diff --git a/docs/auditor/10.6/index.md b/docs/auditor/10.6/index.md index ddf1daeaf5..b62f2efab4 100644 --- a/docs/auditor/10.6/index.md +++ b/docs/auditor/10.6/index.md @@ -1 +1,46 @@ -# Auditor 10.6 +--- +title: "Netwrix Auditor v10.6 Documentation" +description: "Netwrix Auditor v10.6 Documentation" +sidebar_position: 1 +--- + +# Netwrix Auditor v10.6 Documentation + +Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables +control over changes, configurations and access in hybrid IT environments to protect data regardless +of its location. The platform provides security analytics to detect anomalies in user behavior and +investigate threat patterns before a data breach occurs. + +Netwrix Auditor includes applications for: + +- Active Directory +- Active Directory Federation Services +- Microsoft Entra ID +- Exchange +- Microsoft 365 +- Windows file servers +- Dell Data Storage devices +- NetApp filer appliances +- Nutanix Files +- Network Devices +- SharePoint +- Oracle Database +- SQL Server +- VMware +- Windows Server +- User Activity + +Empowered with a RESTful API, the platform delivers visibility and control across all of your +on-premises or cloud-based IT systems in a unified way. + +Major benefits: + +- Detect insider threats on premises and in the cloud +- Pass compliance audits with less effort and expense +- Increase productivity of IT security and operations teams + +To learn how Netwrix Auditor can help you achieve your specific business objectives, refer to the +[Netwrix Auditor Best Practices Guide](https://helpcenter.netwrix.com/bundle/Auditor_BestPractices_10.0/resource/NetwrixAuditor_BestPractices_10.0.pdf). + +**CAUTION:** To keep your systems safe, Auditor should not be exposed to inbound access from the +internet. diff --git a/docs/auditor/10.6/overview/_category_.json b/docs/auditor/10.6/overview/_category_.json index d506eba5c8..ff379f3cc2 100644 --- a/docs/auditor/10.6/overview/_category_.json +++ b/docs/auditor/10.6/overview/_category_.json @@ -1,10 +1,10 @@ { - "label": "Netwrix Auditor v10.6 Documentation", + "label": "Getting Started", "position": 10, "collapsed": true, "collapsible": true, "link": { "type": "doc", - "id": "overview" + "id": "gettingstarted" } } \ No newline at end of file diff --git a/docs/auditor/10.6/overview/overview.md b/docs/auditor/10.6/overview/overview.md deleted file mode 100644 index 29b92a3793..0000000000 --- a/docs/auditor/10.6/overview/overview.md +++ /dev/null @@ -1,46 +0,0 @@ ---- -title: "Netwrix Auditor v10.6 Documentation" -description: "Netwrix Auditor v10.6 Documentation" -sidebar_position: 10 ---- - -# Netwrix Auditor v10.6 Documentation - -Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables -control over changes, configurations and access in hybrid IT environments to protect data regardless -of its location. The platform provides security analytics to detect anomalies in user behavior and -investigate threat patterns before a data breach occurs. - -Netwrix Auditor includes applications for: - -- Active Directory -- Active Directory Federation Services -- Microsoft Entra ID -- Exchange -- Microsoft 365 -- Windows file servers -- Dell Data Storage devices -- NetApp filer appliances -- Nutanix Files -- Network Devices -- SharePoint -- Oracle Database -- SQL Server -- VMware -- Windows Server -- User Activity - -Empowered with a RESTful API, the platform delivers visibility and control across all of your -on-premises or cloud-based IT systems in a unified way. - -Major benefits: - -- Detect insider threats on premises and in the cloud -- Pass compliance audits with less effort and expense -- Increase productivity of IT security and operations teams - -To learn how Netwrix Auditor can help you achieve your specific business objectives, refer to the -[Netwrix Auditor Best Practices Guide](https://helpcenter.netwrix.com/bundle/Auditor_BestPractices_10.0/resource/NetwrixAuditor_BestPractices_10.0.pdf). - -**CAUTION:** To keep your systems safe, Auditor should not be exposed to inbound access from the -internet.