000BuWGb.png) +![Deep Packet Inspection Applications list with Enable DPI action](./../0-images/ka0Qk000000DzDl_0EMQk00000BuWGb.png) > **NOTE:** You must enable DPI for each application on every operating system where the EPP Client is installed (Windows, macOS, Linux). @@ -61,4 +62,4 @@ The Netwrix Endpoint Protector (EPP) Client can inspect text written in instant 3. Select the instant messaging applications you want to monitor. 4. Save the policy. -![Content Aware Policies configuration with instant messaging apps selected](./images/ka0Qk000000DzDl_0EMQk00000BuWID.png) +![Content Aware Policies configuration with instant messaging apps selected](./../0-images/ka0Qk000000DzDl_0EMQk00000BuWID.png) diff --git a/docs/kb/endpointprotector/enable-sensitive-data-protection.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enable-sensitive-data-protection.md similarity index 94% rename from docs/kb/endpointprotector/enable-sensitive-data-protection.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/enable-sensitive-data-protection.md index 678d8f83ea..4a63b11090 100644 --- a/docs/kb/endpointprotector/enable-sensitive-data-protection.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enable-sensitive-data-protection.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Enable Sensitive Data Protection -tags: [] +tags: + - content-aware-protection-and-dpi title: "Enable Sensitive Data Protection" knowledge_article_id: kA0Qk0000002B5uKAE --- @@ -39,4 +40,4 @@ Follow the steps below to complete this process: 3. Re-enter the chosen password in the **New Password (confirm)** field. 4. Click **Save** to apply the changes. -![Screenshot showing the Additional Security Password for Sensitive Data Protection settings in Netwrix Endpoint Protector Server](./images/ka0Qk000000E7ZV_0EMQk00000C52IP.png) +![Screenshot showing the Additional Security Password for Sensitive Data Protection settings in Netwrix Endpoint Protector Server](./../0-images/ka0Qk000000E7ZV_0EMQk00000C52IP.png) diff --git a/docs/kb/endpointprotector/enabling-advanced-printer-and-mtp-scanning.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-advanced-printer-and-mtp-scanning.md similarity index 93% rename from docs/kb/endpointprotector/enabling-advanced-printer-and-mtp-scanning.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-advanced-printer-and-mtp-scanning.md index c5a992617b..4cd939c1e6 100644 --- a/docs/kb/endpointprotector/enabling-advanced-printer-and-mtp-scanning.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-advanced-printer-and-mtp-scanning.md @@ -16,7 +16,8 @@ products: - endpoint-protector visibility: public sidebar_label: Enabling Advanced Printer and MTP Scanning -tags: [] +tags: + - content-aware-protection-and-dpi title: "Enabling Advanced Printer and MTP Scanning" knowledge_article_id: kA0Qk0000002AxvKAE --- @@ -32,7 +33,7 @@ Netwrix Endpoint Protector includes an improved method for Printer and MTP Conte 1. In the Netwrix Endpoint Protector Console, navigate to **Device Control** > **Global Settings**, **Groups**, or **Computers** > **Manage Settings** > **File Tracing and Shadowing**. 2. Toggle the switch to enable **Advanced Printer and MTP Scanning**. 3. Click **Save** within the **File Tracing and Shadowing** section. - ![File Tracing and Shadowing settings with Advanced Printer and MTP Scanning option enabled](./images/ka0Qk000000DsH7_0EMQk00000CB1Rh.png) + ![File Tracing and Shadowing settings with Advanced Printer and MTP Scanning option enabled](./../0-images/ka0Qk000000DsH7_0EMQk00000CB1Rh.png) 4. Save your changes and ensure the updated settings are deployed to Netwrix Endpoint Protector Clients by waiting for the clients to update their policies. 5. Restart the machines protected by Netwrix Endpoint Protector. diff --git a/docs/kb/endpointprotector/enabling-deep-packet-inspection-and-intercepting-vpn-traffic-on-macos-clients.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-deep-packet-inspection-and-intercepting-vpn-traffic-on-macos-clients.md similarity index 94% rename from docs/kb/endpointprotector/enabling-deep-packet-inspection-and-intercepting-vpn-traffic-on-macos-clients.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-deep-packet-inspection-and-intercepting-vpn-traffic-on-macos-clients.md index 035c657eb2..5785d6368d 100644 --- a/docs/kb/endpointprotector/enabling-deep-packet-inspection-and-intercepting-vpn-traffic-on-macos-clients.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-deep-packet-inspection-and-intercepting-vpn-traffic-on-macos-clients.md @@ -17,7 +17,8 @@ keywords: products: - endpoint-protector sidebar_label: Enabling Deep Packet Inspection and Intercepting V -tags: [] +tags: + - content-aware-protection-and-dpi title: "Enabling Deep Packet Inspection and Intercepting VPN Traffic on macOS Clients" knowledge_article_id: kA0Qk0000002BCQKA2 --- @@ -29,10 +30,10 @@ This article describes how to enable Deep Packet Inspection and intercept VPN tr ## Instructions 1. Open the **Netwrix Endpoint Protector Server** interface. In the **Device Control** section, select **User**, **Computer**, **Group**, or **Global Settings**. Click **Manage Settings**, then select **Netwrix Endpoint Protector Client** and enable **Deep Packet Inspection**. - ![Deep Packet Inspection settings in Netwrix Endpoint Protector Server interface](./images/ka0Qk000000EPcr_0EMQk00000C8gO9.png) + ![Deep Packet Inspection settings in Netwrix Endpoint Protector Server interface](./../0-images/ka0Qk000000EPcr_0EMQk00000C8gO9.png) 2. Navigate to **System Configuration** > **System Settings** > **Deep Packet Inspection Certificate**. Download the CA certificate. - ![Download CA Certificate from Deep Packet Inspection Certificate section](./images/ka0Qk000000EPcr_0EMQk00000C8ekY.png) + ![Download CA Certificate from Deep Packet Inspection Certificate section](./../0-images/ka0Qk000000EPcr_0EMQk00000C8ekY.png) 3. Open the **Keychain Access** application on your macOS device. In the sidebar, select **System**. diff --git a/docs/kb/endpointprotector/enabling-user-remediation-in-content-aware-protection-policies.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-user-remediation-in-content-aware-protection-policies.md similarity index 93% rename from docs/kb/endpointprotector/enabling-user-remediation-in-content-aware-protection-policies.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-user-remediation-in-content-aware-protection-policies.md index c51bc622cd..2d69483a73 100644 --- a/docs/kb/endpointprotector/enabling-user-remediation-in-content-aware-protection-policies.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-user-remediation-in-content-aware-protection-policies.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Enabling User Remediation in Content Aware Protect -tags: [] +tags: + - content-aware-protection-and-dpi title: "Enabling User Remediation in Content Aware Protection Policies" knowledge_article_id: kA0Qk0000002BCLKA2 --- @@ -30,5 +31,5 @@ User Remediation allows end users to justify or remediate blocked actions when a 1. In the Netwrix Endpoint Protector Console, navigate to the **Content Aware Protection Policy** where you want to enable User Remediation. 2. Edit the policy and locate the **Policy Action** field. 3. Select **Block and Remediate** from the available actions. - ![Block and Remediate option in Content Aware Protection Policy](./images/ka0Qk000000FKT3_0EMQk00000CAP34.png) + ![Block and Remediate option in Content Aware Protection Policy](./../0-images/ka0Qk000000FKT3_0EMQk00000CAP34.png) 4. Click **Save** to confirm the changes. This will enable the User Remediation feature the next time the endpoint connects to the Netwrix Endpoint Protector Server. diff --git a/docs/kb/endpointprotector/how-does-the-file-size-threshold-apply-to-uploads.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-does-the-file-size-threshold-apply-to-uploads.md similarity index 94% rename from docs/kb/endpointprotector/how-does-the-file-size-threshold-apply-to-uploads.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/how-does-the-file-size-threshold-apply-to-uploads.md index e27686210e..21d2a5a7c3 100644 --- a/docs/kb/endpointprotector/how-does-the-file-size-threshold-apply-to-uploads.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-does-the-file-size-threshold-apply-to-uploads.md @@ -16,7 +16,8 @@ products: - endpoint-protector visibility: public sidebar_label: How Does the File Size Threshold Apply to Uploads? -tags: [] +tags: + - content-aware-protection-and-dpi title: "How Does the File Size Threshold Apply to Uploads?" knowledge_article_id: kA0Qk0000002BE0KAM --- @@ -33,6 +34,6 @@ To activate this option, do the following: 1. Go to **Content Aware Protection** > **Content Aware Policies**. 2. Select your CAP policy and enable the **File Size Threshold** option. -![File Size Threshold option in Content Aware Policies settings](./images/ka0Qk000000ESKb_0EMQk00000C8iL7.png) +![File Size Threshold option in Content Aware Policies settings](./../0-images/ka0Qk000000ESKb_0EMQk00000C8iL7.png) > **NOTE:** If a File Size Threshold is set, it applies to the entire policy, regardless of which file types or custom contents are selected. The value must be a positive, whole number. For example, if the File Size Threshold is set to `1024 MB`, any file smaller than `1 GB` can be uploaded. If ten `200 MB` files are uploaded, all will be accepted. However, if one of the ten files is `1.5 GB`, the upload attempt will be blocked. diff --git a/docs/kb/endpointprotector/how-the-file-size-threshold-applies-to-uploads.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-the-file-size-threshold-applies-to-uploads.md similarity index 96% rename from docs/kb/endpointprotector/how-the-file-size-threshold-applies-to-uploads.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/how-the-file-size-threshold-applies-to-uploads.md index e3766b7315..b8d4bd99a0 100644 --- a/docs/kb/endpointprotector/how-the-file-size-threshold-applies-to-uploads.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-the-file-size-threshold-applies-to-uploads.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: How the File Size Threshold Applies to Uploads -tags: [] +tags: + - content-aware-protection-and-dpi title: "How the File Size Threshold Applies to Uploads" knowledge_article_id: kA0Qk0000002Ay2KAE --- diff --git a/docs/kb/endpointprotector/how-to-block-whatsapp-application-from-launching.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-block-whatsapp-application-from-launching.md similarity index 87% rename from docs/kb/endpointprotector/how-to-block-whatsapp-application-from-launching.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-block-whatsapp-application-from-launching.md index e8e23f5123..81a8f47b6b 100644 --- a/docs/kb/endpointprotector/how-to-block-whatsapp-application-from-launching.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-block-whatsapp-application-from-launching.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Block WhatsApp Application from Launching -tags: [] +tags: + - content-aware-protection-and-dpi title: "How to Block WhatsApp Application from Launching" knowledge_article_id: kA0Qk0000002B12KAE --- @@ -34,17 +35,17 @@ This article explains how to block and prevent the WhatsApp application from ope 2. In the **Parameters** box, enter `*`. 3. Click **Add to Content**. 4. Verify that `WhatsApp.exe *` appears in the **List of Application & CLI Command** box on the right. - ![Applications Denylist configuration for WhatsApp.exe on Windows](./images/ka0Qk000000Dzor_0EMQk00000CAfxR.png) + ![Applications Denylist configuration for WhatsApp.exe on Windows](./../0-images/ka0Qk000000Dzor_0EMQk00000CAfxR.png) 3. For macOS operating systems: 1. In the **Application & CLI Command** box, enter `WhatsAppDesktop`. 2. In the **Parameters** box, enter `*`. 3. Click **Add to Content**. 4. Verify that `WhatsAppDesktop *` appears in the **List of Application & CLI Command** box on the right. - ![Applications Denylist configuration for WhatsAppDesktop on macOS](./images/ka0Qk000000Dzor_0EMQk00000CAfxR.png) + ![Applications Denylist configuration for WhatsAppDesktop on macOS](./../0-images/ka0Qk000000Dzor_0EMQk00000CAfxR.png) 4. Select all entries by checking their checkboxes, then click **Generate**. 5. The final result should display the denylist entries as shown below. - ![Final Applications Denylist with WhatsApp entries](./images/ka0Qk000000Dzor_0EMQk00000CAag4.png) + ![Final Applications Denylist with WhatsApp entries](./../0-images/ka0Qk000000Dzor_0EMQk00000CAag4.png) 6. Under **Policy Denylists** > **Applications** in the Content Aware Protection policy, select the application list you created. 7. Save the policy and update the policies on the endpoint computers. Ensure you assign the policy to the target computers. - ![Assigning the Applications Denylist policy to target computers](./images/ka0Qk000000Dzor_0EMQk00000CAgof.png) + ![Assigning the Applications Denylist policy to target computers](./../0-images/ka0Qk000000Dzor_0EMQk00000CAgof.png) 8. Attempt to open the WhatsApp Desktop application to confirm it is blocked. diff --git a/docs/kb/endpointprotector/how-to-collect-extended-deep-packet-inspection-logs-for-mac-os.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-collect-extended-deep-packet-inspection-logs-for-mac-os.md similarity index 97% rename from docs/kb/endpointprotector/how-to-collect-extended-deep-packet-inspection-logs-for-mac-os.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-collect-extended-deep-packet-inspection-logs-for-mac-os.md index 9699701c7f..9d02adeb6e 100644 --- a/docs/kb/endpointprotector/how-to-collect-extended-deep-packet-inspection-logs-for-mac-os.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-collect-extended-deep-packet-inspection-logs-for-mac-os.md @@ -17,7 +17,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Collect Extended Deep Packet Inspection Log -tags: [] +tags: + - content-aware-protection-and-dpi title: "How to Collect Extended Deep Packet Inspection Logs for Mac OS" knowledge_article_id: kA0Qk0000002B2nKAE --- diff --git a/docs/kb/endpointprotector/how-to-collect-extended-deep-packet-inspection-logs-for-windows.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-collect-extended-deep-packet-inspection-logs-for-windows.md similarity index 96% rename from docs/kb/endpointprotector/how-to-collect-extended-deep-packet-inspection-logs-for-windows.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-collect-extended-deep-packet-inspection-logs-for-windows.md index 683ceadd7c..c91ef8df27 100644 --- a/docs/kb/endpointprotector/how-to-collect-extended-deep-packet-inspection-logs-for-windows.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-collect-extended-deep-packet-inspection-logs-for-windows.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Collect Extended Deep Packet Inspection Log -tags: [] +tags: + - content-aware-protection-and-dpi title: "How to Collect Extended Deep Packet Inspection Logs for Windows" knowledge_article_id: kA0Qk0000002B74KAE --- diff --git a/docs/kb/endpointprotector/how-to-monitor-webmail-for-gmail-outlook-and-yahoo.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-monitor-webmail-for-gmail-outlook-and-yahoo.md similarity index 91% rename from docs/kb/endpointprotector/how-to-monitor-webmail-for-gmail-outlook-and-yahoo.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-monitor-webmail-for-gmail-outlook-and-yahoo.md index 09311c6f39..62ae354127 100644 --- a/docs/kb/endpointprotector/how-to-monitor-webmail-for-gmail-outlook-and-yahoo.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how-to-monitor-webmail-for-gmail-outlook-and-yahoo.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: "How to Monitor Webmail for Gmail, Outlook, and Yahoo" -tags: [] +tags: + - content-aware-protection-and-dpi title: 'How to Monitor Webmail for Gmail, Outlook, and Yahoo' knowledge_article_id: kA0Qk0000002Ay4KAE --- @@ -33,4 +34,4 @@ This article explains how you can enable the **Monitor webmail** setting in Netw When you enable this setting, it allows monitoring of the subject and body fields for Gmail, Outlook, and Yahoo webmail accessed through browsers. -![Deep Packet Inspection settings page with Monitor webmail option highlighted](./images/ka0Qk000000Drsv_0EMQk00000CB41O.png) +![Deep Packet Inspection settings page with Monitor webmail option highlighted](./../0-images/ka0Qk000000Drsv_0EMQk00000CB41O.png) diff --git a/docs/kb/endpointprotector/how_to_add_a_new_entry_to_the_justification_list.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how_to_add_a_new_entry_to_the_justification_list.md similarity index 90% rename from docs/kb/endpointprotector/how_to_add_a_new_entry_to_the_justification_list.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/how_to_add_a_new_entry_to_the_justification_list.md index 784efceee8..2e9098e335 100644 --- a/docs/kb/endpointprotector/how_to_add_a_new_entry_to_the_justification_list.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how_to_add_a_new_entry_to_the_justification_list.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - Content Aware Protection sidebar_label: Add Entry to Justification List -tags: [] +tags: + - content-aware-protection-and-dpi title: "How to Add a New Entry to the Justification List" knowledge_article_id: kA0Qk0000002B2lKAE products: @@ -22,7 +23,7 @@ This article explains how to add a new entry to the Justification List in Endpoi ## Instructions 1. In the Endpoint Protector Console, navigate to **System Parameters** > **User Remediation**. - ![User Remediation section in System Parameters menu in Endpoint Protector](./images/servlet_image_263da6ad1bf4.png) + ![User Remediation section in System Parameters menu in Endpoint Protector](./../0-images/servlet_image_263da6ad1bf4.png) 2. Create a **Justification** list that will appear to the end user when an explanation is required to remediate a file: - Click the **ADD** button. @@ -42,7 +43,7 @@ This article explains how to add a new entry to the Justification List in Endpoi 5. On an endpoint where the policy is applied, open the EPP client and update the policies. 6. To test the policy, attempt to use the print screen function. The client should display a prompt as shown below: - ![User prompt when using Screenshot function in Endpoint Protector client](./images/servlet_image_72f774ab3bed.png) + ![User prompt when using Screenshot function in Endpoint Protector client](./../0-images/servlet_image_72f774ab3bed.png) 7. If the user clicks the **Self-Remediate** button, a new window will appear prompting them to fill in the reason for the action. - ![Justification entry window for self-remediation in Endpoint Protector client](./images/servlet_image_cc8577ae8f6b.png) \ No newline at end of file + ![Justification entry window for self-remediation in Endpoint Protector client](./../0-images/servlet_image_cc8577ae8f6b.png) \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_block_source_code_using_ocr.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how_to_block_source_code_using_ocr.md similarity index 90% rename from docs/kb/endpointprotector/how_to_block_source_code_using_ocr.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/how_to_block_source_code_using_ocr.md index 824aa548e4..9c2171b4d3 100644 --- a/docs/kb/endpointprotector/how_to_block_source_code_using_ocr.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how_to_block_source_code_using_ocr.md @@ -6,7 +6,8 @@ keywords: - Content Aware Protection - source code sidebar_label: Block Source Code Using OCR -tags: [] +tags: + - content-aware-protection-and-dpi title: "How to Block Source Code Using OCR" knowledge_article_id: kA0Qk0000002oAPKAY products: @@ -29,7 +30,7 @@ Follow these steps to enable OCR to allow the system to detect source code in im 2. Enable the OCR option. 3. Click **Save** to apply the settings. -![OCR option in Global Settings](./images/servlet_image_8da7245d9529.png) +![OCR option in Global Settings](./../0-images/servlet_image_8da7245d9529.png) ### Creating a Content Aware Protection Policy for Source Code @@ -39,7 +40,7 @@ Follow these steps to create a custom policy to block or report source code dete 2. Select the operating system type, enter a policy name, and choose the action and type for the policy. 3. Choose all relevant exit points. 4. Select only the relevant source code types. - ![Selecting source code types in Content Aware Protection policy](./images/servlet_image_089dc363ae67.png) + ![Selecting source code types in Content Aware Protection policy](./../0-images/servlet_image_089dc363ae67.png) 5. Select the computers and/or users to which the policy should apply. 6. Click **Save** to create the policy. 7. The system will now block or report source code found in transferred or uploaded images according to the policy settings. \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_use_the_content_detection_summary.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how_to_use_the_content_detection_summary.md similarity index 98% rename from docs/kb/endpointprotector/how_to_use_the_content_detection_summary.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/how_to_use_the_content_detection_summary.md index 22eaa2e9e3..c02996e474 100644 --- a/docs/kb/endpointprotector/how_to_use_the_content_detection_summary.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/how_to_use_the_content_detection_summary.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - Content Aware Policy sidebar_label: Use Content Detection Summary -tags: [] +tags: + - content-aware-protection-and-dpi title: "How to Use the Content Detection Summary" knowledge_article_id: kA0Qk0000002BFWKA2 products: diff --git a/docs/kb/endpointprotector/optical_character_recognition_(ocr)_not_working.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/optical_character_recognition_(ocr)_not_working.md similarity index 96% rename from docs/kb/endpointprotector/optical_character_recognition_(ocr)_not_working.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/optical_character_recognition_(ocr)_not_working.md index 84088b7a40..d36a320a26 100644 --- a/docs/kb/endpointprotector/optical_character_recognition_(ocr)_not_working.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/optical_character_recognition_(ocr)_not_working.md @@ -6,7 +6,8 @@ keywords: - OCR issues - Endpoint Protector sidebar_label: OCR Not Working -tags: [] +tags: + - content-aware-protection-and-dpi title: "Optical Character Recognition (OCR) Not Working" knowledge_article_id: kA0Qk0000002B2gKAE products: diff --git a/docs/kb/endpointprotector/printing_jobs_not_being_blocked_or_reported.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/printing_jobs_not_being_blocked_or_reported.md similarity index 96% rename from docs/kb/endpointprotector/printing_jobs_not_being_blocked_or_reported.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/printing_jobs_not_being_blocked_or_reported.md index bdd44d8e91..91025f23b7 100644 --- a/docs/kb/endpointprotector/printing_jobs_not_being_blocked_or_reported.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/printing_jobs_not_being_blocked_or_reported.md @@ -6,7 +6,8 @@ keywords: - printing jobs - Device Control sidebar_label: Printing Jobs Not Being Blocked or Reported -tags: [] +tags: + - content-aware-protection-and-dpi title: "Printing Jobs Not Being Blocked or Reported" knowledge_article_id: kA0Qk0000002B7CKAU products: diff --git a/docs/kb/endpointprotector/reduce-the-number-of-false-positives.