diff --git a/docs/accessanalyzer/11.6/admin/maintenance/antivirusexclusions.md b/docs/accessanalyzer/11.6/admin/maintenance/antivirusexclusions.md
index bffa92aa41..7aab271200 100644
--- a/docs/accessanalyzer/11.6/admin/maintenance/antivirusexclusions.md
+++ b/docs/accessanalyzer/11.6/admin/maintenance/antivirusexclusions.md
@@ -46,6 +46,12 @@ This file is located within the following directory: `…\STEALTHbits\StealthAUD
- FSAAAppletServer.exe
+## SharePoint Agent Server
+
+This file is located within the following directory: `...\Program Files\STEALTHbits\StealthAUDIT\SPAA\`
+
+- Stealthbits.StealthAUDIT.Agent.Service.exe
+
## Access Information Center
This file is located within the following directory: `…\STEALTHbits\Access Information Center\`
diff --git a/docs/accessanalyzer/11.6/requirements/filesystem/filesystems/azureinformationprotection.md b/docs/accessanalyzer/11.6/requirements/filesystem/filesystems/azureinformationprotection.md
index 3fe94f59d6..3548687f18 100644
--- a/docs/accessanalyzer/11.6/requirements/filesystem/filesystems/azureinformationprotection.md
+++ b/docs/accessanalyzer/11.6/requirements/filesystem/filesystems/azureinformationprotection.md
@@ -45,10 +45,7 @@ Ensure the following prerequisites are met before configuring AIP scanning:
The Rights Management Service Client must be installed on the applet servers where FSAA is running. This may be the local Access Analyzer server, a Proxy server, or a File Server running in applet mode.
-* To install the Rights Management Service Client 2.1 on the server where the scan is taking place, go to the Microsoft download center:
-
- [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=38396)
-
+* To install the Rights Management Service Client 2.1 on the server where the scan is taking place, go to the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=38396):
:::info
**info**
@@ -60,13 +57,10 @@ Read the System Requirements and Install Instructions provided by Microsoft to c
## Create a Service Principal Account
-1. Open the Azure Portal and sign in with an administrator account
-
+1. Open the [Azure Portal](https://portal.azure.com/) and sign in with an administrator account.
+2. Create a new app registration.
- 1. [Azure Portal](https://portal.azure.com/)
-2. Create a new app registration
-
1. Navigate to Microsoft Entra ID → App registrations → New registration
2. Give the new application a distinguishable name
3. Create a client secret
@@ -90,6 +84,9 @@ Read the System Requirements and Install Instructions provided by Microsoft to c
2. Click “Add a permission”
3. Select the **Microsoft Graph API** permission set > Application permissions
4. Add the “InformationProtectionPolicy.Read.All” permission
+
+
+
5. After adding the required API permission, select “Grant admin consent”
6. Record the AppID (from the Overview Page) and the tenantID with the secret value
diff --git a/docs/accessanalyzer/12.0/admin/maintenance/antivirusexclusions.md b/docs/accessanalyzer/12.0/admin/maintenance/antivirusexclusions.md
index 8977737e04..25845127d1 100644
--- a/docs/accessanalyzer/12.0/admin/maintenance/antivirusexclusions.md
+++ b/docs/accessanalyzer/12.0/admin/maintenance/antivirusexclusions.md
@@ -46,6 +46,12 @@ This file is located within the following directory: `…\STEALTHbits\StealthAUD
- FSAAAppletServer.exe
+## SharePoint Agent Server
+
+This file is located within the following directory: `...\Program Files\STEALTHbits\StealthAUDIT\SPAA\`
+
+- Stealthbits.StealthAUDIT.Agent.Service.exe
+
## Access Information Center
This file is located within the following directory: `…\STEALTHbits\Access Information Center\`
diff --git a/docs/accessanalyzer/12.0/requirements/filesystem/filesystems/azureinformationprotection.md b/docs/accessanalyzer/12.0/requirements/filesystem/filesystems/azureinformationprotection.md
index c4073f2ec9..9e8fa50972 100644
--- a/docs/accessanalyzer/12.0/requirements/filesystem/filesystems/azureinformationprotection.md
+++ b/docs/accessanalyzer/12.0/requirements/filesystem/filesystems/azureinformationprotection.md
@@ -45,10 +45,7 @@ Ensure the following prerequisites are met before configuring AIP scanning:
The Rights Management Service Client must be installed on the applet servers where FSAA is running. This may be the local Access Analyzer server, a Proxy server, or a File Server running in applet mode.
