[{"id":"ci_8508c7bb35b3fe977cc1f685c4117537268b229f1a5b4d31616cb8c67a852fb6","title":"Release Notes","path":"/endpoint-privilege-management/5.4/release-notes","children":[{"id":"ci_5ceecd354384aafb06ec097b166faeeefb79a24483d957862ee9b4dea54aa3af","title":"Version 5.4.0","path":"/endpoint-privilege-management/5.4/version-5-4-0","children":[]}]},{"id":"ci_6640d916673fb07f145bb01c30a25bf9f223fe06d42ee0bbceac53c0db444bc7","title":"Getting Started","path":"/endpoint-privilege-management/5.4/getting-started","children":[{"id":"ci_d5fbc28a33f00eb2392107a9325dd1b65a33a52abc0680986a1f87294ef729f8","title":"Activating the EPM Component","path":"/endpoint-privilege-management/5.4/activating-the-epm-component","children":[]},{"id":"ci_1c9fb1b63986bdda003dbcbaada48aa001cbcb7d1322648f7806ff464c8ec220","title":"How to access EPM console","path":"/endpoint-privilege-management/5.4/how-to-access-epm-console","children":[]},{"id":"ci_9b696934ac9ce57aa632290f5dc4f02ef3edf12855cf0b92016a15b90566bffa","title":"EPM Common Uses and Steps","path":"/endpoint-privilege-management/5.4/epm-common-uses-and-steps","children":[]}]},{"id":"ci_fdb0ebc7f5b37ef144e3df82c7249f286dc66bb1b87891ebb37f10c699f795f0","title":"Installation & Setup Guide","path":"/endpoint-privilege-management/5.4/installation-setup-guide","children":[{"id":"ci_51781b304f44974f8282de443d1e3072fbe6e4e64360d215ad0ebc9674cc2e60","title":"Planning Deployment","path":"/endpoint-privilege-management/5.4/planning-deployment","children":[{"id":"ci_5f8af53f4f6016876078470edd6809bba695cd61da5b4765fd8a2886b6c6b421","title":"EPM Service Architecture Overview","path":"/endpoint-privilege-management/5.4/epm-service-architecture-overview","children":[]},{"id":"ci_f30c9728b1d0c3574aa3ee2e64c58773bc64388ffbfb4f0fb3d0797b0c0648ff","title":"System Requirements","path":"/endpoint-privilege-management/5.4/system-requirements","children":[]},{"id":"ci_b280f15a3344c780ed996616596ada84b9bc7a88779b3e1a9ea5c94211e3f33f","title":"Deployment Scenarios","path":"/endpoint-privilege-management/5.4/deployment-scenarios","children":[]},{"id":"ci_5633ed0a12b67c025e923ec9264cc6c30d1936c0d51030593355558bb9b070af","title":"Setting up test environment","path":"/endpoint-privilege-management/5.4/setting-up-test-environment","children":[]},{"id":"ci_52ca8899303e9f42ed9e10dffbe6ecd729a74a3cc1ef6e854ca7be277b8dce5a","title":"Standard Port Requirement for Installation","path":"/endpoint-privilege-management/5.4/standard-port-requirement-for-installation","children":[]}]},{"id":"ci_d5b4cfd07262943020baf131022fb00b338d60903cce337840baec37061c3acf","title":"Installing the Components","path":"/endpoint-privilege-management/5.4/installing-the-components","children":[{"id":"ci_bd17c24d6bdd4b69b9789d9ae8776535eea225a0a1a8d7d33194c13cf1f0d3b6","title":"Installing Vault Component","path":"/endpoint-privilege-management/5.4/installing-vault-component","children":[]},{"id":"ci_99715bfd8492d0c1ea0f464d2fc1f365e47f03b1ad733700b96fe61b47f95e7e","title":"Installing Sectona Web Access","path":"/endpoint-privilege-management/5.4/installing-sectona-web-access","children":[]},{"id":"ci_e56d9a5743125bf2d7296eb7d52e478e9e9a13665de45151e7d6fff7606e6140","title":"Installing Sectona Client App","path":"/endpoint-privilege-management/5.4/installing-sectona-client-app","children":[]},{"id":"ci_b92d9d4d9da2a47619d5a79e382fbbf2b92b88f945243c58958b22a93610ce93","title":"Installing Sectona Windows Monitoring