diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/_category_.json b/docs/passwordpolicyenforcer/11.0/admin/_category_.json similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/_category_.json rename to docs/passwordpolicyenforcer/11.0/admin/_category_.json diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/administration_overview.md b/docs/passwordpolicyenforcer/11.0/admin/administration_overview.md similarity index 94% rename from docs/passwordpolicyenforcer/11.0/administration-overview/administration_overview.md rename to docs/passwordpolicyenforcer/11.0/admin/administration_overview.md index d8de90d7b7..50074e2e96 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/administration_overview.md +++ b/docs/passwordpolicyenforcer/11.0/admin/administration_overview.md @@ -19,7 +19,7 @@ not jeopardize network security. You can also use Password Policy Enforcer to ensure that passwords are compatible with other systems, and to synchronize passwords with other networks and applications. -**NOTE:** The [Evaluate Password Policy Enforcer](/docs/passwordpolicyenforcer/11.0/evaluation-overview/evaluation_overview.md) contains +**NOTE:** The [Evaluate Password Policy Enforcer](/docs/passwordpolicyenforcer/11.0/evaluation/evaluation_overview.md) contains step-by-step instructions to help you quickly install, configure, and evaluate Password Policy Enforcer. Consider using the Evaluation Guide if you are using Password Policy Enforcer for the first time, prior to installing and deploying on your domains. diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/_category_.json b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/_category_.json similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/_category_.json rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/_category_.json diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdconnectppe.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdconnectppe.md similarity index 85% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdconnectppe.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdconnectppe.md index 0620813363..04c9ae1837 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdconnectppe.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdconnectppe.md @@ -28,7 +28,7 @@ Connect to PPE Server installed locally. Can also use **-L** or **-l**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and **OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +[about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdcopyppepolicy.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdcopyppepolicy.md similarity index 80% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdcopyppepolicy.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdcopyppepolicy.md index 0bdc87ff51..adc94781e8 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdcopyppepolicy.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdcopyppepolicy.md @@ -27,8 +27,7 @@ Destination PPE Policy Name. Can also use **-D** or **-d**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdexportppeconfig.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdexportppeconfig.md similarity index 78% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdexportppeconfig.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdexportppeconfig.md index a7929603a1..289cf0fdf9 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdexportppeconfig.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdexportppeconfig.md @@ -22,8 +22,7 @@ Name of the file to create. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdexportppepolicy.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdexportppepolicy.md similarity index 83% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdexportppepolicy.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdexportppepolicy.md index ebe6f23730..4384bdb977 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdexportppepolicy.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdexportppepolicy.md @@ -29,8 +29,7 @@ Name of the file to create. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppebulkpasswordtest.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppebulkpasswordtest.md similarity index 86% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppebulkpasswordtest.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppebulkpasswordtest.md index 0ca624a581..ef2c19fe99 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppebulkpasswordtest.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppebulkpasswordtest.md @@ -33,8 +33,7 @@ The folder for the created html report. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeconfigreport.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeconfigreport.md similarity index 82% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeconfigreport.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeconfigreport.md index db354c5f2f..0c653ed816 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeconfigreport.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeconfigreport.md @@ -25,8 +25,7 @@ Name of the folder to save the report. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppedefaultpolicy.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppedefaultpolicy.md similarity index 74% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppedefaultpolicy.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppedefaultpolicy.md index 77edf0df0b..a1749d2981 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppedefaultpolicy.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppedefaultpolicy.md @@ -18,8 +18,7 @@ PARAMETERS This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeenabled.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeenabled.md similarity index 72% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeenabled.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeenabled.md index 83d95d50e2..1a2d8c242c 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeenabled.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeenabled.md @@ -18,8 +18,7 @@ PARAMETERS This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppehelp.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppehelp.md similarity index 85% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppehelp.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppehelp.md index cea8556678..8505700f0b 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppehelp.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppehelp.md @@ -23,8 +23,7 @@ Name of the cmdlet for help. Can also use **-C** or **-c**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppelicenseinfo.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppelicenseinfo.md similarity index 87% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppelicenseinfo.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppelicenseinfo.md index 96042b8e27..cc370fe8a0 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppelicenseinfo.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppelicenseinfo.md @@ -18,8 +18,7 @@ PARAMETERS This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepasswordtest.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepasswordtest.md similarity index 88% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepasswordtest.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepasswordtest.md index ae819adbd3..85c549fb4a 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepasswordtest.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepasswordtest.md @@ -31,8 +31,7 @@ The old password to test. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepolicies.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepolicies.md similarity index 73% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepolicies.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepolicies.md index 74d2df619e..94a7973e98 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepolicies.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepolicies.md @@ -18,8 +18,7 @@ PARAMETERS This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepolicyenabled.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepolicyenabled.md similarity index 78% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepolicyenabled.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepolicyenabled.md index 7a831c4ff2..08c960cc65 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepolicyenabled.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepolicyenabled.md @@ -23,8 +23,7 @@ Name of the policy. Can also use **-P** or **-p**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeserverversion.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeserverversion.md similarity index 81% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeserverversion.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeserverversion.md index 117af5b55b..612a4bae01 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeserverversion.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeserverversion.md @@ -27,8 +27,7 @@ Connect to PPE Server installed locally. Can also use **-L** or **-l**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeversion.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeversion.md similarity index 72% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeversion.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeversion.md index 57a5f654bf..1bbfb9d55e 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeversion.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeversion.md @@ -18,8 +18,7 @@ PARAMETERS This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdimportppeconfig.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdimportppeconfig.md similarity index 80% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdimportppeconfig.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdimportppeconfig.md index f3a5710cbc..5600814e21 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdimportppeconfig.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdimportppeconfig.md @@ -25,8 +25,8 @@ Name of the configuration file. Can also use **-F** or **-f**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see +[about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdimportppepolicy.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdimportppepolicy.md similarity index 80% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdimportppepolicy.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdimportppepolicy.md index 10082824c0..049e03e9da 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdimportppepolicy.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdimportppepolicy.md @@ -25,8 +25,7 @@ Name of the policy file. Can also use **-F** or **-f**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdlets.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdlets.md new file mode 100644 index 0000000000..531d137eec --- /dev/null +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdlets.md @@ -0,0 +1,53 @@ +--- +title: "PPE cmdlets" +description: "PPE cmdlets" +sidebar_position: 60 +--- + +# PPE cmdlets + +The PPE Cmdlets are available to manage Password Policy Enforcer from a Windows PowerShell. The +cmdlets are not case-sensitive. + +To establish the connection: + +**Step 1 –** Open a Windows PowerShell. Some cmdlets require administrative permissions. You can use +the **Run as Administrator** option. + +**Step 2 –** Import the PPE cmdlets module: +**Import-Module "C:\Program Files\Password Policy Enforcer\PS\PPEConf.PowerShell.dll"** + +**Step 3 –** Connect to your domain: +**Connect-PPE -d "_domain_"** where _domain_ is the full name of your domain controller. +**NT-DC03.NWXTECH.COM** in this example. + +**Get-PPEHelp** with no parameters, displays a list of available cmdlets. Use the PowerShell +**get-help** _Cmdlet_ for information about the cmdlet. + +![PPE cmdlets Connect](/img/product_docs/passwordpolicyenforcer/11.0/administration/cmdletconnect.webp) + +Click a PPE cmdlet name for details. + +- [Connect-PPE](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdconnectppe.md) +- [Copy-PPEPolicy](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdcopyppepolicy.md) +- [Export-PPEConfig](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdexportppeconfig.md) +- [Export-PPEPolicy](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdexportppepolicy.md) +- [Get-PPEBulkPasswordTest](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppebulkpasswordtest.md) +- [Get-PPEConfigReport](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeconfigreport.md) +- [Get-PPEDefaultPolicy](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppedefaultpolicy.md) +- [Get-PPEEnabled](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeenabled.md) +- [Get-PPEHelp](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppehelp.md) +- [Get-PPELicenseInfo](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppelicenseinfo.md) +- [Get-PPEPasswordTest](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepasswordtest.md) +- [Get-PPEPolicies](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepolicies.md) +- [Get-PPEPolicyEnabled](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppepolicyenabled.md) +- [Get-PPEServerVersion](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeserverversion.md) +- [Get-PPEVersion](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdgetppeversion.md) +- [Import-PPEConfig](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdimportppeconfig.md) +- [Import-PPEPolicy](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdimportppepolicy.md) +- [Remove-PPEPolicy](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdremoveppepolicy.md) +- [Set-PPEDefaultPolicy](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppedefaultpolicy.md) +- [Set-PPEEnabled](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppeenabled.md) +- [Set-PPEPolicyEnabled](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppepolicyenabled.md) +- [Start-PPECompromisedPasswordChecker](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdstartppecompromisedpasswordchecker.md) +- [Start-PPEHibpUpdater](/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdstartppehibpupdater.md) diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdremoveppepolicy.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdremoveppepolicy.md similarity index 76% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdremoveppepolicy.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdremoveppepolicy.md index 9d3ef6c6e3..46289d7d17 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdremoveppepolicy.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdremoveppepolicy.md @@ -22,8 +22,7 @@ Name of the policy. Can also use **-P** or **-p**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppedefaultpolicy.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppedefaultpolicy.md similarity index 78% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppedefaultpolicy.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppedefaultpolicy.md index 5c73cb5142..1d7ea6b7ad 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppedefaultpolicy.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppedefaultpolicy.md @@ -22,8 +22,7 @@ Name of the policy. Can also use **-P** or **-p**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppeenabled.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppeenabled.md similarity index 79% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppeenabled.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppeenabled.md index 04a05837c9..c52cd347f8 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppeenabled.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppeenabled.md @@ -23,8 +23,7 @@ or **-e**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLES diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppepolicyenabled.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppepolicyenabled.md similarity index 82% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppepolicyenabled.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppepolicyenabled.md index 2a4d13794a..35979a8fa8 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppepolicyenabled.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdsetppepolicyenabled.md @@ -29,8 +29,7 @@ or **-e**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLES diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdstartppecompromisedpasswordchecker.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdstartppecompromisedpasswordchecker.md similarity index 76% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdstartppecompromisedpasswordchecker.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdstartppecompromisedpasswordchecker.md index 0ae6243e31..bc9291c639 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdstartppecompromisedpasswordchecker.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdstartppecompromisedpasswordchecker.md @@ -19,8 +19,7 @@ PARAMETERS This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdstartppehibpupdater.md b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdstartppehibpupdater.md similarity index 87% rename from docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdstartppehibpupdater.md rename to docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdstartppehibpupdater.md index f82495daac..681d461b37 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdstartppehibpupdater.md +++ b/docs/passwordpolicyenforcer/11.0/admin/cmdlets/cmdstartppehibpupdater.md @@ -38,8 +38,7 @@ File with list of NTLM hashes. Can also use **-S** or **-s**. This cmdlet supports the common parameters: **Verbose**, **Debug**, **ErrorAction**, **ErrorVariable**, **WarningAction**, **WarningVariable**, **OutBuffer**, **PipelineVariable**, and -**OutVariable**. For more information, see about_CommonParameters -[https:/go.microsoft.com/fwlink/?LinkID=113216](https:/go.microsoft.com/fwlink?linkid=113216). +**OutVariable**. For more information, see [about_CommonParameters](https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_commonparameters?view=powershell-7.5). EXAMPLE diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/command_line_interface.md b/docs/passwordpolicyenforcer/11.0/admin/command_line_interface.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/command_line_interface.md rename to docs/passwordpolicyenforcer/11.0/admin/command_line_interface.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/compromisedpasswordcheck.md b/docs/passwordpolicyenforcer/11.0/admin/compromisedpasswordcheck.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/compromisedpasswordcheck.md rename to docs/passwordpolicyenforcer/11.0/admin/compromisedpasswordcheck.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/configconsole.md b/docs/passwordpolicyenforcer/11.0/admin/configconsole.md similarity index 94% rename from docs/passwordpolicyenforcer/11.0/administration-overview/configconsole.md rename to docs/passwordpolicyenforcer/11.0/admin/configconsole.md index adfd4cf78d..a679db31ac 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/configconsole.md +++ b/docs/passwordpolicyenforcer/11.0/admin/configconsole.md @@ -29,9 +29,9 @@ Enforcer. In addition, there are tiles to access Password Policy Enforcer major features: -- [Manage Policies](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/manage_policies.md) -- [Compromised Password Check](/docs/passwordpolicyenforcer/11.0/administration-overview/compromisedpasswordcheck.md) -- [System Audit and Support](/docs/passwordpolicyenforcer/11.0/administration-overview/systemaudit.md) - Version Tracker, Support Tools, Property Editor +- [Manage Policies](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/manage_policies.md) +- [Compromised Password Check](/docs/passwordpolicyenforcer/11.0/admin/compromisedpasswordcheck.md) +- [System Audit and Support](/docs/passwordpolicyenforcer/11.0/admin/systemaudit.md) - Version Tracker, Support Tools, Property Editor See the specific topics for details. @@ -125,11 +125,11 @@ Here are the default settings. - Minimum Age rule is never enforced during a reset. - History rule is enforced if this option is selected and the **Enforce this rule when a - password is reset** option is selected on the [History Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/history_rule.md) Properties. + password is reset** option is selected on the [History Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/history_rule.md) Properties. - **Accept encrypted client request only** specifies requests from Password Policy Client, Netwrix Password Reset and Password Policy/Web must be encrypted. Client requests do not contain passwords - or password hashes. See the [Password Policy Client](/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md) topic for + or password hashes. See the [Password Policy Client](/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md) topic for additional information. Default is checked. - **Log event when password not checked by service** adds an entry to the Windows Application Event Log whenever it accepts a password without checking it. Default is checked. This can occur if: @@ -157,7 +157,7 @@ Here are the default settings. - An event is only logged if the Password Policy Enforcer Client version is 9.0 or later. If a password is rejected by the Password Policy Server, then the event is logged. - Client logged events only show the local rules the password violated. For example, the - Compromised rule is only enforced by the Password Policy Server. See the [Rules](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md) + Compromised rule is only enforced by the Password Policy Server. See the [Rules](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md) topic for additional information. - Client rejections can be lost or duplicated if there are communication issues between the Password Policy Client and Password Policy Server. diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/_category_.json b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/_category_.json similarity index 81% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/_category_.json rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/_category_.json index 414e42eecc..eed0fd644e 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/_category_.json +++ b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/_category_.json @@ -1,5 +1,5 @@ { - "label": "Manage Policies", + "label": "Policies", "position": 20, "collapsed": true, "collapsible": true, diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/manage_policies.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/manage_policies.md similarity index 91% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/manage_policies.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/manage_policies.md index 7f74260c03..74a722a31e 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/manage_policies.md +++ b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/manage_policies.md @@ -8,7 +8,7 @@ sidebar_position: 20 Netwrix Password Policy Enforcer can enforce up to 256 different password policies. You can assign policies to users directly, or indirectly through Active Directory security groups and containers -(Organizational Units). See the [Assign Policies to Users & Groups](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/usersgroups.md) topic for +(Organizational Units). See the [Assign Policies to Users & Groups](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/usersgroups.md) topic for additional information. Open the Configuration Console: @@ -97,16 +97,16 @@ most popular regulatory frameworks. Once you add a policy, it needs to be set up or reviewed if you used a template. Click on the policy name to edit the policy. For each policy: -- Set up [Rules](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md). -- [Assign Policies to Users & Groups](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/usersgroups.md). -- Enable the use of an optional [Passphrase](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/passphrases.md). -- Set up [Policy Properties](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/policy_properties.md). -- Set up [Messages](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/messages.md) for your users. +- Set up [Rules](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md). +- [Assign Policies to Users & Groups](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/usersgroups.md). +- Enable the use of an optional [Passphrase](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/passphrases.md). +- Set up [Policy Properties](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/policy_properties.md). +- Set up [Messages](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/messages.md) for your users. ## Test Policy Launches the Test policy tool in a separate window. You can test **By user** and by **Password bulk -test**. See the [Test Policy](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/testpolicy.md) topic for additional information. +test**. See the [Test Policy](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/testpolicy.md) topic for additional information. ## Set Priorities @@ -118,7 +118,7 @@ priorities** to save the new order. ### Policy Selection Flowchart This flowchart shows how Password Policy Enforcer determines a policy for each user. Use the -[Test Policy](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/testpolicy.md) tool to quickly determine which policy Password Policy Enforcer is +[Test Policy](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/testpolicy.md) tool to quickly determine which policy Password Policy Enforcer is enforced for a particular user. ![managing_policies](/img/product_docs/passwordpolicyenforcer/11.0/administration/managing_policies.webp) diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/messages.