-* To install the Rights Management Service Client 2.1 on the server where the scan is taking place, go to the Microsoft download center:
-
- [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=38396)
-
+* To install the Rights Management Service Client 2.1 on the server where the scan is taking place, go to the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=38396):
:::info
**info**
@@ -60,13 +57,11 @@ Read the System Requirements and Install Instructions provided by Microsoft to c
## Create a Service Principal Account
-1. Open the Azure Portal and sign in with an administrator account
+1. Open the [Azure Portal](https://portal.azure.com/) and sign in with an administrator account.
-
- 1. [Azure Portal](https://portal.azure.com/)
2. Create a new app registration
-
+
1. Navigate to Microsoft Entra ID → App registrations → New registration
2. Give the new application a distinguishable name
3. Create a client secret
@@ -90,6 +85,9 @@ Read the System Requirements and Install Instructions provided by Microsoft to c
2. Click “Add a permission”
3. Select the **Microsoft Graph API** permission set > Application permissions
4. Add the “InformationProtectionPolicy.Read.All” permission
+
+
+
5. After adding the required API permission, select “Grant admin consent”
6. Record the AppID (from the Overview Page) and the tenantID with the secret value
diff --git a/docs/accessinformationcenter/11.6/resourceaudit/user/permissions.md b/docs/accessinformationcenter/11.6/resourceaudit/user/permissions.md
index fec1d9d17a..0cc401f66e 100644
--- a/docs/accessinformationcenter/11.6/resourceaudit/user/permissions.md
+++ b/docs/accessinformationcenter/11.6/resourceaudit/user/permissions.md
@@ -13,6 +13,10 @@ Information Center user. See the
[Results Pane](/docs/accessinformationcenter/11.6/resourceaudit/navigate/overview.md#results-pane)
topic for information on filter options.
+:::note
+Users must be assigned permissions directly to an object to appear in this report. Users who receive access as part of an AD group membership will only be reflected in the [Effective Access Report](/docs/accessinformationcenter/11.6/resourceaudit/user/effectiveaccess.md)
+:::
+

This report is comprised of the following columns:
diff --git a/docs/accessinformationcenter/12.0/resourceaudit/user/permissions.md b/docs/accessinformationcenter/12.0/resourceaudit/user/permissions.md
index d07c70a158..efeea94d29 100644
--- a/docs/accessinformationcenter/12.0/resourceaudit/user/permissions.md
+++ b/docs/accessinformationcenter/12.0/resourceaudit/user/permissions.md
@@ -12,6 +12,10 @@ means the report displays both direct and inherited permissions unless modified
Information Center user. See the [Results Pane](/docs/accessinformationcenter/12.0/resourceaudit/navigate/overview.md#results-pane) topic for
information on filter options.