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/reduce-the-number-of-false-positives.md similarity index 98% rename from docs/kb/endpointprotector/reduce-the-number-of-false-positives.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/reduce-the-number-of-false-positives.md index a7ea123d3a..0eabfd3067 100644 --- a/docs/kb/endpointprotector/reduce-the-number-of-false-positives.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/reduce-the-number-of-false-positives.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Reduce the Number of False Positives -tags: [] +tags: + - content-aware-protection-and-dpi title: "Reduce the Number of False Positives" knowledge_article_id: kA0Qk0000002B6nKAE --- diff --git a/docs/kb/endpointprotector/resolve-black-screen-issues-during-remote-access.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/resolve-black-screen-issues-during-remote-access.md similarity index 85% rename from docs/kb/endpointprotector/resolve-black-screen-issues-during-remote-access.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/resolve-black-screen-issues-during-remote-access.md index d356d9edb0..c96bcbecfa 100644 --- a/docs/kb/endpointprotector/resolve-black-screen-issues-during-remote-access.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/resolve-black-screen-issues-during-remote-access.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Resolve Black Screen Issues During Remote Access -tags: [] +tags: + - content-aware-protection-and-dpi title: "Resolve Black Screen Issues During Remote Access" knowledge_article_id: kA0Qk0000002B62KAE --- @@ -35,10 +36,10 @@ Follow the steps below to resolve this issue: 1. Open the CAP policy settings by navigating to **Content Aware Policies** and **Edit** the policy. - ![CAP policy settings screenshot](./images/ka0Qk000000ES7h_0EMQk00000Cp0a9.png) + ![CAP policy settings screenshot](./../0-images/ka0Qk000000ES7h_0EMQk00000Cp0a9.png) 2. Disable the **Print screen** blocking option. - ![Disable Print screen blocking screenshot](./images/ka0Qk000000ES7h_0EMQk00000Cp0ez.png) + ![Disable Print screen blocking screenshot](./../0-images/ka0Qk000000ES7h_0EMQk00000Cp0ez.png) 3. Save the changes to the policy. diff --git a/docs/kb/endpointprotector/resolve_hsts_web_browser_errors_when_accessing_websites.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/resolve_hsts_web_browser_errors_when_accessing_websites.md similarity index 96% rename from docs/kb/endpointprotector/resolve_hsts_web_browser_errors_when_accessing_websites.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/resolve_hsts_web_browser_errors_when_accessing_websites.md index 0f425d91b6..9e1090c13a 100644 --- a/docs/kb/endpointprotector/resolve_hsts_web_browser_errors_when_accessing_websites.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/resolve_hsts_web_browser_errors_when_accessing_websites.md @@ -6,7 +6,8 @@ keywords: - web browser errors - HTTP errors sidebar_label: Resolve HSTS Errors -tags: [] +tags: + - content-aware-protection-and-dpi title: "Resolve HSTS Web Browser Errors When Accessing Websites" knowledge_article_id: kA0Qk0000002B6dKAE products: diff --git a/docs/kb/endpointprotector/set-up-url-allowlists-and-denylists.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/set-up-url-allowlists-and-denylists.md similarity index 98% rename from docs/kb/endpointprotector/set-up-url-allowlists-and-denylists.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/set-up-url-allowlists-and-denylists.md index 73c4a1f584..c7b51f27fc 100644 --- a/docs/kb/endpointprotector/set-up-url-allowlists-and-denylists.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/set-up-url-allowlists-and-denylists.md @@ -19,7 +19,8 @@ products: - endpoint-protector visibility: public sidebar_label: Set Up URL Allowlists and Denylists -tags: [] +tags: + - content-aware-protection-and-dpi title: "Set Up URL Allowlists and Denylists" knowledge_article_id: kA0Qk0000002B6qKAE --- diff --git a/docs/kb/endpointprotector/set_up_a_report_only_content_aware_protection_policy.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/set_up_a_report_only_content_aware_protection_policy.md similarity index 98% rename from docs/kb/endpointprotector/set_up_a_report_only_content_aware_protection_policy.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/set_up_a_report_only_content_aware_protection_policy.md index 1b39bb78db..6b0cdcff63 100644 --- a/docs/kb/endpointprotector/set_up_a_report_only_content_aware_protection_policy.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/set_up_a_report_only_content_aware_protection_policy.md @@ -8,7 +8,8 @@ keywords: products: - endpoint-protector sidebar_label: Set Up Report Only CAP Policy -tags: [] +tags: + - content-aware-protection-and-dpi title: Set Up a "Report Only" Content Aware Protection Policy knowledge_article_id: kA0Qk0000002B9FKAU --- diff --git a/docs/kb/endpointprotector/utilize-the-monitor-webmail-setting-for-subject-and-body-scanning.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/utilize-the-monitor-webmail-setting-for-subject-and-body-scanning.md similarity index 92% rename from docs/kb/endpointprotector/utilize-the-monitor-webmail-setting-for-subject-and-body-scanning.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/utilize-the-monitor-webmail-setting-for-subject-and-body-scanning.md index d37781ac4a..4d38b07ee0 100644 --- a/docs/kb/endpointprotector/utilize-the-monitor-webmail-setting-for-subject-and-body-scanning.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/utilize-the-monitor-webmail-setting-for-subject-and-body-scanning.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Utilize the Monitor Webmail Setting for Subject an -tags: [] +tags: + - content-aware-protection-and-dpi title: "Utilize the Monitor Webmail Setting for Subject and Body Scanning" knowledge_article_id: kA0Qk0000002BFdKAM --- @@ -33,5 +34,5 @@ The **Monitor webmail** setting in Netwrix Endpoint Protector enables subject an 1. Activate the **Deep Packet Inspection** module if it is not already activated. 2. Go to **Content Aware Protection** > **Deep Packet Inspection** and check the **Monitor webmail for Gmail** setting. - ![Creating a policy in Content Aware Protection](./images/ka0Qk000000ESkP_0EMQk00000C7Jbh.png) + ![Creating a policy in Content Aware Protection](./../0-images/ka0Qk000000ESkP_0EMQk00000C7Jbh.png) 3. Go to **Content Aware Protection** and create the desired policy. diff --git a/docs/kb/endpointprotector/whitelisting-authentication-servers-for-deep-packet-inspection.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/whitelisting-authentication-servers-for-deep-packet-inspection.md similarity index 80% rename from docs/kb/endpointprotector/whitelisting-authentication-servers-for-deep-packet-inspection.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/whitelisting-authentication-servers-for-deep-packet-inspection.md index decff464a0..c8cb0b07bf 100644 --- a/docs/kb/endpointprotector/whitelisting-authentication-servers-for-deep-packet-inspection.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/whitelisting-authentication-servers-for-deep-packet-inspection.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Whitelisting Authentication Servers for Deep Packe -tags: [] +tags: + - content-aware-protection-and-dpi title: "Whitelisting Authentication Servers for Deep Packet Inspection" knowledge_article_id: kA0Qk0000002BDuKAM --- @@ -32,17 +33,17 @@ This article describes how to whitelist authentication servers in Netwrix Endpoi 1. Log in to the Netwrix Endpoint Protector Console. 2. Go to **Denylists and Allowlists** and select **Allowlists**. - ![Allowlists section in Netwrix Endpoint Protector](./images/ka0Qk000000Eb4X_0EMQk00000CAOF3.png) + ![Allowlists section in Netwrix Endpoint Protector](./../0-images/ka0Qk000000Eb4X_0EMQk00000CAOF3.png) 3. Select the **Deep Packet Inspection** tab and click **Add**. - ![Deep Packet Inspection tab in Allowlists](./images/ka0Qk000000Eb4X_0EMQk00000CAOGf.png) + ![Deep Packet Inspection tab in Allowlists](./../0-images/ka0Qk000000Eb4X_0EMQk00000CAOGf.png) 4. Fill in all required fields to define your authentication resource(s) (e.g., ADFS), then click **Save**. - ![Defining authentication resource in DPI allowlist](./images/ka0Qk000000Eb4X_0EMQk00000CAOIH.png) + ![Defining authentication resource in DPI allowlist](./../0-images/ka0Qk000000Eb4X_0EMQk00000CAOIH.png) 5. Go to **Content Aware Protection** > **Content Aware Policies** and select your policy then click **Edit**. 6. Navigate to the **Policy Allowlists** section and click the **Deep Packet Inspection** tab. 7. Select the entry defined in step 4 and verify the accuracy of your selected policy entities. - ![Selecting DPI allowlist entry in policy](./images/ka0Qk000000Eb4X_0EMQk00000CAOJt.png) + ![Selecting DPI allowlist entry in policy](./../0-images/ka0Qk000000Eb4X_0EMQk00000CAOJt.png) 8. Click **Save**. 9. On the managed endpoint, right-click the System Tray or Menu Bar item for Netwrix Endpoint Protector and select **Update policies now**. - ![Update policies now in Netwrix Endpoint Protector client](./images/ka0Qk000000Eb4X_0EMQk00000CAON7.png) + ![Update policies now in Netwrix Endpoint Protector client](./../0-images/ka0Qk000000Eb4X_0EMQk00000CAON7.png) 10. Verify that authentication succeeds when DPI is enabled. diff --git a/docs/kb/endpointprotector/why_dpi_does_not_inspect_content_when_vpn_add-ons_are_installed_on_browsers.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/why_dpi_does_not_inspect_content_when_vpn_add-ons_are_installed_on_browsers.md similarity index 97% rename from docs/kb/endpointprotector/why_dpi_does_not_inspect_content_when_vpn_add-ons_are_installed_on_browsers.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/why_dpi_does_not_inspect_content_when_vpn_add-ons_are_installed_on_browsers.md index cb37d762e9..7f702898ee 100644 --- a/docs/kb/endpointprotector/why_dpi_does_not_inspect_content_when_vpn_add-ons_are_installed_on_browsers.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/why_dpi_does_not_inspect_content_when_vpn_add-ons_are_installed_on_browsers.md @@ -8,7 +8,8 @@ keywords: - Endpoint Protector - content inspection sidebar_label: DPI and VPN Add-ons -tags: [] +tags: + - content-aware-protection-and-dpi title: "Why DPI Does Not Inspect Content When VPN Add-ons Are Installed on Browsers" knowledge_article_id: kA0Qk0000002B9TKAU products: diff --git a/docs/kb/endpointprotector/will-content-aware-protection-block-sensitive-content-in-files-from-the-allowed-file-allowlist.md b/docs/kb/endpointprotector/content-aware-protection-and-dpi/will-content-aware-protection-block-sensitive-content-in-files-from-the-allowed-file-allowlist.md similarity index 86% rename from docs/kb/endpointprotector/will-content-aware-protection-block-sensitive-content-in-files-from-the-allowed-file-allowlist.md rename to docs/kb/endpointprotector/content-aware-protection-and-dpi/will-content-aware-protection-block-sensitive-content-in-files-from-the-allowed-file-allowlist.md index 921e157a89..30b5d64042 100644 --- a/docs/kb/endpointprotector/will-content-aware-protection-block-sensitive-content-in-files-from-the-allowed-file-allowlist.md +++ b/docs/kb/endpointprotector/content-aware-protection-and-dpi/will-content-aware-protection-block-sensitive-content-in-files-from-the-allowed-file-allowlist.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Will Content Aware Protection Block Sensitive Cont -tags: [] +tags: + - content-aware-protection-and-dpi title: "Will Content Aware Protection Block Sensitive Content in Files from the Allowed File Allowlist?" knowledge_article_id: kA0Qk0000002BE9KAM --- @@ -32,10 +33,10 @@ No, Content Aware Protection will not block sensitive content in files that are You can find the Allowed Files allowlist under **Denylists and Allowlists** > **Allowlists** > **Allowed File.** -![Allowed File allowlist in Netwrix Endpoint Protector](./images/ka0Qk000000ETJt_0EMQk00000C8uNt.png) +![Allowed File allowlist in Netwrix Endpoint Protector](./../0-images/ka0Qk000000ETJt_0EMQk00000C8uNt.png) After creating the allowlist, add it to the Content Aware Protection (CAP) policy under **Policy Allowlists.** -![Assigning Allowed File allowlist to a CAP policy](./images/ka0Qk000000ETJt_0EMQk00000C8uB1.png) +![Assigning Allowed File allowlist to a CAP policy](./../0-images/ka0Qk000000ETJt_0EMQk00000C8uB1.png) Once the allowlist is assigned to the policy, the Content Aware Protection policy will inspect but ignore sensitive content in files included in the Allowed File list. Files on the allowlist are not blocked, even if they contain sensitive content. diff --git a/docs/kb/endpointprotector/activating_the_mail_add-in_for_domain_allowlist_in_outlook_classic_for_windows.md b/docs/kb/endpointprotector/deployment-and-installation/activating_the_mail_add-in_for_domain_allowlist_in_outlook_classic_for_windows.md similarity index 92% rename from docs/kb/endpointprotector/activating_the_mail_add-in_for_domain_allowlist_in_outlook_classic_for_windows.md rename to docs/kb/endpointprotector/deployment-and-installation/activating_the_mail_add-in_for_domain_allowlist_in_outlook_classic_for_windows.md index 5b65c2a615..0068b15e00 100644 --- a/docs/kb/endpointprotector/activating_the_mail_add-in_for_domain_allowlist_in_outlook_classic_for_windows.md +++ b/docs/kb/endpointprotector/deployment-and-installation/activating_the_mail_add-in_for_domain_allowlist_in_outlook_classic_for_windows.md @@ -6,7 +6,8 @@ keywords: - Mail Add-in - Domain Allowlist sidebar_label: Activating EPP Mail Add-in -tags: [] +tags: + - deployment-and-installation title: "Activating the Mail Add-in for Domain Allowlist in Outlook Classic for Windows" knowledge_article_id: kA0Qk0000002B6LKAU products: @@ -23,7 +24,7 @@ This article explains how to activate the Endpoint Protector (EPP) Mail Add-in i 1. In the EPP Console, ensure the Mail Add-in is included when downloading the client. - ![EPP Mail Add-in included in client download](./images/servlet_image_5271b231d0a2.png) + ![EPP Mail Add-in included in client download](./../0-images/servlet_image_5271b231d0a2.png) 2. To verify that the EPP Mail Add-in is present in the list of active add-ins, open Outlook and navigate to **Outlook Options** > **Add-ins** > **Active Add-ins**. diff --git a/docs/kb/endpointprotector/add_an_ssl_certificate.md b/docs/kb/endpointprotector/deployment-and-installation/add_an_ssl_certificate.md similarity index 90% rename from docs/kb/endpointprotector/add_an_ssl_certificate.md rename to docs/kb/endpointprotector/deployment-and-installation/add_an_ssl_certificate.md index 5731884f29..e30a844288 100644 --- a/docs/kb/endpointprotector/add_an_ssl_certificate.md +++ b/docs/kb/endpointprotector/deployment-and-installation/add_an_ssl_certificate.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - server maintenance sidebar_label: Add SSL Certificate -tags: [] +tags: + - deployment-and-installation title: "How to Add an SSL Certificate to Endpoint Protector" knowledge_article_id: kA0Qk0000002B6wKAE products: @@ -24,7 +25,7 @@ This article provides guidance on adding an SSL certificate to Endpoint Protecto Follow the steps below to add an SSL certificate to Endpoint Protector: 1. In the Endpoint Protector Console, navigate to **Appliance > Server Maintenance**. - ![Server Maintenance section in the UI](./images/servlet_image_9e6a518233f7.png) + ![Server Maintenance section in the UI](./../0-images/servlet_image_9e6a518233f7.png) 2. Once a `.pem` SSL certificate is generated (`certificate.pem` and `certificate.key`), paste their contents into the self-signing certificate fields and save the changes. > **NOTE:** When copying the certificate and key, ensure you select the **BEGIN** and **END** lines. diff --git a/docs/kb/endpointprotector/check_the_client_version_installed_on_your_computer.md b/docs/kb/endpointprotector/deployment-and-installation/check_the_client_version_installed_on_your_computer.md similarity index 85% rename from docs/kb/endpointprotector/check_the_client_version_installed_on_your_computer.md rename to docs/kb/endpointprotector/deployment-and-installation/check_the_client_version_installed_on_your_computer.md index ea336b82b2..aa37c58649 100644 --- a/docs/kb/endpointprotector/check_the_client_version_installed_on_your_computer.md +++ b/docs/kb/endpointprotector/deployment-and-installation/check_the_client_version_installed_on_your_computer.md @@ -6,7 +6,8 @@ keywords: - management console - Endpoint Protector sidebar_label: Check Client Version -tags: [] +tags: + - deployment-and-installation title: "Check the Client Version Installed on Your Computer" knowledge_article_id: kA0Qk0000002BAuKAM products: @@ -24,7 +25,7 @@ This article explains how to check the version of the client installed on your c You can use either of the following options to check the installed client version: 1. Click the client icon in the system tray to view the installed version directly on your computer. - ![Client icon in system tray showing installed version](./images/servlet_image_e95427bb0c8e.png) + ![Client icon in system tray showing installed version](./../0-images/servlet_image_e95427bb0c8e.png) 2. Open the **Endpoint Protector Management Console** and go to **Device Control > Computers**. Check the **Client Version** column to see the version installed on each computer. - ![Endpoint Protector Management Console showing Client Version](./images/servlet_image_01861a9421d2.png) \ No newline at end of file + ![Endpoint Protector Management Console showing Client Version](./../0-images/servlet_image_01861a9421d2.png) \ No newline at end of file diff --git a/docs/kb/endpointprotector/deploy-the-client-on-macos-through-intune-with-full-disk-access.md b/docs/kb/endpointprotector/deployment-and-installation/deploy-the-client-on-macos-through-intune-with-full-disk-access.md similarity index 97% rename from docs/kb/endpointprotector/deploy-the-client-on-macos-through-intune-with-full-disk-access.md rename to docs/kb/endpointprotector/deployment-and-installation/deploy-the-client-on-macos-through-intune-with-full-disk-access.md index 08361d60c8..c8601d6ecb 100644 --- a/docs/kb/endpointprotector/deploy-the-client-on-macos-through-intune-with-full-disk-access.md +++ b/docs/kb/endpointprotector/deployment-and-installation/deploy-the-client-on-macos-through-intune-with-full-disk-access.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Deploy the Client on macOS Through Intune With Ful -tags: [] +tags: + - deployment-and-installation title: "Deploy the Client on macOS Through Intune With Full Disk Access" knowledge_article_id: kA0Qk0000002B2oKAE --- diff --git a/docs/kb/endpointprotector/deploy_clients_via_group_policy.md b/docs/kb/endpointprotector/deployment-and-installation/deploy_clients_via_group_policy.md similarity index 98% rename from docs/kb/endpointprotector/deploy_clients_via_group_policy.md rename to docs/kb/endpointprotector/deployment-and-installation/deploy_clients_via_group_policy.md index d92dbbd867..7340fdc634 100644 --- a/docs/kb/endpointprotector/deploy_clients_via_group_policy.md +++ b/docs/kb/endpointprotector/deployment-and-installation/deploy_clients_via_group_policy.md @@ -6,7 +6,8 @@ keywords: - Group Policy - deployment sidebar_label: Deploy Clients via GPO -tags: [] +tags: + - deployment-and-installation title: "Deploy Clients via Group Policy" knowledge_article_id: kA0Qk0000002B6KKAU products: diff --git a/docs/kb/endpointprotector/deploying-endpoint-protector-agents.md b/docs/kb/endpointprotector/deployment-and-installation/deploying-endpoint-protector-agents.md similarity index 94% rename from docs/kb/endpointprotector/deploying-endpoint-protector-agents.md rename to docs/kb/endpointprotector/deployment-and-installation/deploying-endpoint-protector-agents.md index 3e70aa0d5f..b41d0b6b81 100644 --- a/docs/kb/endpointprotector/deploying-endpoint-protector-agents.md +++ b/docs/kb/endpointprotector/deployment-and-installation/deploying-endpoint-protector-agents.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Deploying Endpoint Protector Agents -tags: [] +tags: + - deployment-and-installation title: "Deploying Endpoint Protector Agents" knowledge_article_id: kA0Qk0000002BCeKAM --- @@ -28,7 +29,7 @@ This article explains how to deploy Endpoint Protector agents to endpoint system ## Instructions 1. Retrieve the Endpoint Protector Client package(s) from the Endpoint Protector Management Console under **System Configuration** > **Client Software**. - ![Client Software section in Endpoint Protector Management Console](./images/ka0Qk000000ESMD_0EMQk00000C8gT0.png) + ![Client Software section in Endpoint Protector Management Console](./../0-images/ka0Qk000000ESMD_0EMQk00000C8gT0.png) 2. For Windows, select the add-ons that align with your blocking strategy. You can choose any combination of add-ons, or none at all. diff --git a/docs/kb/endpointprotector/download-the-intune-mdm-deployment-guide.md b/docs/kb/endpointprotector/deployment-and-installation/download-the-intune-mdm-deployment-guide.md similarity index 96% rename from docs/kb/endpointprotector/download-the-intune-mdm-deployment-guide.md rename to docs/kb/endpointprotector/deployment-and-installation/download-the-intune-mdm-deployment-guide.md index c5adcb4946..7de3a16c2c 100644 --- a/docs/kb/endpointprotector/download-the-intune-mdm-deployment-guide.md +++ b/docs/kb/endpointprotector/deployment-and-installation/download-the-intune-mdm-deployment-guide.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Download the Intune MDM Deployment Guide -tags: [] +tags: + - deployment-and-installation title: "Download the Intune MDM Deployment Guide" knowledge_article_id: kA0Qk0000002B7QKAU --- diff --git a/docs/kb/endpointprotector/enable_full_disk_access_when_deploying_on_macos_using_kandji.md b/docs/kb/endpointprotector/deployment-and-installation/enable_full_disk_access_when_deploying_on_macos_using_kandji.md similarity index 97% rename from docs/kb/endpointprotector/enable_full_disk_access_when_deploying_on_macos_using_kandji.md rename to docs/kb/endpointprotector/deployment-and-installation/enable_full_disk_access_when_deploying_on_macos_using_kandji.md index 11309a6f12..94d8620f7b 100644 --- a/docs/kb/endpointprotector/enable_full_disk_access_when_deploying_on_macos_using_kandji.md +++ b/docs/kb/endpointprotector/deployment-and-installation/enable_full_disk_access_when_deploying_on_macos_using_kandji.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - Kandji sidebar_label: Enable Full Disk Access on macOS -tags: [] +tags: + - deployment-and-installation title: "Enable Full Disk Access When Deploying on macOS Using Kandji" knowledge_article_id: kA0Qk0000002B16KAE products: diff --git a/docs/kb/endpointprotector/how-to-deploy-the-windows-endpoint-protector-agent.md b/docs/kb/endpointprotector/deployment-and-installation/how-to-deploy-the-windows-endpoint-protector-agent.md similarity index 88% rename from docs/kb/endpointprotector/how-to-deploy-the-windows-endpoint-protector-agent.md rename to docs/kb/endpointprotector/deployment-and-installation/how-to-deploy-the-windows-endpoint-protector-agent.md index 2ea5cb78cc..bc44cb80da 100644 --- a/docs/kb/endpointprotector/how-to-deploy-the-windows-endpoint-protector-agent.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how-to-deploy-the-windows-endpoint-protector-agent.