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/messages.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/messages.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/messages.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/passphrases.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/passphrases.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/passphrases.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/passphrases.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/policy_properties.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/policy_properties.md similarity index 95% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/policy_properties.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/policy_properties.md index e92bffd545..5b485d666e 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/policy_properties.md +++ b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/policy_properties.md @@ -47,10 +47,10 @@ Select the number of rules for **Passwords must comply with** from the drop-down the required compliance level for this policy. The default value **(all the rules**) requires users to comply with all enabled rules. Choose an alternative option if Password Policy Enforcer should enforce a more lenient password policy. The Minimum Age and Maximum Age rules are excluded from -compliance level calculations. See the [Rules](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md) topic for additional information. +compliance level calculations. See the [Rules](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md) topic for additional information. When setting the compliance level, consider that some rules may be disabled when a user enters a -passphrase. See the [Passphrase](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/passphrases.md) topic for additional information. Password Policy +passphrase. See the [Passphrase](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/passphrases.md) topic for additional information. Password Policy Enforcer accepts passphrases that comply with all enabled rules, irrespective of the compliance level. This ensures that passphrases can be used, even if they do not meet the compliance level when Password Policy Enforcer is configured to disable one or more rules for passphrases. diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/_category_.json b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/_category_.json similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/_category_.json rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/_category_.json diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/character_rules.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/character_rules.md similarity index 97% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/character_rules.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/character_rules.md index 24263dc659..9683f878cc 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/character_rules.md +++ b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/character_rules.md @@ -16,7 +16,7 @@ All the Character rules work identically, but each has their own default charact set is the collection of characters that each rule searches for when checking a password. You can use the Character rules with their default character sets, or define your own. By default, the Password Policy Enforcer selects the Password Policy Enforcer character on the -[Set Priorities](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/manage_policies.md#set-priorities) page. +[Set Priorities](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/manage_policies.md#set-priorities) page. **NOTE:** Only Password Policy Enforcer 11 and higher will contain the Windows character set. Password Policy Enforcer 9, Netwrix Password Reset3 and Password Policy Enforcer Web 7 (and older diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/complexity_rule.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/complexity_rule.md similarity index 94% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/complexity_rule.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/complexity_rule.md index 6fb0b7a9c0..61f1713751 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/complexity_rule.md +++ b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/complexity_rule.md @@ -22,7 +22,7 @@ greater than the number of required character sets. Select the **Passwords must always comply with this rule** check box to make the Complexity rule mandatory. Password Policy Enforcer rules are mandatory by default, but can be made optional by changing the Reject passwords that do not comply with value in the Policy Properties page. A -mandatory rule can still be disabled when a passphrase is used. See the [Passphrase](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/passphrases.md) +mandatory rule can still be disabled when a passphrase is used. See the [Passphrase](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/passphrases.md) topic for additional information. **NOTE:** The Complexity rule uses custom character set definitions from the Character rules, even diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/compromised_rule.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/compromised_rule.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/compromised_rule.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/compromised_rule.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/dictionary_rule.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/dictionary_rule.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/dictionary_rule.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/dictionary_rule.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/history_rule.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/history_rule.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/history_rule.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/history_rule.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/length_rule.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/length_rule.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/length_rule.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/length_rule.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/maximum_age_rule.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/maximum_age_rule.md similarity index 98% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/maximum_age_rule.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/maximum_age_rule.md index 105428a766..0e38321617 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/maximum_age_rule.md +++ b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/maximum_age_rule.md @@ -107,5 +107,5 @@ The email's subject and body can contain various macros. Use these macros to per ### Set up SMTP -Opens the Notification settings. See the [Configuration Console](/docs/passwordpolicyenforcer/11.0/administration-overview/configconsole.md) topic for +Opens the Notification settings. See the [Configuration Console](/docs/passwordpolicyenforcer/11.0/admin/configconsole.md) topic for additional details. diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/minimum_age_rule.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/minimum_age_rule.md similarity index 92% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/minimum_age_rule.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/minimum_age_rule.md index eedbc3b561..3d887ec3b7 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/minimum_age_rule.md +++ b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/minimum_age_rule.md @@ -19,7 +19,7 @@ Select the number of days before a user can change their password. password; they must wait until the required number of days has elapsed. The Password Policy Client consequently handles rejections by this rule differently to other rules. Rather than displaying the usual message components, the Password Policy Client only displays the Minimum Age rule's Reason -insert. See [Password Policy Client](/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md) topic for additional information. +insert. See [Password Policy Client](/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md) topic for additional information. The Rejection Reason template, macros, and inserts from other rules are not displayed when a password change is denied by the Minimum Age rule. diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/patterns.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/patterns.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/patterns.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/patterns.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/repetition.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/repetition.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/repetition.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/repetition.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md similarity index 80% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md index fdd27ab53a..073f3ec247 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md +++ b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md @@ -31,18 +31,18 @@ logging** on the **Test Policy** window to see which rules you have tested. Rules: -- [Age (Max) Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/maximum_age_rule.md) -- [Age (Min) Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/minimum_age_rule.md) -- [Characters (Complexity) Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/complexity_rule.md) -- [Character (Granular) Rules](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/character_rules.md) -- [Compromised Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/compromised_rule.md) -- [Dictionary Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/dictionary_rule.md) -- [History Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/history_rule.md) -- [Length Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/length_rule.md) -- [Patterns Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/patterns.md) -- [Repetition Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/repetition.md) -- [Similarity Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/similarity_rule.md) -- [Unique Characters Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/unique_characters.md) +- [Age (Max) Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/maximum_age_rule.md) +- [Age (Min) Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/minimum_age_rule.md) +- [Characters (Complexity) Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/complexity_rule.md) +- [Character (Granular) Rules](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/character_rules.md) +- [Compromised Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/compromised_rule.md) +- [Dictionary Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/dictionary_rule.md) +- [History Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/history_rule.md) +- [Length Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/length_rule.md) +- [Patterns Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/patterns.md) +- [Repetition Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/repetition.md) +- [Similarity Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/similarity_rule.md) +- [Unique Characters Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/unique_characters.md) ## Detecting Character Substitution diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/similarity_rule.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/similarity_rule.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/similarity_rule.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/similarity_rule.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/unique_characters.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/unique_characters.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/unique_characters.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/unique_characters.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/testpolicy.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/testpolicy.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/testpolicy.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/testpolicy.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/usersgroups.md b/docs/passwordpolicyenforcer/11.0/admin/manage-policies/usersgroups.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/usersgroups.md rename to docs/passwordpolicyenforcer/11.0/admin/manage-policies/usersgroups.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/_category_.json b/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/_category_.json similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/_category_.json rename to docs/passwordpolicyenforcer/11.0/admin/password-policy-client/_category_.json diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/configuring_the_password_policy_client.md b/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/configuring_the_password_policy_client.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/configuring_the_password_policy_client.md rename to docs/passwordpolicyenforcer/11.0/admin/password-policy-client/configuring_the_password_policy_client.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md b/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md similarity index 86% rename from docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md rename to docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md index 627e94c3d0..5ff360b3f1 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md +++ b/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md @@ -10,7 +10,7 @@ The Password Policy Client helps users to choose a compliant password. Detailed provided if their new password is rejected. The Password Policy Client is optional. If it is not installed, the -[Similarity Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/similarity_rule.md) can not be enforced. Users only see the default Windows error +[Similarity Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/similarity_rule.md) can not be enforced. Users only see the default Windows error message if their password is rejected, not the detailed help they receive from the Password Policy Client. diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/ppe_tool.md b/docs/passwordpolicyenforcer/11.0/admin/ppe_tool.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/ppe_tool.md rename to docs/passwordpolicyenforcer/11.0/admin/ppe_tool.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/systemaudit.md b/docs/passwordpolicyenforcer/11.0/admin/systemaudit.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/systemaudit.md rename to docs/passwordpolicyenforcer/11.0/admin/systemaudit.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/troubleshooting.md b/docs/passwordpolicyenforcer/11.0/admin/troubleshooting.md similarity index 85% rename from docs/passwordpolicyenforcer/11.0/administration-overview/troubleshooting.md rename to docs/passwordpolicyenforcer/11.0/admin/troubleshooting.md index a039644826..82e3936a40 100644 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/troubleshooting.md +++ b/docs/passwordpolicyenforcer/11.0/admin/troubleshooting.md @@ -17,7 +17,7 @@ them. Select the first (blank) item in the drop-down list if you do not want a d Open the Programs and Features list in Control Panel on the computer you are changing the password from, and check if the Password Policy Client is in the list of installed programs. If it is not, -then install the Password Policy Client. See the [Password Policy Client](/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md) +then install the Password Policy Client. See the [Password Policy Client](/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md) topic for additional information. If Password Policy Enforcer is enforcing a domain policy, then search the Windows Application Event @@ -35,11 +35,10 @@ later. Use the Test Policies page to test a password for the user. Click the **Log** tab to see if a password policy is assigned to the user. -Make sure that the Password Policy Server is enabled. See the -[Configuration Console](/docs/passwordpolicyenforcer/11.0/administration/configconsoleoverview.md) topic for additional information. +Make sure that the Password Policy Server is enabled. Make sure that the Password Policy Client is enabled. See -[Password Policy Client](/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md) topic for additional information. +[Password Policy Client](/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md) topic for additional information. #### Accepting passwords that do not comply with the policy @@ -53,7 +52,7 @@ local policies, search the Application Event Log on the local computer. Use the Test Policies page to test a password that Password Policy Enforcer is accepting. Examine the test results and event log to determine why Password Policy Enforcer accepted the password. If the Test Policies page rejects the password, you must configure the policy. See the -[Policy Testing vs. Password Changes](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/testpolicy.md#policy-testing-vs-password-changes) topic for +[Policy Testing vs. Password Changes](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/testpolicy.md#policy-testing-vs-password-changes) topic for additional information. If the **Enforce policy when password is reset** check box is not selected in the PPS Properties @@ -67,7 +66,7 @@ Password screen. Use the Test Policies page to test a password that Password Policy Enforcer is rejecting. Examine the test results and event log to determine why Password Policy Enforcer rejected the password. If the Test Policies page rejects the password, you must configure the policy. See the -[Policy Testing vs. Password Changes](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/testpolicy.md#policy-testing-vs-password-changes) topic for +[Policy Testing vs. Password Changes](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/testpolicy.md#policy-testing-vs-password-changes) topic for additional information. Set **User must change password at next logon** for the user and repeat the password change test. If @@ -78,5 +77,5 @@ at next logon before every password change test to bypass the rule. #### Passwords that are accepted in the Test Policies page are rejected during a password change -See the [Policy Testing vs. Password Changes](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/testpolicy.md#policy-testing-vs-password-changes) +See the [Policy Testing vs. Password Changes](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/testpolicy.md#policy-testing-vs-password-changes) topic for additional information. diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/windowseventviewer.md b/docs/passwordpolicyenforcer/11.0/admin/windowseventviewer.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/administration-overview/windowseventviewer.md rename to docs/passwordpolicyenforcer/11.0/admin/windowseventviewer.md diff --git a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdlets.md b/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdlets.md deleted file mode 100644 index 2c788157a0..0000000000 --- a/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdlets.md +++ /dev/null @@ -1,53 +0,0 @@ ---- -title: "PPE cmdlets" -description: "PPE cmdlets" -sidebar_position: 60 ---- - -# PPE cmdlets - -The PPE Cmdlets are available to manage Password Policy Enforcer from a Windows PowerShell. The -cmdlets are not case-sensitive. - -To establish the connection: - -**Step 1 –** Open a Windows PowerShell. Some cmdlets require administrative permissions. You can use -the **Run as Administrator** option. - -**Step 2 –** Import the PPE cmdlets module: -**Import-Module "C:\Program Files\Password Policy Enforcer\PS\PPEConf.PowerShell.dll"** - -**Step 3 –** Connect to your domain: -**Connect-PPE -d "_domain_"** where _domain_ is the full name of your domain controller. -**NT-DC03.NWXTECH.COM** in this example. - -**Get-PPEHelp** with no parameters, displays a list of available cmdlets. Use the PowerShell -**get-help** _Cmdlet_ for information about the cmdlet. - -![PPE cmdlets Connect](/img/product_docs/passwordpolicyenforcer/11.0/administration/cmdletconnect.webp) - -Click a PPE cmdlet name for details. - -- [Connect-PPE](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdconnectppe.md) -- [Copy-PPEPolicy](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdcopyppepolicy.md) -- [Export-PPEConfig](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdexportppeconfig.md) -- [Export-PPEPolicy](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdexportppepolicy.md) -- [Get-PPEBulkPasswordTest](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppebulkpasswordtest.md) -- [Get-PPEConfigReport](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeconfigreport.md) -- [Get-PPEDefaultPolicy](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppedefaultpolicy.md) -- [Get-PPEEnabled](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeenabled.md) -- [Get-PPEHelp](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppehelp.md) -- [Get-PPELicenseInfo](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppelicenseinfo.md) -- [Get-PPEPasswordTest](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepasswordtest.md) -- [Get-PPEPolicies](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepolicies.md) -- [Get-PPEPolicyEnabled](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppepolicyenabled.md) -- [Get-PPEServerVersion](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeserverversion.md) -- [Get-PPEVersion](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdgetppeversion.md) -- [Import-PPEConfig](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdimportppeconfig.md) -- [Import-PPEPolicy](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdimportppepolicy.md) -- [Remove-PPEPolicy](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdremoveppepolicy.md) -- [Set-PPEDefaultPolicy](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppedefaultpolicy.md) -- [Set-PPEEnabled](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppeenabled.md) -- [Set-PPEPolicyEnabled](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdsetppepolicyenabled.md) -- [Start-PPECompromisedPasswordChecker](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdstartppecompromisedpasswordchecker.md) -- [Start-PPEHibpUpdater](/docs/passwordpolicyenforcer/11.0/administration-overview/cmdlets/cmdstartppehibpupdater.md) diff --git a/docs/passwordpolicyenforcer/11.0/administration/configconsoleoverview.md b/docs/passwordpolicyenforcer/11.0/administration/configconsoleoverview.md deleted file mode 100644 index a4999bdbe1..0000000000 --- a/docs/passwordpolicyenforcer/11.0/administration/configconsoleoverview.md +++ /dev/null @@ -1,21 +0,0 @@ -# Configuration Console - -This Password Policy Enforcer configuration console configures and manages Password Policy -Enforcer's global properties. It can be installed on any servers and workstations in your domain. -See the [Install the Configuration Console](/docs/passwordpolicyenforcer/11.0/installation/installationconfigconsole.md) topic for -additional information. For security, you can disable/enable it as needed without uninstalling it. - -Open the Configuration Console: - -Click **Start** > **Netwrix Password Policy Enforcer** > **PPE Configuration** -or -Double click the **PPE Configuration** desktop shortcut. - -If this is the first time you have launched the Configuration Console, you are prompted to click -**Yes** to create a new configuration. - -![First start](/img/product_docs/passwordpolicyenforcer/11.0/administration/ppe1.webp) - -The [Configuration Console](/docs/passwordpolicyenforcer/11.0/administration-overview/configconsole.md) is displayed: - -![Configuration Console Dashboard](/img/product_docs/passwordpolicyenforcer/11.0/evaluation/ppedashboard.webp) diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/_category_.json b/docs/passwordpolicyenforcer/11.0/evaluation/_category_.json similarity index 100% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/_category_.json rename to docs/passwordpolicyenforcer/11.0/evaluation/_category_.json diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/conclusion.md b/docs/passwordpolicyenforcer/11.0/evaluation/conclusion.md similarity index 85% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/conclusion.md rename to docs/passwordpolicyenforcer/11.0/evaluation/conclusion.md index ff16932fb3..9f7785a342 100644 --- a/docs/passwordpolicyenforcer/11.0/evaluation-overview/conclusion.md +++ b/docs/passwordpolicyenforcer/11.0/evaluation/conclusion.md @@ -10,7 +10,7 @@ Congratulations! You have successfully installed, configured, and tested Netwrix Enforcer. This guide is an introduction to Password Policy Enforcer's capabilities. You can enforce almost any password policy imaginable with Password Policy Enforcer, customize the Password Policy Client messages, and even synchronize passwords with other networks and applications. The -[Administration](/docs/passwordpolicyenforcer/11.0/administration-overview/administration_overview.md) topic contains more information to +[Administration](/docs/passwordpolicyenforcer/11.0/admin/administration_overview.md) topic contains more information to help you get the most out of Password Policy Enforcer. The [Password Policy Enforcer Web](/docs/passwordpolicyenforcer/11.0/web-overview/web_overview.md) application enables users to securely diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/configuring_policy_rules.md b/docs/passwordpolicyenforcer/11.0/evaluation/configuring_policy_rules.