+:::note
+Users must be assigned permissions directly to an object to appear in this report. Users who receive access as part of an AD group membership will only be reflected in the [Effective Access Report](/docs/accessinformationcenter/12.0/resourceaudit/user/effectiveaccess.md)
+:::
+

This report is comprised of the following columns:
diff --git a/docs/auditor/10.8/admin/search/filteradvanced.md b/docs/auditor/10.8/admin/search/filteradvanced.md
index 0f8066743e..2bcac467f0 100644
--- a/docs/auditor/10.8/admin/search/filteradvanced.md
+++ b/docs/auditor/10.8/admin/search/filteradvanced.md
@@ -33,17 +33,8 @@ information:
| Working hours | Limits your search results to entries that occurred within the specified hours. You can use this filter together with When if you need, for example, to search for activity in the non-business hours during the last week. | You are investigating an incident and want to know who accessed sensitive data outside business hours. You can set this filter as Not equal to and specify the time interval from 8:00 AM to 6:00 PM. Filtered data will include only operations that occurred outside this interval, that is, during non-business hours. |
| Data categories | Limits your search results to entries that contain sensitive data complying with a classification rule. You can use this filter together with Equal to PCIDSS to, for example, search for sensitive files that contain data regulated by the PCIDSS. | You are searching all documents containing cardholder data that can potentially be mapped with the PCIDSS compliance standard. You can set this filter as equal to and specify the value as PCIDSS. Filtered data will contain only files that match this criteria. This filter shows activity records collected from the following data sources: Windows File Servers, SharePoint, SharePoint Online. |
| Details | Limits your search results to entries that contain the specified information in the Details column. The Details column normally contains data specific to your target, e.g., assigned permissions, before and after values, start and end dates. This filter can be helpful when you are looking for a unique entry. | You discovered that a registry key was updated to "242464". Now you want to investigate who made the change and what the value was before. You can set the Details filter to 242464 to find this change faster. |
-| Before* | Limits your search results to entries that contain the specified before value in the Details column. | You are investigating an incident in which the SAM-account-name attribute was changed for an account in your Active Directory domain. You can set the Before filter to the previous name (e.g., John2000) to find the new name faster. |
-| After* | Limits your search results to entries that contain the specified after value in the Details column. | You are investigating a security incident and want to know who enabled a local Administrator account on your Windows Server. You can set the After filter to this account's current state (e.g., Enabled) to find this change faster. |
| Everywhere | Limits your search results to entries that contain the specified value in any column. | You are investigating a security incident. You have already identified the intruder (e.g., BadActor) and now you want to see all actions made by the intruder's account or with it. Since the intruder can be the actor (Who), the object (What), or can even show up in details, set the Everywhere filter to the intruder's name. |
-\* If you plan to audit an SQL Server for data changes and browse the results using 'Before' and
-'After' filter values, make sure that the audited SQL database tables have a primary key (or a
-unique column). Otherwise, 'Before' and 'After' values will not be reported.
-
-\* – If you plan to audit an SQL Server for data changes and browse the results using 'Before' and
-'After' filter values, make sure that the audited SQL database tables have a primary key (or a
-unique column). Otherwise, 'Before' and 'After' values will not be reported.
## Search Conditions
diff --git a/docs/auditor/10.8/admin/settings/licenses.md b/docs/auditor/10.8/admin/settings/licenses.md
index 4cb6cc8f8b..c45c23a416 100644
--- a/docs/auditor/10.8/admin/settings/licenses.md
+++ b/docs/auditor/10.8/admin/settings/licenses.md
@@ -8,17 +8,14 @@ sidebar_position: 90
The Licenses tab allows you to review the status of your current licenses, update them and add new
licenses. To learn about Netwrix Auditor licenses, refer to the following Netwrix Knowledge Base
-article: [Netwrix Auditor Licensing FAQs](https://www.netwrix.com/kb/2113).
+article: [Netwrix Auditor Licensing FAQs]([https://www.netwrix.com/kb/2113](https://docs.netwrix.com/docs/kb/auditor/features-and-operations/glossaries-and-faqs/netwrix-auditor-licensing-faqs).
Follow the steps to update or add a license.
-**Step 1 –** Click **Update**.
+**Step 1 –** Click **Upload License File**.
-**Step 2 –** In the dialog that opens, do one of the following:
+**Step 2 –** In the dialog that opens, point to a license file received from your sales representatives and click the Open button
-- Select Load from file, click Browse and point to a license file received from your sales
- representative.
-- Select Enter manually and type in your company name, license count and license codes.