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Deploy the Windows Endpoint Protector Agent -tags: [] +tags: + - deployment-and-installation title: "How to Deploy the Windows Endpoint Protector Agent" knowledge_article_id: kA0Qk0000001FTFKA2 --- @@ -75,11 +76,11 @@ Deploying the agent via Group Policy requires editing the MSI either directly or 1. Download the Orca MSI (or your preferred MSI editing software; these instructions use Orca). 1. Orca can be installed from the Windows SDK and selecting the MSI options. - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lsoU.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lsoU.png) 2. Right-click on the `EPPClientSetup` MSI and select **Edit with Orca**. - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lrve.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lrve.png) 3. Click on **Transform** > **New Transform**. 4. Add the required properties to the Property Table. @@ -89,9 +90,9 @@ Deploying the agent via Group Policy requires editing the MSI either directly or 4. Click **Ok**. 5. Optional: If there are more properties that need changing or adding, such as not using the default department code, refer to the Appendix for the list of properties and change them all in the Properties table. - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005ls6y.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005ls6y.png) - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lxoA.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lxoA.png) 5. Generate the Transform. 1. Click on **Transform**. @@ -99,7 +100,7 @@ Deploying the agent via Group Policy requires editing the MSI either directly or 3. In the open box, save your transform. 4. Ensure the packages are placed on a network share that is accessible to all clients that need to install it. - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3Ov.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3Ov.png) 6. Deploy the MSI with the Transform file via Group Policy. 1. Open Group Policy Management Console. @@ -115,11 +116,11 @@ Deploying the agent via Group Policy requires editing the MSI either directly or 11. Select the transform file and click **Ok**. 12. Click **Ok**. - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3VN.png) - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lwId.png) - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3gf.png) - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m13n.png) - ![image.png](./images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lzGU.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3VN.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lwId.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m3gf.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005m13n.png) + ![image.png](./../0-images/ka0Qk0000004Rkn_00N0g000004CA0p_0EMQk000005lzGU.png) ## Appendix diff --git a/docs/kb/endpointprotector/how-to-install-client-without-user-interaction.md b/docs/kb/endpointprotector/deployment-and-installation/how-to-install-client-without-user-interaction.md similarity index 96% rename from docs/kb/endpointprotector/how-to-install-client-without-user-interaction.md rename to docs/kb/endpointprotector/deployment-and-installation/how-to-install-client-without-user-interaction.md index 8d513f7732..2a4cca5c5a 100644 --- a/docs/kb/endpointprotector/how-to-install-client-without-user-interaction.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how-to-install-client-without-user-interaction.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Install Client Without User Interaction -tags: [] +tags: + - deployment-and-installation title: "How to Install Client Without User Interaction" knowledge_article_id: kA0Qk0000002Ay3KAE --- diff --git a/docs/kb/endpointprotector/how-to-install-the-client-on-macos-monterey.md b/docs/kb/endpointprotector/deployment-and-installation/how-to-install-the-client-on-macos-monterey.md similarity index 97% rename from docs/kb/endpointprotector/how-to-install-the-client-on-macos-monterey.md rename to docs/kb/endpointprotector/deployment-and-installation/how-to-install-the-client-on-macos-monterey.md index 3cc1dd4430..150530c537 100644 --- a/docs/kb/endpointprotector/how-to-install-the-client-on-macos-monterey.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how-to-install-the-client-on-macos-monterey.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Install the Client on macOS Monterey -tags: [] +tags: + - deployment-and-installation title: "How to Install the Client on macOS Monterey" knowledge_article_id: kA0Qk0000002BCJKA2 --- diff --git a/docs/kb/endpointprotector/how_to_apply_an_offline_patch_or_upgrade.md b/docs/kb/endpointprotector/deployment-and-installation/how_to_apply_an_offline_patch_or_upgrade.md similarity index 90% rename from docs/kb/endpointprotector/how_to_apply_an_offline_patch_or_upgrade.md rename to docs/kb/endpointprotector/deployment-and-installation/how_to_apply_an_offline_patch_or_upgrade.md index c525a6dffa..ccf4beb1e9 100644 --- a/docs/kb/endpointprotector/how_to_apply_an_offline_patch_or_upgrade.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how_to_apply_an_offline_patch_or_upgrade.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - software upgrade sidebar_label: Apply Offline Patch -tags: [] +tags: + - deployment-and-installation title: "How to Apply an Offline Patch or Upgrade" knowledge_article_id: kA0Qk0000002B7MKAU products: @@ -43,15 +44,15 @@ To stay informed about future version releases, visit the [Netwrix Community End 1. Open a web browser and access the **Endpoint Protector** console's web interface. 2. Log in with an account that has administrator privileges. 3. Navigate to **Dashboard** > **Live Update** > **Offline Patch Uploader**. - ![Offline Patch Uploader option in EPP Software Update section](./images/servlet_image_06bccc2709d5.png) + ![Offline Patch Uploader option in EPP Software Update section](./../0-images/servlet_image_06bccc2709d5.png) 4. Select **Choose File**. Browse for the downloaded or provided offline patch file and click **Upload Patch**. - ![Upload Patch button in Offline Patch Uploader](./images/servlet_image_c1cc54905886.png) + ![Upload Patch button in Offline Patch Uploader](./../0-images/servlet_image_c1cc54905886.png) 5. Wait for a green confirmation message stating **Patch applied successfully!** to appear above the Offline Patch Uploader section. - ![Patch applied successfully banner in Offline Patch Uploader](./images/servlet_image_6bd0b54ef795.png) + ![Patch applied successfully banner in Offline Patch Uploader](./../0-images/servlet_image_6bd0b54ef795.png) 6. Remain on the page and monitor the upgrade progress at **Dashboard** > **Live Update**. The progress bar should reach 100%, usually within 5–10 minutes, depending on your database size. - ![Upgrade progress bar in Live Update section](./images/servlet_image_65b2f6cd5406.png) + ![Upgrade progress bar in Live Update section](./../0-images/servlet_image_65b2f6cd5406.png) 7. After the upgrade completes, refresh your browser and verify the updated server version in the bottom right corner of the console interface. - ![Endpoint Protector version number in the console interface](./images/servlet_image_138e8d943c1b.png) + ![Endpoint Protector version number in the console interface](./../0-images/servlet_image_138e8d943c1b.png) 8. If you need to apply additional offline patches, repeat steps 4–7. Offline patches are incremental, like the Live Update functionality. You must apply them one at a time to correctly upgrade the server and avoid issues. > **NOTE:** There may be a delay between a new general availability (GA) release and the availability of an offline patch for the new server version. \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_apply_security_backend_updates.md b/docs/kb/endpointprotector/deployment-and-installation/how_to_apply_security_backend_updates.md similarity index 98% rename from docs/kb/endpointprotector/how_to_apply_security_backend_updates.md rename to docs/kb/endpointprotector/deployment-and-installation/how_to_apply_security_backend_updates.md index cae44225ec..b874f44627 100644 --- a/docs/kb/endpointprotector/how_to_apply_security_backend_updates.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how_to_apply_security_backend_updates.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - system backup sidebar_label: Apply Security Backend Updates -tags: [] +tags: + - deployment-and-installation title: "How to Apply Security Backend Updates" knowledge_article_id: kA0Qk0000002B2zKAE products: diff --git a/docs/kb/endpointprotector/how_to_deploy_the_client_using_sccm_or_msiexec.md b/docs/kb/endpointprotector/deployment-and-installation/how_to_deploy_the_client_using_sccm_or_msiexec.md similarity index 97% rename from docs/kb/endpointprotector/how_to_deploy_the_client_using_sccm_or_msiexec.md rename to docs/kb/endpointprotector/deployment-and-installation/how_to_deploy_the_client_using_sccm_or_msiexec.md index 5d78671af3..a55181ab42 100644 --- a/docs/kb/endpointprotector/how_to_deploy_the_client_using_sccm_or_msiexec.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how_to_deploy_the_client_using_sccm_or_msiexec.md @@ -6,7 +6,8 @@ keywords: - SCCM - msiexec sidebar_label: Deploy Client Using SCCM -tags: [] +tags: + - deployment-and-installation title: "How to Deploy the Client Using SCCM or msiexec" knowledge_article_id: kA0Qk0000002B7IKAU products: diff --git a/docs/kb/endpointprotector/how_to_find_the_cososys_team_id_and_bundle_id_for_client_deployment_on_macos.md b/docs/kb/endpointprotector/deployment-and-installation/how_to_find_the_cososys_team_id_and_bundle_id_for_client_deployment_on_macos.md similarity index 96% rename from docs/kb/endpointprotector/how_to_find_the_cososys_team_id_and_bundle_id_for_client_deployment_on_macos.md rename to docs/kb/endpointprotector/deployment-and-installation/how_to_find_the_cososys_team_id_and_bundle_id_for_client_deployment_on_macos.md index f51c6fbdae..41bbde9b72 100644 --- a/docs/kb/endpointprotector/how_to_find_the_cososys_team_id_and_bundle_id_for_client_deployment_on_macos.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how_to_find_the_cososys_team_id_and_bundle_id_for_client_deployment_on_macos.md @@ -8,7 +8,8 @@ keywords: - Endpoint Protector - macOS sidebar_label: Find CoSoSys Team ID and Bundle ID -tags: [] +tags: + - deployment-and-installation title: "How to Find the CoSoSys Team ID and Bundle ID for Client Deployment on macOS" knowledge_article_id: kA0Qk0000002B7kKAE products: diff --git a/docs/kb/endpointprotector/how_to_manually_uninstall_the_agent.md b/docs/kb/endpointprotector/deployment-and-installation/how_to_manually_uninstall_the_agent.md similarity index 97% rename from docs/kb/endpointprotector/how_to_manually_uninstall_the_agent.md rename to docs/kb/endpointprotector/deployment-and-installation/how_to_manually_uninstall_the_agent.md index 5cb15448d7..e296a6430d 100644 --- a/docs/kb/endpointprotector/how_to_manually_uninstall_the_agent.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how_to_manually_uninstall_the_agent.md @@ -8,7 +8,8 @@ keywords: - Linux - Endpoint Protector sidebar_label: Manually Uninstall the Agent -tags: [] +tags: + - deployment-and-installation title: "How to Manually Uninstall the Agent" knowledge_article_id: kA0Qk0000002B6xKAE products: diff --git a/docs/kb/endpointprotector/how_to_stage_the_endpoint_protector_server.md b/docs/kb/endpointprotector/deployment-and-installation/how_to_stage_the_endpoint_protector_server.md similarity index 98% rename from docs/kb/endpointprotector/how_to_stage_the_endpoint_protector_server.md rename to docs/kb/endpointprotector/deployment-and-installation/how_to_stage_the_endpoint_protector_server.md index 87e900817a..ecd90e379b 100644 --- a/docs/kb/endpointprotector/how_to_stage_the_endpoint_protector_server.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how_to_stage_the_endpoint_protector_server.md @@ -6,7 +6,8 @@ keywords: - server staging - deployment sidebar_label: Stage Endpoint Protector Server -tags: [] +tags: + - deployment-and-installation title: "How to Stage the Endpoint Protector Server" knowledge_article_id: kA0Qk0000002BAkKAM products: diff --git a/docs/kb/endpointprotector/how_to_update_to_macos_12_(monterey)_while_using_endpoint_protector_client_and_deep_packet_inspectio.md b/docs/kb/endpointprotector/deployment-and-installation/how_to_update_to_macos_12_(monterey)_while_using_endpoint_protector_client_and_deep_packet_inspectio.md similarity index 91% rename from docs/kb/endpointprotector/how_to_update_to_macos_12_(monterey)_while_using_endpoint_protector_client_and_deep_packet_inspectio.md rename to docs/kb/endpointprotector/deployment-and-installation/how_to_update_to_macos_12_(monterey)_while_using_endpoint_protector_client_and_deep_packet_inspectio.md index f56955531e..14539e6739 100644 --- a/docs/kb/endpointprotector/how_to_update_to_macos_12_(monterey)_while_using_endpoint_protector_client_and_deep_packet_inspectio.md +++ b/docs/kb/endpointprotector/deployment-and-installation/how_to_update_to_macos_12_(monterey)_while_using_endpoint_protector_client_and_deep_packet_inspectio.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - Deep Packet Inspection sidebar_label: Update to macOS 12 -tags: [] +tags: + - deployment-and-installation title: "How to Update to macOS 12 (Monterey) While Using Endpoint Protector Client and Deep Packet Inspection" knowledge_article_id: kA0Qk0000002B9UKAU products: @@ -30,11 +31,11 @@ This article explains how to update to macOS 12 (Monterey) when using the Endpoi 7. Unzip the downloaded **ClientCerts** file. 8. Select the **cacert.pem** file and move it into **System** in **Keychain Access**. - ![Dragging cacert.pem into System in Keychain Access on macOS](./images/servlet_image_7fc401abe1e3.png) + ![Dragging cacert.pem into System in Keychain Access on macOS](./../0-images/servlet_image_7fc401abe1e3.png) 9. Double-click the newly added certificate. In the **Trust** section, select **Always Trust**. - ![Setting certificate to Always Trust in Keychain Access](./images/servlet_image_910151bbafe1.png) + ![Setting certificate to Always Trust in Keychain Access](./../0-images/servlet_image_910151bbafe1.png) 10. Save the changes. 11. Update the macOS Endpoint Protector client to the latest version. diff --git a/docs/kb/endpointprotector/install-globalsign-and-digicert-root-certificates-on-windows.md b/docs/kb/endpointprotector/deployment-and-installation/install-globalsign-and-digicert-root-certificates-on-windows.md similarity index 92% rename from docs/kb/endpointprotector/install-globalsign-and-digicert-root-certificates-on-windows.md rename to docs/kb/endpointprotector/deployment-and-installation/install-globalsign-and-digicert-root-certificates-on-windows.md index cd7008c8ad..d4fef1dfd4 100644 --- a/docs/kb/endpointprotector/install-globalsign-and-digicert-root-certificates-on-windows.md +++ b/docs/kb/endpointprotector/deployment-and-installation/install-globalsign-and-digicert-root-certificates-on-windows.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: "Install GlobalSign and DigiCert Root Certificates on Windows" -tags: [] +tags: + - deployment-and-installation title: "Install GlobalSign and DigiCert Root Certificates on Windows" knowledge_article_id: kA0Qk0000002BFZKA2 --- @@ -36,13 +37,13 @@ Installing the correct root certificates ensures that Windows recognizes the dig 1. To verify if the required GlobalSign root certificate is present, navigate to `Program Files\Cososys\EPPNotifier.exe`. 2. Right-click **EPPNotifier.exe** and select **Properties**. 3. Navigate to the **Digital Signatures** tab and select the certificate then click **Details**. - ![Viewing digital signature details for EPPNotifier.exe](./images/ka0Qk000000ETF3_0EMQk00000C8rxt.png) + ![Viewing digital signature details for EPPNotifier.exe](./../0-images/ka0Qk000000ETF3_0EMQk00000C8rxt.png) 4. If the GlobalSign root certificate is missing, download it from the official GlobalSign website: GlobalSign Root Certificates ⸱ GlobalSign ↗️ https://support.globalsign.com/ca-certificates/root-certificates/globalsign-root-certificates 5. Search for the certificate named **GlobalSign Root R3** then download and install it in the **Trusted Root Certification Authorities** store. 6. If required, check for the **GlobalSign Code Signing Root R45** certificate in the certificate store: - ![Checking for GlobalSign Code Signing Root R45 in certificate store](./images/ka0Qk000000ETF3_0EMQk00000C8rLD.png) + ![Checking for GlobalSign Code Signing Root R45 in certificate store](./../0-images/ka0Qk000000ETF3_0EMQk00000C8rLD.png) 7. For digital signature time-stamping, ensure the **DigiCert Assured ID Root CA** certificate (valid until 10 November 2031) is trusted. Download it from: DigiCert Root Certificates ⸱ DigiCert ↗️ https://www.digicert.com/kb/digicert-root-certificates.htm diff --git a/docs/kb/endpointprotector/install_client_on_macos_with_deep_packet_inspection_and_vpn_traffic_intercept.md b/docs/kb/endpointprotector/deployment-and-installation/install_client_on_macos_with_deep_packet_inspection_and_vpn_traffic_intercept.md similarity index 99% rename from docs/kb/endpointprotector/install_client_on_macos_with_deep_packet_inspection_and_vpn_traffic_intercept.md rename to docs/kb/endpointprotector/deployment-and-installation/install_client_on_macos_with_deep_packet_inspection_and_vpn_traffic_intercept.md index 50f7580ed1..bc6652afce 100644 --- a/docs/kb/endpointprotector/install_client_on_macos_with_deep_packet_inspection_and_vpn_traffic_intercept.md +++ b/docs/kb/endpointprotector/deployment-and-installation/install_client_on_macos_with_deep_packet_inspection_and_vpn_traffic_intercept.md @@ -8,7 +8,8 @@ keywords: - VPN Traffic Intercept - client software sidebar_label: Install EPP Client on macOS -tags: [] +tags: + - deployment-and-installation title: "Install Client on macOS with Deep Packet Inspection and VPN Traffic Intercept" knowledge_article_id: kA0Qk0000002B64KAE products: diff --git a/docs/kb/endpointprotector/install_the_linux_client.md b/docs/kb/endpointprotector/deployment-and-installation/install_the_linux_client.md similarity index 97% rename from docs/kb/endpointprotector/install_the_linux_client.md rename to docs/kb/endpointprotector/deployment-and-installation/install_the_linux_client.md index ead54b7d28..66085661a9 100644 --- a/docs/kb/endpointprotector/install_the_linux_client.md +++ b/docs/kb/endpointprotector/deployment-and-installation/install_the_linux_client.md @@ -6,7 +6,8 @@ keywords: - Linux client - installation sidebar_label: Install Linux Client -tags: [] +tags: + - deployment-and-installation title: "How to Install the Endpoint Protector Linux Client" knowledge_article_id: kA0Qk0000002B6vKAE products: diff --git a/docs/kb/endpointprotector/installing-a-monitoring-agent-on-the-virtual-appliance.md b/docs/kb/endpointprotector/deployment-and-installation/installing-a-monitoring-agent-on-the-virtual-appliance.md similarity index 97% rename from docs/kb/endpointprotector/installing-a-monitoring-agent-on-the-virtual-appliance.md rename to docs/kb/endpointprotector/deployment-and-installation/installing-a-monitoring-agent-on-the-virtual-appliance.md index 798f3e91f1..82074c1885 100644 --- a/docs/kb/endpointprotector/installing-a-monitoring-agent-on-the-virtual-appliance.md +++ b/docs/kb/endpointprotector/deployment-and-installation/installing-a-monitoring-agent-on-the-virtual-appliance.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Installing a Monitoring Agent on the Virtual Appli -tags: [] +tags: + - deployment-and-installation title: "Installing a Monitoring Agent on the Virtual Appliance" knowledge_article_id: kA0Qk0000002B2vKAE --- diff --git a/docs/kb/endpointprotector/installing-the-agent-with-proxy-settings-on-macos.md b/docs/kb/endpointprotector/deployment-and-installation/installing-the-agent-with-proxy-settings-on-macos.md similarity index 94% rename from docs/kb/endpointprotector/installing-the-agent-with-proxy-settings-on-macos.md rename to docs/kb/endpointprotector/deployment-and-installation/installing-the-agent-with-proxy-settings-on-macos.md index 08ba663574..6bf8219565 100644 --- a/docs/kb/endpointprotector/installing-the-agent-with-proxy-settings-on-macos.md +++ b/docs/kb/endpointprotector/deployment-and-installation/installing-the-agent-with-proxy-settings-on-macos.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Installing the Agent with Proxy Settings on MacOS -tags: [] +tags: + - deployment-and-installation title: "Installing the Agent with Proxy Settings on MacOS" knowledge_article_id: kA0Qk0000002B5vKAE --- @@ -36,6 +37,6 @@ Follow the steps below to install the EPP agent with proxy settings on macOS: 4. If your proxy requires authentication, enter valid credentials in the appropriate fields. 5. You can enter a proxy IP address, DNS name, or fully qualified domain name (FQDN) in the proxy IP field. -![ ](./images/ka0Qk000000Dein_0EMQk00000CV0zJ.png) +![ ](./../0-images/ka0Qk000000Dein_0EMQk00000CV0zJ.png) 6. After installation is complete, wait a few minutes for processing. Then, verify that the computer appears in the **Device Control** > **Computers** section of the **Netwrix Endpoint Protector Web Console**. diff --git a/docs/kb/endpointprotector/installing-the-agent-with-proxy-settings-on-windows.md b/docs/kb/endpointprotector/deployment-and-installation/installing-the-agent-with-proxy-settings-on-windows.md similarity index 97% rename from docs/kb/endpointprotector/installing-the-agent-with-proxy-settings-on-windows.md rename to docs/kb/endpointprotector/deployment-and-installation/installing-the-agent-with-proxy-settings-on-windows.md index fe8474dceb..533d144a5c 100644 --- a/docs/kb/endpointprotector/installing-the-agent-with-proxy-settings-on-windows.md +++ b/docs/kb/endpointprotector/deployment-and-installation/installing-the-agent-with-proxy-settings-on-windows.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Installing the Agent with Proxy Settings on Window -tags: [] +tags: + - deployment-and-installation title: "Installing the Agent with Proxy Settings on Windows" knowledge_article_id: kA0Qk0000002B6OKAU --- diff --git a/docs/kb/endpointprotector/installing_the_agent_with_proxy_settings_on_linux.md b/docs/kb/endpointprotector/deployment-and-installation/installing_the_agent_with_proxy_settings_on_linux.md similarity index 97% rename from docs/kb/endpointprotector/installing_the_agent_with_proxy_settings_on_linux.md rename to docs/kb/endpointprotector/deployment-and-installation/installing_the_agent_with_proxy_settings_on_linux.md index 0cefaf792c..5bc4f4959a 100644 --- a/docs/kb/endpointprotector/installing_the_agent_with_proxy_settings_on_linux.md +++ b/docs/kb/endpointprotector/deployment-and-installation/installing_the_agent_with_proxy_settings_on_linux.md @@ -6,7 +6,8 @@ keywords: - Linux - proxy settings sidebar_label: Installing the Agent with Proxy Settings -tags: [] +tags: + - deployment-and-installation title: "Installing the Agent with Proxy Settings on Linux" knowledge_article_id: kA0Qk0000002B2iKAE products: diff --git a/docs/kb/endpointprotector/migrate_the_endpoint_protector_server_to_a_new_virtual_machine.md b/docs/kb/endpointprotector/deployment-and-installation/migrate_the_endpoint_protector_server_to_a_new_virtual_machine.md similarity index 98% rename from docs/kb/endpointprotector/migrate_the_endpoint_protector_server_to_a_new_virtual_machine.md rename to docs/kb/endpointprotector/deployment-and-installation/migrate_the_endpoint_protector_server_to_a_new_virtual_machine.md index 3dbbf9a62f..92f1187ce8 100644 --- a/docs/kb/endpointprotector/migrate_the_endpoint_protector_server_to_a_new_virtual_machine.md +++ b/docs/kb/endpointprotector/deployment-and-installation/migrate_the_endpoint_protector_server_to_a_new_virtual_machine.md @@ -6,7 +6,8 @@ keywords: - migration - virtual machine sidebar_label: Migrate Endpoint Protector Server -tags: [] +tags: + - deployment-and-installation title: "Migrate the Endpoint Protector Server to a New Virtual Machine" knowledge_article_id: kA0Qk0000002B6DKAU products: diff --git a/docs/kb/endpointprotector/reinstalling-the-endpoint-protector-client-via-linux-terminal.md b/docs/kb/endpointprotector/deployment-and-installation/reinstalling-the-endpoint-protector-client-via-linux-terminal.md similarity index 97% rename from docs/kb/endpointprotector/reinstalling-the-endpoint-protector-client-via-linux-terminal.md rename to docs/kb/endpointprotector/deployment-and-installation/reinstalling-the-endpoint-protector-client-via-linux-terminal.md index 6e8f6ad6ec..073dd5246f 100644 --- a/docs/kb/endpointprotector/reinstalling-the-endpoint-protector-client-via-linux-terminal.md +++ b/docs/kb/endpointprotector/deployment-and-installation/reinstalling-the-endpoint-protector-client-via-linux-terminal.