[{"id":"ci_7d1f59623c2452f492d12df005f4e415c34eb441d8bf79cccba06115b8927720","title":"Getting Started","path":"/endpoint-privilege-management/5.2/getting-started","children":[{"id":"ci_4f440850858b210b14a8c633a0af0a6957b84d4a575da1d0dd9aaf8af8703fe7","title":"Activating the EPM Component","path":"/endpoint-privilege-management/5.2/activating-the-epm-component","children":[]},{"id":"ci_f7f37394ed50789a151684feb63a8fd1a89554619491c605ac5dd0760fba7678","title":"How to access EPM console","path":"/endpoint-privilege-management/5.2/how-to-access-epm-console","children":[]},{"id":"ci_59ded1b1febc92d982184e31c434ef5db30a3fbc294ed9ba29ae3b0eba00b894","title":"EPM Common Uses and Steps","path":"/endpoint-privilege-management/5.2/epm-common-uses-and-steps","children":[]}]},{"id":"ci_c3bfc4d489240a6e15deb602891e8f2524e97d30abe2b2ece88437a0f6afe5a8","title":"Installation & Setup Guide","path":"/endpoint-privilege-management/5.2/installation-setup-guide","children":[{"id":"ci_43b81613c0f2b4f560810b960c67834a27ece12c0e8c79de86b05ec715fe074d","title":"Planning Deployment","path":"/endpoint-privilege-management/5.2/planning-deployment","children":[{"id":"ci_d70691fff0f5579853edf33fe7dbee4a7eb732d7455c49fcb2cba1275bc7b118","title":"EPM Service Architecture Overview","path":"/endpoint-privilege-management/5.2/epm-service-architecture-overview","children":[]},{"id":"ci_7625a8c45e92f49089d4cdcbb7f87f643958df8b2b8e691e61656932342fb9d5","title":"System Requirements","path":"/endpoint-privilege-management/5.2/system-requirements","children":[]},{"id":"ci_2d6e29740f992b660325be857607356040fecb11ca0a2a7c2bb86913d3af689d","title":"Deployment Scenarios","path":"/endpoint-privilege-management/5.2/deployment-scenarios","children":[]},{"id":"ci_adbe0039d73e557acc13f38015b9ed9e4d6720087f5af81306b85c42d32ae3f3","title":"Setting up test environment","path":"/endpoint-privilege-management/5.2/setting-up-test-environment","children":[]},{"id":"ci_3d645a599ad15f868cc363d1d977f438318d7b1af28ce2847570d450343ea624","title":"Standard Port Requirement for Installation","path":"/endpoint-privilege-management/5.2/standard-port-requirement-for-installation","children":[]}]},{"id":"ci_dfc6c8d52c233e6aa20b46a5912e45d06295cbbc23ad33a943c2cb867ea1835d","title":"Installing the Components","path":"/endpoint-privilege-management/5.2/installing-the-components","children":[{"id":"ci_a1106de5430f7c5aad16987783d075ea8e1790124f8dae354114ed83c55dbf57","title":"Installing Vault Component","path":"/endpoint-privilege-management/5.2/installing-vault-component","children":[]},{"id":"ci_abbc795d62b671e7ebb550529530a4efe99190d6870f3db8f6f26f0ec8c1f347","title":"Installing Sectona Web Access","path":"/endpoint-privilege-management/5.2/installing-sectona-web-access","children":[]},{"id":"ci_9b57e89b02db525d8068f3e2a8ced0b260557baffce8e144db80a8f76317423a","title":"Installing Sectona Client App","path":"/endpoint-privilege-management/5.2/installing-sectona-client-app","children":[]},{"id":"ci_e2e174721c95efd03b4f5455112009c9ea02087aa9b28267aa0946c373556226","title":"Installing Sectona Windows Monitoring Component","path":"/endpoint-privilege-management/5.2/installing-sectona-windows-monitoring-component","children":[]},{"id":"ci_a640472231948a633fd7ce99cc0482a8e4f10c0b3faa06e07f20229246d24aa5","title":"Installing Sectona