## Notes for Managed Service Providers
diff --git a/docs/auditor/10.8/requirements/software.md b/docs/auditor/10.8/requirements/software.md
index fe2b76a57b..9040c5c874 100644
--- a/docs/auditor/10.8/requirements/software.md
+++ b/docs/auditor/10.8/requirements/software.md
@@ -37,23 +37,6 @@ you plan to export or print such reports, check the requirements below.
**NOTE:** Please note that if you are going to use SQL Express plan, do not install SSRS and Auditor
on the domain controller.
-Export SSRS-based reports
-
-To export SSRS-based reports, it is recommended Internet Explorer is installed on the machine where
-Auditor client runs. If IE is not available, you can use the **Print** function or click the button
-**Open in browser** and export the report directly from Netwrix Auditor.
-
-See the following Microsoft article for the full list of the supported browsers:
-[Browser Support for Reporting Services and Power View](https://learn.microsoft.com/en-us/sql/reporting-services/browser-support-for-reporting-services-and-power-view?view=sql-server-ver16).
-
-Follow the steps to configure Internet Options to allow file downloads for the Local intranet zone.
-
-**Step 1 –** Select **Internet Options** and click **Security**.
-
-**Step 2 –** Select **Local intranet** zone and click **Custom level**.
-
-**Step 3 –** In the Settings list, locate **Downloads** > **File download** and make sure the
-**Enabled** option is selected.
Printing
diff --git a/docs/endpointpolicymanager/components/applicationsettingsmanager/manual/firefox/overview_1.md b/docs/endpointpolicymanager/components/applicationsettingsmanager/manual/firefox/overview_1.md
index 56f8387f2a..2457dee72a 100644
--- a/docs/endpointpolicymanager/components/applicationsettingsmanager/manual/firefox/overview_1.md
+++ b/docs/endpointpolicymanager/components/applicationsettingsmanager/manual/firefox/overview_1.md
@@ -59,7 +59,7 @@ following
:::note
-[https://www.policypak.com/knowledge-base/preconfigured-paks/firefox-how-can-i-deliver-certificates-to-certificate-authority-store-and-select-websites-mail-users-and-software-makers.html](http://www.policypak.com/knowledge-base/preconfigured-paks/firefox-how-can-i-deliver-certificates-to-certificate-authority-store-and-select-websites-mail-users-and-software-makers.html).
+[Firefox: How do I troubleshoot adding Certificates with Endpoint Policy Manager and Firefox?](/docs/endpointpolicymanager/components/applicationsettingsmanager/technotes/preconfiguredappsets/certificates_1.md).
:::
diff --git a/docs/endpointpolicymanager/components/browserrouter/manual/internetexplorer/edgemod.md b/docs/endpointpolicymanager/components/browserrouter/manual/internetexplorer/edgemod.md
index 63b204dc4c..04dc7cad4b 100644
--- a/docs/endpointpolicymanager/components/browserrouter/manual/internetexplorer/edgemod.md
+++ b/docs/endpointpolicymanager/components/browserrouter/manual/internetexplorer/edgemod.md
@@ -36,7 +36,7 @@ see it open as an IE tab in Edge. We say should because the rule will not work r
a detail called the 65 second rule, which you can read more about here
[https://docs.microsoft.com/en-us/microsoft-edge/deploy/emie-to-improve-compatibility](https://www.policypak.com/video/endpointpolicymanager-troubleshooting-with-admx-files.html).
