Skip to content

Commit b65a533

Browse files
NEA and Changetracker index fixes
1 parent 86cd51a commit b65a533

File tree

16 files changed

+331
-353
lines changed

16 files changed

+331
-353
lines changed

docs/accessanalyzer/11.6/admin/settings/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,5 +85,5 @@ select a global setting to configure:
8585
- Creating a Storage Profiles requires Microsoft® SQL® Server information
8686

8787
See the
88-
[Getting Started](/docs/accessanalyzer/11.6/overview/gettingstarted.md) topic
88+
[Getting Started](/docs/accessanalyzer/11.6/gettingstarted.md) topic
8989
for additional information.

docs/accessanalyzer/11.6/overview/gettingstarted.md renamed to docs/accessanalyzer/11.6/gettingstarted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Getting Started"
33
description: "Getting Started"
4-
sidebar_position: 10
4+
sidebar_position: 2
55
---
66

77
# Getting Started

docs/accessanalyzer/11.6/index.md

Lines changed: 244 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,244 @@
1-
# Enterprise Auditor 11.6
1+
---
2+
title: "Netwrix Enterprise Auditor v11.6 Documentation"
3+
description: "Netwrix Enterprise Auditor v11.6 Documentation"
4+
sidebar_position: 1
5+
---
6+
7+
# Netwrix Enterprise Auditor v11.6 Documentation
8+
9+
Netwrix Enterprise Auditor automates the collection and analysis of the data you need to answer the
10+
most difficult questions you face in the management and security of dozens of critical IT assets,
11+
including data, directories, and systems.
12+
13+
The platform framework contains the following key components:
14+
15+
- Data Collection through Data Collectors
16+
- Analysis through Analysis Modules
17+
- Remediation through Action Modules
18+
- Reporting through Published Reports and the Web Console
19+
20+
Enterprise Auditor contains over 40 built-in data collection modules covering both on-premises and
21+
cloud-based platforms from Operating Systems to Office 365. Leveraging an agentless architectural
22+
approach, our proprietary AnyData collector provides an easy, wizard-driven interface for
23+
configuring the application to collect exactly the data needed, enabling fast, flawless,
24+
lightest-weight possible data collection from dozens of data sources.
25+
26+
## Instant Solutions Overview
27+
28+
There are several predefined instant solutions available with Enterprise Auditor. Each solution
29+
contains specific data collectors, jobs, analysis modules, action modules, and pre-created reports.
30+
A few solutions are core components available to all Enterprise Auditor users, but most solutions
31+
require a license.
32+
33+
### .Active Directory Inventory Solution
34+
35+
The .Active Directory Inventory Solution is designed to provide essential user, group membership,
36+
and computer details from the targeted domains to many Enterprise Auditor built-in solutions. Key
37+
information includes user status, user attributes, and group membership. The collected data is
38+
accessed by other Enterprise Auditor solutions and the Netwrix Access Information Center for
39+
analysis.
40+
41+
This is a core solution available to all Enterprise Auditor users.
42+
43+
See the
44+
[.Active Directory Inventory Solution](/docs/accessanalyzer/11.6/solutions/activedirectoryinventory/overview.md)
45+
topic for additional information.
46+
47+
### .Entra ID Inventory Solution
48+
49+
The .Entra ID Inventory Solution is designed to inventory, analyze, and report on Microsoft Entra
50+
ID. It provides essential user and group membership details to the Entra ID Solution. Key
51+
information includes managers, email addresses, and direct memberships. Collected data helps an
52+
organization identify toxic conditions like nested groups, circular nesting, disabled users, and
53+
duplicate groups. The user and group information assists with understanding probable group
54+
ownership, group memberships, largest groups, user status, attribute completion, and synchronization
55+
status between on-premises Active Directory and Microsoft Entra ID.
56+
57+
This is a core solution available to all Enterprise Auditor users.
58+
59+
See the
60+
[.Entra ID Inventory Solution](/docs/accessanalyzer/11.6/solutions/entraidinventory/overview.md)
61+
topic for additional information.
62+
63+
### .NIS Inventory Solution
64+
65+
The .NIS Inventory Solution is designed to provide essential user and group membership information
66+
from a NIS domain, mapping these principals to Windows-style SIDs. This provides valuable
67+
information to the File Systems Solution when auditing NFS shares.
68+
69+
This is a core solution available to all Enterprise Auditor users.
70+
71+
See the
72+
[.NIS Inventory Solution](/docs/accessanalyzer/11.6/solutions/nisinventory/overview.md)
73+
