Skip to content

Commit ab6703a

Browse files
authored
Merge pull request #96 from netwrix/Ayesha/DM11.1-tables
DM 11.1 Tables cleanup
2 parents db1f8b8 + 085d3fb commit ab6703a

File tree

95 files changed

+329
-328
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+329
-328
lines changed

docs/directorymanager/11.1/APIs/commonerrors.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,12 @@ sidebar_position: 100
88

99
This section lists the errors common to all APIs.
1010

11-
| Sr. # | Error Code | Error | Description |
12-
| ----- | ---------- | --------------------- | ------------------------------------------- |
13-
| 1. | 400 | Bad request | Wrong parameters |
14-
| 2. | 401 | Unauthorized | Wrong or expired token |
15-
| 3. | 404 | Not found | The URL is incorrect or object is not found |
11+
| Sr. # | Error Code | Error | Description |
12+
| ----- | ---------- | -------------- | --------- |
13+
| 1. | 400 | Bad request | Wrong parameters |
14+
| 2. | 401 | Unauthorized | Wrong or expired token |
15+
| 3. | 404 | Not found | The URL is incorrect or object is not found |
1616
| 4. | 405 | Method not allowed | Wrong HTTP verb is used in the request |
1717
| 5. | 500 | Internal server error | An exception or error occurred in API |
1818
| 6. | 501 | Not implemented | Required function is not implemented by API |
19-
| 7. | 503 | Service unavailable | API service is not available |
19+
| 7. | 503 | Service unavailable | API service is not available |

