[{"id":"ci_48956ad3063bca0522c94451c6cbcdf1d4f3c45b0b44a2467c0e6335f1e013cc","title":"Release Notes","path":"/endpoint-privilege-management/5.5/release-notes","children":[{"id":"ci_361612ed17cc567acecaeb75b873be634052321db8e6ceefd97509665fa977ab","title":"Version 5.5.0","path":"/endpoint-privilege-management/5.5/version-5-5-0","children":[]}]},{"id":"ci_ae21aa5c5c68861c6eae7fd5cfeafd962174504b42e76053e0ea9ee05dcc1b04","title":"Getting Started","path":"/endpoint-privilege-management/5.5/getting-started","children":[{"id":"ci_0c85ec562c00e79c0a9d9351f3f8e5b941565f0c8aecacd0342c3745177ef174","title":"Activating the EPM Component","path":"/endpoint-privilege-management/5.5/activating-the-epm-component","children":[]},{"id":"ci_d7d6d389037f8a18f277ba00bdab2e590fe75de1a6b707534a3ce3eabdd68927","title":"How to access EPM console","path":"/endpoint-privilege-management/5.5/how-to-access-epm-console","children":[]},{"id":"ci_8f1f1178ab94eab0910a34229ccb7b7d8275f1a93c2a945d0d522e6afde021c2","title":"EPM Common Uses and Steps","path":"/endpoint-privilege-management/5.5/epm-common-uses-and-steps","children":[]}]},{"id":"ci_63b1bd4b10b88c6af20988ef5cfb0b27e06eac63abc8eb1abee6588ea9783849","title":"Installation & Setup Guide","path":"/endpoint-privilege-management/5.5/installation-setup-guide","children":[{"id":"ci_b22b48e198c6617f6b241425b211587836609b244a7a7282b0814cdd59179928","title":"Planning Deployment","path":"/endpoint-privilege-management/5.5/planning-deployment","children":[{"id":"ci_5d47469f7c2e71f95f4c4089a9f0f3cf682f577b2786efd7f161b4dbf7c5fd2d","title":"EPM Service Architecture Overview","path":"/endpoint-privilege-management/5.5/epm-service-architecture-overview","children":[]},{"id":"ci_20f71aad349b0dfe4d3b560cbe0104cec207885d6346919cfa438fd754cb77ef","title":"System Requirements","path":"/endpoint-privilege-management/5.5/system-requirements","children":[]},{"id":"ci_c7e723dc3537d3ad0259fdf99140182e14bc9a765247ed64b54052692c38ccd4","title":"Deployment Scenarios","path":"/endpoint-privilege-management/5.5/deployment-scenarios","children":[]},{"id":"ci_088cf2ce7ec3472331f2bca8db7d55841897f909213f817fa06423df8738e807","title":"Setting up test environment","path":"/endpoint-privilege-management/5.5/setting-up-test-environment","children":[]},{"id":"ci_99b964130e111d6ace2c24ddb2ea3823cc8fd248dd330f2a0cc1a8daf0f004b8","title":"Standard Port Requirement for Installation","path":"/endpoint-privilege-management/5.5/standard-port-requirement-for-installation","children":[]}]},{"id":"ci_b3e5028df1a3e9f227df0e6d9be0eede2b891b6defbbbbe6580e149b7eed1a53","title":"Installing the Components","path":"/endpoint-privilege-management/5.5/installing-the-components","children":[{"id":"ci_ba80db55b3837b1a8b0e65e45396c9b9c056c5fa183b9b2c171958519e8f37d0","title":"Installing Vault Component","path":"/endpoint-privilege-management/5.5/installing-vault-component","children":[]},{"id":"ci_991158a4a9875b5a1e62eb500e3d4a7765e12a7a2097993bb0b668c5975c3188","title":"Installing Sectona Web Access","path":"/endpoint-privilege-management/5.5/installing-sectona-web-access","children":[]},{"id":"ci_0c42ceeb9fad8eae621aa5620df86c6c711f269138f6b71fe432bfdf10f661e5","title":"Installing Sectona Client App","path":"/endpoint-privilege-management/5.5/installing-sectona-client-app","children":[]},{"id":"ci_6d2028691485763987cee55ae745077c81d58959f3746f7770382a78fba17d95","title":"Installing Sectona Windows Monitoring Component","path":"/endpoint-privilege-management/5.5/installing-sectona-windows-monitoring-component","children":[]},{"id":"ci_8f857f450eef0e55e938ecd50cc44de0a6637aecc85714ff7b4d57f534e3f85e","title":"Installing Sectona Launcher","path":"/endpoint-privilege-management/5.5/installing-sectona-launcher","children":[]},{"id":"ci_5302c9d72532b25c57fa914142b160494a2b9710a7d9201a617715984742f33d","title":"Installing