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Reinstalling the Endpoint Protector Client via Lin -tags: [] +tags: + - deployment-and-installation title: "Reinstalling the Endpoint Protector Client via Linux Terminal" knowledge_article_id: kA0Qk0000002B6JKAU --- diff --git a/docs/kb/endpointprotector/uninstall-the-client-from-a-mac-computer.md b/docs/kb/endpointprotector/deployment-and-installation/uninstall-the-client-from-a-mac-computer.md similarity index 96% rename from docs/kb/endpointprotector/uninstall-the-client-from-a-mac-computer.md rename to docs/kb/endpointprotector/deployment-and-installation/uninstall-the-client-from-a-mac-computer.md index 8d1efac115..1b937a448d 100644 --- a/docs/kb/endpointprotector/uninstall-the-client-from-a-mac-computer.md +++ b/docs/kb/endpointprotector/deployment-and-installation/uninstall-the-client-from-a-mac-computer.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Uninstall the Client From a Mac Computer -tags: [] +tags: + - deployment-and-installation title: "Uninstall the Client From a Mac Computer" knowledge_article_id: kA0Qk0000002B7SKAU --- diff --git a/docs/kb/endpointprotector/upgrade_linux_clients_without_uninstalling_and_reinstalling.md b/docs/kb/endpointprotector/deployment-and-installation/upgrade_linux_clients_without_uninstalling_and_reinstalling.md similarity index 97% rename from docs/kb/endpointprotector/upgrade_linux_clients_without_uninstalling_and_reinstalling.md rename to docs/kb/endpointprotector/deployment-and-installation/upgrade_linux_clients_without_uninstalling_and_reinstalling.md index f1de0daeea..1c0d376372 100644 --- a/docs/kb/endpointprotector/upgrade_linux_clients_without_uninstalling_and_reinstalling.md +++ b/docs/kb/endpointprotector/deployment-and-installation/upgrade_linux_clients_without_uninstalling_and_reinstalling.md @@ -6,7 +6,8 @@ keywords: - Linux client upgrade - configuration preservation sidebar_label: Upgrade Linux Clients -tags: [] +tags: + - deployment-and-installation title: "Upgrade Linux Clients Without Uninstalling and Reinstalling" knowledge_article_id: kA0Qk0000002B6mKAE products: diff --git a/docs/kb/endpointprotector/upgrade_to_client_version_5.9.4.3.md b/docs/kb/endpointprotector/deployment-and-installation/upgrade_to_client_version_5.9.4.3.md similarity index 97% rename from docs/kb/endpointprotector/upgrade_to_client_version_5.9.4.3.md rename to docs/kb/endpointprotector/deployment-and-installation/upgrade_to_client_version_5.9.4.3.md index e74645c3b0..9860ebe28d 100644 --- a/docs/kb/endpointprotector/upgrade_to_client_version_5.9.4.3.md +++ b/docs/kb/endpointprotector/deployment-and-installation/upgrade_to_client_version_5.9.4.3.md @@ -6,7 +6,8 @@ keywords: - EPP client upgrade - software installation sidebar_label: Upgrade to EPP Client 5.9.4.3 -tags: [] +tags: + - deployment-and-installation title: "Upgrade to Client Version 5.9.4.3" knowledge_article_id: kA0Qk0000002q5lKAA products: @@ -68,7 +69,7 @@ This article provides instructions for upgrading to Netwrix Endpoint Protector ( 1. Open the EPP agent via the system tray icon. 2. Navigate to **Settings** and press `Ctrl + Alt + i` (Windows) or `Command + Option + i` (macOS). - ![EPP agent settings and version check](./images/servlet_image_13588715e752.png) + ![EPP agent settings and version check](./../0-images/servlet_image_13588715e752.png) - From the EPP server 5.9.4.2 console: 1. Navigate to **Device Control** > **Computers** > **List of Computers**. diff --git a/docs/kb/endpointprotector/are_ios_devices_recognized_when_connected_to_a_windows_pc.md b/docs/kb/endpointprotector/device-control-and-access-management/are_ios_devices_recognized_when_connected_to_a_windows_pc.md similarity index 94% rename from docs/kb/endpointprotector/are_ios_devices_recognized_when_connected_to_a_windows_pc.md rename to docs/kb/endpointprotector/device-control-and-access-management/are_ios_devices_recognized_when_connected_to_a_windows_pc.md index e18e15290f..ab9f6f864f 100644 --- a/docs/kb/endpointprotector/are_ios_devices_recognized_when_connected_to_a_windows_pc.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/are_ios_devices_recognized_when_connected_to_a_windows_pc.md @@ -6,7 +6,8 @@ keywords: - iOS devices - Windows PC sidebar_label: iOS Device Recognition -tags: [] +tags: + - device-control-and-access-management title: "Are iOS Devices Recognized When Connected to a Windows PC?" knowledge_article_id: kA0Qk0000002B9HKAU products: diff --git a/docs/kb/endpointprotector/block-file-transfers-to-or-from-network-shares.md b/docs/kb/endpointprotector/device-control-and-access-management/block-file-transfers-to-or-from-network-shares.md similarity index 96% rename from docs/kb/endpointprotector/block-file-transfers-to-or-from-network-shares.md rename to docs/kb/endpointprotector/device-control-and-access-management/block-file-transfers-to-or-from-network-shares.md index e2ccc30710..5c3dab4c37 100644 --- a/docs/kb/endpointprotector/block-file-transfers-to-or-from-network-shares.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/block-file-transfers-to-or-from-network-shares.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Block File Transfers to or from Network Shares -tags: [] +tags: + - device-control-and-access-management title: "Block File Transfers to or from Network Shares" knowledge_article_id: kA0Qk0000002B6oKAE --- diff --git a/docs/kb/endpointprotector/blocking-easylock-folder-access-on-machines-without-the-endpoint-protector-agent.md b/docs/kb/endpointprotector/device-control-and-access-management/blocking-easylock-folder-access-on-machines-without-the-endpoint-protector-agent.md similarity index 91% rename from docs/kb/endpointprotector/blocking-easylock-folder-access-on-machines-without-the-endpoint-protector-agent.md rename to docs/kb/endpointprotector/device-control-and-access-management/blocking-easylock-folder-access-on-machines-without-the-endpoint-protector-agent.md index 44571000ee..6ae1db95a7 100644 --- a/docs/kb/endpointprotector/blocking-easylock-folder-access-on-machines-without-the-endpoint-protector-agent.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/blocking-easylock-folder-access-on-machines-without-the-endpoint-protector-agent.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Blocking EasyLock Folder Access on Machines... -tags: [] +tags: + - device-control-and-access-management title: "Blocking EasyLock Folder Access on Machines Without the Endpoint Protector Agent" knowledge_article_id: kA0Qk0000002B6iKAE --- @@ -30,4 +31,4 @@ This article explains how you can prevent access to EasyLock-protected folders f 1. Go to **Device Control** > **Global Settings** > **EasyLock Settings**. 2. Enable the **Endpoint Protector Client presence required** option. 3. Save the changes. - ![Endpoint](./images/servlet_image_3f1c3b331cfe.png) + ![Endpoint](./../0-images/servlet_image_3f1c3b331cfe.png) diff --git a/docs/kb/endpointprotector/can-endpoint-protector-block-internal-card-readers-on-mac.md b/docs/kb/endpointprotector/device-control-and-access-management/can-endpoint-protector-block-internal-card-readers-on-mac.md similarity index 96% rename from docs/kb/endpointprotector/can-endpoint-protector-block-internal-card-readers-on-mac.md rename to docs/kb/endpointprotector/device-control-and-access-management/can-endpoint-protector-block-internal-card-readers-on-mac.md index 2c53e0006e..e5b9148b6d 100644 --- a/docs/kb/endpointprotector/can-endpoint-protector-block-internal-card-readers-on-mac.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/can-endpoint-protector-block-internal-card-readers-on-mac.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Can Endpoint Protector Block Internal Card Readers -tags: [] +tags: + - device-control-and-access-management title: "Can Endpoint Protector Block Internal Card Readers on Mac?" knowledge_article_id: kA0Qk0000002BCfKAM --- diff --git a/docs/kb/endpointprotector/can-you-block-an-internal-card-reader-on-mac.md b/docs/kb/endpointprotector/device-control-and-access-management/can-you-block-an-internal-card-reader-on-mac.md similarity index 95% rename from docs/kb/endpointprotector/can-you-block-an-internal-card-reader-on-mac.md rename to docs/kb/endpointprotector/device-control-and-access-management/can-you-block-an-internal-card-reader-on-mac.md index 96090129e8..b304515623 100644 --- a/docs/kb/endpointprotector/can-you-block-an-internal-card-reader-on-mac.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/can-you-block-an-internal-card-reader-on-mac.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Can You Block an Internal Card Reader on Mac? -tags: [] +tags: + - device-control-and-access-management title: "Can You Block an Internal Card Reader on Mac?" knowledge_article_id: kA0Qk0000002BHKKA2 --- diff --git a/docs/kb/endpointprotector/configuring-rights-for-outside-hours-and-outside-network.md b/docs/kb/endpointprotector/device-control-and-access-management/configuring-rights-for-outside-hours-and-outside-network.md similarity index 97% rename from docs/kb/endpointprotector/configuring-rights-for-outside-hours-and-outside-network.md rename to docs/kb/endpointprotector/device-control-and-access-management/configuring-rights-for-outside-hours-and-outside-network.md index 7882313730..cab8a843ab 100644 --- a/docs/kb/endpointprotector/configuring-rights-for-outside-hours-and-outside-network.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/configuring-rights-for-outside-hours-and-outside-network.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Configuring Rights for Outside Hours and Outside N -tags: [] +tags: + - device-control-and-access-management title: "Configuring Rights for Outside Hours and Outside Network" knowledge_article_id: kA0Qk0000002B6ZKAU --- diff --git a/docs/kb/endpointprotector/device-control-sections-overview.md b/docs/kb/endpointprotector/device-control-and-access-management/device-control-sections-overview.md similarity index 98% rename from docs/kb/endpointprotector/device-control-sections-overview.md rename to docs/kb/endpointprotector/device-control-and-access-management/device-control-sections-overview.md index a2550259d9..670c2b6899 100644 --- a/docs/kb/endpointprotector/device-control-sections-overview.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/device-control-sections-overview.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Device Control Sections Overview -tags: [] +tags: + - device-control-and-access-management title: "Device Control Sections Overview" knowledge_article_id: kA0Qk0000002BCbKAM --- diff --git a/docs/kb/endpointprotector/error-cannot-execute-command-an-error-occurred.md b/docs/kb/endpointprotector/device-control-and-access-management/error-cannot-execute-command-an-error-occurred.md similarity index 95% rename from docs/kb/endpointprotector/error-cannot-execute-command-an-error-occurred.md rename to docs/kb/endpointprotector/device-control-and-access-management/error-cannot-execute-command-an-error-occurred.md index a5620f7c9a..a2d9059596 100644 --- a/docs/kb/endpointprotector/error-cannot-execute-command-an-error-occurred.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/error-cannot-execute-command-an-error-occurred.md @@ -13,7 +13,8 @@ keywords: products: - endpoint-protector sidebar_label: 'Error: "Cannot execute command! An error occurred!"' -tags: [] +tags: + - device-control-and-access-management title: 'Error: "Cannot execute command! An error occurred!"' knowledge_article_id: kA0Qk0000002B73KAE --- diff --git a/docs/kb/endpointprotector/error-failed-to-initiate-usb-device.md b/docs/kb/endpointprotector/device-control-and-access-management/error-failed-to-initiate-usb-device.md similarity index 96% rename from docs/kb/endpointprotector/error-failed-to-initiate-usb-device.md rename to docs/kb/endpointprotector/device-control-and-access-management/error-failed-to-initiate-usb-device.md index 5bb013db42..1a7a5e4038 100644 --- a/docs/kb/endpointprotector/error-failed-to-initiate-usb-device.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/error-failed-to-initiate-usb-device.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: "Error: Failed to Initiate USB device" -tags: [] +tags: + - device-control-and-access-management title: 'Error: Failed to Initiate USB device' knowledge_article_id: kA0Qk0000002BCHKA2 --- diff --git a/docs/kb/endpointprotector/error_devices_not_visible_in_list_of_devices.md b/docs/kb/endpointprotector/device-control-and-access-management/error_devices_not_visible_in_list_of_devices.md similarity index 97% rename from docs/kb/endpointprotector/error_devices_not_visible_in_list_of_devices.md rename to docs/kb/endpointprotector/device-control-and-access-management/error_devices_not_visible_in_list_of_devices.md index 972fb25af1..48539ab5dd 100644 --- a/docs/kb/endpointprotector/error_devices_not_visible_in_list_of_devices.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/error_devices_not_visible_in_list_of_devices.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - EPP Client sidebar_label: Devices Not Visible -tags: [] +tags: + - device-control-and-access-management title: "Error: Devices Not Visible in List of Devices" knowledge_article_id: kA0Qk0000002B6eKAE products: diff --git a/docs/kb/endpointprotector/global-rights-option-not-displayed-when-easylock-role-is-assigned-to-administrator.md b/docs/kb/endpointprotector/device-control-and-access-management/global-rights-option-not-displayed-when-easylock-role-is-assigned-to-administrator.md similarity index 98% rename from docs/kb/endpointprotector/global-rights-option-not-displayed-when-easylock-role-is-assigned-to-administrator.md rename to docs/kb/endpointprotector/device-control-and-access-management/global-rights-option-not-displayed-when-easylock-role-is-assigned-to-administrator.md index 435b595fd7..f18dc2c53e 100644 --- a/docs/kb/endpointprotector/global-rights-option-not-displayed-when-easylock-role-is-assigned-to-administrator.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/global-rights-option-not-displayed-when-easylock-role-is-assigned-to-administrator.md @@ -17,7 +17,8 @@ keywords: products: - endpoint-protector sidebar_label: Global Rights Option Not Displayed When Easylock R -tags: [] +tags: + - device-control-and-access-management title: "Global Rights Option Not Displayed When Easylock Role Is Assigned to Administrator" knowledge_article_id: kA0Qk0000002j7VKAQ --- diff --git a/docs/kb/endpointprotector/how-to-back-up-data-from-a-usb-drive-when-experiencing-easylock-issues.md b/docs/kb/endpointprotector/device-control-and-access-management/how-to-back-up-data-from-a-usb-drive-when-experiencing-easylock-issues.md similarity index 96% rename from docs/kb/endpointprotector/how-to-back-up-data-from-a-usb-drive-when-experiencing-easylock-issues.md rename to docs/kb/endpointprotector/device-control-and-access-management/how-to-back-up-data-from-a-usb-drive-when-experiencing-easylock-issues.md index 1ea7551be8..e284f5a893 100644 --- a/docs/kb/endpointprotector/how-to-back-up-data-from-a-usb-drive-when-experiencing-easylock-issues.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how-to-back-up-data-from-a-usb-drive-when-experiencing-easylock-issues.md @@ -16,7 +16,8 @@ products: - endpoint-protector visibility: public sidebar_label: How to Back Up Data from a USB Drive When Experien -tags: [] +tags: + - device-control-and-access-management title: "How to Back Up Data from a USB Drive When Experiencing Easylock Issues" knowledge_article_id: kA0Qk0000002B2sKAE --- diff --git a/docs/kb/endpointprotector/how-to-charge-an-iphone-on-a-computer-controlled-by-endpoint-protector.md b/docs/kb/endpointprotector/device-control-and-access-management/how-to-charge-an-iphone-on-a-computer-controlled-by-endpoint-protector.md similarity index 95% rename from docs/kb/endpointprotector/how-to-charge-an-iphone-on-a-computer-controlled-by-endpoint-protector.md rename to docs/kb/endpointprotector/device-control-and-access-management/how-to-charge-an-iphone-on-a-computer-controlled-by-endpoint-protector.md index 8b46e0fa65..0d8f7a865e 100644 --- a/docs/kb/endpointprotector/how-to-charge-an-iphone-on-a-computer-controlled-by-endpoint-protector.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how-to-charge-an-iphone-on-a-computer-controlled-by-endpoint-protector.md @@ -15,7 +15,8 @@ products: - endpoint-protector visibility: public sidebar_label: How to Charge an iPhone on a Computer Controlled b -tags: [] +tags: + - device-control-and-access-management title: "How to Charge an iPhone on a Computer Controlled by Netwrix Endpoint Protector" knowledge_article_id: kA0Qk0000002BHNKA2 --- diff --git a/docs/kb/endpointprotector/how-to-configure-deny-access-but-allow-charging-for-ios-devices.md b/docs/kb/endpointprotector/device-control-and-access-management/how-to-configure-deny-access-but-allow-charging-for-ios-devices.md similarity index 93% rename from docs/kb/endpointprotector/how-to-configure-deny-access-but-allow-charging-for-ios-devices.md rename to docs/kb/endpointprotector/device-control-and-access-management/how-to-configure-deny-access-but-allow-charging-for-ios-devices.md index 1843545e2f..0436ad753d 100644 --- a/docs/kb/endpointprotector/how-to-configure-deny-access-but-allow-charging-for-ios-devices.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how-to-configure-deny-access-but-allow-charging-for-ios-devices.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Configure Deny Access but Allow Charging fo -tags: [] +tags: + - device-control-and-access-management title: "How to Configure Deny Access but Allow Charging for iOS Devices" knowledge_article_id: kA0Qk0000002BHDKA2 --- @@ -31,7 +32,7 @@ The **Deny Access** right typically prevents iOS devices from charging. To addre 1. In the **Netwrix Endpoint Protector Console**, navigate to the **Global**, **Computer**, **User**, or **Group** level settings. 2. Locate the **Deny Access but Allow Charging** option under **Device Types**. - ![Deny Access but Allow Charging option under Device Types in Netwrix Endpoint Protector](./images/ka0Qk000000ESsT_0EMQk00000C77qh.png) + ![Deny Access but Allow Charging option under Device Types in Netwrix Endpoint Protector](./../0-images/ka0Qk000000ESsT_0EMQk00000C77qh.png) 3. Select **Deny Access but Allow Charging** for the desired iOS devices. > **NOTE:** This right prevents native sync, a common process for all iOS devices. Setting **Deny Access but Allow Charging** for any iPhone, iPad, or iPod can affect other iOS devices in Netwrix Endpoint Protector. Applying this right to a device type (for example, iPhones) may also apply it to other device types (such as iPads or iPods), regardless of the rights set on those devices. For granular control (Groups, Computers, Devices, etc.), ensure this right is set for a specific device and not for an entire device type. diff --git a/docs/kb/endpointprotector/how-to-configure-user-remediation-for-device-control.md b/docs/kb/endpointprotector/device-control-and-access-management/how-to-configure-user-remediation-for-device-control.md similarity index 98% rename from docs/kb/endpointprotector/how-to-configure-user-remediation-for-device-control.md rename to docs/kb/endpointprotector/device-control-and-access-management/how-to-configure-user-remediation-for-device-control.md index b7b963e6fb..6b5be36e33 100644 --- a/docs/kb/endpointprotector/how-to-configure-user-remediation-for-device-control.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how-to-configure-user-remediation-for-device-control.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Configure User Remediation for Device Contr -tags: [] +tags: + - device-control-and-access-management title: "How to Configure User Remediation for Device Contr" knowledge_article_id: kA0Qk0000002B2pKAE --- diff --git a/docs/kb/endpointprotector/how-to-set-access-rights-for-an-iphone.md b/docs/kb/endpointprotector/device-control-and-access-management/how-to-set-access-rights-for-an-iphone.md similarity index 94% rename from docs/kb/endpointprotector/how-to-set-access-rights-for-an-iphone.md rename to docs/kb/endpointprotector/device-control-and-access-management/how-to-set-access-rights-for-an-iphone.md index 138905d73f..5d17ee8071 100644 --- a/docs/kb/endpointprotector/how-to-set-access-rights-for-an-iphone.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how-to-set-access-rights-for-an-iphone.md @@ -15,7 +15,8 @@ products: - endpoint-protector visibility: public sidebar_label: How to Set Access Rights for an iPhone -tags: [] +tags: + - device-control-and-access-management title: "How to Set Access Rights for an iPhone" knowledge_article_id: kA0Qk0000002BHIKA2 --- diff --git a/docs/kb/endpointprotector/how_easylock_software_works_with_the_endpoint_protector_server_and_client_software.md b/docs/kb/endpointprotector/device-control-and-access-management/how_easylock_software_works_with_the_endpoint_protector_server_and_client_software.md similarity index 93% rename from docs/kb/endpointprotector/how_easylock_software_works_with_the_endpoint_protector_server_and_client_software.md rename to docs/kb/endpointprotector/device-control-and-access-management/how_easylock_software_works_with_the_endpoint_protector_server_and_client_software.md index 7ed011955e..2568926f1d 100644 --- a/docs/kb/endpointprotector/how_easylock_software_works_with_the_endpoint_protector_server_and_client_software.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how_easylock_software_works_with_the_endpoint_protector_server_and_client_software.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - Trusted Device sidebar_label: How EasyLock Works with EPP -tags: [] +tags: + - device-control-and-access-management title: "How EasyLock Software Works with the Endpoint Protector Server and Client Software" knowledge_article_id: kA0Qk0000002BE3KAM products: @@ -28,6 +29,6 @@ Follow the steps below to complete this process: 1. Install EasyLock on a USB storage device. 2. Once EasyLock is installed, the device is turned into a **Trusted Device Level 1 (TD1)**. 