Launcher","path":"/endpoint-privilege-management/5.2/installing-sectona-launcher","children":[]},{"id":"ci_9cb22b1aec7aaa0a660d36b60d3ba99ae2e7131b981b04256a5080db3eed92f8","title":"Installing Sectona Remote Session Host","path":"/endpoint-privilege-management/5.2/installing-sectona-remote-session-host","children":[]},{"id":"ci_1844f971f2318d74aa1d193e3118c9090540a047dd3f1170059069c2dc894555","title":"Building a High Availability Setup","path":"/endpoint-privilege-management/5.2/building-a-high-availability-setup","children":[{"id":"ci_9cb66543ec65db72a290f6fa62c8451f1d18d6bbf14b7b6f86bc00f54138af29","title":"Key Concepts and Components of a High-Availability System","path":"/endpoint-privilege-management/5.2/key-concepts-and-components-of-a-high-availability","children":[]},{"id":"ci_977dfe256afdc1a2ad2fe42ca06bcd5ac6f592da8fb2b52b59809035e54819f0","title":"Choosing an Architecture for HA & DR Requirements","path":"/endpoint-privilege-management/5.2/choosing-an-architecture-for-ha-dr-requirements","children":[]},{"id":"ci_b99defddc2cb5448a76491e80130550b7e993817ff7cd27a35d95846a96fa040","title":"Configuring Sectona Web Access for High Availability","path":"/endpoint-privilege-management/5.2/configuring-sectona-web-access-for-high-availabili","children":[]},{"id":"ci_eb0c87b1abec8187736b4564db8415ab451d0e7fbaf8e473b499a50ca5e03fec","title":"Configuring Vault for High Availability","path":"/endpoint-privilege-management/5.2/configuring-vault-for-high-availability","children":[]}]},{"id":"ci_394bd1c2d0a1d7e4d8cde00666e95a2a8af8150fa64a015d731d5bb244811699","title":"Configuring Disaster Recovery Setup","path":"/endpoint-privilege-management/5.2/configuring-disaster-recovery-setup","children":[]},{"id":"ci_c34d89c9ef56459475485855f1e8fe8eb2a78bef22cd5e87346fa6f40952cf6e","title":"Upgrading the System","path":"/endpoint-privilege-management/5.2/upgrading-the-system","children":[]}]}]},{"id":"ci_167cbaaa29a626aa2117ddfb8b519e8a91ffe695910847d1853db3eb81f3f464","title":"Managing system services","path":"/endpoint-privilege-management/5.2/managing-system-services","children":[]},{"id":"ci_89ec50f50629c4f3069ae3c51a6fe8e7e719c2dada578cdc686baadaa841d5c2","title":"Manage Endpoints","path":"/endpoint-privilege-management/5.2/manage-endpoints","children":[{"id":"ci_5231699d743d6d70a426bb5d0cf1fe6cdc444944ba12165855db000d6b917bb0","title":"Adding an asset manually","path":"/endpoint-privilege-management/5.2/adding-an-asset-manually","children":[]},{"id":"ci_f96335895834625f930208a16a23441f7d76b00552c2e4e8184d4a85de8d28b6","title":"Adding endpoints using active directory scan","path":"/endpoint-privilege-management/5.2/adding-endpoints-using-active-directory-scan","children":[]},{"id":"ci_a8dae04a7b7487339d620919e323e79ed6b8024611e07263bce8499e06148bfc","title":"Adding endpoints using network scan","path":"/endpoint-privilege-management/5.2/adding-endpoints-using-network-scan","children":[]},{"id":"ci_ac7020d0019f7bbea3890e9fd94ff22ef8fdcebc62bdc68ccf711c528eececb5","title":"Manually adding discovered asset from discovery jobs","path":"/endpoint-privilege-management/5.2/manually-adding-discovered-asset-from-discovery-jo","children":[]},{"id":"ci_d5f62c72d8d60c7aa3b38fbba2c52c843c08bbe2e70db72e3acb3c54ee5a349a","title":"Updating endpoint information","path":"/endpoint-privilege-management/5.2/updating-endpoint-information","children":[]},{"id":"ci_3f88bf5ab387c44b24d35b7a7241595ae5bb29c53968a32e11b9a990e00b3553","title":"Accessing