From 7a88c6eeba3390c8c50873b56a5122d639ec5871 Mon Sep 17 00:00:00 2001 From: jth-nw Date: Wed, 13 May 2026 13:38:01 -0500 Subject: [PATCH 1/2] test: trivial edit to test doc-pr ack comment fix --- docs/threatmanager/3.2/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/threatmanager/3.2/index.md b/docs/threatmanager/3.2/index.md index 6f789d7d5a..f45c71cbbd 100644 --- a/docs/threatmanager/3.2/index.md +++ b/docs/threatmanager/3.2/index.md @@ -1,6 +1,6 @@ --- title: "Netwrix Threat Manager v3.2 Documentation" -description: "Netwrix Threat Manager v3.2" +description: "Netwrix Threat Manager v3.2 documentation" sidebar_position: 1 --- From bd4856b939e8993b5d22c0b345ff713a061aeb3f Mon Sep 17 00:00:00 2001 From: "claude[bot]" <41898282+claude[bot]@users.noreply.github.com> Date: Wed, 13 May 2026 18:43:01 +0000 Subject: [PATCH 2/2] fix(vale): auto-fix style issues (Vale + Dale) --- docs/threatmanager/3.2/index.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/docs/threatmanager/3.2/index.md b/docs/threatmanager/3.2/index.md index f45c71cbbd..c0b4551481 100644 --- a/docs/threatmanager/3.2/index.md +++ b/docs/threatmanager/3.2/index.md @@ -8,8 +8,8 @@ sidebar_position: 1 Threat Manager detects and responds to abnormal behavior and advanced attacks against Active Directory and File Systems with unprecedented accuracy and speed. Threat Manager provides -programmatic and automated response options when threats are identified. In addition to an extensive -catalog of preconfigured response actions, Threat Manager can be configured to integrate with you +programmatic and automated response options when it identifies threats. In addition to an extensive +catalog of preconfigured response actions, you can configure Threat Manager to integrate with your own business processes using integrated PowerShell or webhook facilities. Threat Manager can also deliver threat data to administrators in their preferred applications, @@ -17,25 +17,25 @@ including Microsoft Teams, Slack, ServiceNow, and a wide variety of SIEM platfor ## Architecture -The following diagram is a visual representation of Threat Manager architecture. It maps out the +The following diagram shows Threat Manager architecture. It maps out the physical implementation of Threat Manager components. ![Netwrix Threat Manager Architecture diagram](/images/threatmanager/3.0/tmarch.webp) ## Administration -Organizations of virtually any size find it to be impossible, even counterproductive, to evaluate +Organizations of virtually any size find it impossible, even counterproductive, to evaluate the substantial amount of file access events and Active Directory events occurring within their environments on any given day. To overcome this challenge and achieve proper visibility into this otherwise significant blind spot in an organization's cyber security program, Threat ManagerĀ® provides built-in threat analytics to highlight the most unusual behaviors that occur within an -organization each day. Threat Manager also provides a method to investigate activity data in detail using a +organization each day. Threat Manager also lets you investigate activity data in detail using a series of customizable filters to discover threats unique to their organization. ## Supported Platforms -Supported platforms include the Active Directory and File system platforms supported for monitoring -by either Netwrix Threat Prevention or Netwrix Activity Monitor. See the following product +Supported platforms include the Active Directory and File system platforms that either Netwrix +Threat Prevention or Netwrix Activity Monitor can monitor. See the following product documentation for additional information: - [Netwrix Threat Prevention Documentation](https://helpcenter.netwrix.com/category/threatprevention)