From the first time a user accesses
-[www.policypak.com](https://www.policypak.com/knowledge-base/browser-router-troubleshooting/how-to-quickly-troubleshoot-endpointpolicymanager-browser-router.html),
+[www.policypak.com](https://www.policypak.com/),
a period of 65 seconds or so has to transpire until the rule comes fully into effect. Here you can
see that the Endpoint Policy Manager website now appears in IE mode within the Edge browser itself:
diff --git a/docs/kb/endpointpolicymanager/configuring-policypak-to-run-programs-with-elevated-privileges-via-privilege-secure.md b/docs/endpointpolicymanager/components/endpointprivilegemanager/technotes/netwrixprivilegesecure/configuringprograms.md
similarity index 69%
rename from docs/kb/endpointpolicymanager/configuring-policypak-to-run-programs-with-elevated-privileges-via-privilege-secure.md
rename to docs/endpointpolicymanager/components/endpointprivilegemanager/technotes/netwrixprivilegesecure/configuringprograms.md
index aa4e7b1b8b..db43bf020f 100644
--- a/docs/kb/endpointpolicymanager/configuring-policypak-to-run-programs-with-elevated-privileges-via-privilege-secure.md
+++ b/docs/endpointpolicymanager/components/endpointprivilegemanager/technotes/netwrixprivilegesecure/configuringprograms.md
@@ -1,27 +1,7 @@
---
-description: >-
- This article describes how to configure Netwrix Endpoint Policy Manager to
- integrate with Netwrix Privilege Secure so users can launch a specified
- program with on-demand elevated privileges. The example uses dbeaver.exe but
- you can configure any executable.
-keywords:
- - Netwrix Endpoint Policy Manager
- - Netwrix Privilege Secure
- - SbPAM
- - elevated privileges
- - GPO
- - ADMX
- - dbeaver
- - executable policy
- - launch policy
-products:
- - endpointpolicymanager
-sidebar_label: Configuring PolicyPak to Run Programs with Elevate
-tags: []
-title: >-
- Configuring Netwrix Endpoint Policy Manager to Run Programs with Elevated
- Privileges via Privilege Secure
-knowledge_article_id: kA04u000000PoLbCAK
+title: "Configuring Netwrix Endpoint Policy Manager to Run Programs with Elevated Privileges via Privilege Secure"
+description: "This article describes how to configure Netwrix Endpoint Policy Manager to integrate with Netwrix Privilege Secure so users can launch a specified program with on-demand elevated privileges."
+sidebar_position: 40
---
# Configuring Netwrix Endpoint Policy Manager to Run Programs with Elevated Privileges via Privilege Secure
diff --git a/docs/kb/endpointpolicymanager/images/ka04u00000116HU_0EM4u000007ci9R.png b/docs/endpointpolicymanager/components/endpointprivilegemanager/technotes/netwrixprivilegesecure/images/ka04u00000116HU_0EM4u000007ci9R.png
similarity index 100%
rename from docs/kb/endpointpolicymanager/images/ka04u00000116HU_0EM4u000007ci9R.png
rename to docs/endpointpolicymanager/components/endpointprivilegemanager/technotes/netwrixprivilegesecure/images/ka04u00000116HU_0EM4u000007ci9R.png
diff --git a/docs/kb/endpointpolicymanager/disabling_optional_connected_experiences_in_office_365_apps.md b/docs/endpointpolicymanager/components/scriptstriggers/knowledgebase/tipsandtricks/disablingofficeconnectedexperiences.md
similarity index 84%
rename from docs/kb/endpointpolicymanager/disabling_optional_connected_experiences_in_office_365_apps.md
rename to docs/endpointpolicymanager/components/scriptstriggers/knowledgebase/tipsandtricks/disablingofficeconnectedexperiences.md
index 252a43af16..f6b7b3b902 100644
--- a/docs/kb/endpointpolicymanager/disabling_optional_connected_experiences_in_office_365_apps.md
+++ b/docs/endpointpolicymanager/components/scriptstriggers/knowledgebase/tipsandtricks/disablingofficeconnectedexperiences.md
@@ -1,18 +1,7 @@
---
-description: >-
- This article explains how to disable the Optional Connected Experiences feature in Office 365 apps such as Word and Excel using registry settings or PowerShell scripts.
-keywords:
- - Office 365
- - Optional Connected Experiences
- - registry settings
- - PowerShell
- - Endpoint Policy Manager
-sidebar_label: Disabling Optional Connected Experiences
-tags: []
title: "Disabling Optional Connected Experiences in Office 365 Apps"
-knowledge_article_id: kA0Qk0000002WyHKAU
-products:
- - endpointpolicymanager
+description: "This article explains how to disable the Optional Connected Experiences feature in Office 365 apps such as Word and Excel using registry settings or PowerShell scripts."