additional endpoint information","path":"/endpoint-privilege-management/5.2/accessing-additional-endpoint-information","children":[]},{"id":"ci_4214f2edcc7e6cf41a895b97298c6344b67cb861446a2db6f6a2089d5e8a3d44","title":"Adding accounts on endpoints using discovery","path":"/endpoint-privilege-management/5.2/adding-accounts-on-endpoints-using-discovery","children":[]}]},{"id":"ci_3a5eec3a2b9db0f078ddd4c14b87abfd149183b655cd8c704b69b82f4da8ef11","title":"Manage Groups","path":"/endpoint-privilege-management/5.2/manage-groups","children":[{"id":"ci_af688977470d3133f1176d41e80555677286577e113fa03709fdb3b86b9b8366","title":"Creating asset groups","path":"/endpoint-privilege-management/5.2/creating-asset-groups","children":[]},{"id":"ci_44e895370f70913d684c7d1c17104bfc3aa7111777df6a15676fae11424210c9","title":"Adding assets to asset groups","path":"/endpoint-privilege-management/5.2/adding-assets-to-asset-groups","children":[]},{"id":"ci_c7e4a6763edfa4f250645c219861d8fe6e6824e94cbcceaf3c856aaabd035b61","title":"View asset group members","path":"/endpoint-privilege-management/5.2/view-asset-group-members","children":[]},{"id":"ci_0da50fe318f7243a5fa76b486c8d02fd87720b6948999da4ec5dbc5980f3088f","title":"Creating user groups","path":"/endpoint-privilege-management/5.2/creating-user-groups","children":[]},{"id":"ci_6643e4773b0e143b1d0a111a0183895a6166068e6dcb0363876c82faecb789d9","title":"Adding user to user groups","path":"/endpoint-privilege-management/5.2/adding-user-to-user-groups","children":[]},{"id":"ci_af88626ec912599d00a6a01d844e21d7cbf3219626686f57557a447035076b5c","title":"Remove users from user groups","path":"/endpoint-privilege-management/5.2/remove-users-from-user-groups","children":[]},{"id":"ci_80d3774fceece73dd1b4a5ccea4426f565dea15d691f9469ec97fdf879f0a4cb","title":"View user group members","path":"/endpoint-privilege-management/5.2/view-user-group-members","children":[]},{"id":"ci_295a7159daf449e7c7ad0cea56dcc63814bf87e3b12d45f83f9bb95e7ad3a76d","title":"Managing access to assets & passwords via Active Mapping","path":"/endpoint-privilege-management/5.2/managing-access-to-assets-passwords-via-active-map","children":[]}]},{"id":"ci_458785fbf167dafdc951783a4a85d8af4228375972aa44afb30df76e7140d42f","title":"Managing Account Operations","path":"/endpoint-privilege-management/5.2/managing-account-operations","children":[]},{"id":"ci_b4dcae2dbb6b61c933c77731baca8cc710c30d23bdd82135bace71c8243f327a","title":"General Configuration for EPM","path":"/endpoint-privilege-management/5.2/general-configuration-for-epm","children":[{"id":"ci_111d9d269348876f349dcb1eb098cb68894245beccd150e9fb7c638a369347a9","title":"Customize web application appearance and site settings","path":"/endpoint-privilege-management/5.2/customize-web-application-appearance-and-site-sett","children":[]},{"id":"ci_f82ee33e3fe352eaa949adb950a8f527c5b9bcc7e830342e4d0007f4a93709f7","title":"Add new LDAP/LDAPs directory","path":"/endpoint-privilege-management/5.2/add-new-ldap-ldaps-directory","children":[]},{"id":"ci_f068c4cd0f0099daba5141926f1c87f9d4fb4d01bd6b9ba63c4e99210f03c50e","title":"Configure location tagging","path":"/endpoint-privilege-management/5.2/configure-location-tagging","children":[]},{"id":"ci_51f041cd70e03c25957b656bbdbe41c0b401d8200fa3929211acbf5a3152565a","title":"Define network