Component","path":"/endpoint-privilege-management/5.4/installing-sectona-windows-monitoring-component","children":[]},{"id":"ci_58c1eda11d006211283c988bb6c1f9919536612353b7fabea94ad2ae6789da1a","title":"Installing Sectona Launcher","path":"/endpoint-privilege-management/5.4/installing-sectona-launcher","children":[]},{"id":"ci_fc2bf7c6ba5d0cd04119b839961272970d81bb956955f451489ab7f6d61794ea","title":"Installing Remote Session Host","path":"/endpoint-privilege-management/5.4/installing-sectona-remote-session-host","children":[]},{"id":"ci_56f9c40aead1d0ba3b8d34fd1835ec4f3f9ce11c62a6485bb27914d8b6723ac7","title":"Building a High Availability Setup","path":"/endpoint-privilege-management/5.4/building-a-high-availability-setup","children":[{"id":"ci_6eb0fa29f1ae1f462f808986f8a4b2a4d37d27b022da41881a1da9711d7c3331","title":"Key Concepts and Components of a High-Availability System","path":"/endpoint-privilege-management/5.4/key-concepts-and-components-of-a-high-availability","children":[]},{"id":"ci_20be8be813b76e5fb604cd835c94e5519845ff034a68b189f27a0ba467b50f8c","title":"Choosing an Architecture for HA & DR Requirements","path":"/endpoint-privilege-management/5.4/choosing-an-architecture-for-ha-dr-requirements","children":[]},{"id":"ci_00b0ade1b15e8dfb72ec5c8d9572d8fe9c7e0d202bef6c0432e56fdebd26bb7b","title":"Configuring Sectona Web Access for High Availability","path":"/endpoint-privilege-management/5.4/configuring-sectona-web-access-for-high-availabili","children":[]},{"id":"ci_17bd4fb449a9688a8f6e15240f6066ea3e8b3b7de331299517e0a1049addd87a","title":"Configuring Vault for High Availability","path":"/endpoint-privilege-management/5.4/configuring-vault-for-high-availability","children":[]}]},{"id":"ci_e74a2a9729897c4ed3bdd2a703f17dcd5fc3bc881a711c8875e817361f36335d","title":"Configuring Disaster Recovery Setup","path":"/endpoint-privilege-management/5.4/configuring-disaster-recovery-setup","children":[]},{"id":"ci_0b94224d70f125d3bd27a5ab9d3598db3e51da0379e7a4c131750131272c09a0","title":"Upgrading the System","path":"/endpoint-privilege-management/5.4/upgrading-the-system","children":[]}]}]},{"id":"ci_853c6cee01a5196cb1527a86fd8815d5591bab6675cc5aa7933bc8147ea37412","title":"Managing system services","path":"/endpoint-privilege-management/5.4/managing-system-services","children":[]},{"id":"ci_e05f3e30af4f216f98185f59cc49357c597bb9f356bb3b4d0f22300bb30f3b7b","title":"Manage Endpoints","path":"/endpoint-privilege-management/5.4/manage-endpoints","children":[{"id":"ci_884bf5055ab5e7367e3b7874f7cf274e5e9cf3beb1e1a7d199df95567a8ca669","title":"Adding an asset manually","path":"/endpoint-privilege-management/5.4/adding-an-asset-manually","children":[]},{"id":"ci_89cacd820c07d83919f53bf828bd7ef9be52a9fce0feca5c0dad19aadd715431","title":"Adding endpoints using active directory scan","path":"/endpoint-privilege-management/5.4/adding-endpoints-using-active-directory-scan","children":[]},{"id":"ci_de10987e671b8094a53369969798b0d8d0804b313eb92449b7955a90df42fc5e","title":"Adding endpoints using network scan","path":"/endpoint-privilege-management/5.4/adding-endpoints-using-network-scan","children":[]},{"id":"ci_0a443a9f8eac2dfd698f279b8f38afda12c731c76adc3f2cd503a9417262cffc","title":"Manually adding discovered asset from discovery jobs","path":"/endpoint-privilege-management/5.4/manually-adding-discovered-asset-from-discovery-jo","children":[]},{"id":"ci_4d660de6c172c7d2b7c7943349a948d7581949fcbe8b36e344db7cd1587911e5","title":"Adding endpoints not in