Skip to content

Commit 17d6d12

Browse files
notes script
1 parent ddf250b commit 17d6d12

File tree

69 files changed

+543
-136
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+543
-136
lines changed

docs/accessinformationcenter/12.0/accessrequests/interface/changes.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,10 @@ The table displays the following information for selected trustee:
2222
- Update Type – Indicates if group membership was added or removed to process the change
2323
- Member Name – sAMAccountName associated with the domain user whose membership was being changed
2424

25-
**NOTE:** The table data grid functions the same way as other Access Information Center table grids.
25+
:::note
26+
The table data grid functions the same way as other Access Information Center table grids.
2627
See the [Data Grid Features](/docs/accessinformationcenter/12.0/admin/navigate/datagrid.md) topic for additional information.
28+
:::
29+
2730

2831
Click **OK** to close the window.

docs/accessinformationcenter/12.0/accessrequests/overview.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,14 +18,20 @@ folders, SharePoint sites, Active Directory (AD) groups, AD distribution lists,
1818
Administrators groups.All data available within the Access Information Center is collected by
1919
Netwrix Access Analyzer (formerly Enterprise Auditor) according to the targeted environments.
2020

21-
_Remember,_ owners are assigned to resources in the Resource Owners interface. Only resources with
21+
:::tip
22+
Remember, owners are assigned to resources in the Resource Owners interface. Only resources with
2223
assigned owners can be included in the Self-Service Access Requests workflow. These resources must
2324
also have the Allow access requests option selected.
25+
:::
2426

25-
**_RECOMMENDED:_** When deploying the Access Information Center in an organization to enable
27+
28+
:::info
29+
When deploying the Access Information Center in an organization to enable
2630
Self-Service Access Requests, notifications should be sent to assigned owners as well as domain
2731
users. See the [Owner Confirmation Request Email](/docs/accessinformationcenter/12.0/owneroverview/confirmationrequest.md)
2832
topic for additional information.
33+
:::
34+
2935

3036
The Your Access portal provides domain users with the ability to view current access to managed
3137
resources, request access to resources, and view the request status for pending and processed
@@ -59,10 +65,13 @@ Prerequisites:
5965
- Access Information Center configured to send Notifications. See the
6066
[Notifications Page](/docs/accessinformationcenter/12.0/admin/configuration/notifications.md) topic for additional information.
6167

62-
**NOTE:** By default, the Access Information Center is configured to send notifications only to
68+
:::note
69+
By default, the Access Information Center is configured to send notifications only to
6370
the primary owner. However, this can be customized to send notifications to all assigned owners.
6471
See the [Notifications Page](/docs/accessinformationcenter/12.0/admin/configuration/notifications.md) topic for additional
6572
information.
73+
:::
74+
6675

6776
- Access Information Center configured to commit AD changes
6877
- Resources and groups must be known to the Access Information Center, having been audited by Access

docs/accessinformationcenter/12.0/admin/additionalconfig/commitchanges.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,14 @@ configure access groups for those resources in the target environment. An access
2323
of the following access levels to a specific resource: Read, Modify, or Full Control. See the
2424
[Access Groups](/docs/accessinformationcenter/12.0/resourceowners/accessgroups.md) topic for additional information.
2525

26-
**NOTE:** The Access Information Center can only commit group membership changes to domains it has
26+
:::note
27+
The Access Information Center can only commit group membership changes to domains it has
2728
access to, that is the domain where it resides or domains with a trust that are known to it. Also,
2829
the Active Directory service account must have the required permissions for all applicable domains.
2930
See the [Multiple Domains](/docs/accessinformationcenter/12.0/admin/configuration/activedirectory.md#multiple-domains) topic for
3031
additional information.
32+
:::
33+
3134

3235
## Best Practice for Least Privilege
3336

@@ -47,8 +50,11 @@ two options for assigning the Active Directory service account:
4750
option, but can be used as the Active Directory service account. See the
4851
[Active Directory Page](/docs/accessinformationcenter/12.0/admin/configuration/activedirectory.md) topic for additional information.
4952

50-
**_RECOMMENDED:_** The best practice is to create at least two OUs for ease of organization: a
53+
:::info
54+
The best practice is to create at least two OUs for ease of organization: a
5155
security group OU and a distribution list group OU.
56+
:::
57+
5258

5359
**Step 3 –** Apply delegation to these OUs to grant the minimal rights of **Allow Read Members** and
5460
**Allow Write Members** to the Active Directory service account.

docs/accessinformationcenter/12.0/admin/additionalconfig/emailtemplates.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,11 @@ directory:
6060

6161
Follow the steps to customize the email templates.
6262

63-
**NOTE:** To successfully modify these Notifications email templates, a familiarity with basic HTML
63+
:::note
64+
To successfully modify these Notifications email templates, a familiarity with basic HTML
6465
is necessary.
66+
:::
67+
6568