zones","path":"/endpoint-privilege-management/5.2/define-network-zones","children":[]},{"id":"ci_96345071b5e4f0704c4ffff1ff66c7ab8da5b42c1a75b8cc89474874cdcd485b","title":"Managing Settings for video","path":"/endpoint-privilege-management/5.2/managing-settings-for-video","children":[]},{"id":"ci_a08e5d3194565960cceb1128f1ab1603f0f643468d21a4c49ac15ee5070ef8c7","title":"Set criticality level tags","path":"/endpoint-privilege-management/5.2/set-criticality-level-tags","children":[]},{"id":"ci_8317d765da69d8f2cdab072dea3eae0e00781dc152881cab8b0d1fb38f3bf30c","title":"Configuring Email as External Service","path":"/endpoint-privilege-management/5.2/configuring-email-as-external-service","children":[]},{"id":"ci_6512557a191446f3786eb7e5717dd902403163c1902deb86cba23996eddd607b","title":"Setting up a Network Proxy","path":"/endpoint-privilege-management/5.2/setting-up-a-network-proxy","children":[]},{"id":"ci_9d1cc8e7be6075c27aee3dd1de677e8e31c7e5d1189e12f4fc6f904804128521","title":"Conditional Tagging","path":"/endpoint-privilege-management/5.2/conditional-tagging","children":[]},{"id":"ci_56e44cf471d98d8fdde747c41d359480f0c2ef6e9f31e1137779f0c0676b2968","title":"Configure HTTPs certificate","path":"/endpoint-privilege-management/5.2/configure-https-certificate","children":[]},{"id":"ci_20929d575206bccdfeea212512f892741009ae47800d24ae5f5b67b756515b41","title":"Update default system settings","path":"/endpoint-privilege-management/5.2/update-default-system-settings","children":[]},{"id":"ci_4dae84d609ac29879f0ccf934b6a77791bdae03dc2c85422e971de8dcc4937e4","title":"Configure Multi-factor authentication","path":"/endpoint-privilege-management/5.2/configure-multi-factor-authentication","children":[{"id":"ci_a099df5e9f71da71cbd030c5d40db041d7a799494f82cefc7b785811bdd2855a","title":"Sectona MFA","path":"/endpoint-privilege-management/5.2/sectona-mfa","children":[]},{"id":"ci_a02f34eb0fdf80006ba496671224875e17d08b2edcc4d2598253fd55b4c4c51c","title":"DUO MFA","path":"/endpoint-privilege-management/5.2/duo-mfa","children":[]},{"id":"ci_c06e22c7194697fcc07ddb9d53dd5a46081b0c72dbc96325c2034e0876174104","title":"Okta MFA","path":"/endpoint-privilege-management/5.2/okta-mfa","children":[]},{"id":"ci_402510df302c470cd15b6b7999318a4a3d726c7d63296dfab158b77779b44c96","title":"OneLogin MFA","path":"/endpoint-privilege-management/5.2/onelogin-mfa","children":[]},{"id":"ci_149cd10e1d3b804a058f318a78a664e7e2209b8d2f1704df87a1dd99af529e59","title":"Google Authenticator","path":"/endpoint-privilege-management/5.2/google-authenticator","children":[]},{"id":"ci_fcce5d179e556be4093361464bef450996e9287bdfad10eb82d106bff1f7ce57","title":"RSA SecureID","path":"/endpoint-privilege-management/5.2/rsa-secureid","children":[]},{"id":"ci_8867eeb3c53ca17c47795514b3ebab9c43150ff28dd2e93fb100ecb14ff60677","title":"Vasco","path":"/endpoint-privilege-management/5.2/vasco","children":[]},{"id":"ci_c770a7f2ddba556945bd4f1eaf705d4d381bed99bcb33f08209a3d0c42707e57","title":"Generic RADIUS","path":"/endpoint-privilege-management/5.2/generic-radius","children":[]},{"id":"ci_1d7836915c6fba1f82c5049ee5f780143a8072dc9ff4e1b1f1d43c5265f6f657","title":"Microsoft Authenticator","path":"/endpoint-privilege-management/5.2/microsoft-authenticator","children":[]},{"id":"ci_093d3311b4184182ec340b40d783e1c9b5c72311cb4059313fe1d4a060301103","title":"FIDO2","path":"/endpoint-privilege-management/5.2/fido2","children":[]},{"id":"ci_6b9144b24da565d763c9c3129981a3256644ab7721c541252504c5cc5d6f0c86","title":"Biometric","path":"/endpoint-privilege-management/5.2/biometric","children":[]}]},{"id":"ci_fa3bd162c024267ab8f2488ee362031dff13054f6e94f9033314439465bd98b8","title":"Configure