topic for additional information.
74+
75+
### Active Directory Solution
76+
77+
The Active Directory Solution is designed to provide the information every administrator needs
78+
regarding Active Directory configuration, operational management, troubleshooting, analyzing
79+
effective permissions, and tracking who is making what changes within your organization.
80+
81+
See the
82+
[Active Directory Solution](/docs/accessanalyzer/11.6/solutions/activedirectory/overview.md)
83+
topic for additional information.
84+
85+
### Active Directory Permissions Analyzer Solution
86+
87+
The Active Directory Permissions Analyzer Solution is designed to easily and automatically determine
88+
effective permissions applied to any and all Active Directory objects, at any scope, allowing for
89+
the most authoritative view available of who has access to what in Active Directory.
90+
91+
See the
92+
[Active Directory Permissions Analyzer Solution](/docs/accessanalyzer/11.6/solutions/activedirectorypermissionsanalyzer/overview.md)
93+
topic for additional information.
94+
95+
### Amazon Web Services Solution
96+
97+
Enterprise Auditor for AWS allows organizations to secure their data residing in Amazon Web Services
98+
(AWS) S3 platform, reducing their risk exposure through proactive, automated auditing and reporting
99+
of S3 permissions, sensitive data, and ultimately a consolidated view of user access rights across
100+
dozens of structured and unstructured data resources both on-premises and in the cloud.
101+
102+
See the
103+
[AWS Solution](/docs/accessanalyzer/11.6/solutions/aws/overview.md)
104+
topic for additional information.
105+
106+
### Entra ID Solution
107+
108+
The Entra ID Solution is a comprehensive set of audit jobs and reports that provide the information
109+
regarding Microsoft Entra ID configuration, operational management, and troubleshooting. The jobs
110+
within this group help pinpoint potential areas of administrative and security concerns related to
111+
Microsoft Entra ID users and groups, including syncing with on-premises Active Directory.
112+
113+
See the
114+
[Entra ID Solution](/docs/accessanalyzer/11.6/solutions/entraid/overview.md)
115+
topic for additional information.
116+
117+
### Box Solution
118+
119+
The Box solution set contains jobs to provide visibility into Box access rights, policies,
120+
configurations, activities, and more, ensuring you never lose sight or control of your critical
121+
assets residing in Box.
122+
123+
See the
124+
[Box Solution](/docs/accessanalyzer/11.6/solutions/box/overview.md)
125+
topic for additional information.
126+
127+
### Databases Solutions
128+
129+
Enterprise Auditor Databases Solution Set is a comprehensive set of pre-configured audit jobs and
130+
reports that provide visibility into various aspects of supported databases.
131+
132+
- Azure SQL – The Azure SQL Solution Set is a comprehensive set of pre-configured audit jobs and
133+
reports that provide visibility into various aspects of Azure SQL : Users and Roles, Sensitive
134+
Data Discovery, Object Permissions, Configuration, and User Activity.
135+
- Db2 – The Db2 Solution Set is a comprehensive set of pre-configured audit jobs and reports that
136+
provides visibility into various aspects of a Db2 Databases: Sensitive Data Discovery and Object
137+
Permissions.
138+
- Instance Discovery – The Instance Discovery Solution discovers instances on supported database
139+
servers.
140+
- MongoDB Solution – The MongoDB Solution automates the process of understanding where MongDB
141+
databases exist and provides an overview of the MongoDB environment in order to answer questions
142+
around data access. With visibility into every corner of MongoDB and the operating system it
143+
relies upon, organizations can proactively highlight and prioritize risks to sensitive data.
144+
Additionally, organizations can automate manual, time-consuming, and expensive processes
145+
associated with compliance, security, and operations to easily adhere to best practices that keep
146+
MongoDB Server safe and operational.
147+
- MySQL Solution – The MySQL Solution automates the process of understanding where SQL databases
148+
exist and provides an overview of the MySQL environment in order to answer questions around data
149+
access. With visibility into every corner of Microsoft SQL Server and the Windows operating system
150+
it relies upon, organizations can proactively highlight and prioritize risks to sensitive data.
151+
Additionally, organizations can automate manual, time-consuming, and expensive processes
152+
associated with compliance, security, and operations to easily adhere to best practices that keep
153+
SQL Server safe and operational.
154+
- Oracle Solution – The Oracle Solution delivers comprehensive permissions, activity, and sensitive