AD","path":"/endpoint-privilege-management/5.4/adding-endpoints-not-in-ad","children":[]},{"id":"ci_4ed152f5460036fb253149cd91fb15741e227a9884ef5be8c8b6ba7acc1fc728","title":"Updating endpoint information","path":"/endpoint-privilege-management/5.4/updating-endpoint-information","children":[]},{"id":"ci_4c35d9f0d2cfb8613b56e24e4905e790bab9812cabf926b401ef912cecc4cf48","title":"Accessing additional endpoint information","path":"/endpoint-privilege-management/5.4/accessing-additional-endpoint-information","children":[]},{"id":"ci_9481bb095e980dc918c3400d43691462880c6c1476cbf1ccae915477b17f6388","title":"Adding accounts on endpoints using discovery","path":"/endpoint-privilege-management/5.4/adding-accounts-on-endpoints-using-discovery","children":[]},{"id":"ci_70eb11abec06703739dc2ab20e11a7b29f07a8e9bc938a0784ba2b4c02b678c6","title":"Adding endpoints in bulk","path":"/endpoint-privilege-management/5.4/adding-endpoints-in-bulk","children":[]}]},{"id":"ci_add3c2322a73b61fc0eb8e7a8353a09cd7f8783da53f6c9ede24d8a7d514cd59","title":"Manage Groups","path":"/endpoint-privilege-management/5.4/manage-groups","children":[{"id":"ci_3e585e1d4de330c7e1b128cbfa1c283074eaea5d044c478e8054d5b54776f810","title":"Creating asset groups","path":"/endpoint-privilege-management/5.4/creating-asset-groups","children":[]},{"id":"ci_56cb40991e29b72d1880d71b7eb61dd6d81eb74e97c095c84306bd1a736b4dc0","title":"Adding assets to asset groups","path":"/endpoint-privilege-management/5.4/adding-assets-to-asset-groups","children":[]},{"id":"ci_c576be8c177197daf258b0d4ae525ce18a1edd607965cd5cf3eb2e87f4aba903","title":"View asset group members","path":"/endpoint-privilege-management/5.4/view-asset-group-members","children":[]},{"id":"ci_0bb12ce9faa56fe2a00082c59902d139d9fcc0958dae9175cabe0fa259b24954","title":"Creating user groups","path":"/endpoint-privilege-management/5.4/creating-user-groups","children":[]},{"id":"ci_89df19f7c91398e509e60db759183ee5363728437cb626122633c00977b1f285","title":"Adding user to user groups","path":"/endpoint-privilege-management/5.4/adding-user-to-user-groups","children":[]},{"id":"ci_35eb2f8eab1ad7156e817cfbc89bb8453dcf6722c83cdb4c4c44b2f6d7e9825e","title":"Remove users from user groups","path":"/endpoint-privilege-management/5.4/remove-users-from-user-groups","children":[]},{"id":"ci_1583bd2073ec0f658d639112e0aa8ae933c89fc5b1daef0759c0aa5ddd04fbf5","title":"View user group members","path":"/endpoint-privilege-management/5.4/view-user-group-members","children":[]},{"id":"ci_931f8ecf6f53663c01c2183d8976cf7fc1b203f4605e8ec51d5fb1f998204a61","title":"Managing access to assets & passwords via Active Mapping","path":"/endpoint-privilege-management/5.4/managing-access-to-assets-passwords-via-active-map","children":[]}]},{"id":"ci_aa6bedf2317c3ecc9e536e8910c4045bc246cb03b6f3b6f6fc6ebad8d2030f6f","title":"Managing Account Operations","path":"/endpoint-privilege-management/5.4/managing-account-operations","children":[]},{"id":"ci_7c7bb2d302bdce67ab713e35518005f791f6e125f1c1da989cd5f0ddc1b1479e","title":"General Configuration for EPM","path":"/endpoint-privilege-management/5.4/general-configuration-for-epm","children":[{"id":"ci_dab870198111ce152635caf43a91e0d8e8431a63d2e86888c0f1cfd55124c2d0","title":"Customize web application appearance and site settings","path":"/endpoint-privilege-management/5.4/customize-web-application-appearance-and-site-sett","children":[]},{"id":"ci_422f1590b6a3139a87c7eb51965e23d216bd0848ba4db421c6f117a2fbe7adf8","title":"Add new LDAP/LDAPs