User Authentication","path":"/endpoint-privilege-management/5.2/configure-user-authentication","children":[{"id":"ci_14f6b864370248eb232bc62ca3dc66b5f732ee207f448a8ec87a945d8b2d0bdd","title":"LDAP/LDAPs supported directories","path":"/endpoint-privilege-management/5.2/ldap-ldaps-supported-directories","children":[]},{"id":"ci_83e6574092e3b627e3818e08b6f6b91f78aeb369188455acffaa21c0dbea4e6c","title":"Radius authentication","path":"/endpoint-privilege-management/5.2/radius-authentication","children":[]},{"id":"ci_b9a2f69096f6886b59520d9da5d777084510995418fcd8ee08e09cec6f90c7ca","title":"Sectona authentication","path":"/endpoint-privilege-management/5.2/sectona-authentication","children":[]},{"id":"ci_3cd496e3ddfda29455cbcb06e64ae23e852616b172fe9528d81f057a0d5e9c93","title":"SAML authentication","path":"/endpoint-privilege-management/5.2/saml-authentication","children":[{"id":"ci_84108e8c706924a09849a09ab8689582cb62ab4c0904db6fffbf4748a4eed65b","title":"OneLogin SAML","path":"/endpoint-privilege-management/5.2/onelogin-saml","children":[]},{"id":"ci_f417578bf1ba17dfbafc89418eba5939ea7ead8b2bd24d17c18075d215ff4bc2","title":"Okta SAML","path":"/endpoint-privilege-management/5.2/okta-saml","children":[]},{"id":"ci_abfe33a04a6498c2f4306be0c717629757a099c2f3bb5a2bf4d7a09750393e4b","title":"Duo SAML","path":"/endpoint-privilege-management/5.2/duo-saml","children":[]}]}]}]},{"id":"ci_502444067f7bb732564d996f8594f3ad32ea7fafab3515e6d96512cb23470638","title":"Managing Accounts & Keys","path":"/endpoint-privilege-management/5.2/managing-accounts-keys","children":[{"id":"ci_8502f6e981a9332bdb1bbf3d87ed7b0b98f5c29b32ee639cc689e3d9f139ca96","title":"Onboard accounts in vault","path":"/endpoint-privilege-management/5.2/onboard-accounts-in-vault","children":[]}]},{"id":"ci_bcfc23b3ba39dd9a757b18d47b79ea9d25bde78ff98ff6da0af4a2a4f8dc2b0e","title":"Managing User & Authentication","path":"/endpoint-privilege-management/5.2/managing-user-authentication","children":[{"id":"ci_089a9864c15498ec52254a0523a82dff2645f319ef2b056a31d52b852567951c","title":"Adding Users in the system","path":"/endpoint-privilege-management/5.2/adding-users-in-the-system","children":[]},{"id":"ci_d397e0f4db7693a02db14fe8b5d2cea53ccd869419a383a3b08922acc0785159","title":"Managing User Roles","path":"/endpoint-privilege-management/5.2/managing-user-roles","children":[]},{"id":"ci_3e520c80f6ae2fc898db720d9f5bbe258399bbfeb8c27d85d3bb3966e0e115f1","title":"Logon Policy Configuration","path":"/endpoint-privilege-management/5.2/logon-policy-configuration","children":[]},{"id":"ci_7bc7e173e0630f522447b1c73aa8436e1601c162775ac2ee26cea58cefa904d6","title":"User authentication settings","path":"/endpoint-privilege-management/5.2/user-authentication-settings","children":[]}]},{"id":"ci_d2b2306500104b6486b1358f3b20c8922ed3361e6317e3866411522230b9012a","title":"Managing the System","path":"/endpoint-privilege-management/5.2/managing-the-system","children":[{"id":"ci_14f21137192d3d25aa568eb08c368a5bda0462d93f9c9c13a67eb2af6ccddc73","title":"Auditing System