155+
data auditing and reporting for Oracle databases. Through the power of Enterprise Auditor, users
156+
can automate Oracle instance discovery, understand who has access to their Oracle databases, the
157+
level of permission they have, and who is leveraging their access privileges, identify the
158+
location of sensitive information, measure adherence to best practices, and generate workflows and
159+
reports to satisfy security, compliance, and operational requirements.
160+
- PostgreSQL Solution – Enterprise Auditor PostgreSQL Solution Set is a set of pre-configured audit
161+
jobs and reports that provides visibility into PostgreSQL Sensitive Data.
162+
- Redshift – Enterprise Auditor Redshift Solution Set is a set of pre-configured audit jobs and
163+
reports that provides visibility into Redshift Sensitive Data.
164+
- SQL Solution – The SQL Solution is an auditing, compliance, and governance solution for Microsoft
165+
SQL Server database. Key capabilities include effective access calculation, sensitive data
166+
discovery, security configuration assessment, and database activity monitoring.
167+
168+
See the
169+
[Databases Solutions](/docs/accessanalyzer/11.6/solutions/databases/overview.md)
170+
topic for additional information.
171+
172+
### Dropbox Solution
173+
174+
The Dropbox Solution is an auditing, compliance, and governance solution for Dropbox for Business.
175+
Key capabilities include effective access calculation, sensitive data discovery, file content
176+
inspection, inactive access and stale data identification, and entitlement collection for
177+
integration with Identity & Access Management (IAM) processes.
178+
179+
See the
180+
[Dropbox Solution](/docs/accessanalyzer/11.6/solutions/dropbox/overview.md)
181+
topic for additional information.
182+
183+
**NOTE:** Sensitive data auditing requires the Sensitive Data Discovery Add-on.
184+
185+
### Exchange Solution
186+
187+
The Exchange Solution provides auditing and reporting on multiple aspects of the Exchange
188+
environment to assist with identifying risk, understanding usage, and decreasing bloat. Areas of
189+
focus include Audit and Compliance, Maintenance and Cleanup, Metrics and Capacity, Operations and
190+
Health, Public Folders and Configuration Baseline.
191+
192+
See the
193+
[Exchange Solution](/docs/accessanalyzer/11.6/solutions/exchange/overview.md)
194+
topic for additional information.
195+
196+
**NOTE:** Sensitive data auditing requires the Sensitive Data Discovery Add-on.
197+
198+
### File Systems Solution
199+
200+
The File Systems Solution is an auditing, compliance, and governance solution for Windows, NAS,
201+
Unix, and Linux file systems. Key capabilities include effective access calculation, data owner
202+
identification, governance workflows including entitlement reviews and self-service access requests,
203+
sensitive data discovery and classification, open access remediation, least-privilege access
204+
transformation, and file activity monitoring.
205+
206+
See the
207+
[File System Solution](/docs/accessanalyzer/11.6/solutions/filesystem/overview.md)
208+
topic for additional information.
209+
210+
**NOTE:** Activity auditing requires the Activity Monitor. Sensitive data auditing requires the
211+
Sensitive Data Discovery Add-on.
212+
213+
### SharePoint Solution
214+
215+
The SharePoint Solution is a comprehensive set of audit jobs and reports which provide the
216+
information every administrator needs regarding SharePoint on-premises and SharePoint Online
217+
infrastructure, configuration, performance, permissions, required ports, and effective rights.
218+
219+
See the
220+
[SharePoint Solution](/docs/accessanalyzer/11.6/solutions/sharepoint/overview.md)
221+
topic for additional information.
222+
223+
**NOTE:** Sensitive data auditing requires the Sensitive Data Discovery Add-on.
224+
225+
### Unix Solution
226+
227+
The Unix Solution reports on areas of administrative concern for Unix and Linux systems. Attention
228+
is given to users and group details, privileged access rights, and NFS and Samba sharing
229+
configurations.
230+
231+
See the
232+
[Unix Solution](/docs/accessanalyzer/11.6/solutions/unix/overview.md)
233+
topic for additional information.
234+
235+
### Windows Solution
236+
237+
The Windows Solution allows organizations to quickly inventory, assess, and secure their Windows
238+
desktop and server infrastructure from a central location. Key capabilities include privileged
239+
account discovery, security configuration and vulnerability assessment, compliance reporting, and
240+
asset inventory.
241+
242+
See the
243+
[Windows Solution](/docs/accessanalyzer/11.6/solutions/windows/overview.md)
244+
topic for additional information.