docs/directorymanager/11.1/APIs/gettoken.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,14 +25,14 @@ Pass the parameters listed in the table in the request body using the following
2525
application/x-www-form-urlencoded
2626
```
2727

28-
| Name | Description |
29-
| ----------------- | ----------------------------------------------------------------------------------------------------------------------------------- |
30-
| grant_type | password |
31-
| username | Send the username against this parameter to access APIs |
32-
| password | Password of the user |
33-
| client_Id | Secret of Directory Manager API from the SVC.Client database table |
34-
| client_secret | Secret of Directory ManagerAPI from the SVC.Client database table |
35-
| identity_store_id | The ID of the identity store in which the user exists. You can get the identity store ID from the SVC.Identitystore database table. |
28+
| Name | Description |
29+
| ----------------- | ------------------------ |
30+
| grant_type | password |
31+
| username | Send the username against this parameter to access APIs |
32+
| password | Password of the user |
33+
| client_Id | Secret of Directory Manager API from the SVC.Client database table |
34+
| client_secret | Secret of Directory ManagerAPI from the SVC.Client database table |
35+
| identity_store_id | The ID of the identity store in which the user exists. <br />You can get the identity store ID from the SVC.Identitystore database table. |
3636

3737
#### Sample Response Syntax
3838

docs/directorymanager/11.1/credentialprovider/credentialprovider.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ the web page(s) where they can unlock their accounts and reset their passwords.
1717

1818
The Credential Provider package consists of:
1919

20-
| File and Folder Names | Type of file |
21-
| ---------------------------------------------------------- | -------------- |
22-
| NetwrixdirectorymanagerCredentialprovider.msi | Application |
23-
| CPSettings.xml (contains settings for Credential Provider) | File |
24-
| MST Guide | File folder |
25-
| 838060235bcd28bf40ef7532c50ee032.cab | Cab file |
26-
| a35cd6c9233b6ba3da66eecaa9190436.cab | Cab file |
27-
| fe38b2fd0d440e3c6740b626f51a22fc.cab | Cab file |
28-
| Orca-x86_en-us.msi | Orca installer |
29-
| readme.txt | .txt file |
20+
| File and Folder Names | Type of file |
21+
| ------------------ | -------------- |
22+
| NetwrixdirectorymanagerCredentialprovider.msi | Application |
23+
| CPSettings.xml (contains settings for Credential Provider) | File |
24+
| MST Guide | File folder |
25+
| 838060235bcd28bf40ef7532c50ee032.cab | Cab file |
26+
| a35cd6c9233b6ba3da66eecaa9190436.cab | Cab file |
27+
| fe38b2fd0d440e3c6740b626f51a22fc.cab | Cab file |
28+
| Orca-x86_en-us.msi | Orca installer |
29+
| readme.txt | .txt file |

docs/directorymanager/11.1/ssprportal/navigation.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,11 @@ portal supports.
1313

1414
The top right corner of the application displays the following:
1515

16-
| Icon | Description |
17-
| ------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
18-
| Help icon | Click it to launch the help pages for the SSPR portal. |
19-
| Profile icon | Displays your profile picture with your name and the identity store the portal is connected to. Click it to launch a menu that displays the Directory Manager version and the security role assigned to you in Directory Manager. The menu also displays the following options: - My Applcations – Opens the GroupID Applications page, that displays the Directory Manager clients that you have access to. See the [Access your Applications](/docs/directorymanager/11.1/admincenter/general/accessapplications.md) topic for additional information. - Enroll your account – The Your Enrollments page opens, where you can enroll the identity store account you used to sign into the portal. Tabs on this page represent the different authentication types the administrator has enabled for enrollment. See the [Enroll your identity store account](/docs/directorymanager/11.1/admincenter/general/enroll.md) topic for enrollment details, starting at step 3. - Change password – Enables you to change your identity store account password. See the[ Change your password](/docs/directorymanager/11.1/portal/user/manage/changepassword.md) topic for additional information. - Switch Account – Enables you to switch the account so as to access the portal with a different account. See the [Switch Accounts](/docs/directorymanager/11.1/admincenter/general/switchaccount.md) topic for additional information. - Sign Out – Click it to sign out of the SSPR portal. |
16+
| Icon | Description |
17+
| ------------ | ------------ |
18+
| Help icon | Click it to launch the help pages for the SSPR portal. |
19+