Changes","path":"/endpoint-privilege-management/5.2/auditing-system-changes","children":[]},{"id":"ci_f9e8cfd35e9be8ccc03e547522707952174f13e26d1e44305af1f0ec72153f81","title":"Using Troubleshooting Utilities","path":"/endpoint-privilege-management/5.2/using-troubleshooting-utilities","children":[]},{"id":"ci_f483613426ed9a911cc079d29390b3d60c5c29bc645f4999507c40753fc9e343","title":"Monitoring System Health & Service Status","path":"/endpoint-privilege-management/5.2/monitoring-system-health-service-status","children":[]},{"id":"ci_e64473ff2881ff1e9685457a2f71b13dee32501a669b95699f6c5f8c94c5de23","title":"Managing Licenses","path":"/endpoint-privilege-management/5.2/managing-licenses","children":[]},{"id":"ci_9e94af1e444bb42ad06e777204f72cd7d07694cd9487c871767acc23d2e05e2c","title":"Workflow Administration","path":"/endpoint-privilege-management/5.2/workflow-administration","children":[{"id":"ci_3df3afd08843b68f811aba44ec61553cfe5a599d87414673479331193353ae98","title":"Configuring Workflow rule","path":"/endpoint-privilege-management/5.2/configuring-workflow-rule","children":[]},{"id":"ci_5294f3df9e35e0294e7fc2153add85269f77db7e9bf54f3cfdba363c6eb548bc","title":"Overriding workflow-based access","path":"/endpoint-privilege-management/5.2/overriding-workflow-based-access","children":[]},{"id":"ci_71a5d35c3490af92deb91e630565951162a25e0acb614eadbbc15b279ed852c7","title":"Auditing logs","path":"/endpoint-privilege-management/5.2/auditing-logs","children":[]},{"id":"ci_d7241c713a8ff98c4fe61e378b1af8235b5ad11729f45b9168e75e18381252c4","title":"Managing approvals","path":"/endpoint-privilege-management/5.2/managing-approvals","children":[]},{"id":"ci_7f3b8b098cf3f83e5d3d100cd089d25f16c4515de2b7d913d1370094277e9639","title":"Workflow-based access","path":"/endpoint-privilege-management/5.2/workflow-based-access","children":[{"id":"ci_b3f67acc62f6edfa3ca2a3a786211e8db506afa84baf2b13b52e2f8d1e27395b","title":"Enabling Maker Checker","path":"/endpoint-privilege-management/5.2/enabling-maker-checker","children":[]}]}]}]},{"id":"ci_46b0b3112b04c356544414b9484a0c8f6a0ca03fd8c78b9e7c66a55493f7005f","title":"Password Management","path":"/endpoint-privilege-management/5.2/password-management","children":[{"id":"ci_4104260b76fe2195fa5513d4df6af6bb45d37d44d6b1a00e981ec8615ed20c68","title":"Setting up password management","path":"/endpoint-privilege-management/5.2/setting-up-password-management","children":[]},{"id":"ci_7692b27327e6df6326077422b358efc5f866c921aacc5e40a2a8d1c8064f401b","title":"On-demand password change","path":"/endpoint-privilege-management/5.2/on-demand-password-change","children":[]},{"id":"ci_72ea98e1de7253b2978519d76b981db15f84ab1d91a2ce7bf51ab9fdb179ae1c","title":"Configuring password formation rules","path":"/endpoint-privilege-management/5.2/configuring-password-formation-rules","children":[]},{"id":"ci_05fba64bb378d97ebc5d064820fc770f2199079525b67538c5ff749e582e573b","title":"Defining automatic password rotation","path":"/endpoint-privilege-management/5.2/defining-automatic-password-rotation","children":[]},{"id":"ci_5b270f324fb21a6bcb80fc4175ef17049b55464c2851c6f862d8259ff246b496","title":"Defining password checkout rules","path":"/endpoint-privilege-management/5.2/defining-password-checkout-rules","children":[]},{"id":"ci_bfc5fbe30a2eb6552485f0bddff2d3b45c9dc198e498c78fa022875e43e15961","title":"Configuring reconciliation