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/configuring_policy_rules.md rename to docs/passwordpolicyenforcer/11.0/evaluation/configuring_policy_rules.md diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/creating-a-password-policy/_category_.json b/docs/passwordpolicyenforcer/11.0/evaluation/creating-a-password-policy/_category_.json similarity index 100% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/creating-a-password-policy/_category_.json rename to docs/passwordpolicyenforcer/11.0/evaluation/creating-a-password-policy/_category_.json diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/creating-a-password-policy/creating_a_password_policy.md b/docs/passwordpolicyenforcer/11.0/evaluation/creating-a-password-policy/creating_a_password_policy.md similarity index 95% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/creating-a-password-policy/creating_a_password_policy.md rename to docs/passwordpolicyenforcer/11.0/evaluation/creating-a-password-policy/creating_a_password_policy.md index f6bfd404db..39de8ff4dd 100644 --- a/docs/passwordpolicyenforcer/11.0/evaluation-overview/creating-a-password-policy/creating_a_password_policy.md +++ b/docs/passwordpolicyenforcer/11.0/evaluation/creating-a-password-policy/creating_a_password_policy.md @@ -28,7 +28,7 @@ getting started with Password Policy Enforcer. example. **Step 4 –** Select a Policy template or **None** if you are creating your own. For a list of -policies see [Policy Templates ](/docs/passwordpolicyenforcer/11.0/evaluation-overview/creating-a-password-policy/policy_templates.md). +policies see [Policy Templates ](/docs/passwordpolicyenforcer/11.0/evaluation/creating-a-password-policy/policy_templates.md). **Step 5 –** Click **Create policy**. diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/creating-a-password-policy/policy_templates.md b/docs/passwordpolicyenforcer/11.0/evaluation/creating-a-password-policy/policy_templates.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/creating-a-password-policy/policy_templates.md rename to docs/passwordpolicyenforcer/11.0/evaluation/creating-a-password-policy/policy_templates.md diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/enforcing_multiple_policies.md b/docs/passwordpolicyenforcer/11.0/evaluation/enforcing_multiple_policies.md similarity index 97% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/enforcing_multiple_policies.md rename to docs/passwordpolicyenforcer/11.0/evaluation/enforcing_multiple_policies.md index 0ab5f3f00e..0a5c9218c9 100644 --- a/docs/passwordpolicyenforcer/11.0/evaluation-overview/enforcing_multiple_policies.md +++ b/docs/passwordpolicyenforcer/11.0/evaluation/enforcing_multiple_policies.md @@ -70,6 +70,6 @@ Active Directory Users and Computers console, or the Local Users and Groups cons changes and resets for the **PPETestUser** and **PPETestAdmin** accounts. Password Policy Enforcer should enforce the Eval policy for **PPETestUser**, and the Admins policy for **PPETestAdmin**. -**NOTE:** The [Set Priorities](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/manage_policies.md#set-priorities) topic contains +**NOTE:** The [Set Priorities](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/manage_policies.md#set-priorities) topic contains more information about policy assignments, and how Password Policy Enforcer resolves policy assignment conflicts that occur when more than one policy is assigned to a user. diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/evaluation_overview.md b/docs/passwordpolicyenforcer/11.0/evaluation/evaluation_overview.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/evaluation_overview.md rename to docs/passwordpolicyenforcer/11.0/evaluation/evaluation_overview.md diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/improving_the_password_policy.md b/docs/passwordpolicyenforcer/11.0/evaluation/improving_the_password_policy.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/improving_the_password_policy.md rename to docs/passwordpolicyenforcer/11.0/evaluation/improving_the_password_policy.md diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/installforeval.md b/docs/passwordpolicyenforcer/11.0/evaluation/installforeval.md similarity index 94% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/installforeval.md rename to docs/passwordpolicyenforcer/11.0/evaluation/installforeval.md index 7f8dd96a25..9240396129 100644 --- a/docs/passwordpolicyenforcer/11.0/evaluation-overview/installforeval.md +++ b/docs/passwordpolicyenforcer/11.0/evaluation/installforeval.md @@ -21,5 +21,5 @@ The evaluation installation uses the standard installation packages: You may need to create a firewall port exception on the domain controllers if you are evaluating the Password Policy Client on a domain with client computers. See the -[Password Policy Client](/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md) topic for additional +[Password Policy Client](/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md) topic for additional information. diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/preparing_the_computer.md b/docs/passwordpolicyenforcer/11.0/evaluation/preparing_the_computer.md similarity index 100% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/preparing_the_computer.md rename to docs/passwordpolicyenforcer/11.0/evaluation/preparing_the_computer.md diff --git a/docs/passwordpolicyenforcer/11.0/evaluation-overview/testing_the_password_policy.md b/docs/passwordpolicyenforcer/11.0/evaluation/testing_the_password_policy.md similarity index 92% rename from docs/passwordpolicyenforcer/11.0/evaluation-overview/testing_the_password_policy.md rename to docs/passwordpolicyenforcer/11.0/evaluation/testing_the_password_policy.md index 6d3b0a427b..878f31c6aa 100644 --- a/docs/passwordpolicyenforcer/11.0/evaluation-overview/testing_the_password_policy.md +++ b/docs/passwordpolicyenforcer/11.0/evaluation/testing_the_password_policy.md @@ -39,7 +39,7 @@ event log can help you to understand why Password Policy Enforcer accepted or re **NOTE:** Policy testing simulates a password change, but it may not always reflect what happens when a user changes their password. See the -[Policy Testing vs. Password Changes](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/testpolicy.md#policy-testing-vs-password-changes) +[Policy Testing vs. Password Changes](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/testpolicy.md#policy-testing-vs-password-changes) topic for additional information. ## Windows Change Password Screen @@ -69,11 +69,7 @@ these messages are customizable. The Password Policy Client does not modify any Windows system files, and you do not have to install it to enforce a Password Policy Enforcer password policy. Web browser based versions of the Password -Policy Enforcer Client are also available. See the -[Administration](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/administration_overview.md) and -[](http://www.anixis.com/products/ppeweb/)[Password Policy Enforcer Web](/docs/passwordpolicyenforcer/11.0/web-overview/web_overview.md) -topics for more information. Password Reset and Password Policy Enforcer/Web are licensed -separately. +Policy Enforcer Client are also available. ## Active Directory Users / Computers Console and local Users and Groups Console diff --git a/docs/passwordpolicyenforcer/11.0/overview/gettingstarted.md b/docs/passwordpolicyenforcer/11.0/gettingstarted.md similarity index 92% rename from docs/passwordpolicyenforcer/11.0/overview/gettingstarted.md rename to docs/passwordpolicyenforcer/11.0/gettingstarted.md index 7c93b00be7..0204436fcf 100644 --- a/docs/passwordpolicyenforcer/11.0/overview/gettingstarted.md +++ b/docs/passwordpolicyenforcer/11.0/gettingstarted.md @@ -1,7 +1,7 @@ --- title: "Getting Started" description: "Getting Started" -sidebar_position: 10 +sidebar_position: 2 --- # Getting Started @@ -52,5 +52,4 @@ Clients ## Next Steps -You can work through the [Evaluate Password Policy Enforcer](/docs/passwordpolicyenforcer/11.0/evaluation-overview/evaluation_overview.md) or -open the [Configuration Console](/docs/passwordpolicyenforcer/11.0/administration/configconsoleoverview.md). +You can work through the [Evaluate Password Policy Enforcer](/docs/passwordpolicyenforcer/11.0/evaluation/evaluation_overview.md). diff --git a/docs/passwordpolicyenforcer/11.0/index.md b/docs/passwordpolicyenforcer/11.0/index.md index a1d07c8329..65744d83a0 100644 --- a/docs/passwordpolicyenforcer/11.0/index.md +++ b/docs/passwordpolicyenforcer/11.0/index.md @@ -1 +1,11 @@ -# Password Policy Enforcer +--- +title: "Netwrix Password Policy Enforcer v11.0" +description: "Netwrix Password Policy Enforcer v11.0" +sidebar_position: 1 +--- + +# Netwrix Password Policy Enforcer v11.0 + +Netwrix Password Policy Enforcer helps secure your network by ensuring users set strong passwords. +When a user enters a password that does not comply with the password policy, Password Policy +Enforcer immediately rejects the password and details why the password was rejected. diff --git a/docs/passwordpolicyenforcer/11.0/installation/disable_windows_rules.md b/docs/passwordpolicyenforcer/11.0/installation/disable_windows_rules.md index 7529ae4cfd..89375af92a 100644 --- a/docs/passwordpolicyenforcer/11.0/installation/disable_windows_rules.md +++ b/docs/passwordpolicyenforcer/11.0/installation/disable_windows_rules.md @@ -11,7 +11,7 @@ complexity. If you enable the Password Policy Enforcer rules and the Windows rul comply with both sets of rules. Password Policy Enforcer has its own history, minimum and maximum age, length, and complexity rules. -See the [Rules](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md) topic for additional information. You can use the Password Policy Enforcer +See the [Rules](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md) topic for additional information. You can use the Password Policy Enforcer and Windows rules together. A password is only accepted if it complies with the Windows and Password Policy Enforcer password policies. diff --git a/docs/passwordpolicyenforcer/11.0/installation/domain_and_local_policies.md b/docs/passwordpolicyenforcer/11.0/installation/domain_and_local_policies.md index 10acbb488a..5e44b2864b 100644 --- a/docs/passwordpolicyenforcer/11.0/installation/domain_and_local_policies.md +++ b/docs/passwordpolicyenforcer/11.0/installation/domain_and_local_policies.md @@ -24,7 +24,7 @@ policies for the domain accounts. To enforce password policies for domain user accounts, you should install Password Policy Enforcer onto all the domain controllers in the domain. If you have read-only domain controllers and aren't -using the [Rules](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md), [Password Policy Client](/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md), or other software +using the [Rules](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md), [Password Policy Client](/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md), or other software (such as [Netwrix Password Reset](https://www.netwrix.com/active_directory_password_reset_tool.html)) that uses the Password Policy Enforcer Client protocol, then you do not need to install Password Policy @@ -49,14 +49,14 @@ is also some information, such as the user's OU, which does not exist in the SAM limitations, the following rules and features cannot be used with local password policies: - The Minimum Age and Maximum Age rules (you can use the Windows version of these rules with - Password Policy Enforcer). See the [Rules](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md) topic for additional information. + Password Policy Enforcer). See the [Rules](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md) topic for additional information. - Policy assignments by groups and containers. See the - [Assign Policies to Users & Groups](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/usersgroups.md) topic for additional information. + [Assign Policies to Users & Groups](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/usersgroups.md) topic for additional information. Password Policy Enforcer's configuration is stored in Active Directory for domain password policies, and in the Windows registry for local password policies. The Connect To page in the Password Policy Enforcer management console allows you to choose a configuration source. See the -[Connected To](/docs/passwordpolicyenforcer/11.0/administration-overview/configconsole.md#connected-to) topic for additional information. Changes you make to +[Connected To](/docs/passwordpolicyenforcer/11.0/admin/configconsole.md#connected-to) topic for additional information. Changes you make to Password Policy Enforcer's domain configuration are replicated to all domain controllers in the domain. Changes to a local configuration are applied only to the local computer. If you want to use the same local configuration for many computers, export the HKLM\SOFTWARE\ANIXIS\Password Policy diff --git a/docs/passwordpolicyenforcer/11.0/installation/hibpupdater.md b/docs/passwordpolicyenforcer/11.0/installation/hibpupdater.md index a5b33b2bf4..7aab8892a4 100644 --- a/docs/passwordpolicyenforcer/11.0/installation/hibpupdater.md +++ b/docs/passwordpolicyenforcer/11.0/installation/hibpupdater.md @@ -10,7 +10,7 @@ Password Policy Enforcer can be configured to use the Have I Been Pwnd (HIBP) da this database is hosted on the Netwrix website. The HIBP database contains a list of the hashes of known compromised passwords. During password change operations, the application can be configured to reject passwords with a hash that matches a hash in the HIBP database. See the Password Policy -Enforcer [Compromised Password Check](/docs/passwordpolicyenforcer/11.0/administration-overview/compromisedpasswordcheck.md) topic for HIBP database +Enforcer [Compromised Password Check](/docs/passwordpolicyenforcer/11.0/admin/compromisedpasswordcheck.md) topic for HIBP database information and configuration options. The HIBP database must be initially deployed to a server or workstation with an internet connection @@ -104,7 +104,7 @@ Compromised rule to read the files from: \\127.0.0.1\sysvol\your.domain\filename.db -See the [Compromised Rule](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/compromised_rule.md) topic for additional information. +See the [Compromised Rule](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/compromised_rule.md) topic for additional information. The path above only works if the computer has a Sysvol share. This will not be the case if you are using a workstation for policy testing, or if you are using Password Policy Enforcer to enforce diff --git a/docs/passwordpolicyenforcer/11.0/installation/installationclient.md b/docs/passwordpolicyenforcer/11.0/installation/installationclient.md index 3043c9f127..231bbff03c 100644 --- a/docs/passwordpolicyenforcer/11.0/installation/installationclient.md +++ b/docs/passwordpolicyenforcer/11.0/installation/installationclient.md @@ -9,7 +9,7 @@ sidebar_position: 30 This procedure is used to install the client on your current workstation. See the [Install with Group Policy Management](/docs/passwordpolicyenforcer/11.0/installation/installationgpm.md) top for details on installing the client across your network. You can also install/uninstall the products using command line -[Silent Installation](/docs/passwordpolicyenforcer/11.0/administration-overview/command_line_interface.md#silent-installation). +[Silent Installation](/docs/passwordpolicyenforcer/11.0/admin/command_line_interface.md#silent-installation). **Step 1 –** Navigate to the folder where you extracted the installers downloaded from Netwrix. diff --git a/docs/passwordpolicyenforcer/11.0/installation/installationconfigconsole.md b/docs/passwordpolicyenforcer/11.0/installation/installationconfigconsole.md index 9ad2c9024b..eb0e8dee90 100644 --- a/docs/passwordpolicyenforcer/11.0/installation/installationconfigconsole.md +++ b/docs/passwordpolicyenforcer/11.0/installation/installationconfigconsole.md @@ -24,4 +24,4 @@ selecting the **Configuration Console** feature. You can select the other featur for the server. You can also install/uninstall the products using command line -[Silent Installation](/docs/passwordpolicyenforcer/11.0/administration-overview/command_line_interface.md#silent-installation). +[Silent Installation](/docs/passwordpolicyenforcer/11.0/admin/command_line_interface.md#silent-installation). diff --git a/docs/passwordpolicyenforcer/11.0/installation/installationmailer.md b/docs/passwordpolicyenforcer/11.0/installation/installationmailer.md index 2a94a6a400..119201ce3b 100644 --- a/docs/passwordpolicyenforcer/11.0/installation/installationmailer.md +++ b/docs/passwordpolicyenforcer/11.0/installation/installationmailer.md @@ -10,7 +10,7 @@ Netwrix Password Policy Enforcer sends email reminders to domain users before th expire. This is especially useful for users who logon infrequently, and for remote users who access the network without logging on to the domain. You must install the Password Policy Enforcer Mailer and configure the email delivery and email message options to send email reminders to users. See the -[Notifications](/docs/passwordpolicyenforcer/11.0/administration-overview/configconsole.md#notifications) topic for additional information. +[Notifications](/docs/passwordpolicyenforcer/11.0/admin/configconsole.md#notifications) topic for additional information. Add your email address to a service account, and the Password Policy Enforcer Mailer reminds you to change the service account password before it expires. @@ -30,4 +30,4 @@ selecting the **Mailer Service** feature. You can select the other features if a server. You can also install/uninstall the products using command line -[Silent Installation](/docs/passwordpolicyenforcer/11.0/administration-overview/command_line_interface.md#silent-installation). +[Silent Installation](/docs/passwordpolicyenforcer/11.0/admin/command_line_interface.md#silent-installation). diff --git a/docs/passwordpolicyenforcer/11.0/installation/installationserver.md b/docs/passwordpolicyenforcer/11.0/installation/installationserver.md index b31652cea0..e124758b38 100644 --- a/docs/passwordpolicyenforcer/11.0/installation/installationserver.md +++ b/docs/passwordpolicyenforcer/11.0/installation/installationserver.md @@ -13,8 +13,8 @@ password policy for local user accounts. If your domain contains some read-only domain controllers, then installation of Password Policy Enforcer on these servers is only necessary if you are using the following features: -- [Rules](/docs/passwordpolicyenforcer/11.0/administration-overview/manage-policies/rules/rules.md) -- [Password Policy Client](/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md) +- [Rules](/docs/passwordpolicyenforcer/11.0/admin/manage-policies/rules/rules.md) +- [Password Policy Client](/docs/passwordpolicyenforcer/11.0/admin/password-policy-client/password_policy_client.md) - [Netwrix Password Reset](https://helpcenter.netwrix.com/category/passwordreset) - [Password Policy Enforcer Web](/docs/passwordpolicyenforcer/11.0/web-overview/web_overview.md) @@ -31,7 +31,7 @@ The Server installation package includes multiple features selected during insta Manager to install Netwrix Password Policy Enforcer, copy the **msi** files to a distribution folder. See the [Install with Group Policy Management](/docs/passwordpolicyenforcer/11.0/installation/installationgpm.md) topic for additional details. You can also install/uninstall the products using command line -[Silent Installation](/docs/passwordpolicyenforcer/11.0/administration-overview/command_line_interface.md#silent-installation). +[Silent Installation](/docs/passwordpolicyenforcer/11.0/admin/command_line_interface.md#silent-installation). **NOTE:** Continue with these steps to install one or more features on your current server or domain controller. You must repeat these steps for each server where the features are installed. diff --git a/docs/passwordpolicyenforcer/11.0/installation/uninstall.md b/docs/passwordpolicyenforcer/11.0/installation/uninstall.md index 61f97026a5..4a7f1e8040 100644 --- a/docs/passwordpolicyenforcer/11.0/installation/uninstall.md +++ b/docs/passwordpolicyenforcer/11.0/installation/uninstall.md @@ -12,7 +12,7 @@ You can uninstall Password Policy Enforcer on every domain server and computer, Management to remove the PPE Server and PPE Client on all machines. You can also install/uninstall the products using command line -[Silent Installation](/docs/passwordpolicyenforcer/11.0/administration-overview/command_line_interface.md#silent-installation). +[Silent Installation](/docs/passwordpolicyenforcer/11.0/admin/command_line_interface.md#silent-installation). **Step 1 –** Open **Start** > **Control Panel** > **Programs and Features** on each system where a PPE component is installed. diff --git a/docs/passwordpolicyenforcer/11.0/installation/upgrading.md b/docs/passwordpolicyenforcer/11.0/installation/upgrading.md index 58b36ffd8d..d7e93ca50f 100644 --- a/docs/passwordpolicyenforcer/11.0/installation/upgrading.md +++ b/docs/passwordpolicyenforcer/11.0/installation/upgrading.md @@ -11,7 +11,7 @@ Upgrades are supported for versions 9.0 and above. Contact Customer Support at upgrading older versions You can also install/uninstall the products using command line -[Silent Installation](/docs/passwordpolicyenforcer/11.0/administration-overview/command_line_interface.md#silent-installation). +[Silent Installation](/docs/passwordpolicyenforcer/11.0/admin/command_line_interface.md#silent-installation). Upgrading the Password Policy Server @@ -26,7 +26,7 @@ new version do not affect servers running an older version. If you have multiple make configuration changes in both configuration consoles until all domain controllers are upgraded to 11. Failure to do so may lead to inconsistent enforcement of the password policy. -Open the [License](/docs/passwordpolicyenforcer/11.0/administration-overview/configconsole.md#license) settings on the Configuration Console +Open the [License](/docs/passwordpolicyenforcer/11.0/admin/configconsole.md#license) settings on the Configuration Console after an upgrade to check your license details. Password Policy Enforcer reverts to a 30-day evaluation license if it cannot import the license key. diff --git a/docs/passwordpolicyenforcer/11.0/overview/_category_.json b/docs/passwordpolicyenforcer/11.0/overview/_category_.json deleted file mode 100644 index 1ca703538c..0000000000 --- a/docs/passwordpolicyenforcer/11.0/overview/_category_.json +++ /dev/null @@ -1,10 +0,0 @@ -{ - "label": "Netwrix Password Policy Enforcer v11.0", - "position": 10, - "collapsed": true, - "collapsible": true, - "link": { - "type": "doc", - "id": "overview" - } -} \ No newline at end of file diff --git a/docs/passwordpolicyenforcer/11.0/overview/overview.md b/docs/passwordpolicyenforcer/11.0/overview/overview.md deleted file mode 100644 index f047df027f..0000000000 --- a/docs/passwordpolicyenforcer/11.0/overview/overview.md +++ /dev/null @@ -1,11 +0,0 @@ ---- -title: "Netwrix Password Policy Enforcer v11.0" -description: "Netwrix Password Policy Enforcer v11.0" -sidebar_position: 10 ---- - -# Netwrix Password Policy Enforcer v11.0 - -Netwrix Password Policy Enforcer helps secure your network by ensuring users set strong passwords. -When a user enters a password that does not comply with the password policy, Password Policy -Enforcer immediately rejects the password and details why the password was rejected. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/about_tab.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/about_tab.md deleted file mode 100644 index c4aa04a499..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/about_tab.md +++ /dev/null @@ -1,13 +0,0 @@ -# About Tab - -Use the **About** tab to check the version and license information, and to install a new license -key. - -![configuring_npr_10](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_10.webp) - -To install a new license key, copy the entire license e-mail to the clipboard, and then click Get -license from clipboard. - -**NOTE:** Password Reset includes a 30-day evaluation license for up to 50 users. Please -[contact Netwrix support](mailto:support@netwrix.com)[](mailto:support@anixis.com) if you would like -to evaluate Password Reset with more than 50 users. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/administration_overview.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/administration_overview.md deleted file mode 100644 index 74b8a5b166..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/administration_overview.md +++ /dev/null @@ -1,34 +0,0 @@ -# Administration - -Netwrix Password Reset is a self-service password management system that helps you to reduce the -number of password related help desk calls. Password Reset allows users to securely change their -password and unlock their account, even if they have forgotten their password. This section details -the different benefits of using Password Reset. - -## Reduced Costs - -Studies into the costs of password management show that between 20% and 40% of help desk calls are -password related. Password Reset helps you to reduce the number of these calls. - -## Increased Productivity - -Employee productivity plummets while they wait in the help desk queue to have their password reset. -With Password Reset, users can reset their own password in less than two minutes. Users can reset -their password from the Windows logon screen, or a mobile device. This frees the help desk to handle -more important issues. - -## Improved Security - -Identifying staff over the phone can be difficult, especially in large organizations. Password Reset -identifies users by asking them to answer some questions about themselves, and optionally by sending -a verification code to their mobile phone. Incorrect answers are logged, and you can configure -Password Reset to automatically lock out users who give too many incorrect answers. See the -[Configuring Password Reset](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_password_reset.md) topic for additional information. - -## Higher Availability - -Password Reset is ready to respond to password management requests at any hour of the day and night. -It takes only minutes to install, and can handle thousands of requests every hour. - -The [Evaluation](/docs/passwordpolicyenforcer/11.0/passwordreset/evaluation/evaluation_overview.md) topic contains step-by-step instructions to -help you quickly install, configure, and evaluate Password Reset. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_password_reset.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_password_reset.md deleted file mode 100644 index 4d365c6d53..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_password_reset.md +++ /dev/null @@ -1,18 +0,0 @@ -# Configuring Password Reset - -In the previous section, you used Password Reset with a default configuration. You can use the -Configuration Console to edit the configuration settings. Click **Start** > **Netwrix Password -Reset** > **NPR Configuration Console**on the Password Reset Server computer to open the -Configuration Console. - -![configuring_npr](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr.webp) - -Information about the configuration console tabs can be found in the following topics: - -- [General Tab](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/general_tab.md) -- [Enroll Tab](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/enroll_tab.md) -- [E-mail Tab](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/email_tab.md) -- [Verification Tab](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/verification_tab.md) -- [Security Tab](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/security_tab.md) -- [Permissions Tab](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/permissions_tab.md) -- [About Tab](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/about_tab.md) diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/editing_the_html_templates.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/editing_the_html_templates.md deleted file mode 100644 index d79f27b19a..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/editing_the_html_templates.md +++ /dev/null @@ -1,241 +0,0 @@ -# Editing the HTML Templates - -Password Reset's user interface is built with customizable templates. You can easily modify the user -interface by editing the templates. The templates are written in HTML5 and formatted with CSS3, so -they work with all modern web browsers. Older browsers such as Internet Explorer 8 may work, but the -pages may be badly formatted. Please [contact Netwrix support](mailto:support@netwrix.com) if you -need to use Password Reset with older web browsers. - -## User Interface Files - -Password Reset installs seven `.htm` files for every language. Each filename starts with a language -code. The files for the US English language are: - -| Filename | Content | -| ----------------- | ------------------------------------ | -| `en_default.htm` | Static HTML for the menu page | -| `en_enroll.htm` | Template for the Enroll page | -| `en_reset.htm` | Template for the Reset pages | -| `en_unlock.htm` | Template for the Unlock pages | -| `en_change.htm` | Template for the Change pages | -| `en_finished.htm` | Template for the Finished page | -| `en_error.htm` | Template for the Critical Error page | - -The formatting information is in `apr.css`, and the image files are in the images folder. These -files are installed into the `\Inetpub\wwwroot\pwreset\` folder by default. - -**NOTE:** Always backup the user interface files before and after editing them. Your changes may be -overwritten when Password Reset is upgraded, and some changes could stop Password Reset from working -correctly. Having a backup allows you to quickly revert to a working setup. -Web browsers display pages differently, so test your changes with several versions of the most -popular browsers to ensure compatibility. - -### Ranges and Fields - -`en_default.htm` contains static HTML, but the other .htm files contain special comment tags that -are used to prepare the pages. Some of these comments define ranges. A range looks like this: - -`Some text or HTML` - -The Web Interface deletes ranges (and the text inside them) when they are not needed. Some ranges -span only one word, while others span several lines. The other type of comment tag is called a -field. - -`` - -Fields are replaced by some other information. For example, the field above is replaced with a -username. - -### Resource Strings - -Each template ends with a resource string section. - -`` - -Resource strings are mostly validation error messages, but they can contain any text Password Reset -may need to build the page. Do not modify the identifiers on the left, only edit the text on the -right. Resource strings are always inside a range called RESOURCE_STRINGS. Password Reset deletes -this range before sending the page to the user's web browser. See the -[Error Messages](using_password_reset.md#error-messages) topic for additional information. - -### Responsive Content - -Password Reset's templates are responsive. The page layout and content changes to suit the user's -screen size. The layout is defined in the CSS file, and the content in the HTML files. The -text_short and text_long classes are used to display different content depending on the screen size. -text_short elements are shown on small screens (up to 420 pixels wide). text_long elements are shown -on larger screens. - -**CAUTION:** You may rebrand the Password Reset user interface, but it is a violation of the License -Agreement to modify, remove or obscure any copyright notice. - -## Examples - -This section contains examples of common customizations. Use these examples to gain a better -understanding of Password Reset's templates. You don't need to be an expert in HTML to follow these -examples, but a basic understanding of HTML will help. - -Work through them carefully, and backup files before you edit them. The examples in this section are -from the US English files, but the format is the same for all languages. - -### Replace the Netwrix Logo - -The Netwrix logo is shown at the top of the page. The logo is installed into the -`\Inetpub\wwwroot\pwreset\images\` folder by default, and it is called logo.svg. You can replace -this file with one containing your organization's logo. - -You will also need to edit the HTML files if your logo is not in SVG format, or if it has a -different aspect ratio to the Netwrix logo. Open every HTML file in a text editor such as Notepad, -and search for the line shown below. Change the filename (logo.svg), height (70 pixels) and width -(116 pixels) to suit your logo. - -`` - -### Edit Page Instructions - -Instructions appear at the top of each page. You can edit the instructions by opening the relevant -.htm file and searching for the text you wish to modify. - -Instructions are often inside a range called SECTION_A, SECTION_B, SECTION_C, or SECTION_D. Each -section contains instructions for the different pages in the template. Make sure you edit the -instructions in the correct section, or they may be displayed on the wrong page. The text_long and -text_short classes are used in page instructions to tailor content to the screen size. - -`` - -`

Enter your username and domain, and then click Next to continue…` - -`

Use the reset feature if you have forgotten y…` - -`` - -`` - -`

Answer the question below to confirm your identity. Your answer…` - -`

You may need to answer additional questions b…` - -`` - -### Edit Validation Error Messages - -Validation error messages are shown in a red box below the page instructions. Validation errors are -normally caused by invalid user input. - -![using_npr_12](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_12.webp) - -Validation error messages are defined in the relevant template (en_enroll.htm, en_reset.htm, -en_unlock.htm, or en_change.htm). The error messages are in the resource strings section near the -end of the file. Some messages are defined in more than one file, so you may need to edit several -files to change all instances of a message. See the Resource Strings topic for more information. - -You may see placeholders like %1 and %2 in some error messages. These are replaced with more -information about the error. You should keep these, but you can delete them if you do not want them. - -| String | Message | -| --------------------------- | ----------------------------------------------- | -| `@RES_EMPTY_FIELD_EMAIL` | `Enter your e-mail address in the E-mail box.` | -| `@RES_EMPTY_FIELD_QUESTION` | `Select a question from the Question %1 list.` | -| `@RES_IDENTICAL_QUESTIONS` | `Question %1 and %2 are the same. Select a di…` | - -### Edit Critical Error Messages - -All the critical error messages are defined in en_error.htm. The messages are in the resource -strings section near the end of the file. See the Resource Strings topic for more information. - -![using_npr_13](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_13.webp) - -You may see placeholders like %1 and %2 in some error messages. These are replaced with more -information about the error. You should keep these, but you can delete them if you do not want them. - -| String | Message | -| --------------------- | ----------------------------------------------------- | -| `@RES_LOCKED_OUT` | `This feature has been disabled because too many qu…` | -| `@RES_LOCKED_OUT_AD` | `Your account is locked because an incorrect passwo…` | -| `@RES_REQUEST_FAILED` | `The server %1 could not handle your request. Pleas…` | - -If you want to display some text for all error messages, then insert your text above or below the -`

{/*ERROR*/}

` line. For example: - -```html -

{/*ERROR*/}

-

The help desk phone number is 555-555-5555.

-``` - -### Edit Finished Messages - -Finished messages are shown after users successfully complete an enroll, reset, unlock, or change. -These messages are defined in the Resource Strings section near the end of `en_finished.htm`. See -the Resource Strings topic for more information. - -![using_npr_9](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_9.webp) - -`en_finished.htm` has two resource strings for password changes (RES_FINISHED_CHANGE and -RES_FINISHED_CHANGE_INVITE). The first is shown when a user who has enrolled into NPR changes their -password. The second is shown when a user who has not enrolled changes their password. The second -message invites the user to enroll so they can also use the reset and unlock features in future. - -### Replace Enroll Question Lists with Text Boxes - -When users enroll into Password Reset, they choose their questions from the Question List. You can -replace some or all of the question lists with text boxes so users can enter their own questions. -See the [Question List](enroll_tab.md#question-list) topic for additional information. - -The lines you need to edit in en_enroll.htm look like this: - -`` - -There are ten of these lines in en_enroll.htm, each with their own question number (the number after -the q). You do not have to edit all ten lines. If users will be allowed to enter two questions, then -only edit the q1 and q2 lines. Replace these lines with a line like this: - -`` - -Change the three question numbers on each line so they match the original numbers, otherwise -Password Reset will not work correctly. You should also edit the validation error messages in -`en_enroll.htm` as some of them make reference to selecting questions from a list. - -**NOTE:** Users may not choose appropriate security questions, so it is advisable to leave the -question lists for some of the enrollment questions. - -### Change Font Sizes and Colors - -apr.css contains the user interface formatting information. You can change font sizes and colors by -editing this file. You can even reposition and resize items, but you will need some understanding of -CSS to do this. For example, this is the CSS for the validation error box: - -```css -.apr_form .error { - background-color: #ce482f; - - border-radius: 5px; - color: #fff; - - margin: 0 15px 15px; - - padding: 10px 13px; -} -``` - -Edit these properties to change the appearance of the error box. You may need to clear your web -browser's cache to see the changes. - -### Change Icon Colors - -The Web Interface icons are in Scalable Vector Graphics (SVG) format. Vector graphics maintain their -sharpness when resized. You can easily change the colors of the icons with a text editor. Open the -SVG file with a text editor like Notepad, and edit this section of the file: - -fill="#FF7F00" - -Replace the hexadecimal color code with your desired color code. You can use a color picker like -this one to generate the color code: -[https://www.w3schools.com/colors/colors_picker.asp](https://www.w3schools.com/colors/colors_picker.asp) - -**NOTE:** Some old web browsers with basic HTML5 support cannot display SVG images. Password Reset -works with these browsers, but the SVG images are not shown. You can convert the icons to GIF or PNG -format if you want them shown on these older browsers. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/email_tab.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/email_tab.md deleted file mode 100644 index ce8fb58d80..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/email_tab.md +++ /dev/null @@ -1,80 +0,0 @@ -# E-mail Tab - -Use the **E-mail** tab to configure how e-mail is sent to users, when it is sent, and also to edit -the e-mail templates. - -![configuring_npr_3_709x772](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_3_709x772.webp) - -### E-mail Delivery - -Password Reset can send e-mail alerts directly to an SMTP server, or save them to a pickup folder. -Select the **Send e-mail to an SMTP server** option if Password Reset should send e-mails directly -to an SMTP server. Type the name or IP address of an SMTP server in the **Server** text box, and the -SMTP port number in the **Port** text box. -Select the **Save e-mail to a pickup folder** option if NPR should save e-mails to a folder for -delivery by a mail server. Click **Browse...** to select a folder. The mail server must monitor this -folder for new e-mail. - -**NOTE:** Saving e-mail to a pickup folder is the fastest and most reliable delivery method. Use -this option if your mail server supports pickup folders. - -### Triggers - -Triggers define when e-mails are sent. If the trigger for an event is enabled, then Password Reset -sends an e-mail when the event occurs. Enabled triggers are underlined. - -Click the name of an enabled trigger to edit the trigger's e-mail template. - -![configuring_npr_4](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_4.webp) - -Type the name and e-mail address you wish to appear in the e-mail's From field in the **From** text -box. The correct format is "Display Name" `` -Type the recipient's e-mail address in the **To** text box. The correct format is "Display Name" -``. Separate multiple recipients with a semicolon. You can also use these -macros. - -| Macro | Replace with | -| ----------------- | --------------------------------------------------------------------------------------------- | -| [AD_EMAIL] | The e-mail address in Active Directory | -| [NPR_EMAIL] | The e-mail address in Password Reset's database | -| [AD_OR_NPR_EMAIL] | The e-mail address in AD, or the e-mail address in Password Resetif the AD address is blank | -| [NPR_OR_AD_EMAIL] | The e-mail address in NPR, or the e-mail address in AD if the Password Reset address is blank | - -**NOTE:** Use [NPR_OR_AD_EMAIL] with caution as Password Reset does not check the validity of e-mail -addresses. If the e-mail address in Password Reset's database is no longer valid, then the alert is -only sent to the invalid address. - -Type additional recipient e-mail addresses in the **Bcc** text box if you want to send any blind -carbon copies. Separate multiple recipients with a semicolon. - -Type the e-mail's subject in the **Subject** text box. - -Type the e-mail's body in the large text box. The e-mail is sent as plain text unless the body -contains the `` tag. Include the entire HTML document when sending e-mail as HTML. You can -also use these macros. - -| Macro | Replaced with | -| ----------- | --------------------------------------- | -| [AD_DOMAIN] | The user's Active Directory domain name | -| [AD_USER] | The user's Active Directory logon name | - -Password Reset stores the user's preferred language every time they successfully complete an Enroll, -Reset, Unlock, or Change. E-mail alerts are sent in the user's preferred language, or in the current -Web Interface language if the user's preferred language is not known. If an e-mail template is not -defined for the user's preferred language, then the alert is sent in English. - -Use the drop-down list at the bottom of the E-mail template editor to switch between template -languages. Changes are preserved as you switch between languages. The **From**, **To**, and **Bcc** -are the same for all languages. -A warning icon is shown beside the language drop-down list if an e-mail template is not defined for -every language. You should define an e-mail template for every language to ensure that users can -understand their e-mail alerts. - -![configuring_npr_5](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_5.webp) - -**CAUTION:** An attacker may choose a specific language to avoid detection. E-mail alerts are sent -in the Web Interface language chosen by the attacker if the target user has not enrolled or changed -their password with Password Reset. The target user will receive the e-mail alerts, but they may not -understand them. Use the Rest API to remind new users to enroll so their preferred language is known -to Password Reset. See the [Enabling the API](persuading_users_to_enroll.md#enabling-the-api) topic -for additional information. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/enroll_tab.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/enroll_tab.md deleted file mode 100644 index aa8723d56a..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/enroll_tab.md +++ /dev/null @@ -1,52 +0,0 @@ -# Enroll Tab - -Use the **Enroll** tab to maintain the list of enrollment questions and options. - -![configuring_npr_2](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_2.webp) - -### Question List - -Users must answer some questions about themselves when they manually enroll. They choose their -questions from the Question List. - -Add a question - -Follow the steps below to add a question to the list. - -**Step 1 –** Select a language from the drop-down list above the Question List. - -**Step 2 –** Click **Add...** - -**Step 3 –** Type the new question, including the question mark. - -**Step 4 –** Click **OK**, and then click **Apply**. - -Remove a question - -Follow the steps below to remove a question from the list. - -**Step 1 –** Select a language from the drop-down list above the Question List. - -**Step 2 –** Select the question in the Question List. - -**Step 3 –** Click **Remove**, and then click **Yes** when asked to confirm. - -**Step 4 –** Click **Apply**. - -**NOTE:** You can rearrange questions by dragging them. You can also replace question lists with -text boxes so users can enter their own questions. See the -[Editing the HTML Templates](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/editing_the_html_templates.md) document for more information - -### Options - -Password Reset can send e-mail alerts to users when a request is submitted for their account. These -alerts can be sent to the user's Active Directory e-mail address and/or to an e-mail address in -Password Reset's database. Select the **Users must enter an e-mail address to enroll** check box if -users should enter an e-mail address during enrollment. - -The number of questions that users must answer to enroll is configurable, and is set to three by -default. Select the desired number of questions from the **Users must answer...** drop-down list. - -You can also set a minimum length for each answer. Only alphanumeric characters are counted because -Password Reset only checks alphanumeric characters. Select the minimum number of alphanumeric -characters in each answer from the **Answers must contain at least...** drop-down list. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/filter_editor.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/filter_editor.md deleted file mode 100644 index 40972449f4..