6669
![Templates Zip file in the Installation Directory](/img/product_docs/accessinformationcenter/12.0/admin/additionalconfig/emailtemplateszipfile.webp)
6770

@@ -72,17 +75,23 @@ is necessary.
7275
**Step 2 –** Unzip the `Templates.zip` file and save the contents to a folder within this directory
7376
named `Templates`.
7477

75-
**CAUTION:** The customized email templates must be in the `Templates` folder within the
78+
:::warning
79+
The customized email templates must be in the `Templates` folder within the
7680
installation directory to be preserved during future application upgrades.
81+
:::
82+
7783

7884
![Unzipped Email Templates in Templates Folder](/img/product_docs/accessinformationcenter/12.0/admin/additionalconfig/emailtemplatesunzipped.webp)
7985

8086
**Step 3 –** Locate the desired HTML message template.
8187

8288
**Step 4 –** Open the file with a text editor, e.g. Notepad, and customize the email body.
8389

84-
**NOTE:** Using a tool other than a text editor to edit HTML files, such as a WYSIWYG web page
90+
:::note
91+
Using a tool other than a text editor to edit HTML files, such as a WYSIWYG web page
8592
editor which may drastically alter the underlying HTML code, is not supported.
93+
:::
94+
8695

8796
**Step 5 –** Email subject lines can be edited by changing the text between the opening `<title>`
8897
tag and the closing `</title>` tag.

docs/accessinformationcenter/12.0/admin/additionalconfig/entraidsso.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,11 @@ The Access Information Center can be configured to use Microsoft Entra ID Single
1010
configured, users are directed to the Microsoft Entra ID login page, and can log in using their
1111
existing Entra credentials.
1212

13-
**NOTE:** If enabled, only Microsoft Entra ID SSO can be used for logging in. Other accounts,
13+
:::note
14+
If enabled, only Microsoft Entra ID SSO can be used for logging in. Other accounts,
1415
including the default administrator account, cannot be used.
16+
:::
17+
1518

1619
The following is required to use Microsoft Entra ID SSO:
1720

@@ -81,10 +84,13 @@ Microsoft Entra ID SSO in the Access Information Center config file.
8184
To enable Microsoft Entra ID SSO for the Access Information Center, the config file needs to be
8285
updated with values from Microsoft Entra ID. Follow the steps to enable the SSO.
8386
84-
_Remember,_ Enabling Entra ID SSO requires SSL to be enabled. If this was not done during the
87+
:::tip
88+
Remember, Enabling Entra ID SSO requires SSL to be enabled. If this was not done during the
8589
installation, then you must manually configure it. See the
8690
[Securing the Access Information Center](/docs/accessinformationcenter/12.0/installation/secure.md) topic for additional
8791
information.
92+
:::
93+
8894
8995
**Step 1 –** Open the `AccessInformationCenter.Service.exe.config` file in a text editor, such as
9096
Notepad. The file is located in the Access Information Center installation directory:
@@ -103,9 +109,12 @@ as follows:
103109
    <add key="WsFederationReply" value="" />
104110
```
105111
106-
**NOTE:** For new installations of the Access Information Center these parameters are already in the
112+
:::note
113+
For new installations of the Access Information Center these parameters are already in the
107114
config file. If you have upgraded from a previous version, then you need to manually add them as the
108115
config file is retained during an upgrade to maintain the existing settings.
116+
:::
117+
109118
110119
**Step 3 –** Add the required values for the parameters from your Microsoft Entra ID application:
111120

docs/accessinformationcenter/12.0/admin/additionalconfig/timeoutparameter.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,14 @@ sidebar_position: 50
99
A user session will end when the timeout parameter for inactivity has been reached, and the user
1010
will be logged out. By default this is set to 15 minutes.
1111

12-
**NOTE:** When accessing the Access Information Center through the Web Console, its timeout
12+
:::note
13+
When accessing the Access Information Center through the Web Console, its timeout
1314
parameter value takes precedence over the Access Information Center timeout parameter value. See the
1415
Timeout Parameter for the Web Console topic of the
1516
[Netwrix Access Analyzer Documentation](https://helpcenter.netwrix.com/category/accessanalyzer) for
1617
instructions on modifying its timeout parameter value.
18+
:::
19+
1720

1821
The timeout parameter is configured within the `AccessInformationCenter.Service.exe.config` file in
1922
the Access Information Center installation directory:

docs/accessinformationcenter/12.0/admin/configuration/activedirectory.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,11 @@ be configured to be accessible by the same domains. See the Enable Multiple Doma
5151
the [Netwrix Access Analyzer Documentation](https://helpcenter.netwrix.com/category/accessanalyzer)
5252
for additional information.
5353

54-
**NOTE:** All domains enabled to access the Access Information Center must also have data collected
54+
:::note
55+
All domains enabled to access the Access Information Center must also have data collected
5556
by the **.Active Directory Inventory** solution of Access Analyzer.
57+
:::
58+
5659

5760
## Commit Group Membership changes
5861

@@ -67,7 +70,10 @@ Directory service account to commit group membership changes. See the
6770
information on provisioning the Active Directory service account and best practices for group and
6871
resource management through the Access Information Center
6972

70-
_Remember,_ click **Save** when any changes are made to this page.
73+
:::tip
74+
Remember, click **Save** when any changes are made to this page.
75+
:::
76+
7177

7278
## Update the Active Directory Service Account Password
7379

docs/accessinformationcenter/12.0/admin/configuration/consoleaccess.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,21 +27,27 @@ There are five levels of access, or Roles, which can be granted to domain users
2727
access to any other interface within the Access Information Center. This role also does not have
2828
rights to modify the Builtin Administrator account or their own access.
2929

30-
**NOTE:** If Netwrix Access Analyzer (formerly Enterprise Auditor) is storing discovered sensitive
30+
:::note
31+
If Netwrix Access Analyzer (formerly Enterprise Auditor) is storing discovered sensitive
3132
data, the Sensitive Data reports will only display the sensitive data matches for users with the
3233
Security Team and Administrator roles.
34+
:::
35+
3336

3437
A user granted either the Reader or Security Team role can also be further restricted to accessing
3538
information for either:
3639

3740
- Specific resource types (File System, SharePoint, or Active Directory)
3841
- Specific servers
3942

40-
**CAUTION:** Before disabling the Builtin Administrator account, it is necessary to first assign at
43+
:::warning
44+
Before disabling the Builtin Administrator account, it is necessary to first assign at
4145
least one domain user account to the Administrator role. Login with another Administrator account to
4246
disable the Builtin Administrator. Failure to do this could result in being locked-out of the
4347
Configuration interface. As an alternative to disabling this account, the password can be changed.
4448
See the Modify the Builtin Administrator Account topic for additional information.
49+
:::
50+
4551

4652
Once users have been granted console access, they can login with their domain credentials. Console
4753
access is not a requirement for participation as owners or domain users in the Resource Reviews and
@@ -100,9 +106,12 @@ information.
100106

101107
Follow the steps to modify a user’s console access.
102108

103-
**NOTE:** These steps are for modifying domain users with console access roles and do not apply to
109+
:::note
110+
These steps are for modifying domain users with console access roles and do not apply to
104111
the Builtin Administrator account. See the Modify the Builtin Administrator Account topic for
105112
additional information.
113+
:::
114+
106115

107116
**Step 1 –** In the Configuration interface on the Console Access page, select the user to be
108117
modified and click Modify. The Console Access wizard opens to the Select Access page.
@@ -130,8 +139,11 @@ Any modifications to the user’s role are visible in the list on the Console Ac
130139

131140
## Delete Console Users
132141

133-
**CAUTION:** Confirmation is not requested when deleting users. An alternative to deleting a console
142+
:::warning
143+
Confirmation is not requested when deleting users. An alternative to deleting a console
134144
user is to disable their access. See the Modify Console Users topic for additional information.
145+
:::
146+
135147

136148
Follow the steps to remove a user’s configured console access.
137149

@@ -162,7 +174,10 @@ Administrator account and click **Modify**. The Builtin Administrator window ope
162174

163175
The modifications to the Builtin Administrator are processed.
164176

165-
**NOTE:** The new password is encrypted in the `AccessInformationCenter.Service.exe.config` file, in
177+
:::note
178+
The new password is encrypted in the `AccessInformationCenter.Service.exe.config` file, in
166179
the `AuthBuiltinAdminPassword` parameter. If you forget the Admin password, you can clear the
167180
`AuthBuiltinAdminPassword` value in the `AccessInformationCenter.Service.exe.config` file. Then use
168181
the default first launch login credentials to set a new password.
182+
183+
:::

docs/accessinformationcenter/12.0/admin/configuration/database.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,10 @@ Database service account information:
4747
- Use the following SQL account – Uses SQL Authentication to the database. Provide the properly
4848
provisioned SQL credentials for the database
4949

50-
_Remember,_ click **Save** when any changes are made to this page.
50+
:::tip
51+
Remember, click **Save** when any changes are made to this page.
52+
:::
53+
5154

5255
## Update the Database Service Account Password
5356

docs/accessinformationcenter/12.0/admin/configuration/license.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,11 @@ be used to incorporate third-party data into reports.
4444

4545
Follow the steps to update the license key.
4646

47-
**NOTE:** The LIC file must be named to `StealthAUDIT.lic`. If it has another name, rename it before
47+
:::note
48+
The LIC file must be named to `StealthAUDIT.lic`. If it has another name, rename it before
4849
completing the steps.
50+
:::
51+
4952

5053
![Configuration interface showing the License page with unlicensed features](/img/product_docs/accessinformationcenter/12.0/admin/configuration/licenseunlicensedfeatures.webp)
5154

0 commit comments

Comments
 (0)