policy","path":"/endpoint-privilege-management/5.2/configuring-reconciliation-policy","children":[]}]},{"id":"ci_40c488a4a81e79334f6d92d288409ddecabe6220517fab33e490a998f19796d4","title":"Access Endpoints","path":"/endpoint-privilege-management/5.2/access-endpoints","children":[]},{"id":"ci_3734073b0489892a6b719d7e5069629f59e734e7cceb637ffd87715cd188cfe2","title":"Password Checkout","path":"/endpoint-privilege-management/5.2/password-checkout","children":[]},{"id":"ci_4c760dd22eab7ad136ea4a22bda122e6976c9de1373f22a833badfdf3a773d7d","title":"Windows Privilege Management","path":"/endpoint-privilege-management/5.2/windows-privilege-management","children":[{"id":"ci_5bb9a5960189f1c0f83207bdd0287ce02512a08c573b2eb276e6caffe6531ee8","title":"Installing EPM Agent","path":"/endpoint-privilege-management/5.2/installing-epm-agent","children":[]},{"id":"ci_d6bb3f0792dc7a0dc5254f9adf1f920ade554793f6a98612cc92a4d8514f1b39","title":"Distributing Agents via Group Policy","path":"/endpoint-privilege-management/5.2/distributing-agents-via-group-policy","children":[]},{"id":"ci_0b4eb197f39d408d76d9a2c36e2d60b10807c89dc0bad0db111ec66d359bcabc","title":"Privilege Management","path":"/endpoint-privilege-management/5.2/privilege-management","children":[]},{"id":"ci_54e2e2a08865c0757fb47ac5f5eae588aa4193968f983c573076ac301d89e35d","title":"Audit activites","path":"/endpoint-privilege-management/5.2/audit-activites","children":[]},{"id":"ci_9dbbbce1e32dff44faad034b7527ef7ade145fa3c5c3d1f4e0376a6a6dc2bb0d","title":"Adding Local Admin Membership","path":"/endpoint-privilege-management/5.2/adding-local-admin-membership","children":[]}]},{"id":"ci_be77e16e368d19f8e011851095a7bbf380c7fc7d4dcafa0c401c29641f7764c1","title":"Reporting","path":"/endpoint-privilege-management/5.2/reporting","children":[{"id":"ci_d93aff7e5b172c0fe7625d92f6d6e79da78913944e12f377194fe6a83cd853fd","title":"Designing a report","path":"/endpoint-privilege-management/5.2/designing-a-report","children":[]},{"id":"ci_2f8196c3aa4c1dcd1a98c852fcd52ddd9744e1ff5dc96f40d8b184e8530b8e9b","title":"Editing a custom report","path":"/endpoint-privilege-management/5.2/editing-a-custom-report","children":[]},{"id":"ci_b94bc221de3653d59a0d89b81a7a7d260418360d8fcc38557404dea5ed422996","title":"Deleting a custom report","path":"/endpoint-privilege-management/5.2/deleting-a-custom-report","children":[]},{"id":"ci_96d4f227b283e236cd09d61e296a33c0f64cf332e742cd777e1f66b5adeb14c6","title":"Exporting a report","path":"/endpoint-privilege-management/5.2/exporting-a-report","children":[]},{"id":"ci_179ce074af7293d376a76f76ea01dd211d8b54e3daeab6dce5b03dcf8acec845","title":"Scheduling a report","path":"/endpoint-privilege-management/5.2/scheduling-a-report","children":[]},{"id":"ci_e270e1285fb1899421ee5a056b3d5f23e4503e94e66f4c704e6a7c561eed99db","title":"Navigating dashboard","path":"/endpoint-privilege-management/5.2/navigating-dashboard","children":[]},{"id":"ci_5abeb34b1ff4e894d63335b4620406fc326e822813065e9d6d0212e2fb914a1c","title":"Creating the Dashboard","path":"/endpoint-privilege-management/5.2/creating-the-dashboard","children":[]}]},{"id":"ci_0d09639a6a9f052493b504c8ee17c03d8483ba7056c8dd2294bd96b1b98cdaf0","title":"End User Access","path":"/endpoint-privilege-management/5.2/end-user-access","children":[]},{"id":"ci_9977c80e2cd386d7260e74e3e21929f96c9f0bb4b1afcb66e068141fcf33f71b","title":"Launching EPM","path":"/endpoint-privilege-management/5.2/launching-epm","children":[]}]