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/filter_editor.md +++ /dev/null @@ -1,33 +0,0 @@ -# Filter Editor - -Use the Filter Editor to create complex filters, filters for hidden columns, or to save and open -regularly used filters. Press **CTRL** + **F** to open the Filter Editor, or click the **Filter -Editor** button in the lower right corner of the Data Console. - -![using_the_data_console_9](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_9.webp) - -A filter may contain several conditions. Conditions start with a column name, followed by an -operator, and sometimes a value. Column names are shown in green, operators in maroon, and values in -blue. - -A filter also contains a root node and optionally one or more groups. These are used to include -Boolean operators in the filter. Boolean operators are shown in red. Grouped conditions are -indented. - -The filter in the image above contains the root node, one group, and four conditions. It will show -all reset requests in the last fourteen days originating from IP addresses starting with 192.168.115 -or 192.168.119. - -Click the **Click here to add a new condition** button to add a new condition to the filter. Click -the ellipsis button on the left of each line to add or remove conditions and groups. Click column -names, operators, and values to edit them. Most can be selected from a list. Values can also contain -the ? and \* wildcard characters. - -Click **Save As...** to save a filter to a file, or **Open...** to use a saved filter. Click **OK** -to close the Filter Editor and apply the filter. - -Some columns are hidden in the Data Console. You can use the Filter Editor to create filters for -these columns. For example, the filter in the image below shows all users with an NPR v1 enrollment -record. - -![using_the_data_console_10](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_10.webp) diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/filtering_data.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/filtering_data.md deleted file mode 100644 index 83dbefde9b..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/filtering_data.md +++ /dev/null @@ -1,130 +0,0 @@ -# Filtering Data - -The Data Console can show thousands of records, but only some of them will be of interest to you at -any time. Filters let you focus on the important information. - -You can create simple filters by typing values directly into the filter row, or by selecting values -from Filtering by Column Values. More complex filters are created with the Custom Filters and -[Filter Editor](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/filter_editor.md) windows. - -### The Filter Row - -The top row in the **Audit Log** and **Users** tabs is called the Filter Row. You can type filter -values directly into this row. - -![using_the_data_console_3](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_3.webp) - -The Filter Row is empty when you first open the Data Console. To create a filter, click the **Filter -Row** in the column you wish to filter. A cursor will appear. Type a value, and then press **ENTER** -or **TAB**. - -Click the button to shown an editor or selector that helps you enter a value. Values can include -wildcard characters. Use a ? to match any single character, or a \* to match more than one -character. - -![using_the_data_console_4](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_4.webp) - -The image above shows a filter on the Date, Source, and Source IP columns. Only password reset -events on 2/5/2015 originating from IP addresses starting with 192.168.115 are shown. The small blue -icons in the column headers show which columns have active filters. - -**NOTE:** Rows are shown only if they match all filter values (logical AND). Use the custom filter -or the filter editor windows for a logical OR filter. - -### Filtering by Column Values - -You can also create a filter by selecting values from a list in the column headers. - -![using_the_data_console_5](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_5.webp) - -Hover the mouse pointer over a column header until a small button appears on the right side of the -header. - -![using_the_data_console_6](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_6.webp) - -Click the button to show a list of values in the column. - -Select one or more values from the list. Rows that do not match one of the selected values are -hidden. - -![using_the_data_console_7](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_7.webp) - -The list of values for date and date/time columns also includes date ranges such as **Last 7 days**, -**Today**, **Yesterday**, etc. - -Click **(All)** to clear the filter and display all values. Click **(Custom...)** to create a custom -filter. - -### Custom Filters - -Use custom filters to search for partial matches, find a range of values, or to create more complex -filters. Click **(Custom...)** in a column header's value list to create a custom filter. - -![using_the_data_console_8](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_8.webp) - -Custom filters can contain one or two conditions for each column. Select an operator for the first -condition from the drop-down list below the column name. Only relevant operators are shown for each -column. - -Type a value for the condition in the text box beside the operator. The text box may have a button -on the right. Click the button to shown an editor or selector that will help you enter a value. -Values can include wildcard characters. Use a ? to match any single character, or a \* to match more -than one character. - -Select the **AND** or **OR** operator if the filter will have two conditions. Select **AND** if the -filter should only show rows that meet both conditions. Select **OR** if the filter should show rows -that meet either condition. - -Select an operator and value for the second condition, or leave them blank if your filter only has -one condition. Click **OK** to close the Custom Filter window and apply the filter. - -**NOTE:** The Filter Editor is shown instead of the Custom Filter window if the current filter is -too complex for the Custom Filter window. - -### The Filter and Status Bars - -The Status Bar appears at the very bottom of the Data Console. It shows the number of visible -records and the total record count. The Filter Bar appears above the Status Bar, and it shows the -active filter. The button on the right side of the Filter Bar opens the Filter Editor. - -![using_the_data_console_11](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_11.webp) - -A button and a check box appear on the left side of the Filter Bar when a filter is active. Click -the button to clear the filter. Toggle the check box to disable or enable the filter. - -![using_the_data_console_12](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_12.webp) - -A drop-down button appears to the right of the filter. Click it to select a recently used filter. - -![using_the_data_console_13](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_13.webp) - -## Exporting Data - -You can export the visible rows to Microsoft Excel, HTML, text, and XML formats. - -Follow the steps below to export the visible rows in the current tab. - -**Step 1 –** Click the **Audit Log** or **Users** tab. - -**Step 2 –** Click the **File** menu, and then click one of the export menu items. - -**Step 3 –** Type a filename, and then click **Save**. - -**NOTE:** When exporting to Excel, you can choose the file type from the **Export to Excel** window. -The default file type is .xlsx. - -## Deleting Users - -Users are automatically deleted from Password Reset's database approximately one week after they are -deleted from Active Directory. You can also manually delete users from the Data Console. - -Follow the steps below to delete a user. - -**Step 1 –** Click the **Users** tab. - -**Step 2 –** Select the user(s) you wish to delete. - -**Step 3 –** Press the **DELETE** key, and then click **OK**. - -**NOTE:** You can still view a user's event history in the **Audit Log** tab after they are deleted -from the **Users** tab. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/general_tab.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/general_tab.md deleted file mode 100644 index 6ec8125e3b..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/general_tab.md +++ /dev/null @@ -1,117 +0,0 @@ -# General Tab - -Use the General tab to maintain the list of managed domains, set the database options, and enable -the Password Policy Enforcer integration. See the Netwrix Password Policy Enforcer topic for -additional information. - -![configuring_npr](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr.webp) - -### Domain List - -The Domain List is empty when Password Reset is first installed, and users must type their domain -name. You can configure Password Reset to display a list of domains instead of an empty text box. - -Add a Domain to the list - -Follow the steps below to add a domain to the list. - -**Step 1 –** Click **Add...** - -**Step 2 –** Type a NetBIOS (NT Compatible) or DNS domain name. - -**Step 3 –** Click **OK**, and then click **Apply**. - -**NOTE:** The most frequently used domain should be first in the list as it will be the default. You -can rearrange the domains by dragging them to another position. You can also click Sort to sort them -alphabetically. - -Remove a Domain from the list - -Follow the steps below to remove a domain from the list: - -**Step 1 –** Select the domain name in the Domain List. - -**Step 2 –** Click **Remove**, and then click **Yes** when asked to confirm. - -**Step 3 –** Click **Apply**. - -### Database - -Password Reset uses an SQL Server Compact database by default. It creates two database files -(apr.sdf and aprlog.sdf) in the Password Reset installation folder. - -Follow the steps below to move these files to another folder. - -**Step 1 –** Close the Data Console if it is open. - -**Step 2 –** Stop the Password Reset service. - -**Step 3 –** Move apr.sdf and aprlog.sdf to their new location. The database files should remain on -a local disk. - -**Step 4 –** Give the Password Reset service account read and write permissions to the database -files in their new location. - -**Step 5 –** Open the Password Reset Configuration Console, and click **Change...** in the -**General** tab. - -**Step 6 –** Click **Browse...** and select the new database path. - -**Step 7 –** Click **OK** twice, and then click **Apply**. - -**Step 8 –** Start the Password Reset service. - -**Step 9 –** Update the backup script to copy from the new folder. See the -[Working with the Database](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/working_with_the_database.md) topic for additional information. - -You can also move the database from SQL Server Compact to SQL Server. See the -[Working with the Database](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/working_with_the_database.md) topic for more information. - -### Netwrix Password Policy Enforcer - -Password Reset is a configurable password filter that enforces granular password policies with many -advanced features. Password Reset can integrate with Password Policy Enforcer to help users choose a -compliant password. - -![configuring_npr_1](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_1.webp) - -Password Reset displays the Password Policy Enforcer policy message when users are prompted for -their new password, and the Password Policy Enforcer rejection message if the new password does not -comply with the password policy. Select the **Password Policy Enforcer integration** check box if -you have installed and configured Password Policy Enforcer on your domain controllers. - -Password Reset locates and queries a domain controller in the user's domain when Password Policy -Enforcer integration is enabled. You can override this behavior and send all Password Policy -Enforcer queries to a specific IP address by setting the `PPEIPAddress` registry value to the IP -address of a Password Policy Server. The `PPEIPAddress` value is in -`HKEY_LOCAL_MACHINE\SOFTWARE\ANIXIS\ANIXIS Password Reset\3.0`. - -**NOTE:** Due to a protocol upgrade, Netwrix Password Reset v3.3 is not compatible with Netwrix -Password Policy Enforcer v8.x and earlier versions. If you are using Netwrix Password Reset with any -of those older Netwrix Password Policy Enforcer versions, please consider upgrading Netwrix Password -Policy Enforcer first to a current version, and only then upgrade Netwrix Password Reset to v3.3 (or -later). - -Users are more likely to see the Password Policy Enforcer Generic Rejection message rather than the -more detailed Rejection message when this registry value is set. Users may also have the wrong -policy, or no policy enforced if the queried server is not a domain controller in the user's -domain. -Queries to the Password Policy Server are sent to UDP port 1333 by default. You may need to create -firewall rules to open this port. See the -[Password Policy Client](/docs/passwordpolicyenforcer/11.0/administration-overview/password-policy-client/password_policy_client.md) -topic for more information. - -**NOTE:** Due to a protocol upgrade, it is now recommended to enable protocol encryption for -clients. To do so, please navigate to the PPS Properties in your Netwrix Password Policy Enforcer -server configuration, and enable "Only accept encrypted client request". - -![using_ppe_with_npr](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_ppe_with_npr.webp) - -Please do not enable this option if you are using Netwrix Password Reset v3.3 with Netwrix Password -Policy Enforcer v8.x or earlier versions, or with Netwrix Password Policy Enforcer/Web. If you are -using Netwrix Password Reset v3.3 with any of those older versions of Netwrix Password Policy -Enforcer, please consider upgrading first to a current and supported version. - -**NOTE:** Password Policy Enforcer is not included with Password Reset. Go to -[www.netwrix.com/password_policy_enforcer](https://www.netwrix.com/password_policy_enforcer.html) to -learn more about Password Policy Enforcer. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/installation.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/installation.md deleted file mode 100644 index 478e156834..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/installation.md +++ /dev/null @@ -1,357 +0,0 @@ -# Installation - -Netwrix Password Reset V3.30 is designed to run on Windows 2008 to 2019. Users access Password Reset -from a web browser, or from the Password Reset console. - -## System Requirements - -- Windows 2008\*, 2008 R2, 2012, 2012 R2, 2016, or 2019. - - \*x64 only for NPR Server and Web Interface. - -- 20 Megabytes free disk space. -- 20 Megabytes free RAM. - -## System Components - -Password Reset has two server components, and an optional client. Both server components can be -installed on one server, or they may be installed on separate servers if your web server is in a -DMZ. - -### The Web Interface - -The Web Interface is the component that users interact with. It accepts user requests, encrypts -them, and sends them to the Password Reset Server. The Web Interface must be installed on a server -running IIS 7 or later. - -### The Netwrix Password Reset Server - -The Password Reset Server is the component that performs requests on behalf of users. It receives -requests from the Web Interface, checks the user's credentials, and performs the requested task if -the credentials are valid. - -![installing_npr_624x193](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/installing_npr_624x193.webp) - -**NOTE:** Microsoft SQL Server Compact is installed with the Password Reset Server. SQL Server -Compact is free to use, and should only be removed if you move the database to SQL Server. SQL -Server Compact is an embedded database. Unlike SQL Server, you do not need to configure or manage -it. See the [Working with the Database](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/working_with_the_database.md) topic for additional -information. - -## Installation Types - -A single server installation is recommended where users will only access Password Reset from a -trusted network, including a VPN. In this installation type, the Web Interface and Password Reset -Server are both installed on the same server. The server must have access to a domain controller in -each managed domain. - -If Password Reset will be accessible from the Internet without a VPN, then it is likely that you -will want to run the Web Interface in a DMZ. A multiple server installation is recommended for this -scenario. In this installation type, the Web Interface is installed on an server in the DMZ and the -Password Reset Server is installed on another server in the internal network. A firewall rule allows -the two servers to communicate. - -You choose the installation type when installing Password Reset, but you can change it later. - -**NOTE:** An Password Reset Server can accept requests from more than one Web Interface. Having -multiple Web Interfaces allows for load balancing and failover, but you should only consider this -option if you already have redundant web servers. Most organizations only need one Web Interface. - -Password Reset can share server resources with other applications. It is normally not necessary to -dedicate a server exclusively to Password Reset. The Web Interface can be installed on an existing -web server as long as it is well secured and not overloaded. The Password Reset Server can run on an -existing member server or domain controller. - -### Single Server Installation - -Follow the steps below to install the Web Interface and Password Reset Server on a single server. - -**Step 1 –** Start the Password Reset Setup wizard (APR330.exe). - -**Step 2 –** The Setup wizard may ask you to backup some files if an older version of Password Reset -is detected. Backup the files, and then click **Next**. - -**Step 3 –** Click **Next**. - -**Step 4 –** Read the License Agreement. Click **I accept the terms of the license agreement**, and -then click **Next** if you accept all the terms. - -**Step 5 –** Select the **All Components** option, and then click **Next**. - -**Step 6 –** The Setup wizard may offer to install IIS. Click **OK** to install IIS. - -**Step 7 –** Enter a **User Name**, **Domain**, and **Password** for the Password Reset service -account. The account will be created and added to the Domain Admins group if it does not exist. - -**NOTE:** You can remove the account from the Domain Admins group later. If using an existing -account, make sure it has the required permissions. See the -[Securing Password Reset](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/securing_password_reset.md) topic for additional information. - -**Step 8 –** Click **Next**. - -**Step 9 –** Select an **IIS Web Site** from the drop-down list, and optionally change the default -**Virtual Directory** for the Web Interface. - -**NOTE:** The Web Interface should be installed in its own virtual directory. - -**Step 10 –** Click **Next** twice. - -**Step 11 –** Wait for Password Reset to install, and then click **Finish**. - -**NOTE:** The Password Reset Setup wizard installs the Password Reset Server and associated files -into the `\Program Files\NetwrixPassword Reset\` folder by default. Use the SERVERDIR parameter to -install the Password Reset Server to a different folder. For example, APR330.exe -SERVERDIR="D:\Programs\NPR\" - -### Multiple Server Installation - -Create firewall rules to allow the Web Interface and Password Reset Server to communicate if there -is a DMZ firewall between them. The Web Interface initiates a request by sending a datagram with the -following properties: - -| Web Interface Datagram | | -| ---------------------- | ---------------------------------- | -| Protocol | UDP | -| Source Address | Web Interface server's IP address | -| Source Port | Any | -| Destination address | Password Reset Server's IP address | -| Destination Port | 5100 | - -The Password Reset Server responds with a datagram that has the following properties: - -| NPR Server Datagram | | -| ------------------- | ---------------------------------- | -| Protocol | UDP | -| Source Address | Password Reset Server's IP address | -| Source Port | 5100 | -| Destination address | Web Interface server's IP address | -| Destination Port | Any | - -Install Password Reset Server on an Internal Network - -Follow the steps below to install the Password Reset Server on a server in the internal network. - -**Step 1 –** Start the Password Reset Setup wizard (APR330.exe). - -**Step 2 –** The Setup wizard may ask you to backup some files if an older version of Password Reset -is detected. Backup the files, and then click **Next**. - -**Step 3 –** Click **Next**. - -**Step 4 –** Read the License Agreement. Click **I accept the terms of the license agreement**, and -then click **Next** if you accept all the terms. - -**Step 5 –** Select the Server **Only option**, and then click **Next**. - -**Step 6 –** Type a **User Name**, **Domain**, and **Password** for the Password Reset service -account. The account will be created and added to the Domain Admins group if it does not exist. - -**NOTE:** You can remove the account from the Domain Admins group later. If using an existing -account, make sure it has the required permissions. See the -[Securing Password Reset](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/securing_password_reset.md) topic for additional information. - -**Step 7 –** Make sure the **Create Windows Firewall Exception for the NPR Server service** check -box is selected, and then click **Next** twice. - -**Step 8 –** Wait for the Password Reset Server to install, and then click **Finish**. - -**NOTE:** Open UDP port 5100 on the Password Reset Server computer if a host-based firewall other -than the Windows Firewall is installed. This is needed in addition to the DMZ firewall rules -above. -The Password Reset Setup wizard installs the Password Reset Server and associated files into the -`\Program Files\Netwrix Password Reset\` folder by default. Use the SERVERDIR parameter to install -the Password Reset Server to a different folder. For example, APR330.exe -SERVERDIR="D:\Programs\NPR\" - -Install Web Interface Server in DMZ - -Follow the steps below to install the Web Interface on a server in the DMZ. - -**Step 1 –** Start the Password Reset Setup wizard (APR330.exe). - -**Step 2 –** The Setup wizard may ask you to backup some files if an older version of Password Reset -is detected. Backup the files, and then click **Next**. - -**Step 3 –** Click **Next**. - -**Step 4 –** Read the License Agreement. Click **I accept the terms of the license agreement**, and -then click **Next** if you accept all the terms. - -**Step 5 –** Select the **Web Interface Only** option, and then click **Next**. - -**Step 6 –** The Setup wizard may offer to install IIS. Click **OK** to install IIS. - -**Step 7 –** Select an **IIS Web Site** from the drop-down list, and optionally change the default -**Virtual Directory** for the Web Interface. The Web Interface should be installed in its own -virtual directory. - -**Step 8 –** Click **Next** twice. - -**Step 9 –** Wait for the Web Interface to install, and then click **Finish**. - -**Step 10 –** Start the Registry Editor (regedit.exe). - -**Step 11 –** Expand the **HKEY_LOCAL_MACHINE**, **SOFTWARE**, **ANIXIS**, **ANIXIS Password -Reset**, and **3.0** registry keys. - -**Step 12 –** Set the **ServerIP** registry value to the IP address of the computer that you -installed the Password Reset Server onto. - -![installing_npr_1](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/installing_npr_1.webp) - -The Password Reset Setup wizard only installs one Web Interface on each server, but you can copy the -files to another directory and publish several Web Interfaces from one server. This allows you to -present different user interfaces from each directory. The Web Interfaces all communicate with the -same NPR Server because there is only one ServerIP value. - -Follow the steps below to configure the Web Interfaces to communicate with different Password Reset -Servers. - -**Step 1 –** Start the Registry Editor (regedit.exe). - -**Step 2 –** Expand the **HKEY_LOCAL_MACHINE**, **SOFTWARE**, **ANIXIS**, **ANIXIS Password Reset**, -and **3.0** registry keys. - -**Step 3 –** Clear the data in the **ServerIP** registry value. - -**Step 4 –** Create a REG_SZ value for each Web Interface called ServerIP_VDIR where VDIR is the -name of the virtual directory. - -For example, if the virtual directory is called Finance, then the registry value should be called -ServerIP_Finance. - -**Step 5 –** Set each ServerIP_VDIR value to the IP address of the Password Reset Server. - -## Upgrading From NPR V3.x - -Some planning is needed to ensure a smooth upgrade from NPR V3.x. A trial run on a lab network is -recommended if you have not installed NPR before. - -### Before You Begin - -The database files are not overwritten during an upgrade, but you should still create a backup -before upgrading. See the -[Backing up the Database](working_with_the_database.md#backing-up-the-database) topic for additional -information. - -**The Web Interface files are overwritten during an upgrade. You must backup any customized