3. Configure the EPP appliance with the **Allow Access if device is TD Level 1** setting so that the appliance is made aware of the device status. - ![EPP appliance configuration screen showing Allow Access if device is TD Level 1 option](./images/servlet_image_2f2abfe498d8.png) + ![EPP appliance configuration screen showing Allow Access if device is TD Level 1 option](./../0-images/servlet_image_2f2abfe498d8.png) 4. All file transfers on the device are managed through EasyLock's vault software, ensuring secure data handling. 5. Optional: You can allow regular device usage. If the EasyLock device has the **Allow Access** right, it can be used like a regular device. \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_add_specific_devices_to_the_allow_list.md b/docs/kb/endpointprotector/device-control-and-access-management/how_to_add_specific_devices_to_the_allow_list.md similarity index 75% rename from docs/kb/endpointprotector/how_to_add_specific_devices_to_the_allow_list.md rename to docs/kb/endpointprotector/device-control-and-access-management/how_to_add_specific_devices_to_the_allow_list.md index 56bfb7c699..e5a289cab4 100644 --- a/docs/kb/endpointprotector/how_to_add_specific_devices_to_the_allow_list.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how_to_add_specific_devices_to_the_allow_list.md @@ -6,7 +6,8 @@ keywords: - device control - endpoint protector sidebar_label: Add Devices to Allow List -tags: [] +tags: + - device-control-and-access-management title: "How to Add Specific Devices to the Allow List" knowledge_article_id: kA0Qk0000002B4JKAU products: @@ -24,13 +25,13 @@ This article explains how to add specific devices to the allow list using the we 1. Open the **Endpoint Protector** web console and navigate to the **Device Control** menu. 2. Select the **Global Rights** sub-menu. 3. Scroll to the bottom of the page and click the **Add** button. - ![Add button in Global Rights section](./images/servlet_image_97c005a48040.png) + ![Add button in Global Rights section](./../0-images/servlet_image_97c005a48040.png) 4. In the new window that appears, add the specific device to the allow list. - ![Add device to allow list window](./images/servlet_image_5843306691b5.png) + ![Add device to allow list window](./../0-images/servlet_image_5843306691b5.png) 5. Fill in the requested details for your device and click **Next**. You will be prompted to add the device as a new device. - ![Add new device details](./images/servlet_image_18cc5d89ac43.png) + ![Add new device details](./../0-images/servlet_image_18cc5d89ac43.png) 6. After filling in the device details, click **Save** and you should see the entry in the Allow list. ## Related Links -- [Set Rights for a Specific Device](/docs/kb/endpointprotector/set-rights-for-a-specific-device) \ No newline at end of file +- [Set Rights for a Specific Device](/docs/kb/endpointprotector/device-control-and-access-management/set-rights-for-a-specific-device) \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_control_idevices_on_endpoint_protector_for_mac.md b/docs/kb/endpointprotector/device-control-and-access-management/how_to_control_idevices_on_endpoint_protector_for_mac.md similarity index 89% rename from docs/kb/endpointprotector/how_to_control_idevices_on_endpoint_protector_for_mac.md rename to docs/kb/endpointprotector/device-control-and-access-management/how_to_control_idevices_on_endpoint_protector_for_mac.md index c6fe2e7cec..d753d56eb9 100644 --- a/docs/kb/endpointprotector/how_to_control_idevices_on_endpoint_protector_for_mac.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how_to_control_idevices_on_endpoint_protector_for_mac.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - Mac sidebar_label: Control iDevices on Endpoint Protector -tags: [] +tags: + - device-control-and-access-management title: "How to Control iDevices on Endpoint Protector for Mac" knowledge_article_id: kA0Qk0000002B7eKAE products: @@ -27,4 +28,4 @@ Follow these steps to configure settings for devices: 2. Alternatively, set the device rights at the group, computer, or user level. 3. Ensure these settings align with your requirements for managing iPhones, iPads, and iPods Touch. -![Device Control Global Rights configuration for iDevices on Mac in Endpoint Protector](./images/servlet_image_d669c51c8b7d.png) \ No newline at end of file +![Device Control Global Rights configuration for iDevices on Mac in Endpoint Protector](./../0-images/servlet_image_d669c51c8b7d.png) \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_view_a_scanner_in_the_controlled_device_list.md b/docs/kb/endpointprotector/device-control-and-access-management/how_to_view_a_scanner_in_the_controlled_device_list.md similarity index 96% rename from docs/kb/endpointprotector/how_to_view_a_scanner_in_the_controlled_device_list.md rename to docs/kb/endpointprotector/device-control-and-access-management/how_to_view_a_scanner_in_the_controlled_device_list.md index 1fa85b2427..2c6f1c67de 100644 --- a/docs/kb/endpointprotector/how_to_view_a_scanner_in_the_controlled_device_list.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how_to_view_a_scanner_in_the_controlled_device_list.md @@ -6,7 +6,8 @@ keywords: - controlled device list - Endpoint Protector sidebar_label: View Scanner in Controlled Device List -tags: [] +tags: + - device-control-and-access-management title: "How to View a Scanner in the Controlled Device List" knowledge_article_id: kA0Qk0000002BAxKAM products: diff --git a/docs/kb/endpointprotector/how_to_whitelist_a_device_for_global_access.md b/docs/kb/endpointprotector/device-control-and-access-management/how_to_whitelist_a_device_for_global_access.md similarity index 98% rename from docs/kb/endpointprotector/how_to_whitelist_a_device_for_global_access.md rename to docs/kb/endpointprotector/device-control-and-access-management/how_to_whitelist_a_device_for_global_access.md index fc52943666..a1701dcac7 100644 --- a/docs/kb/endpointprotector/how_to_whitelist_a_device_for_global_access.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/how_to_whitelist_a_device_for_global_access.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - device management sidebar_label: Whitelisting a Device -tags: [] +tags: + - device-control-and-access-management title: "How to Whitelist a Device for Global Access" knowledge_article_id: kA0Qk0000002BB8KAM products: diff --git a/docs/kb/endpointprotector/managing-network-share-rights-in-device-control.md b/docs/kb/endpointprotector/device-control-and-access-management/managing-network-share-rights-in-device-control.md similarity index 94% rename from docs/kb/endpointprotector/managing-network-share-rights-in-device-control.md rename to docs/kb/endpointprotector/device-control-and-access-management/managing-network-share-rights-in-device-control.md index 150d066666..a14b735d6c 100644 --- a/docs/kb/endpointprotector/managing-network-share-rights-in-device-control.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/managing-network-share-rights-in-device-control.md @@ -19,7 +19,8 @@ products: - endpoint-protector visibility: public sidebar_label: Managing Network Share Rights in Device Control -tags: [] +tags: + - device-control-and-access-management title: "Managing Network Share Rights in Device Control" knowledge_article_id: kA0Qk0000002BHBKA2 --- @@ -38,7 +39,7 @@ This article explains how to locate and modify rights for Network Shares at the If you configure device rights granularly for all entities, the priority order is as follows, starting with the highest: -![Priority order for device rights in Endpoint Protector](./images/ka0Qk000000FAdN_0EMQk00000Dgxc5.png) +![Priority order for device rights in Endpoint Protector](./../0-images/ka0Qk000000FAdN_0EMQk00000Dgxc5.png) If global rights indicate that no computer on the system has access to a specific device, and for one computer that device has been authorized, then that computer will have access to that device. diff --git a/docs/kb/endpointprotector/missing-devices-in-the-client-list.md b/docs/kb/endpointprotector/device-control-and-access-management/missing-devices-in-the-client-list.md similarity index 96% rename from docs/kb/endpointprotector/missing-devices-in-the-client-list.md rename to docs/kb/endpointprotector/device-control-and-access-management/missing-devices-in-the-client-list.md index 5550556299..1595e48c1f 100644 --- a/docs/kb/endpointprotector/missing-devices-in-the-client-list.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/missing-devices-in-the-client-list.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Missing Devices in the Client List -tags: [] +tags: + - device-control-and-access-management title: "Missing Devices in the Client List" knowledge_article_id: kA0Qk0000002B4FKAU --- diff --git a/docs/kb/endpointprotector/read_only_access_not_working_after_rights_change.md b/docs/kb/endpointprotector/device-control-and-access-management/read_only_access_not_working_after_rights_change.md similarity index 96% rename from docs/kb/endpointprotector/read_only_access_not_working_after_rights_change.md rename to docs/kb/endpointprotector/device-control-and-access-management/read_only_access_not_working_after_rights_change.md index 011fb7146e..cd35ba6ca4 100644 --- a/docs/kb/endpointprotector/read_only_access_not_working_after_rights_change.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/read_only_access_not_working_after_rights_change.md @@ -6,7 +6,8 @@ keywords: - access rights - Endpoint Protector sidebar_label: Read Only Access Issues -tags: [] +tags: + - device-control-and-access-management title: "Read Only Access Not Working After Rights Change" knowledge_article_id: kA0Qk0000002BIqKAM products: diff --git a/docs/kb/endpointprotector/resolve-wifi-connection-issues-when-rights-are-set-to-allow-access.md b/docs/kb/endpointprotector/device-control-and-access-management/resolve-wifi-connection-issues-when-rights-are-set-to-allow-access.md similarity index 95% rename from docs/kb/endpointprotector/resolve-wifi-connection-issues-when-rights-are-set-to-allow-access.md rename to docs/kb/endpointprotector/device-control-and-access-management/resolve-wifi-connection-issues-when-rights-are-set-to-allow-access.md index 891b9c6545..63a123b973 100644 --- a/docs/kb/endpointprotector/resolve-wifi-connection-issues-when-rights-are-set-to-allow-access.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/resolve-wifi-connection-issues-when-rights-are-set-to-allow-access.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Resolve WiFi Connection Issues When Rights Are Set -tags: [] +tags: + - device-control-and-access-management title: "Resolve WiFi Connection Issues When Rights Are Set to Allow Access" knowledge_article_id: kA0Qk0000002BB4KAM --- diff --git a/docs/kb/endpointprotector/set-rights-for-a-specific-device.md b/docs/kb/endpointprotector/device-control-and-access-management/set-rights-for-a-specific-device.md similarity index 97% rename from docs/kb/endpointprotector/set-rights-for-a-specific-device.md rename to docs/kb/endpointprotector/device-control-and-access-management/set-rights-for-a-specific-device.md index 5b984918a7..e006ba4bdc 100644 --- a/docs/kb/endpointprotector/set-rights-for-a-specific-device.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/set-rights-for-a-specific-device.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Set Rights for a Specific Device -tags: [] +tags: + - device-control-and-access-management title: "Set Rights for a Specific Device" knowledge_article_id: kA0Qk0000002B6rKAE --- diff --git a/docs/kb/endpointprotector/understanding-the-rights-hierarchy-for-devices.md b/docs/kb/endpointprotector/device-control-and-access-management/understanding-the-rights-hierarchy-for-devices.md similarity index 92% rename from docs/kb/endpointprotector/understanding-the-rights-hierarchy-for-devices.md rename to docs/kb/endpointprotector/device-control-and-access-management/understanding-the-rights-hierarchy-for-devices.md index 93d48d4ae8..f031059821 100644 --- a/docs/kb/endpointprotector/understanding-the-rights-hierarchy-for-devices.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/understanding-the-rights-hierarchy-for-devices.md @@ -17,7 +17,8 @@ products: - endpoint-protector visibility: public sidebar_label: Understanding the Rights Hierarchy for Devices -tags: [] +tags: + - device-control-and-access-management title: "Understanding the Rights Hierarchy for Devices" knowledge_article_id: kA0Qk0000002B6SKAU --- @@ -38,6 +39,6 @@ The rights hierarchy for devices, from lowest to highest, is as follows: ## Instructions 1. To set precedence between **Computer Rights** and **User Rights**, go to **System Configuration > System Settings** and select the desired option. - ![System Settings page showing precedence configuration for Computer or User Rights](./images/ka0Qk000000DzNR_0EMQk00000BmNLl.png) + ![System Settings page showing precedence configuration for Computer or User Rights](./../0-images/ka0Qk000000DzNR_0EMQk00000BmNLl.png) 2. **Custom Classes** have the highest priority and override all other rights. Use Custom Classes to globally set rights for a device or class of devices identified by VID, PID, and Serial Number. diff --git a/docs/kb/endpointprotector/why-is-a-printer-detected-as-an-usb-storage-device.md b/docs/kb/endpointprotector/device-control-and-access-management/why-is-a-printer-detected-as-an-usb-storage-device.md similarity index 96% rename from docs/kb/endpointprotector/why-is-a-printer-detected-as-an-usb-storage-device.md rename to docs/kb/endpointprotector/device-control-and-access-management/why-is-a-printer-detected-as-an-usb-storage-device.md index 9ce96a62b4..e5f28de076 100644 --- a/docs/kb/endpointprotector/why-is-a-printer-detected-as-an-usb-storage-device.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/why-is-a-printer-detected-as-an-usb-storage-device.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Why Is a Printer Detected as an USB Storage Device -tags: [] +tags: + - device-control-and-access-management title: "Why Is a Printer Detected as an USB Storage Device?" knowledge_article_id: kA0Qk0000002BLzKAM --- diff --git a/docs/kb/endpointprotector/why-smartphones-are-detected-as-multiple-device-types.md b/docs/kb/endpointprotector/device-control-and-access-management/why-smartphones-are-detected-as-multiple-device-types.md similarity index 97% rename from docs/kb/endpointprotector/why-smartphones-are-detected-as-multiple-device-types.md rename to docs/kb/endpointprotector/device-control-and-access-management/why-smartphones-are-detected-as-multiple-device-types.md index d82744f259..8669492a04 100644 --- a/docs/kb/endpointprotector/why-smartphones-are-detected-as-multiple-device-types.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/why-smartphones-are-detected-as-multiple-device-types.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Why Smartphones Are Detected as Multiple Device Ty -tags: [] +tags: + - device-control-and-access-management title: "Why Smartphones Are Detected as Multiple Device Ty" knowledge_article_id: kA0Qk0000002B96KAE --- diff --git a/docs/kb/endpointprotector/why_does_an_iphone_remain_blocked_despite_having_allow_access_rights.md b/docs/kb/endpointprotector/device-control-and-access-management/why_does_an_iphone_remain_blocked_despite_having_allow_access_rights.md similarity index 95% rename from docs/kb/endpointprotector/why_does_an_iphone_remain_blocked_despite_having_allow_access_rights.md rename to docs/kb/endpointprotector/device-control-and-access-management/why_does_an_iphone_remain_blocked_despite_having_allow_access_rights.md index 4752d2314d..9abc480d92 100644 --- a/docs/kb/endpointprotector/why_does_an_iphone_remain_blocked_despite_having_allow_access_rights.md +++ b/docs/kb/endpointprotector/device-control-and-access-management/why_does_an_iphone_remain_blocked_despite_having_allow_access_rights.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - Allow Access rights sidebar_label: iPhone Blocked by Endpoint Protector -tags: [] +tags: + - device-control-and-access-management title: "Why Does an iPhone Remain Blocked Despite Having Allow Access Rights?" knowledge_article_id: kA0Qk0000002B9JKAU products: diff --git a/docs/kb/endpointprotector/why_endpoint_protector_detects_cameras_as_digital_cameras_or_windows_portable_devices_(mtp).md b/docs/kb/endpointprotector/device-control-and-access-management/why_endpoint_protector_detects_cameras_as_digital_cameras_or_windows_portable_devices_(mtp).md similarity index 96% rename from docs/kb/endpointprotector/why_endpoint_protector_detects_cameras_as_digital_cameras_or_windows_portable_devices_(mtp).md rename to docs/kb/endpointprotector/device-control-and-access-management/why_endpoint_protector_detects_cameras_as_digital_cameras_or_windows_portable_devices_(mtp).md index 2282e11e08..514e445c51 100644 --- a/docs/kb/endpointprotector/why_endpoint_protector_detects_cameras_as_digital_cameras_or_windows_portable_devices_(mtp).md +++ b/docs/kb/endpointprotector/device-control-and-access-management/why_endpoint_protector_detects_cameras_as_digital_cameras_or_windows_portable_devices_(mtp).md @@ -6,7 +6,8 @@ keywords: - Digital Cameras - Windows Portable Devices sidebar_label: Why Endpoint Protector Detects Cameras -tags: [] +tags: + - device-control-and-access-management title: "Why Endpoint Protector Detects Cameras as Digital Cameras or Windows Portable Devices (MTP)" knowledge_article_id: kA0Qk0000002BE7KAM products: diff --git a/docs/kb/endpointprotector/can-the-easylock-app-be-opened-without-the-endpoint-protector-agent-installed.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/can-the-easylock-app-be-opened-without-the-endpoint-protector-agent-installed.md similarity index 92% rename from docs/kb/endpointprotector/can-the-easylock-app-be-opened-without-the-endpoint-protector-agent-installed.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/can-the-easylock-app-be-opened-without-the-endpoint-protector-agent-installed.md index 634ca16e31..72cfaff7ae 100644 --- a/docs/kb/endpointprotector/can-the-easylock-app-be-opened-without-the-endpoint-protector-agent-installed.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/can-the-easylock-app-be-opened-without-the-endpoint-protector-agent-installed.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Can the EasyLock App Be Opened Without the Endpoin -tags: [] +tags: + - enforced-encryption-and-easylock title: "Can the EasyLock App Be Opened Without the Endpoint Protector Agent Installed?" knowledge_article_id: kA0Qk0000002B2bKAE --- @@ -29,4 +30,4 @@ Yes, you can configure whether EasyLock can be opened only when the Netwrix Endp To configure this option, navigate to **Device Control** > **Global Settings** > **EasyLock Settings** and toggle the switch next to **Endpoint Protector Client presence required**. -![Endpoint Protector Client presence required setting in EasyLock Settings](./images/ka0Qk000000EaBh_0EMQk00000CD9g6.png) +![Endpoint Protector Client presence required setting in EasyLock Settings](./../0-images/ka0Qk000000EaBh_0EMQk00000CD9g6.png) diff --git a/docs/kb/endpointprotector/create_a_system_backup_v2.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/create_a_system_backup_v2.md similarity index 88% rename from docs/kb/endpointprotector/create_a_system_backup_v2.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/create_a_system_backup_v2.md index 304f185b0e..27158ad8d9 100644 --- a/docs/kb/endpointprotector/create_a_system_backup_v2.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/create_a_system_backup_v2.md @@ -6,7 +6,8 @@ keywords: - disaster recovery - migration sidebar_label: Create a System Backup -tags: [] +tags: + - enforced-encryption-and-easylock title: "Create a System Backup V2" knowledge_article_id: kA0Qk0000002B6gKAE products: @@ -30,4 +31,4 @@ This article outlines how to create a backup of all settings, rights, policies, ## Related Links - [System Backup V2](https://docs.netwrix.com/docs/endpointprotector/5_9_4_2/admin/systemmaintenance/backup) -- [How to Perform a Backup Restore](/docs/kb/endpointprotector/how_to_perform_a_backup_restore) \ No newline at end of file +- [How to Perform a Backup Restore](/docs/kb/endpointprotector/enforced-encryption-and-easylock/how_to_perform_a_backup_restore) \ No newline at end of file diff --git a/docs/kb/endpointprotector/determine-the-recommended-number-of-endpoints-for-file-tracing-and-file-shadowing.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/determine-the-recommended-number-of-endpoints-for-file-tracing-and-file-shadowing.md similarity index 97% rename from docs/kb/endpointprotector/determine-the-recommended-number-of-endpoints-for-file-tracing-and-file-shadowing.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/determine-the-recommended-number-of-endpoints-for-file-tracing-and-file-shadowing.md index 98d39645cf..a4a587c23f 100644 --- a/docs/kb/endpointprotector/determine-the-recommended-number-of-endpoints-for-file-tracing-and-file-shadowing.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/determine-the-recommended-number-of-endpoints-for-file-tracing-and-file-shadowing.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: "Determine the Recommended Number of Endpoints for File Tracing and File Shadowing" -tags: [] +tags: + - enforced-encryption-and-easylock title: "Determine the Recommended Number of Endpoints for File Tracing and File Shadowing" knowledge_article_id: kA0Qk0000002BCVKA2 --- diff --git a/docs/kb/endpointprotector/enable_easylock_updates_and_file_shadowing_for_removable_drives.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/enable_easylock_updates_and_file_shadowing_for_removable_drives.md similarity index 96% rename from docs/kb/endpointprotector/enable_easylock_updates_and_file_shadowing_for_removable_drives.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/enable_easylock_updates_and_file_shadowing_for_removable_drives.md index 1bf416b6ae..949a8abcf8 100644 --- a/docs/kb/endpointprotector/enable_easylock_updates_and_file_shadowing_for_removable_drives.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/enable_easylock_updates_and_file_shadowing_for_removable_drives.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - file shadowing sidebar_label: Enable EasyLock Updates -tags: [] +tags: + - enforced-encryption-and-easylock title: "Enable EasyLock Updates and File Shadowing for Removable Drives" knowledge_article_id: kA0Qk0000002B11KAE products: diff --git a/docs/kb/endpointprotector/file-shadow-format-for-documents-sent-to-printers.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/file-shadow-format-for-documents-sent-to-printers.md similarity index 96% rename from docs/kb/endpointprotector/file-shadow-format-for-documents-sent-to-printers.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/file-shadow-format-for-documents-sent-to-printers.md index b1ac44cf2e..b2d9361170 100644 --- a/docs/kb/endpointprotector/file-shadow-format-for-documents-sent-to-printers.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/file-shadow-format-for-documents-sent-to-printers.md @@ -16,7 +16,8 @@ products: - endpoint-protector visibility: public sidebar_label: File Shadow Format for Documents Sent to Printers -tags: [] +tags: + - enforced-encryption-and-easylock title: "File Shadow Format for Documents Sent to Printers" knowledge_article_id: kA0Qk0000002B98KAE --- diff --git a/docs/kb/endpointprotector/how-to-set-an-uninstall-protection-password.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/how-to-set-an-uninstall-protection-password.md similarity index 96% rename from docs/kb/endpointprotector/how-to-set-an-uninstall-protection-password.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/how-to-set-an-uninstall-protection-password.md index 4834df29f6..524f4dccae 100644 --- a/docs/kb/endpointprotector/how-to-set-an-uninstall-protection-password.