directory","path":"/endpoint-privilege-management/5.4/add-new-ldap-ldaps-directory","children":[]},{"id":"ci_b2147bf2a57b5e53ba7cc3f2c778349312083b229f8f4d8848d8552ff295d570","title":"Configure location tagging","path":"/endpoint-privilege-management/5.4/configure-location-tagging","children":[]},{"id":"ci_a1d3f621207f7cc16b0aa68d349f09e09e2461fb7a403e1d68d9045ac3b3eae6","title":"Define network zones","path":"/endpoint-privilege-management/5.4/define-network-zones","children":[]},{"id":"ci_639d4e7f79faca286bd31850d1f753b3b4a10b436e37094966376b17d2f5cd17","title":"Managing Settings for video","path":"/endpoint-privilege-management/5.4/managing-settings-for-video","children":[]},{"id":"ci_85db7139f47271f95fd7c04b1fddf422e23e2b4792b027b4d3de93e4790cd70e","title":"Set criticality level tags","path":"/endpoint-privilege-management/5.4/set-criticality-level-tags","children":[]},{"id":"ci_9de9e27ce06141d61eb29863769a62dca1a6d277bf2d000ff3b5090fd25a4346","title":"Configuring Email as External Service","path":"/endpoint-privilege-management/5.4/configuring-email-as-external-service","children":[]},{"id":"ci_69df121705fc34b8691ea19e86041d8ce8c43bd7c8bed4cf49d96cdf53d2abec","title":"Setting up a Network Proxy","path":"/endpoint-privilege-management/5.4/setting-up-a-network-proxy","children":[]},{"id":"ci_9924092a913890e124622e9b4dcefa89f69b87b6cc5fc73ecdb52309e353e4e9","title":"Conditional Tagging","path":"/endpoint-privilege-management/5.4/conditional-tagging","children":[]},{"id":"ci_2736f3896ec322a5bcf159cd1a3cc8e247b9c263d1e32243e96fe115dda7df16","title":"Configure HTTPs certificate","path":"/endpoint-privilege-management/5.4/configure-https-certificate","children":[]},{"id":"ci_a5ca257d46ef0462e529858b0c53cf0882f1a20bf02737424f8bdd18bf13dda0","title":"Update default system settings","path":"/endpoint-privilege-management/5.4/update-default-system-settings","children":[]},{"id":"ci_b12cbaed63ed7ee62b5f0b83b6878c3e49363a47baa574bde58460b79452554a","title":"Configure Multi-factor authentication","path":"/endpoint-privilege-management/5.4/configure-multi-factor-authentication","children":[{"id":"ci_c5ed9d53287ff34d28328adfd43daf69a8fef6878bc3df02aecfb1bde5e5700a","title":"Sectona MFA","path":"/endpoint-privilege-management/5.4/sectona-mfa","children":[]},{"id":"ci_2efacbb2c83f011b7aded7412a5198ba29d15dd9405dc0fa6c5bae656de91e03","title":"DUO MFA","path":"/endpoint-privilege-management/5.4/duo-mfa","children":[]},{"id":"ci_36ac6ed07c5f323daee22bda366c2e5d3f03a14f60dab681f0f7c5022af32068","title":"Okta MFA","path":"/endpoint-privilege-management/5.4/okta-mfa","children":[]},{"id":"ci_e829d431e86a632fdaf5c1d577b3f0213df0d35021c31afe742a712471c73a03","title":"OneLogin MFA","path":"/endpoint-privilege-management/5.4/onelogin-mfa","children":[]},{"id":"ci_06735a5bdc2bef9fe3c7fb34e9530b13eb3042ad7cf1f58f2230abda73311cfc","title":"Google Authenticator","path":"/endpoint-privilege-management/5.4/google-authenticator","children":[]},{"id":"ci_16e8d2bed3d9a642234054416ca91e553922034c2437c5f3c43992455a2fd640","title":"RSA SecureID","path":"/endpoint-privilege-management/5.4/rsa-secureid","children":[]},{"id":"ci_1f59f5e3b94536200478e225c12c1997e903985cf33a09f99cf72104cb04bb92","title":"Vasco","path":"/endpoint-privilege-management/5.4/vasco","children":[]},{"id":"ci_1fae2dd383170663aea9d0c4cfe210ee4608a9f4d06a76443b20546edfd155b7","title":"Generic RADIUS","path":"/endpoint-privilege-management/5.4/generic-radius","children":[]},{"id":"ci_8c5146494a2793919eaa7ed215d492b920fc8b81f26c359a253795c5686dd63b","title":"Microsoft