+sidebar_position: 20
---
# Disabling Optional Connected Experiences in Office 365 Apps
@@ -61,4 +50,4 @@ If you are using **Netwrix Endpoint Policy Manager**, you can deploy the above P
## Related Links
- [How to create a shortcut under the Public Desktop using Endpoint Policy Scripts Manager](https://docs.netwrix.com/docs/endpointpolicymanager/)
-- [Policy Setting for Optional Connected Experiences ⸱ Microsoft 🡥](https://learn.microsoft.com/en-us/microsoft-365-apps/privacy/manage-privacy-controls#policy-setting-for-optional-connected-experiences)
\ No newline at end of file
+- [Policy Setting for Optional Connected Experiences ⸱ Microsoft 🡥](https://learn.microsoft.com/en-us/microsoft-365-apps/privacy/manage-privacy-controls#policy-setting-for-optional-connected-experiences)
diff --git a/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraid.md b/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraid.md
index d235862f3f..8db1c6fe13 100644
--- a/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraid.md
+++ b/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraid.md
@@ -9,6 +9,8 @@ If you want to know which GROUPS your Users or Computers are in within Azure AD,
Endpoint Policy Manager (formerly PolicyPak) and these scripts. Then after that, you can use Item
Level Targeting to check group membership and trigger actions and policies.
+
+
Hi. This is Jeremy Moskowitz. In this video, I'm going to show you how to use a couple of scripts in
order to figure out which Azure AD groups the user or computer is a member of.
Now I'm going to stress a couple of things right at the front of this video. These scripts are
diff --git a/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraidgroupdetermine.md b/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraidgroupdetermine.md
index b2728a9fe6..9d86b6d74e 100644
--- a/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraidgroupdetermine.md
+++ b/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraidgroupdetermine.md
@@ -10,6 +10,8 @@ Endpoint Policy Manager (formerly PolicyPak) and these scripts with your MDM ser
Workspace ONE or MobileIron.. Then after that, you can use Item Level Targeting to check group
membership and trigger actions and policies.
+
+
Hi. This is Jeremy Moskowitz. This is part three of how to use Endpoint Policy Manager Scripts to
query Azure AD to then do interesting things like apply Group Policy Preferences or Endpoint Policy
Manager items depending on if a user or a computer is a member of an Azure AD group.
diff --git a/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraidgroupmembership.md b/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraidgroupmembership.md
index 0c43fce0f0..adf38bdbdd 100644
--- a/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraidgroupmembership.md
+++ b/docs/endpointpolicymanager/deliverymethods/mdm/videos/iltwithscripts/entraidgroupmembership.md
@@ -9,4 +9,6 @@ If you have Netwrix Endpoint Policy Manager (formerly PolicyPak) Cloud \*AND\* A
this technique to query the User or Computer groups. Then use Item Level Targeting to trigger when
GPPrefs or Endpoint Policy Manager items will apply.
+
+
diff --git a/docs/endpointpolicymanager/gettingstarted/cloudmanual/underhood/installation.md b/docs/endpointpolicymanager/gettingstarted/cloudmanual/underhood/installation.md
index 148982252c..76ce7d4f43 100644
--- a/docs/endpointpolicymanager/gettingstarted/cloudmanual/underhood/installation.md
+++ b/docs/endpointpolicymanager/gettingstarted/cloudmanual/underhood/installation.md
@@ -28,7 +28,7 @@ Cloud.
:::note
If you always use a proxy, and the Endpoint Policy Manager Cloud client cannot seem to
contact the Endpoint Policy Manager services, please read this Endpoint Policy Manager KB article:
-[https://www.policypak.com/knowledge-base/client-installation-troubleshooting/i-always-use-a-proxy-and-the-cloud-client-cannot-seem-to-make-contact-with-the-services-see-faq-item-3-above-first-what-else-can-i-try.html](http://www.policypak.com/knowledge-base/client-installation-troubleshooting/i-always-use-a-proxy-and-the-cloud-client-cannot-seem-to-make-contact-with-the-services-see-faq-item-3-above-first-what-else-can-i-try.html).