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/how-to-set-an-uninstall-protection-password.md @@ -14,7 +14,8 @@ products: - endpoint-protector visibility: public sidebar_label: How to Set an Uninstall Protection Password -tags: [] +tags: + - enforced-encryption-and-easylock title: "How to Set an Uninstall Protection Password" knowledge_article_id: kA0Qk0000002B2mKAE --- diff --git a/docs/kb/endpointprotector/how-to-use-easylock-without-endpoint-protector-software.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/how-to-use-easylock-without-endpoint-protector-software.md similarity index 90% rename from docs/kb/endpointprotector/how-to-use-easylock-without-endpoint-protector-software.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/how-to-use-easylock-without-endpoint-protector-software.md index fe6f878619..88155a5729 100644 --- a/docs/kb/endpointprotector/how-to-use-easylock-without-endpoint-protector-software.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/how-to-use-easylock-without-endpoint-protector-software.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Use EasyLock Without Endpoint Protector Sof -tags: [] +tags: + - enforced-encryption-and-easylock title: "How to Use EasyLock Without Endpoint Protector Software" knowledge_article_id: kA0Qk0000002AxwKAE --- @@ -33,4 +34,4 @@ When the EasyLock software is used on a computer without Netwrix Endpoint Protec After you open EasyLock, the application will prompt you for a password. Any data you copy into the application will be encrypted using 256-bit AES software encryption. Only users with the correct password can access the encrypted data. -![EasyLock password prompt on launch](./images/ka0Qk000000DeHN_0EMQk00000CJ50H.png) +![EasyLock password prompt on launch](./../0-images/ka0Qk000000DeHN_0EMQk00000CJ50H.png) diff --git a/docs/kb/endpointprotector/how_to_perform_a_backup_restore.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/how_to_perform_a_backup_restore.md similarity index 94% rename from docs/kb/endpointprotector/how_to_perform_a_backup_restore.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/how_to_perform_a_backup_restore.md index cda42b07eb..aefc78b2d7 100644 --- a/docs/kb/endpointprotector/how_to_perform_a_backup_restore.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/how_to_perform_a_backup_restore.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - data security sidebar_label: Backup Restore -tags: [] +tags: + - enforced-encryption-and-easylock title: "How to Perform a Backup Restore" knowledge_article_id: kA0Qk0000002BAfKAM products: @@ -50,4 +51,4 @@ By following these steps, you can successfully perform a backup and restore for ## Related Links - [System Backup V2](https://docs.netwrix.com/docs/endpointprotector/5_9_4_2/admin/systemmaintenance/backup) -- [Create a System Backup V2](/docs/kb/endpointprotector/create_a_system_backup_v2) \ No newline at end of file +- [Create a System Backup V2](/docs/kb/endpointprotector/enforced-encryption-and-easylock/create_a_system_backup_v2) \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_reassign_a_valid_enforced_encryption_license_to_a_usb_storage_device.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/how_to_reassign_a_valid_enforced_encryption_license_to_a_usb_storage_device.md similarity index 97% rename from docs/kb/endpointprotector/how_to_reassign_a_valid_enforced_encryption_license_to_a_usb_storage_device.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/how_to_reassign_a_valid_enforced_encryption_license_to_a_usb_storage_device.md index 58ef918358..33c2ba8902 100644 --- a/docs/kb/endpointprotector/how_to_reassign_a_valid_enforced_encryption_license_to_a_usb_storage_device.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/how_to_reassign_a_valid_enforced_encryption_license_to_a_usb_storage_device.md @@ -6,7 +6,8 @@ keywords: - EasyLock - USB storage device sidebar_label: Reassign Enforced Encryption License -tags: [] +tags: + - enforced-encryption-and-easylock title: "How to Reassign a Valid Enforced Encryption License to a USB Storage Device" knowledge_article_id: kA0Qk0000002B7BKAU products: diff --git a/docs/kb/endpointprotector/locate-logs-in-content-aware-report-when-using-partitions.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/locate-logs-in-content-aware-report-when-using-partitions.md similarity index 91% rename from docs/kb/endpointprotector/locate-logs-in-content-aware-report-when-using-partitions.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/locate-logs-in-content-aware-report-when-using-partitions.md index f6743d7876..2498d20343 100644 --- a/docs/kb/endpointprotector/locate-logs-in-content-aware-report-when-using-partitions.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/locate-logs-in-content-aware-report-when-using-partitions.md @@ -13,7 +13,8 @@ keywords: products: - endpoint-protector sidebar_label: Locate Logs in Content Aware Report When Using Par -tags: [] +tags: + - enforced-encryption-and-easylock title: "Locate Logs in Content Aware Report When Using Partitions" knowledge_article_id: kA0Qk0000002B5wKAE --- @@ -29,4 +30,4 @@ This article explains how to locate logs in the **Content Aware Report** when pa 1. If no results are shown when filtering by date in the **Content Aware Report**, check which partition is currently selected. 2. Select the partition that corresponds to the time interval you are searching for to view the relevant logs. -![Screenshot showing no results in Content Aware Report when filtering by date](./images/ka0Qk000000E7Pp_0EMQk00000C51uD.png) +![Screenshot showing no results in Content Aware Report when filtering by date](./../0-images/ka0Qk000000E7Pp_0EMQk00000C51uD.png) diff --git a/docs/kb/endpointprotector/managing-enforced-encryption-and-file-tracing-settings.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/managing-enforced-encryption-and-file-tracing-settings.md similarity index 92% rename from docs/kb/endpointprotector/managing-enforced-encryption-and-file-tracing-settings.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/managing-enforced-encryption-and-file-tracing-settings.md index be3496a5e9..1dd99bd9f6 100644 --- a/docs/kb/endpointprotector/managing-enforced-encryption-and-file-tracing-settings.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/managing-enforced-encryption-and-file-tracing-settings.md @@ -18,7 +18,8 @@ keywords: products: - endpoint-protector sidebar_label: Managing Enforced Encryption and File Tracing Sett -tags: [] +tags: + - enforced-encryption-and-easylock title: "Managing Enforced Encryption and File Tracing Settings" knowledge_article_id: kA0Qk0000002BCkKAM --- @@ -29,13 +30,13 @@ knowledge_article_id: kA0Qk0000002BCkKAM The **Enforced Encryption Settings** section in Endpoint Protector allows remote management of encrypted devices. Before you use these features, you must configure a master password. -![Enforced Encryption Settings section in Endpoint Protector](./images/ka0Qk000000FAYX_0EMQk00000CAOoY.png) +![Enforced Encryption Settings section in Endpoint Protector](./../0-images/ka0Qk000000FAYX_0EMQk00000CAOoY.png) Within the **Settings** section, you can configure the master password, enable Enforced Encryption file tracing, and define whether Enforced Encryption can be installed and executed only on computers with the Endpoint Protector Client present. Complex password rules can be enforced for both the master password and user password. If enabled, you can set password length, minimum character requirements, validity period, password history, and other settings. -![Password complexity settings for Enforced Encryption](./images/ka0Qk000000FAYX_0EMQk00000CAPiz.png) +![Password complexity settings for Enforced Encryption](./../0-images/ka0Qk000000FAYX_0EMQk00000CAPiz.png) ## File Tracing Settings @@ -43,7 +44,7 @@ Endpoint Protector allows tracing of files copied and encrypted on portable devi You can activate this option from **Enforced Encryption** > **EasyLock** > **Settings** > **File Tracing/Offline File Tracing.** -![File Tracing and Offline File Tracing settings in EasyLock](./images/ka0Qk000000FAYX_0EMQk00000DgyY9.png) +![File Tracing and Offline File Tracing settings in EasyLock](./../0-images/ka0Qk000000FAYX_0EMQk00000DgyY9.png) By enabling the **File Tracing** option, all data transferred to and from devices using Enforced Encryption is recorded and logged for auditing. If the Endpoint Protector Client is present, the logged information is automatically sent to the Endpoint Protector Server. This occurs regardless of whether File Tracing is enabled for that specific computer in the **Device Control** module. diff --git a/docs/kb/endpointprotector/protect-the-client-from-unauthorized-uninstallation.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/protect-the-client-from-unauthorized-uninstallation.md similarity index 91% rename from docs/kb/endpointprotector/protect-the-client-from-unauthorized-uninstallation.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/protect-the-client-from-unauthorized-uninstallation.md index 52dc8d35d7..565a76e145 100644 --- a/docs/kb/endpointprotector/protect-the-client-from-unauthorized-uninstallation.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/protect-the-client-from-unauthorized-uninstallation.md @@ -14,7 +14,8 @@ keywords: products: - endpoint-protector sidebar_label: Protect the Client from Unauthorized Uninstallatio -tags: [] +tags: + - enforced-encryption-and-easylock title: "Protect the Client from Unauthorized Uninstallation" knowledge_article_id: kA0Qk0000002B5yKAE --- @@ -35,7 +36,7 @@ This article explains how you can secure the Netwrix Endpoint Protector (EPP) cl 1. Navigate to **System Configuration** > **System Security**. 2. Enter a password under **Security Password for Uninstall Protection** and click **Save**. -![Screenshot showing Security Password for Uninstall Protection settings in EPP client](./images/ka0Qk000000E7fx_0EMQk00000C51pO.png) +![Screenshot showing Security Password for Uninstall Protection settings in EPP client](./../0-images/ka0Qk000000E7fx_0EMQk00000C51pO.png) 3. After saving the changes, a notification will appear stating the uninstall password is set. 4. Update the policies on the endpoint manually or wait for the policies to be automatically updated based on the time set for **Policy Refresh Interval**. @@ -45,6 +46,6 @@ This article explains how you can secure the Netwrix Endpoint Protector (EPP) cl 1. Navigate to **Device Control** > **Global Settings** > **Tamper Mode** and toggle the switch to **On**. 2. Scroll down to the bottom of the subsection labeled **Endpoint Protector Client** and click **Save**. -![Screenshot showing Tamper Mode settings in EPP client](./images/ka0Qk000000E7fx_0EMQk00000C51as.png) +![Screenshot showing Tamper Mode settings in EPP client](./../0-images/ka0Qk000000E7fx_0EMQk00000C51as.png) 3. Update the policies on the endpoint manually or wait for the policies to be automatically updated based on the time set for **Policy Refresh Interval**. diff --git a/docs/kb/endpointprotector/restart_the_client_without_restarting_the_computer.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/restart_the_client_without_restarting_the_computer.md similarity index 96% rename from docs/kb/endpointprotector/restart_the_client_without_restarting_the_computer.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/restart_the_client_without_restarting_the_computer.md index 517bf10cfa..bb85a8ba84 100644 --- a/docs/kb/endpointprotector/restart_the_client_without_restarting_the_computer.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/restart_the_client_without_restarting_the_computer.md @@ -8,7 +8,8 @@ keywords: - macOS - Linux sidebar_label: Restart EPP Client -tags: [] +tags: + - enforced-encryption-and-easylock title: "Restart the Client Without Restarting the Computer" knowledge_article_id: kA0Qk0000002B6QKAU products: diff --git a/docs/kb/endpointprotector/system-backup-v2-not-showing-in-the-endpoint-protector-console.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/system-backup-v2-not-showing-in-the-endpoint-protector-console.md similarity index 96% rename from docs/kb/endpointprotector/system-backup-v2-not-showing-in-the-endpoint-protector-console.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/system-backup-v2-not-showing-in-the-endpoint-protector-console.md index 2ca0f70af2..83214889ec 100644 --- a/docs/kb/endpointprotector/system-backup-v2-not-showing-in-the-endpoint-protector-console.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/system-backup-v2-not-showing-in-the-endpoint-protector-console.md @@ -16,7 +16,8 @@ products: - endpoint-protector visibility: public sidebar_label: System Backup V2 Not Showing in the Endpoint Prote -tags: [] +tags: + - enforced-encryption-and-easylock title: "System Backup V2 Not Showing in the Endpoint Protector Console" knowledge_article_id: kA0Qk0000002B2jKAE --- diff --git a/docs/kb/endpointprotector/what_is_a_file_read-write_event.md b/docs/kb/endpointprotector/enforced-encryption-and-easylock/what_is_a_file_read-write_event.md similarity index 97% rename from docs/kb/endpointprotector/what_is_a_file_read-write_event.md rename to docs/kb/endpointprotector/enforced-encryption-and-easylock/what_is_a_file_read-write_event.md index a310b219a6..36d13ed0b2 100644 --- a/docs/kb/endpointprotector/what_is_a_file_read-write_event.md +++ b/docs/kb/endpointprotector/enforced-encryption-and-easylock/what_is_a_file_read-write_event.md @@ -8,7 +8,8 @@ keywords: products: - endpoint-protector sidebar_label: File Read-Write Event Overview -tags: [] +tags: + - enforced-encryption-and-easylock title: What Is a "File Read-Write" Event? knowledge_article_id: kA0Qk0000002BAiKAM --- diff --git a/docs/kb/endpointprotector/client-modes-overview.md b/docs/kb/endpointprotector/features-and-operations/client-modes-overview.md similarity index 99% rename from docs/kb/endpointprotector/client-modes-overview.md rename to docs/kb/endpointprotector/features-and-operations/client-modes-overview.md index ee78f451b1..b6702f2e59 100644 --- a/docs/kb/endpointprotector/client-modes-overview.md +++ b/docs/kb/endpointprotector/features-and-operations/client-modes-overview.md @@ -17,7 +17,8 @@ keywords: products: - endpoint-protector sidebar_label: Client Modes Overview -tags: [] +tags: + - features-and-operations title: "Client Modes Overview" knowledge_article_id: kA0Qk0000002BCRKA2 --- diff --git a/docs/kb/endpointprotector/client_integrity_fail_events.md b/docs/kb/endpointprotector/features-and-operations/client_integrity_fail_events.md similarity index 97% rename from docs/kb/endpointprotector/client_integrity_fail_events.md rename to docs/kb/endpointprotector/features-and-operations/client_integrity_fail_events.md index c0998374e5..98812eb5c4 100644 --- a/docs/kb/endpointprotector/client_integrity_fail_events.md +++ b/docs/kb/endpointprotector/features-and-operations/client_integrity_fail_events.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - event causes sidebar_label: Client Integrity Fail Events -tags: [] +tags: + - features-and-operations title: "Client Integrity Fail Events" knowledge_article_id: kA0Qk0000002B4GKAU products: diff --git a/docs/kb/endpointprotector/creating-ediscovery-policies-and-scans.md b/docs/kb/endpointprotector/features-and-operations/creating-ediscovery-policies-and-scans.md similarity index 95% rename from docs/kb/endpointprotector/creating-ediscovery-policies-and-scans.md rename to docs/kb/endpointprotector/features-and-operations/creating-ediscovery-policies-and-scans.md index 964983555c..b2a0356cd7 100644 --- a/docs/kb/endpointprotector/creating-ediscovery-policies-and-scans.md +++ b/docs/kb/endpointprotector/features-and-operations/creating-ediscovery-policies-and-scans.md @@ -17,7 +17,8 @@ keywords: products: - endpoint-protector sidebar_label: Creating eDiscovery Policies and Scans -tags: [] +tags: + - features-and-operations title: "Creating eDiscovery Policies and Scans" knowledge_article_id: kA0Qk0000002BCiKAM --- @@ -31,7 +32,7 @@ This article explains how to create custom eDiscovery policies and manage scans ## Instructions 1. In the Netwrix Endpoint Protector Console, navigate to **eDiscovery** > **Policies and Scans** and click the **Create Custom Policy** button. - ![Create Custom Policy button in eDiscovery Policies and Scans](./images/ka0Qk000000Eb9N_0EMQk00000CAPJB.png) + ![Create Custom Policy button in eDiscovery Policies and Scans](./../0-images/ka0Qk000000Eb9N_0EMQk00000CAPJB.png) 2. Choose the OS type, provide a policy name, select items of focus and click **Save**. diff --git a/docs/kb/endpointprotector/how-to-view-all-ediscovery-scan-results-when-the-number-exceeds-the-10-000-record-limit.md b/docs/kb/endpointprotector/features-and-operations/how-to-view-all-ediscovery-scan-results-when-the-number-exceeds-the-10-000-record-limit.md similarity index 98% rename from docs/kb/endpointprotector/how-to-view-all-ediscovery-scan-results-when-the-number-exceeds-the-10-000-record-limit.md rename to docs/kb/endpointprotector/features-and-operations/how-to-view-all-ediscovery-scan-results-when-the-number-exceeds-the-10-000-record-limit.md index 64ef82cbda..e20e8f2376 100644 --- a/docs/kb/endpointprotector/how-to-view-all-ediscovery-scan-results-when-the-number-exceeds-the-10-000-record-limit.md +++ b/docs/kb/endpointprotector/features-and-operations/how-to-view-all-ediscovery-scan-results-when-the-number-exceeds-the-10-000-record-limit.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: 'How to View All eDiscovery Scan Results When the Number Exceeds the 10,000 Record Limit' -tags: [] +tags: + - features-and-operations title: >- How to View All eDiscovery Scan Results When the Number Exceeds the 10,000 Record Limit diff --git a/docs/kb/endpointprotector/how_to_display_the_destination_url_in_content_aware_reports.md b/docs/kb/endpointprotector/features-and-operations/how_to_display_the_destination_url_in_content_aware_reports.md similarity index 89% rename from docs/kb/endpointprotector/how_to_display_the_destination_url_in_content_aware_reports.md rename to docs/kb/endpointprotector/features-and-operations/how_to_display_the_destination_url_in_content_aware_reports.md index 91c607bd33..cb19fe7fd8 100644 --- a/docs/kb/endpointprotector/how_to_display_the_destination_url_in_content_aware_reports.md +++ b/docs/kb/endpointprotector/features-and-operations/how_to_display_the_destination_url_in_content_aware_reports.md @@ -6,7 +6,8 @@ keywords: - Content Aware Reports - Destination URL sidebar_label: Display Destination URL in Reports -tags: [] +tags: + - features-and-operations title: "How to Display the Destination URL in Content Aware Reports" knowledge_article_id: kA0Qk0000002B66KAE products: @@ -27,4 +28,4 @@ This article explains how to display the **Destination URL** in Content Aware Re 4. Click the **Show/Hide Columns** button. 5. Select the **Destination** column to display the Destination URL in the report. -![Show/Hide Columns option in Content Aware Reports](./images/servlet_image_744e12be3cff.png) \ No newline at end of file +![Show/Hide Columns option in Content Aware Reports](./../0-images/servlet_image_744e12be3cff.png) \ No newline at end of file diff --git a/docs/kb/endpointprotector/impact-of-spectre-and-meltdown-on-endpoint-protector-deployments.md b/docs/kb/endpointprotector/features-and-operations/impact-of-spectre-and-meltdown-on-endpoint-protector-deployments.md similarity index 98% rename from docs/kb/endpointprotector/impact-of-spectre-and-meltdown-on-endpoint-protector-deployments.md rename to docs/kb/endpointprotector/features-and-operations/impact-of-spectre-and-meltdown-on-endpoint-protector-deployments.md index c433d35f48..3802adb2ea 100644 --- a/docs/kb/endpointprotector/impact-of-spectre-and-meltdown-on-endpoint-protector-deployments.md +++ b/docs/kb/endpointprotector/features-and-operations/impact-of-spectre-and-meltdown-on-endpoint-protector-deployments.md @@ -17,7 +17,8 @@ products: - endpoint-protector visibility: public sidebar_label: Impact of Spectre and Meltdown on Endpoint Protect -tags: [] +tags: + - features-and-operations title: "Impact of Spectre and Meltdown on Endpoint Protector Deployments" knowledge_article_id: kA0Qk0000002B93KAE --- diff --git a/docs/kb/endpointprotector/locating-the-default-username-and-password-for-the-reporting-and-administration-tool.md b/docs/kb/endpointprotector/features-and-operations/locating-the-default-username-and-password-for-the-reporting-and-administration-tool.md similarity index 96% rename from docs/kb/endpointprotector/locating-the-default-username-and-password-for-the-reporting-and-administration-tool.md rename to docs/kb/endpointprotector/features-and-operations/locating-the-default-username-and-password-for-the-reporting-and-administration-tool.md index 9ea8ff38b9..137b70a47f 100644 --- a/docs/kb/endpointprotector/locating-the-default-username-and-password-for-the-reporting-and-administration-tool.md +++ b/docs/kb/endpointprotector/features-and-operations/locating-the-default-username-and-password-for-the-reporting-and-administration-tool.md @@ -13,7 +13,8 @@ keywords: products: - endpoint-protector sidebar_label: Locating the Default Username and Password for the -tags: [] +tags: + - features-and-operations title: "Locating the Default Username and Password for the Reporting and Administration Tool" knowledge_article_id: kA0Qk0000002BNcKAM --- diff --git a/docs/kb/endpointprotector/network-ports-for-endpoint-protector-server-and-client.md b/docs/kb/endpointprotector/features-and-operations/network-ports-for-endpoint-protector-server-and-client.md similarity index 96% rename from docs/kb/endpointprotector/network-ports-for-endpoint-protector-server-and-client.md rename to docs/kb/endpointprotector/features-and-operations/network-ports-for-endpoint-protector-server-and-client.md index 68709fc61c..de738ced71 100644 --- a/docs/kb/endpointprotector/network-ports-for-endpoint-protector-server-and-client.md +++ b/docs/kb/endpointprotector/features-and-operations/network-ports-for-endpoint-protector-server-and-client.md @@ -15,7 +15,8 @@ keywords: products: - endpoint-protector sidebar_label: Network Ports for Endpoint Protector Server and Cl -tags: [] +tags: + - features-and-operations title: "Network Ports for Endpoint Protector Server and Client" knowledge_article_id: kA0Qk0000002BDyKAM --- @@ -32,7 +33,7 @@ This article summarizes the network ports used by Netwrix Endpoint Protector Ser | Port | Purpose | Direction | Notes | |------|---------|-----------|-------| -| `443` | HTTPS communication between Netwrix Endpoint Protector Server and Clients | Inbound to Server | Default port for client-server communication. Required for agent deployment and management. ![Default port 443 setting in Client Software download section](./images/ka0Qk000000FFRl_0EMQk00000C7FeY.png) | +| `443` | HTTPS communication between Netwrix Endpoint Protector Server and Clients | Inbound to Server | Default port for client-server communication. Required for agent deployment and management. ![Default port 443 setting in Client Software download section](./../0-images/ka0Qk000000FFRl_0EMQk00000C7FeY.png) | | `22` | SSH (Support access) | Inbound to Server | Used by Netwrix Technical Support for remote intervention if required. Should be restricted to trusted sources. | | `389` | Active Directory integration | Outbound from Server | Default