Authenticator","path":"/endpoint-privilege-management/5.4/microsoft-authenticator","children":[]},{"id":"ci_33e6990fa850cb5ea4c217143be0f2300fd9fd7b44e186392d221c416b983e15","title":"FIDO2","path":"/endpoint-privilege-management/5.4/fido2","children":[]},{"id":"ci_6a44a9d9a0f53f9102af2836e953e6a888e9ae4b0360dba46469a7bc4f4aa248","title":"Biometric","path":"/endpoint-privilege-management/5.4/biometric","children":[]}]},{"id":"ci_e5f612993844dbaab637cb52e08651640abaf6e711c63d7ec457f340226da8de","title":"Configure User Authentication","path":"/endpoint-privilege-management/5.4/configure-user-authentication","children":[{"id":"ci_183de5fd7b6ba35fc9032970e29cc29a94976d05e1a92036d92afb287bb2ec2d","title":"LDAP/LDAPs supported directories","path":"/endpoint-privilege-management/5.4/ldap-ldaps-supported-directories","children":[]},{"id":"ci_60285d95f951a408b986c12f8c823e11821292a1546cdf2fafd921dc8e705a27","title":"Radius authentication","path":"/endpoint-privilege-management/5.4/radius-authentication","children":[]},{"id":"ci_8a2e48a1fc0c01d7b0b8f21b5ffef5f705f008e7a1f5d4f2c798a928439b89d1","title":"Sectona authentication","path":"/endpoint-privilege-management/5.4/sectona-authentication","children":[]},{"id":"ci_e991acd995fac16d69bcdab85d5a12a2dc83af2fcf407ad556e3cdb47f7b2013","title":"SAML authentication","path":"/endpoint-privilege-management/5.4/saml-authentication","children":[{"id":"ci_a4a6ef7812b8ef8e14021c53674f974324c7c8b0d74b18e1352630192b0d7540","title":"OneLogin SAML","path":"/endpoint-privilege-management/5.4/onelogin-saml","children":[]},{"id":"ci_1242258b646dc29400e811eb42812e470cd4402feb7bd49a1a93f7a36ba92d0c","title":"Okta SAML","path":"/endpoint-privilege-management/5.4/okta-saml","children":[]},{"id":"ci_0565661ce5f9a63c91959125f854e2ce163adb75fedd3ee7d6b3e8699c6da28d","title":"Duo SAML","path":"/endpoint-privilege-management/5.4/duo-saml","children":[]}]}]}]},{"id":"ci_0904333e148fbc061ea924ce287fb7dcb6b034b35b8e90a4ffd9504971f0df9d","title":"Managing Accounts & Keys","path":"/endpoint-privilege-management/5.4/managing-accounts-keys","children":[{"id":"ci_9e7a23b91eef0a29ad80af9429616a8f88f435c3407a0b5048a3a0428d952caa","title":"Onboard accounts in vault","path":"/endpoint-privilege-management/5.4/onboard-accounts-in-vault","children":[]}]},{"id":"ci_094c90962c3806545574fe71549b1df9dc753400957f7ac0582f04472b6dbdaa","title":"Managing User & Authentication","path":"/endpoint-privilege-management/5.4/managing-user-authentication","children":[{"id":"ci_ecb4a0700f9a181effba0dd67e6d30462e9b2526620a8a29c974b6991e3af41f","title":"Adding Users in the system","path":"/endpoint-privilege-management/5.4/adding-users-in-the-system","children":[]},{"id":"ci_ef6950e37888b125224e938be4baa1fc8e956df999b36f75929bcc348c0bd3ae","title":"Managing User Roles","path":"/endpoint-privilege-management/5.4/managing-user-roles","children":[]},{"id":"ci_442b13285e65698b288d9ced91207096225cd9dabb185692d281b3e7544ee926","title":"Logon Policy Configuration","path":"/endpoint-privilege-management/5.4/logon-policy-configuration","children":[]},{"id":"ci_2df4b2b3bcd741e9b839e21b9b3b4fbf85455972fbbd627c5802ca4eecc2f908","title":"User authentication settings","path":"/endpoint-privilege-management/5.4/user-authentication-settings","children":[]}]},{"id":"ci_78274ad004daceb140ed9a5aa3e9ccce801784567e30d45cc41679ce7ce05f94","title":"Managing