docs/accessanalyzer/11.6/install/application/firstlaunch.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,5 +126,5 @@ topic for more information about logs.
126126
The Enterprise Auditor Console is now ready for custom configuration and use. There are a few
127127
additional steps to complete in order to begin collecting data, such as configuring a Connection
128128
Profile and a Schedule Service account as well as discovering hosts and setting up host lists. See
129-
the [Getting Started](/docs/accessanalyzer/11.6/overview/gettingstarted.md)
129+
the [Getting Started](/docs/accessanalyzer/11.6/gettingstarted.md)
130130
topic for additional information.

docs/accessanalyzer/11.6/install/application/upgrade/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The purpose of this document is to provide the basic steps needed for upgrading
2020
and the stock solutions. Contact [Netwrix Support](https://www.netwrix.com/support.html) for
2121
additional information.
2222

23-
See the [What's New](/docs/accessanalyzer/11.6/overview/whatsnew.md) topic for
23+
See the [What's New](/docs/accessanalyzer/11.6/whatsnew.md) topic for
2424
release information.
2525

2626
## Considerations

docs/accessanalyzer/11.6/install/sensitivedatadiscovery/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This topic provides information on the installation and upgrade processes of the
1616
Discovery Add-On. For information on the required prerequisites, see the Server Requirements topic.
1717

1818
The version of the SharePoint Agent must also match the major version of Enterprise Auditor. See the
19-
[What's New](/docs/accessanalyzer/11.6/overview/whatsnew.md) topic for release
19+
[What's New](/docs/accessanalyzer/11.6/whatsnew.md) topic for release
2020
information.
2121

2222
## Supported Platforms

docs/accessanalyzer/11.6/install/sharepointagent/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ For information on the required prerequisites and permissions, see the
1919
topic.
2020

2121
The version of the SharePoint Agent must also match the major version of Enterprise Auditor. See the
22-
[What's New](/docs/accessanalyzer/11.6/overview/whatsnew.md) topic for
22+
[What's New](/docs/accessanalyzer/11.6/whatsnew.md) topic for
2323
additional information.
2424

2525
## Supported Platforms

docs/accessanalyzer/11.6/overview/_category_.json

Lines changed: 0 additions & 10 deletions
This file was deleted.

0 commit comments

Comments
 (0)