port for LDAP communication with Active Directory. | diff --git a/docs/kb/endpointprotector/otp_device_code_compatibility.md b/docs/kb/endpointprotector/features-and-operations/otp_device_code_compatibility.md similarity index 97% rename from docs/kb/endpointprotector/otp_device_code_compatibility.md rename to docs/kb/endpointprotector/features-and-operations/otp_device_code_compatibility.md index 7b3097d7cc..dfd883ad60 100644 --- a/docs/kb/endpointprotector/otp_device_code_compatibility.md +++ b/docs/kb/endpointprotector/features-and-operations/otp_device_code_compatibility.md @@ -8,7 +8,8 @@ keywords: - security - authentication sidebar_label: OTP Device Code Compatibility -tags: [] +tags: + - features-and-operations title: "OTP Device Code Compatibility" knowledge_article_id: kA0Qk0000002B7ZKAU products: diff --git a/docs/kb/endpointprotector/overview_of_remediation_actions_in_ediscovery.md b/docs/kb/endpointprotector/features-and-operations/overview_of_remediation_actions_in_ediscovery.md similarity index 97% rename from docs/kb/endpointprotector/overview_of_remediation_actions_in_ediscovery.md rename to docs/kb/endpointprotector/features-and-operations/overview_of_remediation_actions_in_ediscovery.md index 9c570d39a8..3da15fe372 100644 --- a/docs/kb/endpointprotector/overview_of_remediation_actions_in_ediscovery.md +++ b/docs/kb/endpointprotector/features-and-operations/overview_of_remediation_actions_in_ediscovery.md @@ -6,7 +6,8 @@ keywords: - remediation actions - sensitive data sidebar_label: Overview of Remediation Actions -tags: [] +tags: + - features-and-operations title: "Overview of Remediation Actions in eDiscovery" knowledge_article_id: kA0Qk0000002B9DKAU products: diff --git a/docs/kb/endpointprotector/recommendations_for_endpoint_protector_interaction_with_security_vendors,_proxies,_casbs,_and_browse.md b/docs/kb/endpointprotector/features-and-operations/recommendations_for_endpoint_protector_interaction_with_security_vendors,_proxies,_casbs,_and_browse.md similarity index 98% rename from docs/kb/endpointprotector/recommendations_for_endpoint_protector_interaction_with_security_vendors,_proxies,_casbs,_and_browse.md rename to docs/kb/endpointprotector/features-and-operations/recommendations_for_endpoint_protector_interaction_with_security_vendors,_proxies,_casbs,_and_browse.md index 2df0f13c97..1fb2e749a9 100644 --- a/docs/kb/endpointprotector/recommendations_for_endpoint_protector_interaction_with_security_vendors,_proxies,_casbs,_and_browse.md +++ b/docs/kb/endpointprotector/features-and-operations/recommendations_for_endpoint_protector_interaction_with_security_vendors,_proxies,_casbs,_and_browse.md @@ -8,7 +8,8 @@ keywords: - CASBs - web browsers sidebar_label: Recommendations for Endpoint Protector Interaction -tags: [] +tags: + - features-and-operations title: "Recommendations for Endpoint Protector Interaction with Security Vendors, Proxies, CASBs, and Browsers" knowledge_article_id: kA0Qk0000002B7HKAU products: diff --git a/docs/kb/endpointprotector/restrict-applications-or-cli-commands.md b/docs/kb/endpointprotector/features-and-operations/restrict-applications-or-cli-commands.md similarity index 88% rename from docs/kb/endpointprotector/restrict-applications-or-cli-commands.md rename to docs/kb/endpointprotector/features-and-operations/restrict-applications-or-cli-commands.md index e54eab63a2..cf4f8ee94c 100644 --- a/docs/kb/endpointprotector/restrict-applications-or-cli-commands.md +++ b/docs/kb/endpointprotector/features-and-operations/restrict-applications-or-cli-commands.md @@ -17,7 +17,8 @@ keywords: products: - endpoint-protector sidebar_label: Restrict Applications or CLI Commands -tags: [] +tags: + - features-and-operations title: "Restrict Applications or CLI Commands" knowledge_article_id: kA0Qk0000002B69KAE --- @@ -37,9 +38,9 @@ Follow the steps below to complete this process: 3. Click the **Add to content** button. 4. Click the **Generate** button. -![Screenshot showing how to add applications or CLI commands to the denylist](./images/ka0Qk000000ES65_0EMQk00000C528j.png) +![Screenshot showing how to add applications or CLI commands to the denylist](./../0-images/ka0Qk000000ES65_0EMQk00000C528j.png) 5. To include the newly created **Applications** denylist in a content aware policy, you must select the denylist in the policy settings. 6. Target the client machines where the policy should apply. -![Screenshot showing how to include the denylist in a content aware policy and target client machines](./images/ka0Qk000000ES65_0EMQk00000C52DZ.png) +![Screenshot showing how to include the denylist in a content aware policy and target client machines](./../0-images/ka0Qk000000ES65_0EMQk00000C52DZ.png) diff --git a/docs/kb/endpointprotector/supported_platforms_for_endpoint_protector_server_installation.md b/docs/kb/endpointprotector/features-and-operations/supported_platforms_for_endpoint_protector_server_installation.md similarity index 97% rename from docs/kb/endpointprotector/supported_platforms_for_endpoint_protector_server_installation.md rename to docs/kb/endpointprotector/features-and-operations/supported_platforms_for_endpoint_protector_server_installation.md index 2ecdd9a9e4..a6013f2887 100644 --- a/docs/kb/endpointprotector/supported_platforms_for_endpoint_protector_server_installation.md +++ b/docs/kb/endpointprotector/features-and-operations/supported_platforms_for_endpoint_protector_server_installation.md @@ -8,7 +8,8 @@ keywords: - Active Directory Integration - Deployment Methods sidebar_label: Supported Platforms -tags: [] +tags: + - features-and-operations title: "Supported Platforms for Endpoint Protector Server Installation" knowledge_article_id: kA0Qk0000002B99KAE products: diff --git a/docs/kb/endpointprotector/user_remediation_reporting.md b/docs/kb/endpointprotector/features-and-operations/user_remediation_reporting.md similarity index 82% rename from docs/kb/endpointprotector/user_remediation_reporting.md rename to docs/kb/endpointprotector/features-and-operations/user_remediation_reporting.md index eb6b6ab8a8..67560f4a9c 100644 --- a/docs/kb/endpointprotector/user_remediation_reporting.md +++ b/docs/kb/endpointprotector/features-and-operations/user_remediation_reporting.md @@ -8,7 +8,8 @@ keywords: - reports - administration sidebar_label: User Remediation Reporting -tags: [] +tags: + - features-and-operations title: "User Remediation Reporting" knowledge_article_id: kA0Qk0000002B94KAE products: @@ -30,5 +31,5 @@ This article explains how to locate and review logs of end user responses to **U ## Related Links -- [How to Configure User Remediation for Device Contr](/docs/kb/endpointprotector/how-to-configure-user-remediation-for-device-control) -- [Enabling User Remediation in Content Aware Protection Policies](/docs/kb/endpointprotector/enabling-user-remediation-in-content-aware-protection-policies) \ No newline at end of file +- [How to Configure User Remediation for Device Contr](/docs/kb/endpointprotector/device-control-and-access-management/how-to-configure-user-remediation-for-device-control) +- [Enabling User Remediation in Content Aware Protection Policies](/docs/kb/endpointprotector/content-aware-protection-and-dpi/enabling-user-remediation-in-content-aware-protection-policies) \ No newline at end of file diff --git a/docs/kb/endpointprotector/using-smart-groups-for-automatic-computer-and-user-assignment.md b/docs/kb/endpointprotector/features-and-operations/using-smart-groups-for-automatic-computer-and-user-assignment.md similarity index 95% rename from docs/kb/endpointprotector/using-smart-groups-for-automatic-computer-and-user-assignment.md rename to docs/kb/endpointprotector/features-and-operations/using-smart-groups-for-automatic-computer-and-user-assignment.md index fff041db95..c4a6c7571a 100644 --- a/docs/kb/endpointprotector/using-smart-groups-for-automatic-computer-and-user-assignment.md +++ b/docs/kb/endpointprotector/features-and-operations/using-smart-groups-for-automatic-computer-and-user-assignment.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Using Smart Groups for Automatic Computer and User -tags: [] +tags: + - features-and-operations title: "Using Smart Groups for Automatic Computer and User Assignment" knowledge_article_id: kA0Qk0000002B6MKAU --- @@ -40,4 +41,4 @@ Smart Groups enable automatic assignment of computers or users to groups based o - `*XYZ` — Name ends with XYZ 7. To exclude certain computers or users from the group, specify names or patterns to be excluded. 8. For example, all computers with names starting with **XYZ** will be included in the group, except those starting with **XYZA**. - ![Smart Group configuration example in Netwrix Endpoint Protector](./images/ka0Qk000000EaoP_0EMQk00000BmIKT.png) + ![Smart Group configuration example in Netwrix Endpoint Protector](./../0-images/ka0Qk000000EaoP_0EMQk00000BmIKT.png) diff --git a/docs/kb/endpointprotector/what-do-the-colors-represent-in-endpoint-protector-server-and-client.md b/docs/kb/endpointprotector/features-and-operations/what-do-the-colors-represent-in-endpoint-protector-server-and-client.md similarity index 97% rename from docs/kb/endpointprotector/what-do-the-colors-represent-in-endpoint-protector-server-and-client.md rename to docs/kb/endpointprotector/features-and-operations/what-do-the-colors-represent-in-endpoint-protector-server-and-client.md index 21a538f330..69de401eeb 100644 --- a/docs/kb/endpointprotector/what-do-the-colors-represent-in-endpoint-protector-server-and-client.md +++ b/docs/kb/endpointprotector/features-and-operations/what-do-the-colors-represent-in-endpoint-protector-server-and-client.md @@ -16,7 +16,8 @@ products: - endpoint-protector visibility: public sidebar_label: What Do the Colors Represent in Endpoint Protector -tags: [] +tags: + - features-and-operations title: "What Do the Colors Represent in Endpoint Protector Server and Client?" knowledge_article_id: kA0Qk0000002B63KAE --- diff --git a/docs/kb/endpointprotector/what_are_cryptographic_hashes.md b/docs/kb/endpointprotector/features-and-operations/what_are_cryptographic_hashes.md similarity index 98% rename from docs/kb/endpointprotector/what_are_cryptographic_hashes.md rename to docs/kb/endpointprotector/features-and-operations/what_are_cryptographic_hashes.md index 1d79edf799..544b137f88 100644 --- a/docs/kb/endpointprotector/what_are_cryptographic_hashes.md +++ b/docs/kb/endpointprotector/features-and-operations/what_are_cryptographic_hashes.md @@ -6,7 +6,8 @@ keywords: - file integrity - checksum verification sidebar_label: Cryptographic Hashes Overview -tags: [] +tags: + - features-and-operations title: "What Are Cryptographic Hashes?" knowledge_article_id: kA0Qk0000002BM5KAM products: diff --git a/docs/kb/endpointprotector/whitelist_or_exclude_endpoint_protector_processes_in_crowdstrike.md b/docs/kb/endpointprotector/features-and-operations/whitelist_or_exclude_endpoint_protector_processes_in_crowdstrike.md similarity index 97% rename from docs/kb/endpointprotector/whitelist_or_exclude_endpoint_protector_processes_in_crowdstrike.md rename to docs/kb/endpointprotector/features-and-operations/whitelist_or_exclude_endpoint_protector_processes_in_crowdstrike.md index c1173b73ce..1e0ec109ec 100644 --- a/docs/kb/endpointprotector/whitelist_or_exclude_endpoint_protector_processes_in_crowdstrike.md +++ b/docs/kb/endpointprotector/features-and-operations/whitelist_or_exclude_endpoint_protector_processes_in_crowdstrike.md @@ -8,7 +8,8 @@ keywords: - exclusion list - security policies sidebar_label: Whitelist or Exclude EPP Processes -tags: [] +tags: + - features-and-operations title: "Whitelist or Exclude Endpoint Protector Processes in CrowdStrike" knowledge_article_id: kA0Qk0000002B7GKAU products: diff --git a/docs/kb/endpointprotector/why-do-various-linux-system-users-appear-in-the-endpoint-protector-user-interface.md b/docs/kb/endpointprotector/features-and-operations/why-do-various-linux-system-users-appear-in-the-endpoint-protector-user-interface.md similarity index 97% rename from docs/kb/endpointprotector/why-do-various-linux-system-users-appear-in-the-endpoint-protector-user-interface.md rename to docs/kb/endpointprotector/features-and-operations/why-do-various-linux-system-users-appear-in-the-endpoint-protector-user-interface.md index dd056622b0..1e464035fc 100644 --- a/docs/kb/endpointprotector/why-do-various-linux-system-users-appear-in-the-endpoint-protector-user-interface.md +++ b/docs/kb/endpointprotector/features-and-operations/why-do-various-linux-system-users-appear-in-the-endpoint-protector-user-interface.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: Why Do Various Linux System Users Appear in the En -tags: [] +tags: + - features-and-operations title: "Why Do Various Linux System Users Appear in the Endpoint Protector User Interface?" knowledge_article_id: kA0Qk0000002BCgKAM --- diff --git a/docs/kb/endpointprotector/why_does_the_ediscovery_scanning_status_progress_bar_drop_to_a_lower_percentage.md b/docs/kb/endpointprotector/features-and-operations/why_does_the_ediscovery_scanning_status_progress_bar_drop_to_a_lower_percentage.md similarity index 97% rename from docs/kb/endpointprotector/why_does_the_ediscovery_scanning_status_progress_bar_drop_to_a_lower_percentage.md rename to docs/kb/endpointprotector/features-and-operations/why_does_the_ediscovery_scanning_status_progress_bar_drop_to_a_lower_percentage.md index 80fca45139..44fcf050fa 100644 --- a/docs/kb/endpointprotector/why_does_the_ediscovery_scanning_status_progress_bar_drop_to_a_lower_percentage.md +++ b/docs/kb/endpointprotector/features-and-operations/why_does_the_ediscovery_scanning_status_progress_bar_drop_to_a_lower_percentage.md @@ -6,7 +6,8 @@ keywords: - scanning status - Endpoint Protector Client sidebar_label: eDiscovery Scanning Status Progress Bar -tags: [] +tags: + - features-and-operations title: "Why Does the eDiscovery Scanning Status Progress Bar Drop to a Lower Percentage?" knowledge_article_id: kA0Qk0000002BIlKAM products: diff --git a/docs/kb/endpointprotector/move_and_tag_files.py b/docs/kb/endpointprotector/move_and_tag_files.py new file mode 100644 index 0000000000..aeab929e30 --- /dev/null +++ b/docs/kb/endpointprotector/move_and_tag_files.py @@ -0,0 +1,280 @@ +#!/usr/bin/env python3 +import os +import shutil +import re + +# Define the categories and their files +categories = { + "deployment-and-installation": [ + "activating_the_mail_add-in_for_domain_allowlist_in_outlook_classic_for_windows.md", + "add_an_ssl_certificate.md", + "check_the_client_version_installed_on_your_computer.md", + "deploy_clients_via_group_policy.md", + "deploying-endpoint-protector-agents.md", + "deploy-the-client-on-macos-through-intune-with-full-disk-access.md", + "download-the-intune-mdm-deployment-guide.md", + "enable_full_disk_access_when_deploying_on_macos_using_kandji.md", + "how_to_deploy_the_client_using_sccm_or_msiexec.md", + "how_to_find_the_cososys_team_id_and_bundle_id_for_client_deployment_on_macos.md", + "how_to_manually_uninstall_the_agent.md", + "how_to_stage_the_endpoint_protector_server.md", + "how-to-install-client-without-user-interaction.md", + "how-to-install-the-client-on-macos-monterey.md", + "how-to-deploy-the-windows-endpoint-protector-agent.md", + "install_client_on_macos_with_deep_packet_inspection_and_vpn_traffic_intercept.md", + "install_the_linux_client.md", + "install-globalsign-and-digicert-root-certificates-on-windows.md", + "installing_the_agent_with_proxy_settings_on_linux.md", + "installing-a-monitoring-agent-on-the-virtual-appliance.md", + "installing-the-agent-with-proxy-settings-on-macos.md", + "installing-the-agent-with-proxy-settings-on-windows.md", + "migrate_the_endpoint_protector_server_to_a_new_virtual_machine.md", + "reinstalling-the-endpoint-protector-client-via-linux-terminal.md", + "uninstall-the-client-from-a-mac-computer.md", + "upgrade_linux_clients_without_uninstalling_and_reinstalling.md", + "upgrade_to_client_version_5.9.4.3.md", + ], + "device-control-and-access-management": [ + "are_ios_devices_recognized_when_connected_to_a_windows_pc.md", + "can-endpoint-protector-block-internal-card-readers-on-mac.md", + "can-you-block-an-internal-card-reader-on-mac.md", + "configuring-rights-for-outside-hours-and-outside-network.md", + "error_devices_not_visible_in_list_of_devices.md", + "how_easylock_software_works_with_the_endpoint_protector_server_and_client_software.md", + "how_to_add_specific_devices_to_the_allow_list.md", + "how_to_control_idevices_on_endpoint_protector_for_mac.md", + "how_to_whitelist_a_device_for_global_access.md", + "how-to-charge-an-iphone-on-a-computer-controlled-by-endpoint-protector.md", + "how-to-configure-deny-access-but-allow-charging-for-ios-devices.md", + "how-to-configure-user-remediation-for-device-control.md", + "how-to-set-access-rights-for-an-iphone.md", + "managing-network-share-rights-in-device-control.md", + "missing-devices-in-the-client-list.md", + "read_only_access_not_working_after_rights_change.md", + "resolve-wifi-connection-issues-when-rights-are-set-to-allow-access.md", + "set-rights-for-a-specific-device.md", + "understanding-the-rights-hierarchy-for-devices.md", + "why_does_an_iphone_remain_blocked_despite_having_allow_access_rights.md", + "why_endpoint_protector_detects_cameras_as_digital_cameras_or_windows_portable_devices_(mtp).md", + "why-is-a-printer-detected-as-an-usb-storage-device.md", + "why-smartphones-are-detected-as-multiple-device-types.md", + "device-control-sections-overview.md", + "blocking-easylock-folder-access-on-machines-without-the-endpoint-protector-agent.md", + "block-file-transfers-to-or-from-network-shares.md", + "how_to_view_a_scanner_in_the_controlled_device_list.md", + "global-rights-option-not-displayed-when-easylock-role-is-assigned-to-administrator.md", + "how-to-back-up-data-from-a-usb-drive-when-experiencing-easylock-issues.md", + "error-failed-to-initiate-usb-device.md", + "error-cannot-execute-command-an-error-occurred.md", + ], + "content-aware-protection-and-dpi": [ + "allowing-chatgpt-access-via-deep-packet-inspection-allowlist.md", + "can-content-aware-protection-detect-sensitive-content-in-archived-files.md", + "can-optical-character-recognition-be-enabled-for-file-inspection.md", + "configure_content_aware_policy_priorities.md", + "content_aware_protection_tab_missing.md", + "content-aware-policy-configuration.md", + "create_exceptions_for_specific_file_extensions.md", + "dpi-certificate-not-available-in-the-browser.md", + "enable-deep-packet-inspection-for-instant-messaging-applications.md", + "enabling-advanced-printer-and-mtp-scanning.md", + "enabling-deep-packet-inspection-and-intercepting-vpn-traffic-on-macos-clients.md", + "enabling-user-remediation-in-content-aware-protection-policies.md", + "how_to_block_source_code_using_ocr.md", + "how_to_use_the_content_detection_summary.md", + "how-does-the-file-size-threshold-apply-to-uploads.md", + "how-the-file-size-threshold-applies-to-uploads.md", + "how-to-block-whatsapp-application-from-launching.md", + "how-to-collect-extended-deep-packet-inspection-logs-for-mac-os.md", + "how-to-collect-extended-deep-packet-inspection-logs-for-windows.md", + "how-to-monitor-webmail-for-gmail-outlook-and-yahoo.md", + "optical_character_recognition_(ocr)_not_working.md", + "printing_jobs_not_being_blocked_or_reported.md", + "reduce-the-number-of-false-positives.md", + "resolve_hsts_web_browser_errors_when_accessing_websites.md", + "resolve-black-screen-issues-during-remote-access.md", + "set_up_a_report_only_content_aware_protection_policy.md", + "set-up-url-allowlists-and-denylists.md", + "utilize-the-monitor-webmail-setting-for-subject-and-body-scanning.md", + "whitelisting-authentication-servers-for-deep-packet-inspection.md", + "why_dpi_does_not_inspect_content_when_vpn_add-ons_are_installed_on_browsers.md", + "does-endpoint-protector-inspect-content-sent-through-thunderbird.md", + "does_the_uninstall_attempt_event_confirm_agent_removal_from_the_client_machine.md", + "how-to-apply-real-time-data-validation.md", + "will-content-aware-protection-block-sensitive-content-in-files-from-the-allowed-file-allowlist.md", + "enable-sensitive-data-protection.md", + "how_to_add_a_new_entry_to_the_justification_list.md", + ], + "enforced-encryption-and-easylock": [ + "enable_easylock_updates_and_file_shadowing_for_removable_drives.md", + "error-failed-to-initiate-usb-device.md", + "file-shadow-format-for-documents-sent-to-printers.md", + "how_to_reassign_a_valid_enforced_encryption_license_to_a_usb_storage_device.md", + "how-to-use-easylock-without-endpoint-protector-software.md", + "managing-enforced-encryption-and-file-tracing-settings.md", + "can-the-easylock-app-be-opened-without-the-endpoint-protector-agent-installed.md", + "protect-the-client-from-unauthorized-uninstallation.md", + "how-to-set-an-uninstall-protection-password.md", + "restart_the_client_without_restarting_the_computer.md", + "create_a_system_backup_v2.md", + "create_exceptions_for_specific_file_extensions.md", + "how_to_perform_a_backup_restore.md", + "what_is_a_file_read-write_event.md", + "enable_easylock_updates_and_file_shadowing_for_removable_drives.md", + "locate-logs-in-content-aware-report-when-using-partitions.md", + "determine-the-recommended-number-of-endpoints-for-file-tracing-and-file-shadowing.md", + "system-backup-v2-not-showing-in-the-endpoint-protector-console.md", + ], + "administration-security-and-monitoring": [ + "ad_admins_not_able_to_log_in.md", + "configure-session-timeout-in-the-administration-interface.md", + "configure-session-timeout-settings-for-the-administration-interface.md", + "enable_two-factor_authentication_for_system_admins_with_google_authenticator_app.md", + "error-computers-displayed-as-unlicensed-under-list-of-computers.md", + "export-event-logs-from-reports-and-analysis.md", + "how_to_block_specific_ip_addresses_from_accessing_the_console.md", + "how_to_increase_the_200_entries_display_limitation.md", + "how_to_locate_and_change_the_default_credentials_for_the_console.md", + "how_to_select_multiple_computers_and_users_within_groups.md", + "how_to_set_up_e-mail_alerts.md", + "how_to_set_up_active_directory_administrator_synchronization.md", + "how_to_set_up_external_storage.md", + "how_to_set_up_smtp_with_gmail.md", + "how-to-check-the-history-and-email-status-of-alerts.md", + "how-to-identify-and-remove-duplicate-computers.md", + "how-to-set-fqdn-in-server-certificate-subject.md", + "how-to-update-endpoint-protector-or-unify-server.md", + "managing-system-administrators-and-administrator-groups.md", + "resetting-an-administrator-password.md", + "review_administrator_activity_in_the_console.md", + "secure_endpoint_protector_web_console_with_an_ssl_certificate.md", + "set_password_validity_or_remove_password_expiration_for_administrators.md", + "set_up_a_siem_integration.md", + "set_up_automatic_license_release.md", + "troubleshoot_two-factor_authentication_issues.md", + "update-the-endpoint-protector-server-ip-address-on-a-windows-endpoint.md", + "how-to-export-the-list-of-computers,_users,_or_devices.md", + "how_to_set_up_active_directory_administrator_synchronization.md", + ], + "troubleshooting-and-errors": [ + "ad_admins_not_able_to_log_in.md", + "destination_details_tab_is_missing_in_the_reports_and_analysis_section.md", + "error_devices_not_visible_in_list_of_devices.md", + "error_server_user_interface_only_accessible_with_safari_on_vm-hosted_servers.md", + "error-cannot-execute-command-an-error-occurred.md", + "error-computers-displayed-as-unlicensed-under-list-of-computers.md", + "error-failed-to-initiate-usb-device.md", + "error-secure-connection-failed-invalid-certificate-error-in-mozilla-firefox.md", + "global-rights-option-not-displayed-when-easylock-role-is-assigned-to-administrator.md", + "greyed-out-computer-in-the-client-software-upgrade.md", + "how_to_manually_activate_debugging_logs_on_windows.md", + "how_to_manually_generate_logs_for_mac_endpoint_protector_agents_via_terminal.md", + "how_to_remotely_activate_and_collect_client_logs_from_the_server_interface.md", + "how_to_resolve_reports_and_analysis_logs_not_loading.md", + "how_to_handle_the_111.33.33.111_ip_address_on_the_server.md", + "how_to_upgrade_when_apply_updates_button_is_grayed_out.md", + "how_to_generate_a_memory_dump.md", + "how-to-check-the-client-to-server-connection-status.md", + "how-to-collect-extended-deep-packet-inspection-logs-for-mac-os.md", + "how-to-collect-extended-deep-packet-inspection-logs-for-windows.md", + "locate-logs-in-content-aware-report-when-using-partitions.md", + "missing-devices-in-the-client-list.md", + "optical_character_recognition_(ocr)_not_working.md", + "printing_jobs_not_being_blocked_or_reported.md", + "read_only_access_not_working_after_rights_change.md", + "resolve_hsts_web_browser_errors_when_accessing_websites.md", + "resolve-black-screen-issues-during-remote-access.md", + "resolve-wifi-connection-issues-when-rights-are-set-to-allow-access.md", + "user_interface_performance_issues.md", + "why_is_the_serial_number_not_correctly_identified_for_my_iphone.md", + "system-backup-v2-not-showing-in-the-endpoint-protector-console.md", + ], + "features-and-operations": [ + "can-the-easylock-app-be-opened-without-the-endpoint-protector-agent-installed.md", + "client_integrity_fail_events.md", + "client-modes-overview.md", + "creating-ediscovery-policies-and-scans.md", + "does-endpoint-protector-inspect-content-sent-through-thunderbird.md", + "impact-of-spectre-and-meltdown-on-endpoint-protector-deployments.md", + "locating-the-default-username-and-password-for-the-reporting-and-administration-tool.md", + "network-ports-for-endpoint-protector-server-and-client.md", + "otp_device_code_compatibility.md", + "overview_of_remediation_actions_in_ediscovery.md", + "recommendations_for_endpoint_protector_interaction_with_security_vendors,_proxies,_casbs,_and_browse.md", + "supported_platforms_for_endpoint_protector_server_installation.md", + "understanding-the-rights-hierarchy-for-devices.md", + "user_remediation_reporting.md", + "using-smart-groups-for-automatic-computer-and-user-assignment.md", + "what_are_cryptographic_hashes.md", + "what_is_a_file_read-write_event.md", + "what-do-the-colors-represent-in-endpoint-protector-server-and-client.md", + "whitelist_or_exclude_endpoint_protector_processes_in_crowdstrike.md", + "why_endpoint_protector_detects_cameras_as_digital_cameras_or_windows_portable_devices_(mtp).md", + "why-is-a-printer-detected-as-an-usb-storage-device.md", + "why-smartphones-are-detected-as-multiple-device-types.md", + "why-do-various-linux-system-users-appear-in-the-endpoint-protector-user-interface.md", + "why_does_the_ediscovery_scanning_status_progress_bar_drop_to_a_lower_percentage.md", + ], +} + +# Get the base directory +base_dir = os.path.dirname(os.path.abspath(__file__)) + +# Statistics +total_moved = 0 +total_tagged = 0 +errors = [] + +# Process each category +for category, files in categories.items(): + category_dir = os.path.join(base_dir, category) + + for filename in files: + source_path = os.path.join(base_dir, filename) + dest_path = os.path.join(category_dir, filename) + + # Check if source file exists + if not os.path.exists(source_path): + errors.append(f"Source file not found: {filename}") + continue + + try: + # Read the file + with open(source_path, 'r', encoding='utf-8') as f: + content = f.read() + + # Replace tags: [] with tags:\n - category-name + # First, find and replace the tags line + updated_content = re.sub( + r'tags: \[\]', + f'tags:\n - {category}', + content + ) + + # Write to destination + with open(dest_path, 'w', encoding='utf-8') as f: + f.write(updated_content) + + # Remove source file + os.remove(source_path) + + total_moved += 1 + total_tagged += 1 + print(f"Moved and tagged: {filename} -> {category}/") + + except Exception as e: + errors.append(f"Error processing {filename}: {str(e)}") + print(f"Error processing {filename}: {str(e)}") + +# Print summary +print("\n" + "="*80) +print("SUMMARY") +print("="*80) +print(f"Total files moved: {total_moved}") +print(f"Total files tagged: {total_tagged}") +if errors: + print(f"\nErrors encountered ({len(errors)}):") + for error in errors: + print(f" - {error}") +else: + print("No errors encountered!") diff --git a/docs/kb/endpointprotector/destination_details_tab_is_missing_in_the_reports_and_analysis_section.md b/docs/kb/endpointprotector/troubleshooting-and-errors/destination_details_tab_is_missing_in_the_reports_and_analysis_section.md similarity index 86% rename from docs/kb/endpointprotector/destination_details_tab_is_missing_in_the_reports_and_analysis_section.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/destination_details_tab_is_missing_in_the_reports_and_analysis_section.md index 24880b68a8..a8370333b6 100644 --- a/docs/kb/endpointprotector/destination_details_tab_is_missing_in_the_reports_and_analysis_section.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/destination_details_tab_is_missing_in_the_reports_and_analysis_section.md @@ -6,7 +6,8 @@ keywords: - Reports and Analysis - Endpoint Protector Console sidebar_label: Missing Destination Details Tab -tags: [] +tags: + - troubleshooting-and-errors title: "Destination Details Tab Is Missing in the Reports and Analysis Section" knowledge_article_id: kA0Qk0000002B4HKAU products: @@ -23,11 +24,11 @@ Why is the Destination Details tab missing in the Reports and Analysis section? The **Destination Details** tab, which lists the website where a monitored file was uploaded, may be missing from the **Reports and Analysis** section in the **Endpoint Protector Console**. -![Missing Destination Details tab](./images/servlet_image_1a8a53e40ad6.png) +![Missing Destination Details tab](./../0-images/servlet_image_1a8a53e40ad6.png) If the **Destination Details** tab is missing, enable the **Reporting V2** setting in **System Configuration** > **System Settings**. -![Enable Reporting V2 setting](./images/servlet_image_055f8013da42.png) +![Enable Reporting V2 setting](./../0-images/servlet_image_055f8013da42.png) After enabling **Reporting V2**, the **Destination Details** field will be selectable and viewable in the Reports and Analysis section. diff --git a/docs/kb/endpointprotector/error-secure-connection-failed-invalid-certificate-error-in-mozilla-firefox.md b/docs/kb/endpointprotector/troubleshooting-and-errors/error-secure-connection-failed-invalid-certificate-error-in-mozilla-firefox.md similarity index 97% rename from docs/kb/endpointprotector/error-secure-connection-failed-invalid-certificate-error-in-mozilla-firefox.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/error-secure-connection-failed-invalid-certificate-error-in-mozilla-firefox.md index 07033fcb9b..9ffb2806dd 100644 --- a/docs/kb/endpointprotector/error-secure-connection-failed-invalid-certificate-error-in-mozilla-firefox.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/error-secure-connection-failed-invalid-certificate-error-in-mozilla-firefox.md @@ -16,7 +16,8 @@ products: - endpoint-protector visibility: public sidebar_label: "Error: Secure Connection Failed (Invalid Certificate) Error in Mozilla Firefox" -tags: [] +tags: + - troubleshooting-and-errors title: 'Error: Secure Connection Failed (Invalid Certificate) Error in Mozilla Firefox' knowledge_article_id: kA0Qk0000002BCUKA2 --- diff --git a/docs/kb/endpointprotector/error_server_user_interface_only_accessible_with_safari_on_vm-hosted_servers.md b/docs/kb/endpointprotector/troubleshooting-and-errors/error_server_user_interface_only_accessible_with_safari_on_vm-hosted_servers.md similarity index 97% rename from docs/kb/endpointprotector/error_server_user_interface_only_accessible_with_safari_on_vm-hosted_servers.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/error_server_user_interface_only_accessible_with_safari_on_vm-hosted_servers.md index 3d4f154835..29a37afb38 100644 --- a/docs/kb/endpointprotector/error_server_user_interface_only_accessible_with_safari_on_vm-hosted_servers.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/error_server_user_interface_only_accessible_with_safari_on_vm-hosted_servers.md @@ -6,7 +6,8 @@ keywords: - server user interface - virtual machine sidebar_label: Server UI Access Issue -tags: [] +tags: + - troubleshooting-and-errors title: "Error: Server User Interface Only Accessible with Safari on VM-Hosted Servers" knowledge_article_id: kA0Qk0000002B2dKAE products: diff --git a/docs/kb/endpointprotector/greyed-out-computer-in-the-client-software-upgrade.md b/docs/kb/endpointprotector/troubleshooting-and-errors/greyed-out-computer-in-the-client-software-upgrade.md similarity index 93% rename from docs/kb/endpointprotector/greyed-out-computer-in-the-client-software-upgrade.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/greyed-out-computer-in-the-client-software-upgrade.md index 528264b512..b5f30c94fd 100644 --- a/docs/kb/endpointprotector/greyed-out-computer-in-the-client-software-upgrade.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/greyed-out-computer-in-the-client-software-upgrade.md @@ -17,7 +17,8 @@ keywords: products: - endpoint-protector sidebar_label: Greyed Out Computer in the Client Software Upgrade -tags: [] +tags: + - troubleshooting-and-errors title: "Greyed Out Computer in the Client Software Upgrade" knowledge_article_id: kA0Qk0000002B5pKAE --- @@ -28,7 +29,7 @@ knowledge_article_id: kA0Qk0000002B5pKAE The affected computer is displayed as greyed out and cannot be selected in the Netwrix Endpoint Protector client software upgrade or update interface. -![Example](./images/servlet_image_3f1c3b331cfe.png) +![Example](./../0-images/servlet_image_3f1c3b331cfe.png) ## Cause diff --git a/docs/kb/endpointprotector/how-to-check-the-client-to-server-connection-status.md b/docs/kb/endpointprotector/troubleshooting-and-errors/how-to-check-the-client-to-server-connection-status.md similarity index 93% rename from docs/kb/endpointprotector/how-to-check-the-client-to-server-connection-status.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/how-to-check-the-client-to-server-connection-status.md index 16959c0b55..ec13184439 100644 --- a/docs/kb/endpointprotector/how-to-check-the-client-to-server-connection-status.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/how-to-check-the-client-to-server-connection-status.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Check the Client-to-Server Connection Statu -tags: [] +tags: + - troubleshooting-and-errors title: "How to Check the Client-to-Server Connection Status" knowledge_article_id: kA0Qk0000002B14KAE --- @@ -41,4 +42,4 @@ This article explains how to check the connection status between the Netwrix End - The connection status - The time and date when the policies were last received - ![Netwrix Endpoint Protector Client Settings tab showing server connection status details](./images/ka0Qk000000Dzs5_0EMQk00000CAOoZ.png) + ![Netwrix Endpoint Protector Client Settings tab showing server connection status details](./../0-images/ka0Qk000000Dzs5_0EMQk00000CAOoZ.png) diff --git a/docs/kb/endpointprotector/how-to-generate-a-memory-dump.md b/docs/kb/endpointprotector/troubleshooting-and-errors/how-to-generate-a-memory-dump.md similarity index 97% rename from docs/kb/endpointprotector/how-to-generate-a-memory-dump.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/how-to-generate-a-memory-dump.md index d6f99739fc..c0401814c3 100644 --- a/docs/kb/endpointprotector/how-to-generate-a-memory-dump.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/how-to-generate-a-memory-dump.md @@ -16,7 +16,8 @@ keywords: products: - endpoint-protector sidebar_label: How to Generate a Memory Dump -tags: [] +tags: + - troubleshooting-and-errors title: "How to Generate a Memory Dump" knowledge_article_id: kA0Qk0000002B6RKAU --- diff --git a/docs/kb/endpointprotector/how_to_handle_the_111.33.33.111_ip_address_on_the_server.md b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_handle_the_111.33.33.111_ip_address_on_the_server.md similarity index 98% rename from docs/kb/endpointprotector/how_to_handle_the_111.33.33.111_ip_address_on_the_server.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/how_to_handle_the_111.33.33.111_ip_address_on_the_server.md index e8a2297d0d..bbf10c23ef 100644 --- a/docs/kb/endpointprotector/how_to_handle_the_111.33.33.111_ip_address_on_the_server.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_handle_the_111.33.33.111_ip_address_on_the_server.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - firewall settings sidebar_label: Handle 111.33.33.111 IP Address -tags: [] +tags: + - troubleshooting-and-errors title: "How to Handle the 111.33.33.111 IP Address on the Server" knowledge_article_id: kA0Qk0000002B4EKAU products: diff --git a/docs/kb/endpointprotector/how_to_manually_activate_debugging_logs_on_windows.md b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_manually_activate_debugging_logs_on_windows.md similarity index 97% rename from docs/kb/endpointprotector/how_to_manually_activate_debugging_logs_on_windows.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/how_to_manually_activate_debugging_logs_on_windows.md index 5ab8a5a547..5786a580a3 100644 --- a/docs/kb/endpointprotector/how_to_manually_activate_debugging_logs_on_windows.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_manually_activate_debugging_logs_on_windows.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - Windows sidebar_label: Activate Debugging Logs -tags: [] +tags: + - troubleshooting-and-errors title: "How to Manually Activate Debugging Logs on Windows" knowledge_article_id: kA0Qk0000002B7PKAU products: diff --git a/docs/kb/endpointprotector/how_to_manually_generate_logs_for_mac_endpoint_protector_agents_via_terminal.md b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_manually_generate_logs_for_mac_endpoint_protector_agents_via_terminal.md similarity index 97% rename from docs/kb/endpointprotector/how_to_manually_generate_logs_for_mac_endpoint_protector_agents_via_terminal.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/how_to_manually_generate_logs_for_mac_endpoint_protector_agents_via_terminal.md index 3fc3f38aee..d9daf741b5 100644 --- a/docs/kb/endpointprotector/how_to_manually_generate_logs_for_mac_endpoint_protector_agents_via_terminal.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_manually_generate_logs_for_mac_endpoint_protector_agents_via_terminal.md @@ -6,7 +6,8 @@ keywords: - Mac Client - log generation sidebar_label: Generate Logs for Mac EPP -tags: [] +tags: + - troubleshooting-and-errors title: "How to Manually Generate Logs for Mac Endpoint Protector Agents via Terminal" knowledge_article_id: kA0Qk0000002B6VKAU products: diff --git a/docs/kb/endpointprotector/how_to_remotely_activate_and_collect_client_logs_from_the_server_interface.md b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_remotely_activate_and_collect_client_logs_from_the_server_interface.md similarity index 73% rename from docs/kb/endpointprotector/how_to_remotely_activate_and_collect_client_logs_from_the_server_interface.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/how_to_remotely_activate_and_collect_client_logs_from_the_server_interface.md index 055e7fbb86..bdc2dd46d5 100644 --- a/docs/kb/endpointprotector/how_to_remotely_activate_and_collect_client_logs_from_the_server_interface.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_remotely_activate_and_collect_client_logs_from_the_server_interface.md @@ -6,7 +6,8 @@ keywords: - client logs - endpoint management sidebar_label: Remotely Activate and Collect Client Logs -tags: [] +tags: + - troubleshooting-and-errors title: "How to Remotely Activate and Collect Client Logs from the Server Interface" knowledge_article_id: kA0Qk0000002B2cKAE products: @@ -22,30 +23,30 @@ This article explains how to remotely enable debug logging on an endpoint machin ## Instructions 1. In the **Endpoint Protector Console**, navigate to **Device Control > Computers**, then select the target computer and click **Manage Settings**. - ![Manage Settings in Device Control > Computers](./images/servlet_image_8cfbf5692849.png) + ![Manage Settings in Device Control > Computers](./../0-images/servlet_image_8cfbf5692849.png) 2. Scroll down to **Debug Logging**, then click the **Set Log Level** drop-down menu and select **Debug**. - ![Set Log Level to Debug](./images/servlet_image_5840481544b9.png) + ![Set Log Level to Debug](./../0-images/servlet_image_5840481544b9.png) 3. After selecting **Debug**, click **Save** and wait for the green notification confirming that the changes have been saved. - ![Changes have been saved notification](./images/servlet_image_baa2795f8fd3.png) + ![Changes have been saved notification](./../0-images/servlet_image_baa2795f8fd3.png) 4. On the computer, refresh the policies and reproduce the issue. 5. Return to the computer listed under **Device Control > Computers** and click **Collect diagnostics**. - ![Collect diagnostics option](./images/servlet_image_60b30f91932d.png) - ![Diagnostics collection in progress](./images/servlet_image_96e38073d295.png) + ![Collect diagnostics option](./../0-images/servlet_image_60b30f91932d.png) + ![Diagnostics collection in progress](./../0-images/servlet_image_96e38073d295.png) 6. Logs will be sent to the server under **Reports and Analysis > Logs Report**. - ![Logs Report section](./images/servlet_image_9aa4123f77f5.png) + ![Logs Report section](./../0-images/servlet_image_9aa4123f77f5.png) 7. Navigate to **Reports and Analysis > Logs Report**. 8. Expand the filters. Click the **Event** drop-down menu, then select **Artifact Received** and click **Apply**. - ![Filter for Artifact Received event](./images/servlet_image_3f1c3b331cfe.png) + ![Filter for Artifact Received event](./../0-images/servlet_image_3f1c3b331cfe.png) 9. Under the events, the uploaded artifact or client logs will be listed and available for download by the system administrator. > **NOTE:** The artifact may not be available for immediate download and may display a "File not found" error. It can take 20–30 minutes before the file is ready to download." - ![Artifact or client logs available for download](./images/servlet_image_823648e31f8f.png) + ![Artifact or client logs available for download](./../0-images/servlet_image_823648e31f8f.png) 10. Once the client logs are downloaded, submit them to the support team as needed. \ No newline at end of file diff --git a/docs/kb/endpointprotector/how_to_resolve_reports_and_analysis_logs_not_loading.md b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_resolve_reports_and_analysis_logs_not_loading.md similarity index 97% rename from docs/kb/endpointprotector/how_to_resolve_reports_and_analysis_logs_not_loading.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/how_to_resolve_reports_and_analysis_logs_not_loading.md index 3f85686b46..9f14f6fe9d 100644 --- a/docs/kb/endpointprotector/how_to_resolve_reports_and_analysis_logs_not_loading.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_resolve_reports_and_analysis_logs_not_loading.md @@ -6,7 +6,8 @@ keywords: - Endpoint Protector - display settings sidebar_label: Resolve Reports and Analysis Logs -tags: [] +tags: + - troubleshooting-and-errors title: "How to Resolve Reports and Analysis Logs Not Loading" knowledge_article_id: kA0Qk0000002B2rKAE products: diff --git a/docs/kb/endpointprotector/how_to_upgrade_when_apply_updates_button_is_grayed_out.md b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_upgrade_when_apply_updates_button_is_grayed_out.md similarity index 98% rename from docs/kb/endpointprotector/how_to_upgrade_when_apply_updates_button_is_grayed_out.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/how_to_upgrade_when_apply_updates_button_is_grayed_out.md index 11eb59ca73..7e12b74ba4 100644 --- a/docs/kb/endpointprotector/how_to_upgrade_when_apply_updates_button_is_grayed_out.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/how_to_upgrade_when_apply_updates_button_is_grayed_out.md @@ -8,7 +8,8 @@ keywords: products: - endpoint-protector sidebar_label: Upgrade When Apply Updates Button Is Grayed Out -tags: [] +tags: + - troubleshooting-and-errors title: How to Upgrade When "Apply Updates" Button Is Grayed Out knowledge_article_id: kA0Qk0000002BDvKAM --- diff --git a/docs/kb/endpointprotector/user_interface_performance_issues.md b/docs/kb/endpointprotector/troubleshooting-and-errors/user_interface_performance_issues.md similarity index 98% rename from docs/kb/endpointprotector/user_interface_performance_issues.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/user_interface_performance_issues.md index e38370de1c..8cb723c779 100644 --- a/docs/kb/endpointprotector/user_interface_performance_issues.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/user_interface_performance_issues.md @@ -6,7 +6,8 @@ keywords: - performance issues - troubleshooting sidebar_label: User Interface Performance Issues -tags: [] +tags: + - troubleshooting-and-errors title: "User Interface Performance Issues" knowledge_article_id: kA0Qk0000002B6GKAU products: diff --git a/docs/kb/endpointprotector/verify-if-the-endpoint-protector-network-extension-is-enabled.md b/docs/kb/endpointprotector/troubleshooting-and-errors/verify-if-the-endpoint-protector-network-extension-is-enabled.md similarity index 97% rename from docs/kb/endpointprotector/verify-if-the-endpoint-protector-network-extension-is-enabled.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/verify-if-the-endpoint-protector-network-extension-is-enabled.md index 09e20a2534..1e9fcfb3a1 100644 --- a/docs/kb/endpointprotector/verify-if-the-endpoint-protector-network-extension-is-enabled.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/verify-if-the-endpoint-protector-network-extension-is-enabled.md @@ -16,7 +16,8 @@ products: - endpoint-protector visibility: public sidebar_label: Verify if the Endpoint Protector Network Extension -tags: [] +tags: + - troubleshooting-and-errors title: "Verify if the Endpoint Protector Network Extension Is Enabled" knowledge_article_id: kA0Qk0000002B6TKAU --- diff --git a/docs/kb/endpointprotector/why_is_the_serial_number_not_correctly_identified_for_my_iphone.md b/docs/kb/endpointprotector/troubleshooting-and-errors/why_is_the_serial_number_not_correctly_identified_for_my_iphone.md similarity index 97% rename from docs/kb/endpointprotector/why_is_the_serial_number_not_correctly_identified_for_my_iphone.md rename to docs/kb/endpointprotector/troubleshooting-and-errors/why_is_the_serial_number_not_correctly_identified_for_my_iphone.md index 7211d1a096..2212abd452 100644 --- a/docs/kb/endpointprotector/why_is_the_serial_number_not_correctly_identified_for_my_iphone.md +++ b/docs/kb/endpointprotector/troubleshooting-and-errors/why_is_the_serial_number_not_correctly_identified_for_my_iphone.md @@ -6,7 +6,8 @@ keywords: - serial number - USB storage device sidebar_label: iPhone Serial Number Identification -tags: [] +tags: + - troubleshooting-and-errors title: "Why Is the Serial Number Not Correctly Identified for My iPhone?" knowledge_article_id: kA0Qk0000002BIoKAM products: