Skip to content

Commit 443561c

Browse files
NAA fixes except DCs
1 parent 8cdeb0e commit 443561c

File tree

88 files changed

+123
-106
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

88 files changed

+123
-106
lines changed

docs/accessanalyzer/12.0/admin/datacollector/aws/loginroles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ the categories of:
1616
![AWS Query Login Roles](/img/product_docs/accessanalyzer/12.0/admin/datacollector/aws/loginroles.webp)
1717

1818
Add the login roles that will allow Access Analyzer to scan the AWS accounts. See the
19-
[Configure AWS for Scans](/docs/accessanalyzer/12.0/requirements/aws/aws_2.md) topic for additional
19+
[Configure AWS for Scans](/docs/accessanalyzer/12.0/requirements/aws/configurescans.md) topic for additional
2020
information. The page has the following options:
2121

2222
- Import From File – Browse to the location of a CSV file from which to import the roles

docs/accessanalyzer/12.0/admin/datacollector/sql/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,9 +94,9 @@ For SQL:
9494
- Grant View server state to [DOMAIN\USER]
9595
- Grant Control Server to [DOMAIN\USER] (specifically required for the Weak Passwords Job)
9696

97-
See the [Azure SQL Auditing Configuration](/docs/accessanalyzer/12.0/requirements/databases/databasesql/azuresqlaccess.md)
97+
See the [Azure SQL Auditing Configuration](/docs/accessanalyzer/12.0/requirements/databases/sql/azuresqlaccess.md)
9898
topic and the
99-
[AzureSQL Target Least Privilege Model](/docs/accessanalyzer/12.0/requirements/databases/databasesql/databaseazuresql.md)
99+
[AzureSQL Target Least Privilege Model](/docs/accessanalyzer/12.0/requirements/databases/sql/azuresql.md)
100100
topic for additional information.
101101

102102
Sensitive Data Discovery Considerations

docs/accessanalyzer/12.0/admin/datacollector/unix/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Permissions
2525
- Root permissions in Unix/Linux
2626

2727
If the Root permission is unavailable, a least privileged model can be used. See the
28-
[Least Privilege Model](/docs/accessanalyzer/12.0/requirements/unix/unix_1.md#least-privilege-model) topic additional
28+
[Least Privilege Model](/docs/accessanalyzer/12.0/requirements/unix/target.md#least-privilege-model) topic additional
2929
information.
3030

3131
## Unix Query Configuration

docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/addomaincontrollers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Follow the steps to create a Host Discovery query using the **Query an Active Di
1010
(Discover Domain Controllers)** source option. This option scans the default domain controller or a
1111
specified server but is scoped to return only machines that are domain controllers.
1212

13-
![Host Discovey Wizard Source page for AD Domain Controllers query](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source.webp)
13+
![Host Discovey Wizard Source page for AD Domain Controllers query](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source_2.webp)
1414

1515
**Step 1 –** Open the Host Discovery Wizard. On the Source page, select the **Query an Active
1616
Directory server (Discover Domain Controllers)** option. Click **Next**.
@@ -88,7 +88,7 @@ Click **Next** to continue.
8888

8989
Click **Next** to continue.
9090

91-
![Host Discovey Wizard Inventory page for AD Domain Controllers query](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory.webp)
91+
![Host Discovey Wizard Inventory page for AD Domain Controllers query](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory_2.webp)
9292

9393
**Step 5 –** On the Inventory page, the host inventory process can be automatically included with
9494
the discovery query.

docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/adexchange.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Follow the steps to create a Host Discovery query using the Query an Active Dire
1111
specified server but is scoped to return only computer objects residing in the configuration
1212
container for Exchange servers.
1313

14-
![Host Discovery Wizard Source page for AD Exchange](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source.webp)
14+
![Host Discovery Wizard Source page for AD Exchange](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source_5.webp)
1515

1616
**Step 1 –** Open the Host Discovery Wizard. On the Source Page, select the **Query an Active
1717
Directory server (Discover Exchange servers)** option. Click **Next**.
@@ -67,7 +67,7 @@ Leave this page unchanged. If you must modify this page, see the
6767

6868
Click **Next** to continue.
6969

70-
![Host Discovery Wizard Inventory page for AD Exchange](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory.webp)
70+
![Host Discovery Wizard Inventory page for AD Exchange](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory_5.webp)
7171

7272
**Step 5 –** On the Inventory page, the host inventory process can be automatically included with
7373
the discovery query.

docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/adgeneral.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Follow the steps to create a Host Discovery query using the Query an Active Dire
1111
all computer objects. The query can be scoped to only return computer objects in specified
1212
containers or individual computer objects. See Step 3 for additional information.
1313

14-
![Host Discovery Wizard Source page for AD General](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source.webp)
14+
![Host Discovery Wizard Source page for AD General](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source_4.webp)
1515

1616
**Step 1 –** Open the Host Discovery Wizard. On the Source page, select the **Query an Active
1717
Directory server (General)** option. Click **Next**.
@@ -89,7 +89,7 @@ Click **Next** to continue.
8989

9090
Click **Next** to continue.
9191

92-
![Host Discovery Wizard Inventory page for AD General](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory.webp)
92+
![Host Discovery Wizard Inventory page for AD General](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory_4.webp)
9393

9494
**Step 5 –** On the Inventory page, the host inventory process can be automatically included with
9595
the discovery query.

docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/csv.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ option.
1313
it re-imports the host list. Therefore, deleting, renaming, or moving the import source file causes
1414
the query to fail.
1515

16-
![Host Discovery Wizard Source page for CSV import](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source.webp)
16+
![Host Discovery Wizard Source page for CSV import](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source_3.webp)
1717

1818
**Step 1 –** Open the Host Discovery Wizard. On the Source page, select the **Import from a CSV
1919
file** option on the Source page. Click **Next**.
@@ -78,7 +78,7 @@ Click **Next** to continue.
7878

7979
Click **Next** to continue.
8080

81-
![Host Discovery Wizard Inventory page for CSV import](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory.webp)
81+
![Host Discovery Wizard Inventory page for CSV import](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory_3.webp)
8282

8383
**Step 5 –** On the Inventory page, the host inventory process can be automatically included with
8484
the discovery query.

docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/ipnetwork.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Follow the steps to create a Host Discovery query using the Scan your IP network
1010
option scans a specified range of IP Addresses for active hosts and resolves the names of machines
1111
using DNS.
1212

13-
![Host Discovey Wizard Source page for IP network scan](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source.webp)
13+
![Host Discovey Wizard Source page for IP network scan](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/source_1.webp)
1414

1515
**Step 1 –** Open the Host Discovery Wizard. On the Source page, select the **Scan your IP network**
1616
option. Click **Next**.
@@ -99,7 +99,7 @@ Click **Next** to continue.
9999

100100
Click **Next** to continue.
101101

102-
![Host Discovey Wizard Inventory page for IP network scan](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory.webp)
102+
![Host Discovey Wizard Inventory page for IP network scan](/img/product_docs/accessanalyzer/12.0/admin/hostdiscovery/wizard/inventory_1.webp)
103103

104104
**Step 5 –** On the Inventory page, the host inventory process can be automatically included with
105105
the discovery query.

docs/accessanalyzer/12.0/admin/jobs/instantjobs/ad_passwordexpirationnotification.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,22 +39,22 @@ Navigate to the **Jobs** > **AD_PasswordExpirationNotification** > **Configure**
3939

4040
The default analysis tasks are:
4141

42-
- 1. User Password Information – Creates the PasswordExpirationNotification_Details table
42+
- **1. User Password Information** – Creates the PasswordExpirationNotification_Details table
4343
accessible under the job’s Results node
4444
- Contains a configurable parameter for the number of days until a password expires to be
4545
identified
4646
- See the
4747
[Customizable Analysis Tasks for the AD_PasswordExpirationNotification Job](#customizable-analysis-tasks-for-the-ad_passwordexpirationnotification-job)
4848
topic for additional information.
49-
- 2. Domain Summary – Creates an interim processing table in the database for use by downstream
49+
- **2. Domain Summary** – Creates an interim processing table in the database for use by downstream
5050
analysis and report generation
51-
- 3. Passwords Set to Expire Within 15 Days – Creates the
51+
- **3. Passwords Set to Expire Within 15 Days** – Creates the
5252
PasswordExpirationNotification_ExpiresWithin15Days table accessible under the job’s Results
5353
node
54-
- 4. Notification Data Table – Creates the
54+
- **4. Notification Data Table** – Creates the
5555
PasswordExpirationNotification_ExpiresWithin15Days_UserNotifications table accessible under
5656
the job’s Results node
57-
- 5. Help Desk Notification – Sends notification of users with passwords set to expire in X days
57+
- **5. Help Desk Notification** – Sends notification of users with passwords set to expire in X days
5858
- See the
5959
[Notification Analysis Task in the AD_PasswordExpirationNotification Job](#notification-analysis-task-in-the-ad_passwordexpirationnotification-job)
6060
topic for additional information.
@@ -70,7 +70,7 @@ Navigate to the **Jobs** > **AD_PasswordExpirationNotification** > **Configure**
7070

7171
The default actions are:
7272

73-
- 1. User Notification – Uses the SendMail Action Module to send notifications to users on
73+
- **1. User Notification** – Uses the SendMail Action Module to send notifications to users on
7474
password expiration
7575
- Requires the Notification Actions license feature
7676
- See the

docs/accessanalyzer/12.0/admin/jobs/instantjobs/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,9 @@ from the parent group, if any)** or **Specify individual hosts or hosts lists**
4141
option is selected, skip to Step 7. If the second option is selected, click **Next** to go to the
4242
Host Lists and Individual Hosts wizard pages.
4343

44-
| ![Host Lists page](/img/product_docs/accessanalyzer/12.0/admin/jobs/instantjobs/individualhosts.webp) |
45-
| ------------------------------------------------------------------------------------------------------------------------------------ | --- | ------------------------------------------------------------------------------------------------------------------------------------------------ |
46-
| Host Lists page | | Individual Hosts page |
44+
| ![Host Lists page](/img/product_docs/accessanalyzer/12.0/admin/jobs/instantjobs/hostlists.webp)| ![Individual Hosts page](/img/product_docs/accessanalyzer/12.0/admin/jobs/instantjobs/individualhosts.webp) |
45+
|:----------------------:|:-----------------------:|
46+
| Host Lists page | Individual Hosts page |
4747

4848
**Step 6 –** Some of the Library selections add a Host Lists, and Individual Hosts page. If these
4949
pages do not appear with the selection, skip to Step 7. If the pages do appear, check the host list

0 commit comments

Comments
 (0)