Web -Interface files before upgrading**. The Web Interface files are installed in the -`\Inetpub\wwwroot\pwreset\` folder by default. - -**NOTE:** A full backup of the NPR server(s) is recommended. This allows you to roll back to the -previous version if the upgrade cannot be completed. -You may need to restart Windows after upgrading. - -If Password Reset was originally installed by someone else and you do not have their installation -notes, then read the Installation topic before you begin. Also make sure you know the password for -the Password Reset Server service account as you will need it during the upgrade. - -### Upgrading to V3.3 - -Start the Password Reset Setup wizard (APR330.exe) and follow the prompts. The Setup wizard -uninstalls the previous version, so there is no need to manually uninstall it. - -If the Password Reset Server and Web Interface are installed on different servers, then upgrade all -servers before using the new version. The Password Reset Server and Web Interface are only tested -with matching versions. - -Restore any customized Web Interface files after upgrading. Do not restore APR.dll from the backup -as it belongs to the previous version. You should keep a copy of the original Web Interface files -and compare them with the files from the previous version using a file comparison tool. Any changes -between versions should be merged into your customized files. - -The Password Reset V3.30 data console does not read the VerificationCode or EnrollRecord columns -from the User table on SQL Server. Access to these columns can be denied for Data Console users -after upgrading all instances of the Data Console. See the -[Using the Data Console](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console.md) topic for additional information. - -## Upgrading From NPR V2.x - -As this is a major upgrade with many changes, some planning is needed to ensure a smooth upgrade. A -trial run on a lab network is recommended, especially if you are customizing the user interface. See -the [Editing the HTML Templates](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/editing_the_html_templates.md) topic for additional information. - -**CAUTION:** Due to a protocol upgrade, Netwrix Password Reset v3.3 is not compatible with Netwrix -Password Policy Enforcer v8.x and earlier versions. If you are using Netwrix Password Reset with any -of those older Netwrix Password Policy Enforcer versions, please consider upgrading Netwrix Password -Policy Enforcer first to a current version, and only then upgrade Netwrix Password Reset to v3.3 (or -later). - -### Before You Begin - -**Step 1 –** Backup the NPR V2.x server(s). - -**Step 2 –** Close the Data Console if it is open. - -**Step 3 –** Stop the Netwrix Password Reset service and backing up the database. See the -[Backing up the Database](working_with_the_database.md#backing-up-the-database) topic for additional -information. - -### Upgrading to V3.23 - -**Step 1 –** Follow the steps for either Single Server Installation or Multiple Server Installation. -If the Web Interface is on a different server, then upgrade it as well. - -**Step 2 –** Open the Data Console, and check the Audit Log and User tabs to make sure the data was -imported. - -**Step 3 –** Open NPR in a web browser and test the Enroll, Reset, and Change features. - -**Step 4 –** Install your new license key if you have a perpetual license. - -**Step 5 –** Update the Client license key if you have a perpetual license. - -## Other Tasks - -Move Database files - -The database files are created in the installation folder when NPR is first installed. The default -installation folder for NPR V2.x was below the Program Files (x86) folder, but in NPR V3.3 it is -below the Program Files folder. The database files are not moved automatically during an upgrade, so -you should move them to the new installation folder (or a different folder) after upgrading. - -Follow the steps below to move the database files to the `\Program Files\Netwrix Password Reset\` -folder. - -**Step 1 –** Close the Data Console if it is open. - -**Step 2 –** Stop the Netwrix Password Reset service. - -**Step 3 –** Move apr.sdf and aprlog.sdf from the \Program Files (x86)\Netwrix Password Reset\ -folder to the \Program Files\Netwrix Password Reset\ folder. - -**Step 4 –** Open the Configuration Console. - -**Step 5 –** Click the **General** tab. - -**Step 6 –** Click **Change...** - -**Step 7 –** Click **Browse...** and then browse to the \Program Files\Netwrix Password Reset\ -folder. - -**Step 8 –** Click **OK** twice, and then click **Apply**. - -**Step 9 –** Start the Netwrix Password Reset service. - -**Step 10 –** Update the backup script to copy from the new folder. See the -[Backing up the Database](working_with_the_database.md#backing-up-the-database) topic for additional -information. - -Configure Password Reset Client to use IE11 emulation mode - -Older versions of the Password Reset Client display pages in Internet Explorer 7 emulation mode. -This mode cannot display the new HTML templates correctly. You can upgrade the Password Reset Client -to the latest version, or configure existing installations to use IE 11 mode. This only works on -Windows Vista and later with IE 9 or later. - -Follow the steps below to configure the Password Reset Client to use IE 11 mode. - -**Step 1 –** Start the Registry Editor (regedit.exe). - -**Step 2 –** Expand the **HKEY_LOCAL_MACHINE**, **SOFTWARE**, **Microsoft**, **Internet Explorer**, -**MAIN**, **FeatureControl**, and **FEATURE_BROWSER_EMULATION** registry keys. - -**Step 3 –** Create a new DWORD value called **LogonUI.exe**, and set it to 2AF8 (hex). - -Create this registry value on all the Password Reset Client computers. IE 11 mode can be requested -even if the computer is running an older version of IE. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/moving_to_sql_server.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/moving_to_sql_server.md deleted file mode 100644 index 1d21eb1697..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/moving_to_sql_server.md +++ /dev/null @@ -1,119 +0,0 @@ -# Moving to SQL Server - -Some planning is needed before moving the database to SQL Server. A trial run on a lab network is -recommended. You can run the Data Copy wizard more than once if you cannot complete the move on the -first attempt. A move back to SQL Server Compact is also possible. - -### Create the Database - -Your database administrator needs to set up the SQL Server database. The instructions below are an -overview of the procedure, they are not step-by-step instructions. NPR V3.30 has been tested with -SQL Server 2012 to 2019. - -Follow the instructions below for an overview of the procedure. - -**Step 1 –** Create an SQL Server database. - -**Step 2 –** Create an SQL Server login for the Password Reset service account, and configure it for -Windows authentication. To identify the service account, open services.msc, double-click the -Password Reset service, and then click the Log On tab. Password Reset logs on to SQL Server with -this account. - -![working_with_the_database](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/working_with_the_database.webp) - -**Step 3 –** Create an SQL Server user, and map it to the service account login. - -**Step 4 –** Add the SQL Server user to the db_datareader, db_datawriter, and db_ddladmin server -roles for the database. - -Your database administrator also needs to grant access to the users that will use the Data Console. -These users only need to be added to the db_datareader server role, and they can be denied access to -the VerificationCode and EnrollRecord columns in the User table. The user running the Data Copy -wizard also needs to be added to the db_datawriter and db_ddladmin server roles. - -Additional permissions can be set for users of the Data Console after the tables are created. Grant -the DELETE privilege on the User table to users who are allowed to delete user records. Deny all -privileges on the VerificationCode and EnrollRecord columns in the User table as they are not used -by the Data Console. - -### Create the Tables and Copy the Data - -The Data Copy wizard creates the database tables and copies the data to SQL Server. You must run the -wizard even if the SQL Server Compact database is empty. Data in the destination database is deleted -before it is copied from the source database. - -Follow the steps below to create the tables and copy the data. - -**Step 1 –** Open the Configuration Console. - -**Step 2 –** Click the **General** tab. - -**Step 3 –** Click **Copy Data...** to open the Data Copy wizard. - -**Step 4 –** Click **Copy from SQL Compact to SQL Server**. - -**Step 5 –** Check the path to the SQL Server Compact database files. If the default path is -incorrect, then click **Browse...**, choose a path, and then click **OK**. - -**Step 6 –** Click **Next**. - -**Step 7 –** Set the SQL Server connection settings for the Data Copy wizard. You can set different -connection settings for the service account later. The **Username** and **Password** are only needed -if **SQL Server Authentication** is selected. The user must be in the db_datareader, db_datawriter, -and db_ddladmin SQL Server roles. **Encrypt connection** should be selected to protect user -information, and **Trust server certificate** must be selected if SQL Server is using a self-signed -certificate. SQL Server uses a self-signed certificate if a trusted certificate is not installed. -The SQL Server Native Client must be installed if **Trust server certificate** is selected. - -![working_with_the_database_1](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/working_with_the_database_1.webp) - -**Step 8 –** Click **Next**. - -**Step 9 –** Check the summary information, and then click **Start**. - -**Step 10 –** Wait for the wizard to finish, and then click **Close**. - -### Configure Netwrix Password Reset to Connect to SQL Server - -Configure Password Reset to connect to SQL Server immediately after copying the data. If the cutover -is delayed, then run the Data Copy wizard again to update the SQL Server database with the latest -data. To configure Password Reset to connect to SQL Server: - -**Step 1 –** Open the Configuration Console. - -**Step 2 –** Click the **General** tab. - -**Step 3 –** Click **Change...** - -**Step 4 –** Select the **SQL Server** option. - -**Step 5 –** Type the server name in the **Server** text box. Use `[server]\[instance]` to connect -to a named instance. - -**Step 6 –** Type the database name in the **Database** text box. - -**Step 7 –** Select the **Encrypt connection** option to encrypt the connection to SQL Server. This -option should be selected to protect user information. - -**Step 8 –** Select the **Trust server certificate** option if SQL Server is using a self-signed -certificate. SQL Server uses a self-signed certificate if a trusted certificate is not installed. -Password Reset cannot connect to SQL Server with a self-signed certificate if this option is not -selected. The SQL Server Native Client must be installed if **Trust server certificate** is -selected. - -**Step 9 –** Click **OK**, and then click **Apply**. - -**Step 10 –** Restart the Password Reset service. If the service does not start, then check the -database connection options and the SQL Server login, user, and server roles configured earlier. You -can change the database back to SQL Server Compact while you troubleshoot the issue. - -### Other Tasks - -Open the Data Console and set your SQL Server connection options. You will need to enter a password -every time you open the Data Console if **SQL Server Authentication** is selected. The Data Console -executable and help file (APRDC.exe and CHM_NPR.chm) can be copied to the computers of other users -who will use the Data Console. - -Delete the two SQL Server Compact database files (apr.sdf and aprlog.sdf) after cutting over to SQL -Server. These files will soon contain outdated information, and leaving them on the server is an -unnecessary security risk. Also ensure that the SQL Server database is backed up regularly. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/password_reset_client.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/password_reset_client.md deleted file mode 100644 index e0d6bb5476..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/password_reset_client.md +++ /dev/null @@ -1,240 +0,0 @@ -# Password Reset Client - -The Password Reset Client allows users to securely reset their password or unlock their account from -the Windows Logon and Unlock Computer screens. Users click **Reset Password** to access the Password -Reset system. - -![the_password_reset_client_905x750](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/the_password_reset_client_905x750.webp) - -**NOTE:** The Password Reset Client does not modify any Windows system files. - -## Installing the PRC - -The Password Reset Client is designed to run on Windows XP to Windows 10, and Server 2003 to -Server 2019. The PRC is compatible with Remote Desktop Services on these operating systems. Support -for Windows XP and Server 2003 is depreciated because the PRC uses Internet Explorer for page -rendering, and Internet Explorer 8 has very limited support for HTML5. Send an e-mail to -[support@netwrix.com ](mailto:support@netwrix.com)if you need to use the Password Reset Client with -these older operating systems. - -### System Requirements - -- Windows Vista, 7, 8, 8.1, or 10. - Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, or 2019. - Windows XP, Server 2003, or 2003 R2 (depreciated). -- 1 Megabyte free disk space. -- 128 Kilobytes free RAM (per session if using Remote Desktop Services). - -You can install the PRC manually if you only have a few computers, but it is easier to perform an -automated installation if you have many computers. Follow the instructions below to perform an -automated installation with Group Policy. - -### Create a Distribution Point - -A distribution point can either be a UNC path to a server share, or a DFS (Distributed File System) -path. Organizations with large, multi-site networks should use DFS as it offers fault tolerance and -load sharing. To create a PRC distribution point: - -**Step 1 –** Log on to a server as an administrator. - -**Step 2 –** Create a shared network folder to distribute the files from. - -**Step 3 –** Give the Domain Computers security group read access to the share, and limit write -access to authorized personnel only. - -**Step 4 –** Copy NPRClt330.msi into the distribution point folder. - -**NOTE:** NPRClt330.msi is in the Client folder below the Netwrix Server's installation folder. -(`\Program Files\Netwrix Password Reset\` by default). - -**Step 5 –** Give the Domain Computers security group read access to the NPRClt330.msi file in the -distribution point. - -### Create a Group Policy Object - -**Step 1 –** Start the Group Policy Management Console (gpmc.msc). - -**Step 2 –** Expand the forest and domain items in the left pane. - -**Step 3 –** Right-click the domain root node in the left pane, and then click **Create a GPO in -this domain, and Link it here...** - -**Step 4 –** Enter **Password Reset Client**, then press **ENTER**. - -![the_password_reset_client_1_895x652](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/the_password_reset_client_1_895x652.webp) - -### Edit the Group Policy Object - -**Step 1 –** **Right-**Click the **Password Reset Client GPO**, then click the Edit**...** button. - -**Step 2 –** Expand the **Computer Configuration**, **Policies**, and **Software Settings** items in -the left pane. - -**Step 3 –** **Right-Click** the **Software installation** item, and then select **New** > -**Package**. - -**Step 4 –** Enter the full UNC path to NPRClt330.msi in the Open dialog box. - -**NOTE:** You must enter a UNC path so that other computers can access this file over the network. -For example, \\file server\distributionpointshare\NPRClt330.msi - -**Step 5 –** Click **Open**. - -**Step 6 –** Select the **Assigned deployment** method, then click **OK**. - -**Step 7 –** Close the Group Policy Management Editor. - -### Complete the Installation - -Restart each computer to complete the installation. Windows installs the Password Reset Client -during startup. The computer may restart itself automatically to complete the installation. - -**NOTE:** Computers with Fast Logon Optimization enabled may not install the Password Reset Client -during the first restart. These computers perform a background refresh of Group Policy, and will -install the client on the first restart after the refresh. See the Microsoft Description of the -[Windows Fast Logon Optimization feature](https://support.microsoft.com/en-us/topic/description-of-the-windows-fast-logon-optimization-feature-9ca41d24-0210-edd8-08b0-21b772c534b7) -article for additional information on the Fast Logon Optimization feature. - -## Configuring the PRC - -You must install an Active Directory administrative template to configure the Password Reset Client. -The administrative template only has to be installed once. - -Install PRC Administrative Template - -Follow the steps below to install the PRC administrative template. - -**Step 1 –** Use the Group Policy Management Console (gpmc.msc) to display the GPOs linked at the -domain level. - -**Step 2 –** **Right-click** the **Password Reset Client** GPO, and then **click** the -**Edit...**button. - -**Step 3 –** Expand the **Computer Configuration** item. - -**Step 4 –** Expand the **Policies** item if it is visible. - -**Step 5 –** **Right-click** the **Administrative Templates** item, and then click **Add/Remove -Templates...** - -**Step 6 –** Click **Add...** and then browse to the Client folder below the Password Reset Server's -installation folder. (`\Program Files\Netwrix Password Reset\` by default). - -**Step 7 –** Select **NPRClt.adm**, and then click **Open**. - -![the_password_reset_client_2](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/the_password_reset_client_2.webp) - -**Step 8 –** Click **Close**. - -Configure the PRC - -Follow the steps below to configure the Password Reset Client. - -**Step 1 –** Use the Group Policy Management Console (gpmc.msc) to display the GPOs linked at the -domain level. - -**Step 2 –** **Right-click** the **Password Reset Client** GPO, then click the **Edit...** button. - -**Step 3 –** Expand the **Computer Configuration, Policies** (if it exists), **Administrative -Templates**, **Classic Administrative Templates (ADM)**, **Netwrix Password Reset**, and **Password -Reset Client** items. - -![the_password_reset_client_3](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/the_password_reset_client_3.webp) - -**Step 4 –** Double-click the **Browser settings** item in the right pane of the Group Policy -Management Editor. - -![the_password_reset_client_4](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/the_password_reset_client_4.webp) - -**Step 5 –** Select the **Enabled**option. - -**Step 6 –** Enter the desired **Width** and **Height** of the PRC browser window. - -**NOTE:** Set the Width and Height to 0 to have the PRC calculate an appropriate size. - -**Step 7 –** Enter the **Start address** (URL) of the Password Reset system. The URL should point to -the Password Reset menu or reset page. - -**NOTE:** The Start address should follow this format: -`HTTPS://(your domain or IP address)/pwrest/en_default.htm` -This format helps ensure that the URL points to the correct location on your Password Reset server. - -**Step 8 –** Enter a **Restricted path** (URL) to stop users from following links to other sites -from the Password Reset Client browser. - -**NOTE:** The Restricted path should follow this format: -`HTTPS://(your domain or IP address)/pwrest/` -This will help prevent users from navigating to untrusted sites within the Password Reset Client. - -**Step 9 –** Click **OK**. - -**Step 10 –** Close the Group Policy Management Editor. - -The new PRC configuration is applied to all computers in the domain. This does not happen -immediately, as Windows takes some time to apply the changes to Group Policy. You can force an -immediate refresh of Group Policy on the local computer with the following command: gpupdate -/target:computer - -The Password Reset Client only opens URLs with .dll, .htm, and .html extensions. URLs without a -filename are not opened. The PRC also blocks some page content, including audio and video files, -ActiveX controls and Java applets. Send an e-mail to -[support@netwrix.com ](mailto:support@netwrix.com)if you need to change the default filename and -content restrictions. - -**CAUTION:** Users may follow links to untrusted sites if the Password Reset user interface or -server error pages contain external links. This is a security risk because the Password Reset Client -runs under the context of the local system account. Specify a restricted path to stop users from -following links to other sites from the Password Reset Client. The start address and restricted path -should both begin with https:// - -**NOTE:** The **Enable Password Reset Client**, **Always show reset link**, and **Dialog attachment -delay** are automatically set by the Password Reset Client, and are normally left in their default -(Not configured) state. -The administrative template contains detailed information about all the PRC configuration settings. -This information is shown on the **Help** box. The **Help** box is shown after you double-click one -of the configuration settings in the left pane. - -## Licensing the PRC - -Follow the steps below to add a license key to the PRC configuration. - -**Step 1 –** Open the **Configuration Console** and install your license key. - -**Step 2 –** Start the **Registry Editor** (regedit.exe). - -**Step 3 –** Expand the **HKEY_LOCAL_MACHINE**, **SOFTWARE**, **ANIXIS**, **ANIXIS Password Reset**, -and **3.0** registry keys. - -**NOTE:** The LicenseKey registry value should be located on the Password Reset Server. This is the -machine where you have installed the Password Reset server component, not the client machines. - -**Step 4 –** Double-click the **LicenseKey** value, and then copy the entire license key to the -clipboard. - -**Step 5 –** Use the Group Policy Management Console (gpmc.msc) to display the GPOs linked at the -domain level. - -**Step 6 –** Right-click the **Password Reset Client** GPO, then click the **Edit...** button. - -**Step 7 –** Expand the **Computer Configuration**, **Policies** (if it exists), **Administrative -Templates**, **Classic Administrative Templates (ADM)**, **Netwrix Password Reset**, and **Password -Reset Client** items. - -**Step 8 –** Double-click the **License key** item in the Left pane of the Group Policy Management -Editor. - -**Step 9 –** Select the **Enabled** option. - -**Step 10 –** Click inside the **License key** text box, then paste the license key. - -![the_password_reset_client_5](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/the_password_reset_client_5.webp) - -**Step 11 –** Click **OK**. - -**Step 12 –** Close the Group Policy Management Editor. - -The license key is applied to all computers in the domain. This does not happen immediately, as -Windows takes some time to apply the changes to Group Policy. You can force an immediate refresh of -Group Policy on the local computer with the following command: - -`gpupdate /target:computer` diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/permissions_tab.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/permissions_tab.md deleted file mode 100644 index be7cb12c36..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/permissions_tab.md +++ /dev/null @@ -1,25 +0,0 @@ -# Permissions Tab - -Use the **Permissions** tab to control which users can use Password Reset. - -![configuring_npr_9](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_9.webp) - -### Enroll - -Select the **Allow all users to enroll** option if all users are permitted to enroll. Only enrolled -users can reset passwords and unlock accounts. - -Select the **Allow only members of these groups to enroll** option if users are permitted to enroll -only if they belong to a specified group. Click **Add...** to choose which groups are permitted to -enroll. - -Select the **Allow all users except members of these groups to enroll** option if users are -permitted to enroll unless they belong to a specified group. Click **Add...** to choose which groups -are not permitted to enroll. - -To remove a group from the list, select it and then click **Remove**. Enrolled users can continue to -reset their passwords and unlock their accounts even if they are no longer allowed to enroll. - -### Change - -These settings specify which users can change their password with Password Reset. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/persuading_users_to_enroll.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/persuading_users_to_enroll.md deleted file mode 100644 index 0da47ba46e..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/persuading_users_to_enroll.md +++ /dev/null @@ -1,76 +0,0 @@ -# Persuading Users to Enroll - -The Web Interface includes a REST API which your web sites and applications can query to determine -if a user is enrolled. Your web site or application can take appropriate action to encourage the -user to enroll. This could be anything from displaying a discreet message to denying access until -the user enrolls. - -## Enabling the API - -The API is disabled by default. If an attacker sends many queries to the API, they could try to -guess the domain and user names of enrolled users. They could get the same information by sending -many requests to the Web Interface.API is the more attractive target because API responds faster and -API queries are not logged to the Audit Log. - -If you do not want to enable the API because your Web Interface is accessible from the Internet, -then you could leave the API disabled on your Internet-facing Web Interface and set up an internal -Web Interface for API queries. Use the ServerIP registry value to point both Web Interfaces to the -same NPR Server, and enable the API only on the internal server. See the -[Multiple Server Installation](installation.md#multiple-server-installation) topic for more -information. - -Follow the steps below to enable the API. - -**Step 1 –** Start the Registry Editor (regedit.exe). - -**Step 2 –** Expand the **HKEY_LOCAL_MACHINE**, **SOFTWARE**, **ANIXIS**, **ANIXIS Password Reset**, -and **3.0** registry keys. - -**Step 3 –** Create a new **DWORD** value called **WebAPIState**, and set it to 1. - -![persuading_users_to_enroll](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/persuading_users_to_enroll.webp) - -## Querying the API - -Send a GET request with the user's Active Directory domain and user name like: - -GET https://[server]/pwreset/apr.dll/api/enrollments/**[domain]**/**[user]** - -You can also use the User Principal Name (UPN): - -GET https://[server]/pwreset/apr.dll/api/enrollments/upn/**[user@domain]** - -## Interpreting the Response - -There are three possible responses: - -| Response | Meaning | -| ----------------------- | -------------------------------------- | -| `{"isEnrolled": true}` | User is enrolled | -| `{"isEnrolled": false}` | User is not enrolled or does not exist | -| `{}` | System maintenance is running | - -The API may also return one of these HTTP errors: - -| Error | Reason | -| ------------------------- | ------------------------------------------ | -| 400 Bad Request | Invalid request path | -| 403 Forbidden | API disabled, or cannot read configuration | -| 500 Internal Server Error | Other error | - -## Performance and Caching - -API performance is dependent on many factors. Synchronous queries will suffice in most cases, but -asynchronous queries are recommended to avoid delays. - -Avoid unnecessary calls to the API as they can overload the server. Try to call the API only once -after users logon. - -Caching improves performance and increases capacity. When the API sends a **user is enrolled** -response, it requests caching for up to two weeks. The web browser should cache the response and use -it for the next two weeks before querying the server again. No caching is requested for other -responses. - -**NOTE:** You may get a **user is enrolled** response after deleting an enrolled user when testing -the API. Clearing the browser cache may fix this, but not if other HTTP caches have cached the -response. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/securing_password_reset.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/securing_password_reset.md deleted file mode 100644 index 6dae8ba894..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/securing_password_reset.md +++ /dev/null @@ -1,106 +0,0 @@ -# Securing Password Reset - -Password Reset has many inbuilt security features, but there are some things you should do to secure -Password Reset. The most important of these is to install an SSL certificate for the Web Interface. -You can also set up a standard user account with delegated permissions for the Password Reset -Server. - -## Installing and Using an SSL Certificate - -The Web Interface and Password Reset Server always communicate over a secure channel. You do not -have to configure the encryption for this connection, but you do need to set up SSL (Secure Sockets -Layer) encryption for the connection between the web browser (or Password Reset Client) and the web -server. See the [Password Reset Client](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/password_reset_client.md) topic for more information. - -**CAUTION:** Do not use Password Reset on a production network without SSL encryption. - -You can use a self-signed certificate with Password Reset, but most organizations purchase -certificates from a certificate authority. You can install the Web Interface on a server that -already has an SSL certificate if you would rather not purchase another one. - -Your certificate authority will have instructions to guide you through the certificate request and -installation process. You can also learn more about using SSL certificates with IIS on the pages -below. - -- [http://www.iis.net/learn/manage/configuring-security/how-to-set-up-ssl-on-iis](http://www.iis.net/learn/manage/configuring-security/how-to-set-up-ssl-on-iis) -- [http://technet.microsoft.com/en-us/library/cc732230(WS.10).aspx](http://technet.microsoft.com/en-us/library/cc732230(WS.10).aspx) - -**NOTE:** Ensure that users only access Password Reset over an encrypted connection after the SSL -certificate is installed. The Start address and Restricted path in the Password Reset Client -configuration should start with https://. Web browsers can be redirected to the secure URL. See the -[Configuring the PRC](password_reset_client.md#configuring-the-prc) topic for more information. - -## Delegating Permissions to the Netwrix Password Reset Server Service - -When the Setup wizard creates a service account for the Password Reset Server, it adds the account -to the Domain Admins group. This allows Password Reset to start working without additional -configuration, but it also gives the service excessive permissions. You can improve security by -removing the service account from the Domain Admins group and granting only the required -permissions. - -You can grant Active Directory permissions from the command-line with dsacls.exe, or with the -graphical user interface. The examples below use the command-line, but you can use either method. -The commands you need to execute are: - -dsacls "[object]" /I:S /G "[account]:CA;Reset Password;user" - -dsacls "[object]" /I:S /G "[account]:RPWP;lockoutTime;user" - -dsacls "[object]" /I:S /G "[account]:RPWP;pwdLastSet;user" - -Where [object] is the distinguished name of the domain or OU containing the user accounts, and -[account] is the name of the service account in user@domain or domain\user format. - -The first two commands allow NPR to reset passwords and unlock accounts. Both commands are required -even if the Unlock item is hidden from the menu because Password Reset automatically unlocks an -account when its password is reset. The third command allows Password Reset to set **User must -change password at next logon** in Active Directory if the **Require users to change their password -after a reset** option is enabled in the Configuration Console's **Security** tab. - -For example, the following command grants the axs\apr account permission to reset passwords for -users in the axs.net domain: - -dsacls "dc=axs,dc=net" /I:S /G "axs\apr:CA;Reset Password;user" - -If Password Reset is configured to use an SQL Server Compact database, then give the service account -read and write permissions to the database files. See the -[Moving to SQL Server](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/moving_to_sql_server.md) topic for more information. - -Remove the service account from the Domain Admins group and restart the Password Reset service after -executing these commands. Check the Windows Application event log if the service does not start. - -### Using Delegated Permissions with Protected Groups - -When you delegate permissions for the Password Reset service account, the delegated permissions are -initially applied to all users in the domain or OU. After some time, Windows restores the original -permissions for some important user accounts. The restored permissions do not allow Password Reset -to reset passwords or unlock accounts for these users. - -The accounts protected by this feature vary by Windows version, and include members of the Domain -Admins, Enterprise Admins, and Schema Admins groups. The list of protected groups is configurable, -so it may differ from the defaults in the Windows documentation. - -If you are using an Password Reset service account with delegated permissions and do not want these -privileged accounts to reset their password or unlock their account with Password Reset, then there -is no need to make any configuration changes. Windows automatically restores the original -permissions for these accounts. This is done every hour by default. - -If you want to allow these users to reset their password and unlock their account with Password -Reset, then you need to change the permissions for the AdminSDHolder container. The commands you -need to execute are: - -dsacls "[AdminSDHolder]" /G "[account]:CA;Reset Password" - -dsacls "[AdminSDHolder]" /G "[account]:RPWP;lockoutTime" - -dsacls "[AdminSDHolder]" /G "[account]:RPWP;pwdLastSet" - -Where [AdminSDHolder] is the distinguished name of the AdminSDHolder container, and [account] is the -name of the service account in user@domain or domain\user format. -The DN of the AdminSDHolder container for the netwrix.com domain is -CN=AdminSDHolder,CN=System,DC=netwrix,DC=com - -**NOTE:** Changes to the AdminSDHolder container are not applied to accounts immediately. You may -need to wait up to an hour for Windows to update the DACL for these accounts. You can also start the -process manually. Search for runProtectAdminGroupsTask or FixUpInheritance in Microsoft's -documentation or more information. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/security_tab.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/security_tab.md deleted file mode 100644 index 4706ded1f5..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/security_tab.md +++ /dev/null @@ -1,65 +0,0 @@ -# Security Tab - -Use the **Security** tab to configure the inactivity timeout, password reset policies, and the -lockout threshold. - -![configuring_npr_8](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_8.webp) - -### Inactivity Timeout - -Users should remain at their computer while resetting their password or unlocking their account. -Their account could be compromised if they leave their computer after answering the first question. -NPR protects user accounts by expiring sessions if users take too long to respond. Select the -inactivity timeout from the **Expire idle sessions after...** drop-down list. Set it to 0 seconds to -disable the inactivity timeout. - -### Reset Policies - -Select the **Enforce the AD password history and minimum age policies for resets** check box to -enforce these Active Directory password policies during a reset. Older Windows versions cannot -enforce these policies for password resets. This capability was added as a hotfix for Windows 2008 -and 2008 R2. See the [KB2386717](http://support.microsoft.com/kb/2386717) Microsoft knowledge base -article for additional information. The hotfix is included with SP1 for Windows 2008 R2, and is a -standard feature on later Windows versions. - -Users are more likely to forget a password shortly after changing it. Enforcing a minimum age for -password resets may increase the number of help desk calls because users won't be able to reset -recently changed passwords. One solution is to clear the check box above, and select the **Require -users to change their password after a reset** check box instead. The Active Directory password -history policy won't be enforced for the password reset, but it will be enforced for the password -change when the user logs on. This stops users from reusing a recent password, but it won't stop -them from resetting a recently changed password. - -Users whose passwords are set to never expire in Active Directory will not be forced to change their -password during logon, even if this check box is selected. - -**NOTE:** Password Policy Enforcer's History rule is enforced for password resets if the **Enforce -policy when password is reset** check box is selected in the PPS properties page, and if the -**Enforce this rule when a password is reset** check box is selected in the History rule's -properties page. Netwrix Password Policy Enforcer does not enforce the Minimum Age rule for password -resets. See the Security Tab topic for additional information. - -Users may try to evade the password history policy by resetting their password several times in -quick succession to push a password off the password history list. Select a value from the -**Passwords can only be reset if they are at least...** drop-down list to stop users from doing -this. Set it to 0 days to disable this feature. If the Active Directory minimum password age policy -is also enforced for password resets, then the effective minimum age is the greater of the AD and -NPR minimum ages. - -### Lockout - -Password Reset's lockout should not be confused with the Windows lockout policy. A Windows lockout -stops users from logging on, whereas an Password Reset lockout stops users from resetting their -password and unlocking their account. Windows locks out users when they enter too many incorrect -passwords. Password Reset locks out users when they enter too many incorrect answers or verification -codes. - -Select a value from the **Lockout user after...** drop-down list to specify how many incorrect -answers Password Reset accepts before locking out a user. Set it to 0 incorrect answers to disable -the lockout feature. Incorrect verification codes are counted as incorrect answers if the **Lockout -users if they enter too many incorrect verification codes** check box is selected on the -**Verification** tab. - -**NOTE:** Locked out users must re-enroll before they can use Password Reset to reset their password -or unlock their account. The incorrect answer count is reset when a user enrolls, or answers all -questions during a reset or unlock. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_password_reset.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_password_reset.md deleted file mode 100644 index c9b89a62fb..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_password_reset.md +++ /dev/null @@ -1,156 +0,0 @@ -# Using Password Reset - -Netwrix Password Policy Enforcer is a web application. Users can access it from a web browser, or -from the Password Reset Client. The default URL for the Web Interface -is:` http://[server]/pwreset/` -See the [Password Reset Client](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/password_reset_client.md) topic for more information. - -You can use URL parameters to open a specific page, and to set the user and domain names. For -example: `http://[server]/pwreset/apr.dll? cmd=enroll&username=johnsmith&domain=CORP` - -Where [server] is the name or IP address of the server hosting the Web Interface. - -![using_npr_866x634](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_866x634.webp) - -Users access the Enroll, Reset, Unlock, and Change features from the menu. These features are -explained on the following pages. - -**CAUTION:** The connection between the Web Interface and Password Reset Server is always encrypted. -Install an SSL certificate on the web server and use HTTPS to encrypt connections from the browser -to the web server. See the -[Installing and Using an SSL Certificate](securing_password_reset.md#installing-and-using-an-ssl-certificate) -topic for more information. - -## Enroll - -Only enrolled users can reset their password and unlock their account. Users can enroll manually by -answering some questions about themselves, or they can be enrolled automatically if automatic -enrollment is enabled. Users only need to enroll once, but they can enroll again if they are locked -out of Password Reset, or if they want to change their questions or answers. See the -[Verification Codes](verification_tab.md#verification-codes) and -[Verification Tab](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/verification_tab.md) topics for more information. - -Follow the steps below to manually enroll into Password Reset. - -**Step 1 –** Click the **Enroll** item in the menu. - -![using_npr_0_765x963](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_0_765x963.webp) - -**Step 2 –** Type a **Username**, **Domain**, and **Password**. - -**Step 3 –** Type an e-mail address if the **E-mail** text box is visible. See the -[Options](enroll_tab.md#options) topic for more information. - -**Step 4 –** Select a question from each of the **Question** drop-down lists, and type an answer to -each question in the **Answer** text boxes. - -**Step 5 –** Click **Next**, and then click **OK** to return to the menu. - -**NOTE:** Windows increments the bad password count in Active Directory when a user tries to enroll -with an incorrect password. This may trigger a lockout if the Windows account lockout policy is -enabled. - -## Reset - -Users should use the Reset feature if they have forgotten their password. Resetting a password also -unlocks the account if it is locked. - -Follow the steps below to reset an account password. - -**Step 1 –** Click the **Reset** item in the menu. - -![using_npr_1_824x469](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_1_824x469.webp) - -**Step 2 –** Type a **Username** and **Domain**, and then click **Next**. - -![using_npr_2_809x640](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_2_809x640.webp) - -**Step 3 –** Type the **Answer** to the first question, and then click **Next**. Repeat until all -questions are answered correctly. - -![using_npr_3](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_3.webp) - -**Step 4 –** You may be asked to enter a verification code. The verification code is sent to your -phone by e-mail or SMS. Type the **Code**, and then click **Next**. - -![using_npr_5](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_5.webp) - -**Step 5 –** Type the new **Password** into both text boxes, and then click **Next**. - -![using_npr_6](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_6.webp) - -**Step 6 –** Click **OK** to return to the menu. - -## Unlock - -Users should use the Unlock feature if they know their password, but have entered it incorrectly too -many times and locked out their account. - -Follow the steps below to unlock an account. - -**Step 1 –** Click the **Unlock** item in the menu. - -![using_npr_7](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_7.webp) - -**Step 2 –** Type a **Username** and **Domain**, and then click **Next**. - -![using_npr_4_842x816](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_4_842x816.webp) - -**Step 3 –** Type the **Answer** to the first question, and then click **Next**. Repeat until all -questions are answered correctly. - -![using_npr_8](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_8.webp) - -**Step 4 –** You may be asked to enter a verification code. The verification code is sent to your -phone by e-mail or SMS. Type the **Code**, and then click **Next**. - -![using_npr_9_789x276](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_9_789x276.webp) - -**Step 5 –** Click **OK** to return to the menu. - -**NOTE:** The Unlock feature unlocks accounts in Active Directory. Users who are locked out of -Password Reset should re-enroll to gain access to Password Reset. See the -[Verification Codes](verification_tab.md#verification-codes) topic for more information. - -## Change - -Users should use the Change feature if they know their password and would like to change it. - -Follow the steps below to change an account password. - -**Step 1 –** Click the **Change** item in the menu. - -![using_npr_10_771x440](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_10_771x440.webp) - -**Step 2 –** Type a **Username** and **Domain**, and then click **Next**. - -![using_npr_11_773x593](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_11_773x593.webp) - -**Step 3 –** Type the **Old Password**, **New Password**, and **Confirm Password**, and then click -**Next**. - -**Step 4 –** Click **OK** to return to the menu. - -**NOTE:** Windows increments the bad password count in Active Directory when a user tries to change -their password with an incorrect password. This may trigger a lockout if the Windows account lockout -policy is enabled. - -## Error Messages - -Validation errors are shown in a red box below the page instructions. Validation errors are normally -caused by invalid user input. They can often be overcome by changing the value of one or more input -fields and resubmitting the form. - -![using_npr_12](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_12.webp) - -Critical errors are shown on their own page. These errors are mostly a result of configuration or -system errors. An event may be written to the Windows Application event log on the Password Reset -Server computer when a critical error occurs. Users can sometimes overcome a critical error by -following the instructions in the error message, but most critical errors are beyond the user's -control. - -![using_npr_13](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_npr_13.webp) - -Validation and critical error messages are stored in the HTML templates. You can modify the default -messages by editing the templates. See the -[Resource Strings](editing_the_html_templates.md#resource-strings) topic for more information. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console.md deleted file mode 100644 index 50ce193872..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console.md +++ /dev/null @@ -1,51 +0,0 @@ -# Using the Data Console - -The Data Console allows you to view and export data collected by Password Reset. Click **Start** > -**Netwrix Password Reset** > **NPR Data Console** to open the console. - -The Data Console has three tabs. The **Recent Activity** tab shows a chart of recent requests. The -chart is empty when Password Reset is first installed, but it will populate itself as the system is -used. - -![using_the_data_console](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console.webp) - -The bars in the chart show how many successful enrollments, resets, unlocks, and changes occurred -every day. You can click the bars to see a filtered view of the events for that day. For example, -you could click the blue bar on 2/19/2015 to see all the password resets for that day. - -![using_the_data_console_1_1393x772](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_1_1393x772.webp) - -The resulting view shows only the 15 successful password resets on 2/19/2015. These are shown in the -**Audit Log** tab. You can create your own filter to find events in this tab. See the -[Custom Filters](filtering_data.md#custom-filters) topic for additional information. You can drag a -column's header to rearrange the columns, or click a column header to sort the records. - -The **Audit Log** tab has nine columns: - -- Type — Event type (Success or Failure) -- Date — Event date -- Time — Event time -- Source — Event source (Reset, Unlock, etc.) -- User — User's Active Directory user logon name -- Domain — User's Active Directory domain -- Event — A description of the event -- Source IP — The request's source IP address -- Source User — The request's source username (blank if anonymous access is enabled) - -The **Users** tab contains Information about each user. All users are shown by default, but you can -create filters to find specific users. - -![using_the_data_console_2_1317x725](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/using_the_data_console_2_1317x725.webp) - -The **Users** tab has seven columns: - -- User — User's Active Directory user logon name -- Domain — User's Active Directory domain -- E-mail — E-mail address entered during enrollment -- Last Enroll — Date and time of last successful enroll -- Last Reset — Date and time of last successful password reset -- Last Unlock — Date and time of last successful account unlock -- Last Change — Date and time of last successful password change - -**NOTE:** The Data Console does not automatically display new information as it is added to the -database. Press F5 to refresh the view. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/verification_tab.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/verification_tab.md deleted file mode 100644 index 9bda3d689d..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/verification_tab.md +++ /dev/null @@ -1,113 +0,0 @@ -# Verification Tab - -Use the **Verification** tab to enable verification codes for resets and unlocks. Verification codes -are used for two-factor authentication, and to authenticate users that have not manually enrolled. A -verification code is sent to the user's mobile phone by e-mail and/or SMS, and the user enters the -verification code to continue. - -![configuring_npr_6](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_6.webp)7 - -#### Verification Codes - -Select the **Send verification codes for resets and unlocks** check box to enable verification -codes. - -Select the **Users can reset and unlock with only a verification code if they have not enrolled** -check box to enable automatic enrollment. Automatic enrollment allows users to reset their password -and unlock their account even if they have not previously enrolled. Password Reset enrolls the users -when they request a reset or unlock, and sends them a verification code for authentication. Users -that are automatically enrolled can also manually enroll with questions later. Users that are only -automatically enrolled cannot continue to reset their password and unlock their account if this -option is subsequently disabled. Automatic enrollment should only be used with secure devices -connected to a secure network, otherwise a stolen or lost device could be used to reset a user's -password. - -Automatically enrolled users: - -- Do not have an Password Reset e-mail address, so verification codes are only sent to the user's - Active Directory e-mail address and/or phone number. -- Must be authenticated with a verification code, so their reset or unlock request will be denied - even if the Users can reset and unlock without a verification code if a code cannot be sent check - box is selected. -- Need to manually enroll if the sending of verification codes, or automatic enrollments are - disabled after they are automatically enrolled. -- Can manually enroll at any time. Authenticating users with questions and verification codes is - more secure than using only verification codes. -- Are not sent the After Enroll e-mail alert. - -Select the **Users can reset and unlock without a verification code if a code cannot be sent** check -box if users should be allowed to continue when a verification code cannot be sent. Verification -codes can only be sent to users that have a mobile phone number or e-mail address in Active -Directory, or an e-mail address in Password Reset's database. Even if this information is present, -an error could stop the verification code from being sent. If this check box is not selected, then -users will need to contact the help desk if a verification code cannot be sent. - -Select the **Lockout users if they enter too many incorrect verification codes** check box if the -incorrect answer count should be incremented when users submit an incorrect verification code. A -user's Password Reset record can be locked out if they enter too many incorrect answers or -verification codes. The lockout threshold is set on the **Security** tab. - -Select the **Show incomplete e-mail addresses and phone numbers to users** check box if NPR should -hide parts of the e-mail address and phone number when requesting a verification code. This is -especially important if automatic enrollment is enabled, as it stops an attacker from discovering -information about the user. - -![configuring_npr_0](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_0.webp) - -Verification codes are of a specified length, and may contain both alpha and numeric characters. -Select the desired options from the **Create verification codes with...** drop-down lists. Longer, -more complex (alphanumeric) verification codes are harder to guess, but also harder to enter. -Verification codes do not need to be very long or complex if the verification code lockout and -expiry features are enabled. - -Select a value from the **Expire verification codes after...** drop-down list to limit how long -users have to enter their verification code. Set it to 0 minutes if the verification code should not -expire. A new verification code is sent for every reset and unlock. This setting limits how long a -user has to enter their verification code, it does not allow old verification codes to be reused. - -### E-mail - -Select the **Send verification codes by e-mail** check box to send verification codes to users via -e-mail. You must configure the E-mail delivery options in the **E-mail** tab to send verification -codes by e-mail. See the Verification Tab topic for additional information. - -Verification codes can be sent to the Active Directory e-mail address and/or the Password Reset -e-mail address. Select the desired option from the **Send to** drop-down list. - -Click **Edit...** to edit the e-mail template for verification codes. The [CODE] macro is replaced -with the verification code, so include the [CODE] macro in the e-mail subject or body. - -The user's Active Directory e-mail address is read from the **mail** attribute by default. Click -**AD Attribute** if you want to use an e-mail address from a different attribute. Type the name of -the attribute, and then click **OK**. - -#### SMS - -Select the **Send verification codes by SMS** check box to send verification codes to users via SMS. -Any SMS provider with a Windows command-line interface (CLI) can be used. - -Click **Browse...** to select the executable that sends the SMS. The executable is supplied by your -SMS provider. - -Type the command-line parameters in the Parameters text box. Refer to your SMS provider's -documentation for the expected parameters. You can also use the macros in the table below. Use -quotes around parameters and macros that may contain space characters. - -| Macro | Replaced with | -| ---------- | --------------------------------------- | -| [CODE] | Verification code | -| [PHONE] | User's Active Directory phone number | -| [USERNAME] | User's Active Directory user login name | -| [DOMAIN] | User's Active Directory domain name | -| [LANG] | Current Web Interface language code | - -The user's Active Directory mobile phone number is read from the mobile attribute by default. Click -**AD Attribute** if you want to use a phone number from a different attribute. Type the name of the -attribute, and then click **OK**. - -**NOTE:** Use a script to perform additional processing before sending the SMS. For example, a -script could read the user's phone number from a database, or send a language-specific SMS based on -the value of the [LANG] macro. Put the path of the scripting engine executable in the **Command** -text box, and the path to the script file and other parameters in the **Parameters** text box. - -![configuring_npr_7](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/administration/configuring_npr_7.webp) diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/working_with_the_database.md b/docs/passwordpolicyenforcer/11.0/passwordreset/administration/working_with_the_database.md deleted file mode 100644 index 5cdf79c71d..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/administration/working_with_the_database.md +++ /dev/null @@ -1,72 +0,0 @@ -# Working with the Database - -The NPR Server stores user and event information in a database. The default database is Microsoft -SQL Server Compact, an embedded version of SQL Server. The benefits of using SQL Server Compact -include: - -- No manual installation or configuration required. -- No maintenance apart from database. See the Backing up the Database topic for additional - information. -- Fast and lightweight. -- Free to use. - -Despite these benefits, there are some disadvantages to using an embedded database. The benefits of -using SQL Server include: - -- Remote access to the database from the Data Console and other applications. -- Improved availability if SQL Server is configured for high availability. -- Increased security. - -See solutions to these disadvantages in the [Moving to SQL Server](/docs/passwordpolicyenforcer/11.0/passwordreset/administration/moving_to_sql_server.md) topic. - -## Backing up the Database - -The database should be backed up regularly. The instructions below are for a SQL Server Compact -database. If using SQL Server, then use your backup software to backup the database. - -Follow the steps below for the recommended backup procedure. - -**Step 1 –** Close the **Data Console** if it is open. - -**Step 2 –** Stop - -**Step 3 –** Copy the database files to a local or network disk. - -**Step 4 –** Start the **Netwrix Password Reset** service. - -**Step 5 –** Copy the database files to another device. - -The database files (apr.sdf and aprlog.sdf) are in the Password Reset Server's installation folder -by default, but the location is configurable. The following commands create copies of the files with -a .bak extension. Copy the .bak files to another device, and run the backup script daily. - -net stop "Netwrix Password Reset" - -copy /Y "c:\program files\netwrix password reset\apr.sdf" "c:\program files\netwrix password -reset\apr.bak" - -copy /Y "c:\program files\netwrix password reset\aprlog.sdf" "c:\program files\netwrix password -reset\aprlog.bak" - -net start "Netwrix Password Reset" - -**NOTE:** Change the paths above if the database files are in a different folder. See the -[Database](general_tab.md#database) topic for more information. - -**Restoring database from backup** - -Follow the steps below to restore the database files from a backup. - -**Step 1 –** Restore apr.bak and aprlog.bak from the backup device. - -**Step 2 –** Close the Data Console if it is open. - -**Step 3 –** Stop . - -**Step 4 –** Copy apr.bak over apr.sdf, and aprlog.bak over aprlog.sdf. - -**Step 5 –** Start . - -**CAUTION:** apr.sdf contains hashes of the user answers. The hashes are salted and encrypted to -protect them from attack, but you should still ensure that this file and all backup copies are -stored securely. diff --git a/docs/passwordpolicyenforcer/11.0/passwordreset/evaluation/evaluation_overview.md b/docs/passwordpolicyenforcer/11.0/passwordreset/evaluation/evaluation_overview.md deleted file mode 100644 index 18adcbcb71..0000000000 --- a/docs/passwordpolicyenforcer/11.0/passwordreset/evaluation/evaluation_overview.md +++ /dev/null @@ -1,18 +0,0 @@ -# Evaluation - -Password Reset is a self-service password management system that helps organizations to reduce the -number of password related help desk calls. Password Reset allows users to securely change their -password and unlock their account, even if they have forgotten their password. - -This Evaluator's Guide shows you how to quickly install, configure, and test Password Reset. You -should read this guide if you are evaluating Password Reset, or if you are using Password Reset for -the first time. - -Please [contact Netwrix support](mailto:support@netwrix.com) if you have any questions, or if you -encounter any problems during your evaluation. - -![introduction_1_1](/img/product_docs/passwordpolicyenforcer/11.0/passwordreset/evaluation/introduction_1_1.webp) - -The Password Reset Administrator's Guide contains additional installation and configuration -information. Refer to the Administrator's Guide for more detailed coverage of the topics discussed -in this guide. diff --git a/docs/passwordpolicyenforcer/11.0/requirements.md b/docs/passwordpolicyenforcer/11.0/requirements.md index a3a78e5205..1935bbc2d5 100644 --- a/docs/passwordpolicyenforcer/11.0/requirements.md +++ b/docs/passwordpolicyenforcer/11.0/requirements.md @@ -1,7 +1,7 @@ --- title: "Requirements" description: "Requirements" -sidebar_position: 20 +sidebar_position: 4 --- # Requirements diff --git a/docs/passwordpolicyenforcer/11.0/web-overview/editing_html_templates.md b/docs/passwordpolicyenforcer/11.0/web-overview/editing_html_templates.md index 7764fd6d67..45a335316e 100644 --- a/docs/passwordpolicyenforcer/11.0/web-overview/editing_html_templates.md +++ b/docs/passwordpolicyenforcer/11.0/web-overview/editing_html_templates.md @@ -63,8 +63,7 @@ right. Resource strings are always inside a range called RESOURCE_STRINGS. Passw Web deletes this range before sending the page to the user's web browser. **CAUTION:** You may rebrand the Password Policy Enforcer Web user interface, but it is a violation -of the License Agreement to modify, remove or obscure any copyright notice. See the -[License Agreement](/docs/passwordpolicyenforcer/11.0/web/license_agreement.md) topic for additional information. +of the License Agreement to modify, remove or obscure any copyright notice. ## Examples diff --git a/docs/passwordpolicyenforcer/11.0/web-overview/using_web.md b/docs/passwordpolicyenforcer/11.0/web-overview/using_web.md index 177381bbb0..66c6d1caf6 100644 --- a/docs/passwordpolicyenforcer/11.0/web-overview/using_web.md +++ b/docs/passwordpolicyenforcer/11.0/web-overview/using_web.md @@ -24,7 +24,7 @@ You can also include the username and/or domain in the URL: **_RECOMMENDED:_** Install the SSL Certificate the web server and use the HTTPS protocol if Password Policy Enforcer Web will be used on an unencrypted network. See the -[Install an SSL Certificate](/docs/passwordpolicyenforcer/11.0/web-overview/securing_web.md#install-an-sslcertificate) topic for additional +[Install an SSL Certificate](/docs/passwordpolicyenforcer/11.0/web-overview/securing_web.md) topic for additional information. **NOTE:** A license reminder message is shown occasionally when Password Policy Enforcer Web is used diff --git a/docs/passwordpolicyenforcer/11.0/web/license_agreement.md b/docs/passwordpolicyenforcer/11.0/web/license_agreement.md deleted file mode 100644 index eec6218f59..0000000000 --- a/docs/passwordpolicyenforcer/11.0/web/license_agreement.md +++ /dev/null @@ -1,144 +0,0 @@ -# License Agreement - -NETWRIX PTY LTD ("NETWRIX") IS WILLING TO LICENSE THIS SOFTWARE ONLY UPON THE CONDITION THAT YOU -ACCEPT ALL OF THE TERMS CONTAINED IN THIS SOFTWARE LICENSE AGREEMENT. PLEASE READ THE TERMS -CAREFULLY. IF YOU DO NOT AGREE WITH THESE TERMS, THEN NETWRIX IS UNWILLING TO LICENSE THE SOFTWARE -TO YOU. - -NETWRIX SOFTWARE LICENSE AGREEMENT AND WARRANTY STATEMENT - -(End-User Trial Use License With Option For Extended Use/Redistribution Prohibited) - -1. The Software. - - The Software licensed under this Agreement consists of computer programs, data compilation(s), - and documentation referred to as PPE Web V7.x (the "Software"). - -2. Trial Use. - - You are authorized to use the Software for evaluation purposes during a trial use term of thirty - (30) days, unless prior to the expiration of the trial use term this license is terminated by - You for convenience or terminated by either party for material breach. You have the option to - register for full use of the Software at any time by paying the required license fee. - Registration will authorize You to use an unlocking key which will convert the Software to full - use, subject to the terms and conditions of this agreement. Your use of the Software under this - trial use license for any purpose after the expiration of the initial trial use term is not - authorized without the prior written consent of Netwrix. Upon expiration of the limited trial - use term, the Software may automatically disable itself. Immediately upon expiration of the - limited trial use term, You shall either register for full use of the Software, or destroy all - copies of the Software and documentation. - -3. Perpetual Term. - - If You purchase a perpetual license, then the term of the license granted herein shall be - perpetual unless terminated by You for convenience or terminated by either party for material - breach. - - Immediately upon termination of this license for any reason, You shall destroy all copies of the - Software and documentation. - -4. Subscription Term(s). - - If You purchase a subscription license, then the term of this license is on a subscription basis - with an initial term of one (1) year, and optional renewal terms of one (1) year each, unless - prior to renewal this license is terminated by You for convenience or terminated by either party - for material breach. Renewal procedures are available from Netwrix, and unless such procedures - are strictly satisfied, including the payment of any required license fee, Your use of the - Software for any purpose after the expiration of the subscription term is not authorized. Upon - expiration of the subscription term, the Software may automatically disable itself. Immediately - upon expiration or termination of this license for any reason, You shall destroy all copies of - the Software and documentation. - -5. License Grant. - - You are granted non-exclusive rights to install and use the Software on any computer and/or - transmit the Software over a computer network, provided that You acquire and dedicate a licensed - copy of the Software for each user who may access the Software. A license for the Software may - not be shared or used concurrently by different users. You may purchase additional licenses for - the Software from time to time. This Agreement shall take precedence over any purchase order for - additional licenses, and any conflicting, inconsistent, or additional terms in such purchase - orders shall be null and void. You may copy the Software for archival purposes, provided that - all copies must contain the original Software's proprietary notices in unaltered form. - -6. Restrictions. - - You may not: (i) permit others to use the Software, except as expressly provided above for - authorized network use; (ii) modify or translate the Software, except the HTML, CSS, and image - files; (iii) reverse engineer, decompile, or disassemble the Software, except to the extent this - restriction is expressly prohibited by applicable law; (iv) create derivative works based on the - Software; (v) merge the Software with another product; (vi) copy the Software, except as - expressly provided above; or (vii) modify, remove or obscure any copyright, trademark or other - proprietary rights notices or labels on the Software. - -7. Transfers. - - You may not transfer the Software or any rights under this Agreement without the prior written - consent of Netwrix, which consent shall not be unreasonably withheld. A condition to any - transfer or assignment shall be that the recipient agrees to the terms of this Agreement. Any - attempted transfer or assignment in violation of this provision shall be null and void. - -8. Ownership. - - Netwrix and its suppliers own the Software and all intellectual property rights embodied - therein, including copyrights and valuable trade secrets embodied in the Software's design and - coding methodology. The Software is protected by Australian copyright laws and international - treaty provisions. This Agreement provides You only a limited use license, and no ownership of - any intellectual property. - -LIMITED WARRANTY STATEMENT; LIMITATION OF LIABILITY. Netwrix warrants only to You that the Software -shall, in unmodified form, perform substantially in accordance with accompanying documentation under -normal use for a period of thirty (30) days from the purchase date. The entire and exclusive -liability and remedy for breach of this Limited Warranty shall be, at Netwrix option, either (i) -return of the amount received by Netwrix for the Software, or (ii) replacement of defective Software -and/or documentation. NETWRIX AND ITS SUPPLIERS AND RESELLERS SPECIFICALLY DISCLAIM THE IMPLIED -WARRANTIES OF TITLE, NON- INFRINGEMENT, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, SYSTEM -INTEGRATION, AND DATA ACCURACY. THERE IS NO WARRANTY OR GUARANTEE THAT THE OPERATION OF THE SOFTWARE -WILL BE UNINTERRUPTED OR ERROR-FREE, OR THAT THE SOFTWARE WILL MEET ANY PARTICULAR CRITERIA OF -PERFORMANCE, QUALITY, ACCURACY, PURPOSE, OR NEED, EXCEPT AS EXPRESSLY PROVIDED IN THE LIMITED -WARRANTY. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS AGREEMENT. NO USE OF THE -SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. No action for the above Limited -Warranty may be commenced after one (1) year following the expiration date of the warranty. To the -extent that this Warranty Statement is inconsistent with the jurisdiction where You use the -Software, the Warranty Statement shall be deemed to be modified consistent with such local law. -Under such local law, certain limitations may not apply, and You may have additional rights which -vary from jurisdiction to jurisdiction. For example, some states in the United States and some -jurisdictions outside the United States may: (i) preclude the disclaimers and limitations of this -Warranty Statement from limiting the rights of a consumer; (ii) otherwise restrict the ability of a -manufacturer to make such disclaimers or to impose such limitations; or (iii) grant the consumer -additional legal rights, specify the duration of implied warranties which the manufacturer cannot -disclaim, or prohibit limitations on how long an implied warranty lasts. - -INDEPENDENT OF THE FORGOING PROVISIONS, IN NO EVENT AND UNDER NO LEGAL THEORY, INCLUDING WITHOUT -LIMITATION, TORT, CONTRACT, OR STRICT PRODUCTS LIABILITY, SHALL NETWRIX OR ANY OF ITS SUPPLIERS BE -LIABLE TO YOU OR ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF -ANY KIND, INCLUDING WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER -MALFUNCTION, OR ANY OTHER KIND OF COMMERCIAL DAMAGE, EVEN IF NETWRIX HAS BEEN ADVISED OF THE -POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL -INJURY TO THE EXTENT PROHIBITED BY APPLICABLE LAW. - -IN NO EVENT SHALL NETWRIX'S LIABILITY FOR ACTUAL DAMAGES FOR ANY CAUSE WHATSOEVER, AND REGARDLESS OF -THE FORM OF ACTION, EXCEED THE AMOUNT OF THE PURCHASE PRICE PAID, IF ANY, FOR THE SOFTWARE LICENSE. - -EXPORT CONTROLS. You agree to comply with all local laws in Your jurisdiction which might impact -Your right to import, export or use the Software, and You represent that You have complied with any -regulations or registration procedures required by applicable law to make this license enforceable. - -MISCELLANEOUS. This Agreement constitutes the entire understanding of the parties with respect to -the subject matter of this Agreement and merges all prior communications, representations, and -agreements. This Agreement may be modified only by a written agreement signed by the parties. If any -provision of this Agreement is held to be unenforceable for any reason, such provision shall be -reformed only to the extent necessary to make it enforceable. This Agreement shall be construed -under the laws of the State of New South Wales, Australia, excluding rules regarding conflicts of -law. This Agreement will not be governed by the United Nations Convention on Contracts for the -International Sale of Goods, the application of which is expressly excluded. The parties have -requested that this Agreement and all documents contemplated hereby be drawn up in English. Les -parties aux presentes ont exige que cette entente et tous autres documents envisages par les -presentes soient rediges en anglais. - -U.S. GOVERNMENT END USERS: If the Software and documentation is acquired by or for the United States -Government then it is provided with RESTRICTED RIGHTS. Use, duplication, or disclosure by the United -States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of The Rights -in Technical Data and Computer Software clause at DFARS 252.227-7013, or subparagraphs (c)(1) and -(2) of the Commercial Computer Software-Restricted Rights at 48 CFR 52.227-19 or clause -18-52.227-86(d) of the NASA supplement to the FAR, as applicable. Manufacturer is NETWRIX PTY LTD, 9 -Monteray Terrace, Glenmore Park, NSW 2745 Australia. diff --git a/docs/passwordpolicyenforcer/11.0/overview/whatsnew.md b/docs/passwordpolicyenforcer/11.0/whatsnew.md similarity index 99% rename from docs/passwordpolicyenforcer/11.0/overview/whatsnew.md rename to docs/passwordpolicyenforcer/11.0/whatsnew.md index bcedc89e2c..1ae1abb42d 100644 --- a/docs/passwordpolicyenforcer/11.0/overview/whatsnew.md +++ b/docs/passwordpolicyenforcer/11.0/whatsnew.md @@ -1,7 +1,7 @@ --- title: "What's New" description: "What's New" -sidebar_position: 20 +sidebar_position: 3 --- # What's New