+[I always use a proxy and the cloud client cannot seem to make contact with the services (see FAQ Item #3 above first.) What else can I try?](/docs/endpointpolicymanager/deliverymethods/cloud/knowledgebase/clienttroubleshooting/proxyservices.md).
:::
diff --git a/docs/endpointpolicymanager/upgrademaintenance/antivirussystemsoftware/antivirus.md b/docs/endpointpolicymanager/upgrademaintenance/antivirussystemsoftware/antivirus.md
index 2fd85462b9..cb12a69afc 100644
--- a/docs/endpointpolicymanager/upgrademaintenance/antivirussystemsoftware/antivirus.md
+++ b/docs/endpointpolicymanager/upgrademaintenance/antivirussystemsoftware/antivirus.md
@@ -14,7 +14,7 @@ conflict with some Antivirus programs. (McAfee, Sophos, etc.)
Additionally, you can tell Endpoint Policy Manager to avoid conflict with Antivirus and security
engines if you know what processes are getting entangled. If you wish to do that, please see
-[PolicyPak: Exclude Processes via ADMX](https://helpcenter.netwrix.com/bundle/endpointpolicymanager/page/Content/endpointpolicymanager/Video/GettingStarted/ADMX.htm)
+[Endpoint Policy Manager: Exclude Processes via ADMX](/docs/endpointpolicymanager/gettingstarted/misc/videos/troubleshooting/admx.md)
for general how-to directions.
We suggest proactively excluding the two processes below which could be blocked and prevented from
diff --git a/docs/kb/endpointpolicymanager/_category_.json b/docs/kb/endpointpolicymanager/_category_.json
deleted file mode 100644
index ecfd882251..0000000000
--- a/docs/kb/endpointpolicymanager/_category_.json
+++ /dev/null
@@ -1,6 +0,0 @@
-{
- "label": "Knowledge Base",
- "position": 999,
- "collapsed": true,
- "collapsible": true
-}
diff --git a/docs/kb/endpointpolicymanager/index.md b/docs/kb/endpointpolicymanager/index.md
deleted file mode 100644
index 4023e29653..0000000000
--- a/docs/kb/endpointpolicymanager/index.md
+++ /dev/null
@@ -1,18 +0,0 @@
----
-title: "Endpoint Policy Manager Knowledge Base"
-description: "Endpoint Policy Manager knowledge base articles and troubleshooting guides"
-slug: endpointpolicymanager
----
-
-# Endpoint Policy Manager Knowledge Base
-
-Welcome to the Endpoint Policy Manager knowledge base. Browse our collection of troubleshooting guides, configuration instructions, and best practices.
-
-Use the search function above to find specific articles or browse through all Endpoint Policy Manager KB articles in this section.
-
-## Need Help?
-
-If you can't find what you're looking for:
-1. Use the search function above
-2. Check the main Endpoint Policy Manager documentation
-3. Contact [Netwrix support](https://www.netwrix.com/support.html)
\ No newline at end of file
diff --git a/static/images/accessanalyzer/11.6/requirements/target/config/AIP_APP_Permissions.webp b/static/images/accessanalyzer/11.6/requirements/target/config/AIP_APP_Permissions.webp
new file mode 100644
index 0000000000..6b60a1e991
Binary files /dev/null and b/static/images/accessanalyzer/11.6/requirements/target/config/AIP_APP_Permissions.webp differ
diff --git a/static/images/accessanalyzer/12.0/requirements/target/config/AIP_APP_Permissions.webp b/static/images/accessanalyzer/12.0/requirements/target/config/AIP_APP_Permissions.webp
new file mode 100644
index 0000000000..6b60a1e991
Binary files /dev/null and b/static/images/accessanalyzer/12.0/requirements/target/config/AIP_APP_Permissions.webp differ