System","path":"/endpoint-privilege-management/5.4/managing-the-system","children":[{"id":"ci_9da5f30d64c6cc860c2a4bf4bd29e7f4c5a14e3a109255efe623884fda54cadc","title":"Auditing System Changes","path":"/endpoint-privilege-management/5.4/auditing-system-changes","children":[]},{"id":"ci_eb635390376b398dcfece32422c25df1818d376ee7e98da5d8b6d736c47998b7","title":"Using Troubleshooting Utilities","path":"/endpoint-privilege-management/5.4/using-troubleshooting-utilities","children":[]},{"id":"ci_2a4364b8c300e1c50bb7219787c3f60dffae64d130a25d36482cba79680db61a","title":"Monitoring System Health & Service Status","path":"/endpoint-privilege-management/5.4/monitoring-system-health-service-status","children":[]},{"id":"ci_45815f04668897d21cfb05ce2875b37c63c151d0e711fdc98eb87022b642f0e6","title":"Managing Licenses","path":"/endpoint-privilege-management/5.4/managing-licenses","children":[]},{"id":"ci_1a77a6315cea3bcacb26bd3ecb29429718fc712cf6b01c5ca38b3fad7cbceb0c","title":"Workflow Administration","path":"/endpoint-privilege-management/5.4/workflow-administration","children":[{"id":"ci_f1aaba22ecab4e039846418df55e47640a261923c2f1e5e497b66bb5ceeea110","title":"Configuring Workflow rule","path":"/endpoint-privilege-management/5.4/configuring-workflow-rule","children":[]},{"id":"ci_50cc73118ed9dfb99f9265a02e881109f75ae6489f7bd2b7cfd2825d4cf08f7f","title":"Overriding workflow-based access","path":"/endpoint-privilege-management/5.4/overriding-workflow-based-access","children":[]},{"id":"ci_4e95dfdce7d58d4a0ed247a7a3fb5daa877da6728108f8772d8390a72844bdef","title":"Auditing logs","path":"/endpoint-privilege-management/5.4/auditing-logs","children":[]},{"id":"ci_356ec146a88a2f4dd31f3937d2ca53d1abfcce8421368cc5cfd77ca715678486","title":"Managing approvals","path":"/endpoint-privilege-management/5.4/managing-approvals","children":[]},{"id":"ci_dd61a36999fc8989f0c94fc25d3b4b102b553ea969a0715a804a7cf7f30ac2a0","title":"Workflow-based access","path":"/endpoint-privilege-management/5.4/workflow-based-access","children":[{"id":"ci_046e4718db16f3fd5c04457550befce6477a284d9e3acb53516aebee02877ed1","title":"Enabling Maker Checker","path":"/endpoint-privilege-management/5.4/enabling-maker-checker","children":[]}]}]}]},{"id":"ci_0dd5d8409f90e802a815fe9766121c43d318e1676c5b36d179b6729dc697e31a","title":"Password Management","path":"/endpoint-privilege-management/5.4/password-management","children":[{"id":"ci_13ede995045e5632a13391a527bec79bfa57730b80f8dd9cc6263049f0497bce","title":"Setting up password management","path":"/endpoint-privilege-management/5.4/setting-up-password-management","children":[]},{"id":"ci_973ae2cb90c4daa4f58b0b82bc4b15c923fcd52be7d126487a3a991c84c44418","title":"On-demand password change","path":"/endpoint-privilege-management/5.4/on-demand-password-change","children":[]},{"id":"ci_aacfe14c36cd1fb0d70d5a63aaf7c43e8179b8581f81e3c97f27372384fc805c","title":"Configuring password formation rules","path":"/endpoint-privilege-management/5.4/configuring-password-formation-rules","children":[]},{"id":"ci_3b212d6ce96f21c5fdc0d96f185297f2a3c97b15b6b24e41e1f3b6e13bcf4d29","title":"Defining automatic password rotation","path":"/endpoint-privilege-management/5.4/defining-automatic-password-rotation","children":[]},{"id":"ci_9dcfc2498e147c8543f0d4a69beb31d4452279d0bd2e81689e4511cbd4aff6ce","title":"Defining password checkout rules","path":"/endpoint-privilege-management/5.4/defining-password-checkout-rules","children":[]},{"id":"ci_b86b64d06761f760d3d3487e711addc8cf57b92aa1321dec3522d0c57a4568be","title":"Configuring