| Profile icon | Displays your profile picture with your name and the identity store the portal is connected to. Click it to launch a menu that displays the Directory Manager version and the security role assigned to you in Directory Manager. The menu also displays the following options: <ul><li>My Applcations – Opens the GroupID Applications page, that displays the Directory Manager clients that you have access to. See the [Access your Applications](/docs/directorymanager/11.1/admincenter/general/accessapplications.md) topic for additional information.</li><li>Enroll your account – The Your Enrollments page opens, where you can enroll the identity store account you used to sign into the portal. Tabs on this page represent the different authentication types the administrator has enabled for enrollment. See the [Enroll your identity store account](/docs/directorymanager/11.1/admincenter/general/enroll.md) topic for enrollment details, starting at step 3.</li><li>Change password – Enables you to change your identity store account password. See the[ Change your password](/docs/directorymanager/11.1/portal/user/manage/changepassword.md) topic for additional information.</li><li>Switch Account – Enables you to switch the account so as to access the portal with a different account. See the [Switch Accounts](/docs/directorymanager/11.1/admincenter/general/switchaccount.md) topic for additional information.</li><li>Sign Out – Click it to sign out of the SSPR portal.</li></ul> |
20+
2021

2122
## Portal Functions
2223

docs/threatprevention/7.5/admin/agents/agents-windows/loglevelconfiguration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -86,21 +86,21 @@ Console log files are stored on the machine where the respective console is inst
8686

8787
Log files are stored in the following locations:
8888

89-
Enterprise Manager Log Files
89+
**Enterprise Manager Log Files**
9090

9191
![Enterprise Manager Log File Location](/img/product_docs/threatprevention/7.5/admin/agents/window/emlogs.webp)
9292

9393
The default location is:
9494

95-
…\Netwrix\Netwrix Threat Prevention\SIEnterpriseManager\logs\
95+
**…\Netwrix\Netwrix Threat Prevention\SIEnterpriseManager\logs\**
9696

9797
Administration Console Log Files
9898

9999
![Administration Console Log File Location](/img/product_docs/threatprevention/7.5/admin/agents/window/consolelogs.webp)
100100

101101
The default location is:
102102

103-
…\Netwrix\Netwrix Threat Prevention\SIWinConsole\logs\
103+
**…\Netwrix\Netwrix Threat Prevention\SIWinConsole\logs\**
104104

105105
:::note
106106
Log files for a remote instance of the Administration Console are available at the same

docs/threatprevention/7.5/admin/analytics/baduseridsourcehost.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Configure the day limit to 30 days.
2727
| Trigger | Any number of failed authentication attempts using non-existing accounts made from a specific host |
2828
| Recommended Settings | Bad User ID (by source host) groups attacks by where failed authentication attempts by non-existing accounts are coming from to trigger analytic hits. The user-configurable parameter is based on time, where time is used to visualize how often an attempt is made to authenticate using a non-existing account from an individual system. <br />Netwrix recommends setting the default value to 30 days. If a failed authentication attempt using a non-existing account occurs from the same host after the 30 day time period, a new analytic hit will be produced rather than incrementing the previous hit count. |
2929

30-
Analytic Workflow
30+
**Analytic Workflow**
3131

3232
1. Configure the analytic policy
3333
2. Enable the analytic policy
@@ -52,7 +52,7 @@ The Configure Analytics window has two tabs:
5252
- Policy – Where filters can be added, additional actions configured, a custom schedule set, and the
5353
policy enabled
5454

55-
Settings Tab
55+
**Settings Tab**
5656

5757
![Bad User ID (by Source Host) Analytic Type - Settings tab](/img/product_docs/threatprevention/7.5/admin/analytics/baduseridsettings.webp)
5858

@@ -63,7 +63,7 @@ number of attempts through the limit of days set here, e.g. 30 days. After this
6363
elapsed from the first attempt, a new incident will be triggered for any additional attempt with a
6464
new count.
6565

66-
Policy Tab
66+
**Policy Tab**
6767

6868
![Bad User ID (by Source Host) Analytic Type - Policy tab](/img/product_docs/threatprevention/7.5/admin/analytics/policytab.webp)
6969

docs/threatprevention/7.5/admin/analytics/baduseriduser.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Configure the day limit to 30 days.
2727
| Trigger | Any number of failed authentication attempts made by a non-existing account |
2828
| Recommended Settings | Bad User ID (by user) groups attacks by account name where every new non-existing account will generate an analytic hit. The user-configurable parameter is based on time, where time is used to visualize how often an attempt is made to authenticate using the same non-existing account name. <br />Netwrix recommends setting the default value to 30 days. If an attempt to use that same non-existing account name occurs after the 30 day time period, a new analytic hit will be produced rather than incrementing the previous hit count. |
2929

30-
Analytic Workflow
30+
**Analytic Workflow**
3131

3232
1. Configure the analytic policy
3333
2. Enable the analytic policy
@@ -52,7 +52,7 @@ The Configure Analytics window has two tabs:
5252
- Policy – Where filters can be added, additional actions configured, a custom schedule set, and the
5353
policy enabled
5454

55-
Settings Tab
55+
**Settings Tab**
5656

5757
![Bad User ID (by User) Analytic Type - Settings tab](/img/product_docs/threatprevention/7.5/admin/analytics/baduseridsettings.webp)
5858

@@ -62,7 +62,7 @@ additional attempt for the same bad user account will be added to the total numb
6262
through the limit of days set here, e.g. 30 days. After this number of days has elapsed from the
6363
first attempt, a new incident will be triggered for any additional attempt with a new count.
6464

65-
Policy Tab
65+
**Policy Tab**
6666

6767
![Bad User ID (by User) Analytic Type - Policy tab](/img/product_docs/threatprevention/7.5/admin/analytics/policytab.webp)
6868

docs/threatprevention/7.5/admin/analytics/breachedpassword.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ successful authentication in the specified time frame.
1616
| Trigger | X failed authentication attempts from the same account followed by a successful authentication in Y hours |
1717
| Recommended Settings | Netwrix recommends configuring this analytic to trigger a hit if Threat Prevention monitors at least 30 failed authentication attempts from the same account followed by a successful authentication in 4 hours. |
1818

19-
Analytic Workflow
19+
**Analytic Workflow**
2020

2121
1. Configure the analytic policy
2222
2. Enable the analytic policy
@@ -41,7 +41,7 @@ The Configure Analytics window has two tabs:
4141
- Policy – Where filters can be added, additional actions configured, a custom schedule set, and the
4242
policy enabled
4343

44-
Settings Tab
44+
**Settings Tab**
4545

4646
![Breached Password Analytic Type - Settings tab](/img/product_docs/threatprevention/7.5/admin/analytics/breachedpasswordsettings.webp)
4747

@@ -55,7 +55,7 @@ triggered, an incident record is saved to the database along with the events tha
5555
incident. Raw authentication event data that did not contribute to an incident are purged from
5656
memory once they are more than 24 hours old.
5757

58-
Policy Tab
58+
**Policy Tab**
5959

6060
![Breached Password Analytic Type - Policy tab](/img/product_docs/threatprevention/7.5/admin/analytics/policytab.webp)
6161

docs/threatprevention/7.5/admin/analytics/bruteforceattacks.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ volume of event activity from monitoring all servers.
2222
| Trigger | X failed logins from a single host against a single host in Y minutes |
2323
| Recommended Settings | Configure this analytic to trigger a hit if Threat Prevention monitors at least 40 failed logins from a single host against a single host in 3 minutes. |
2424

25-
Analytic Workflow
25+
**Analytic Workflow**
2626

2727
1. Configure the analytic policy
2828
2. Enable the analytic policy
@@ -47,7 +47,7 @@ The Configure Analytics window has two tabs:
4747
- Policy – Where filters can be added, additional actions configured, a custom schedule set, and the
4848
policy enabled
4949

50-
Settings Tab
50+
**Settings Tab**
5151

5252
![Brute Force Attacks Analytic Type - Settings tab](/img/product_docs/threatprevention/7.5/admin/analytics/bruteforceattackssettings.webp)
5353

@@ -66,7 +66,7 @@ Click the **Configure Hosts** link to open the **Policy** > **Event Type** > **H
6666
If checked, the **Ignore failed logins for unresolved user names** option will exclude bad user IDs
6767
from contributing to Brute Force Attacks incidents.
6868

69-
Policy Tab
69+
**Policy Tab**
7070

7171
![Brute Force Attacks Analytic Type - Policy tab](/img/product_docs/threatprevention/7.5/admin/analytics/policytab.webp)
7272

docs/threatprevention/7.5/admin/analytics/concurrentlogins.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ the excessive volume of event activity from monitoring all.
2222
| Trigger | Successful and failed authentications using the same account from at least X hosts in Y minutes |
2323
| Recommended Settings | Netwrix recommends configuring this analytic to trigger a hit if Threat Prevention monitors either successful or failed authentications using the same account from at least 3 hosts in 1 hour. |
2424

25-
Analytic Workflow
25+
**Analytic Workflow**
2626

2727
1. Configure the analytic policy
2828
2. Enable the analytic policy
@@ -47,7 +47,7 @@ The Configure Analytics window has two tabs:
4747
- Policy – Where filters can be added, additional actions configured, a custom schedule set, and the
4848
policy enabled
4949

50-
Settings Tab
50+
**Settings Tab**
5151

5252
![Concurrent Logins Analytic Type - Settings tab](/img/product_docs/threatprevention/7.5/admin/analytics/concurrentloginssettings.webp)
5353

@@ -61,7 +61,7 @@ triggered, an incident record is saved to the database along with the events tha
6161
incident. Raw authentication event data that did not contribute to an incident are purged from
6262
memory once they are more than 24 hours old.
6363

64-
Policy Tab
64+
**Policy Tab**
6565

6666
![Concurrent Logins Analytic Type - Policy tab](/img/product_docs/threatprevention/7.5/admin/analytics/policytab.webp)
6767

0 commit comments

Comments
 (0)