reconciliation policy","path":"/endpoint-privilege-management/5.4/configuring-reconciliation-policy","children":[]}]},{"id":"ci_9cce5ed4c048f9bd4fda307f6da39e1fb7af4593d8f1b48b801fd1304bb3476b","title":"Access Endpoints","path":"/endpoint-privilege-management/5.4/access-endpoints","children":[]},{"id":"ci_e9163369575cfcc24c52ce14bf5b98c7b170b4b78e4c3983f0e1aac7d503a8d2","title":"Password Checkout","path":"/endpoint-privilege-management/5.4/password-checkout","children":[]},{"id":"ci_4c8e02b271febf97c03f9fb340574abf18d8d8f40a57e4f0bff1ebac2e152c7a","title":"Windows Privilege Management","path":"/endpoint-privilege-management/5.4/windows-privilege-management","children":[{"id":"ci_fca7cf8cfd73c232838f25ec3546ac423ea0a4553044b21aaaf9d9d813d82da2","title":"Installing EPM Agent","path":"/endpoint-privilege-management/5.4/installing-epm-agent","children":[]},{"id":"ci_6eacc63d979009f788442c04a1feae299984db18fe28ec81a22b5b0eb3be8149","title":"Distributing Agents via Group Policy","path":"/endpoint-privilege-management/5.4/distributing-agents-via-group-policy","children":[]},{"id":"ci_6991a1b90370795c7120eb02791b3e46293b2b31d2285a7443e7653adac0d2cb","title":"Privilege Management","path":"/endpoint-privilege-management/5.4/privilege-management","children":[]},{"id":"ci_89366e33b49cb5c14dc7e72757f98ad0236e8f0bb6cf3ea760915f2e1f52f64b","title":"Audit activites","path":"/endpoint-privilege-management/5.4/audit-activites","children":[]},{"id":"ci_0b40d269a54757119b46694e3faac5ddec621c7378aef04f0dba30eb863f6381","title":"Adding Local Admin Membership","path":"/endpoint-privilege-management/5.4/adding-local-admin-membership","children":[]}]},{"id":"ci_f2bc2caadb3049dc96d84460481ddcf343fdab221493b5556a3f7fd53e303b1e","title":"Reporting","path":"/endpoint-privilege-management/5.4/reporting","children":[{"id":"ci_47d7bdbca3b3db27ccd30382426e14068f088e10e5ba166058047d244992878b","title":"Designing a report","path":"/endpoint-privilege-management/5.4/designing-a-report","children":[]},{"id":"ci_1bdda93c3ae971d59b11ddd654d7ab656d8708b030187dc720916a2062c5492e","title":"Editing a custom report","path":"/endpoint-privilege-management/5.4/editing-a-custom-report","children":[]},{"id":"ci_6889b061950e8470926e0eb355962134b4c0c48654ef6c1635f73cd2f1c2557a","title":"Deleting a custom report","path":"/endpoint-privilege-management/5.4/deleting-a-custom-report","children":[]},{"id":"ci_bc9fea5ab3de617b0000f7da755130e69bea1452ac6acebb2fd77cb265b3efda","title":"Exporting a report","path":"/endpoint-privilege-management/5.4/exporting-a-report","children":[]},{"id":"ci_a372fd2078ed3a8077f96ad6013785369257374e5a08a562a43539d57609abea","title":"Scheduling a report","path":"/endpoint-privilege-management/5.4/scheduling-a-report","children":[]},{"id":"ci_a513171a6a33391d1ba89b4204a34b1a5cc6343e7e0d7ef983c0b9df5c0bdae6","title":"Navigating dashboard","path":"/endpoint-privilege-management/5.4/navigating-dashboard","children":[]},{"id":"ci_cb64b7bf1babad6dde272a40bb32f2986255686be8929ca1c74f7a4a29330fdc","title":"Creating the Dashboard","path":"/endpoint-privilege-management/5.4/creating-the-dashboard","children":[]}]},{"id":"ci_b9f29d0d9421838bed206d2cf3d5403077b0f1f74e1897ab76c4d46f0bf8c265","title":"End User Access","path":"/endpoint-privilege-management/5.4/end-user-access","children":[]},{"id":"ci_5ac050f479d20f5471b2226ca8049a3c1e9518623d600645eff4d86107dd062b","title":"Launching EPM","path":"/endpoint-privilege-management/5.4/launching-epm","children":[]}]