Remote Session Host","path":"/endpoint-privilege-management/5.5/installing-sectona-remote-session-host","children":[]},{"id":"ci_ebaa77102679dae455e69083f176d90f99fca50b8a800d73f723182a8df88e83","title":"Building a High Availability Setup","path":"/endpoint-privilege-management/5.5/building-a-high-availability-setup","children":[{"id":"ci_bdd22e420046bbf690e3ffcd30884d217d288b3c72e5c97258929f28cfa50557","title":"Key Concepts and Components of a High-Availability System","path":"/endpoint-privilege-management/5.5/key-concepts-and-components-of-a-high-availability","children":[]},{"id":"ci_838125f248a2fe6fcee293f28f5ffcf5e0bdcbbe5fb0419cc207cd41019ed8c5","title":"Choosing an Architecture for HA & DR Requirements","path":"/endpoint-privilege-management/5.5/choosing-an-architecture-for-ha-dr-requirements","children":[]},{"id":"ci_95792c10a5b5d0bab7b115f949c9e63f807b6c2d4a35b7ab3973fe4c1e080c2e","title":"Configuring Sectona Web Access for High Availability","path":"/endpoint-privilege-management/5.5/configuring-sectona-web-access-for-high-availabili","children":[]},{"id":"ci_31c538c29feb212aef8f46a46f938bf0db5241ea6a09f3232e3ec09e4b294ed6","title":"Configuring Vault for High Availability","path":"/endpoint-privilege-management/5.5/configuring-vault-for-high-availability","children":[]}]},{"id":"ci_6eb10d195a0b9ab7f28ed63b9dde2f57fb766ab08554d20073cbaf0ed04bcc34","title":"Configuring Disaster Recovery Setup","path":"/endpoint-privilege-management/5.5/configuring-disaster-recovery-setup","children":[]},{"id":"ci_58a5cf8e542742e8a30aeb540d6eae79403e7fcc25cdb3d2ec0fa2373027557c","title":"Upgrading the System","path":"/endpoint-privilege-management/5.5/upgrading-the-system","children":[]}]}]},{"id":"ci_d4fc63373b87844991e0e320af17048d253e1c808ff30e5b6bf8d631fd26dc7c","title":"Managing system services","path":"/endpoint-privilege-management/5.5/managing-system-services","children":[]},{"id":"ci_ffdec8ef21a9f00af2b82f52d9562c0715c88147ca3e200c46c6b1f4f8b36f42","title":"Manage Endpoints","path":"/endpoint-privilege-management/5.5/manage-endpoints","children":[{"id":"ci_a2937f437615a4972841b33c2039ea93d653c83ba80d490cf22c3dcaba48c63e","title":"Adding an asset manually","path":"/endpoint-privilege-management/5.5/adding-an-asset-manually","children":[]},{"id":"ci_028e1c0d3d1337abc7e65cb0291b7077dfb2d65a94df7305079b8dd3d38b63ef","title":"Adding endpoints using active directory scan","path":"/endpoint-privilege-management/5.5/adding-endpoints-using-active-directory-scan","children":[]},{"id":"ci_6167e8b54fad0705c90bfec84887a2f85c1db41a239e6f2a6e61bbcae8ca2ab9","title":"Adding endpoints using network scan","path":"/endpoint-privilege-management/5.5/adding-endpoints-using-network-scan","children":[]},{"id":"ci_380eabfe98c6b577e73cde1dd571997e80afa2ea2843878599b97ae22210fe94","title":"Manually adding discovered asset from discovery jobs","path":"/endpoint-privilege-management/5.5/manually-adding-discovered-asset-from-discovery-jo","children":[]},{"id":"ci_28454b45798b65ae25bb6131e1c7d10c18dbee6d7e9d2f1d3a1038272a090020","title":"Adding endpoints not in AD","path":"/endpoint-privilege-management/5.5/adding-endpoints-not-in-ad","children":[]},{"id":"ci_6ab53e85dd0455e195ce77b3ca537c57f0710a661114c81824b2fe24e1840fb1","title":"Updating endpoint information","path":"/endpoint-privilege-management/5.5/updating-endpoint-information","children":[]},{"id":"ci_c4c4151760ea03bc0f496e40d3ef63eb7c8544a90de79499b1cc1157fdfd241a","title":"Accessing additional endpoint information","path":"/endpoint-privilege-management/5.5/accessing-additional-endpoint-information","children":[]},{"id":"ci_e20c8a8d1a526cf8c5a7b46c29d8c8df214cf43287f664c4fdee21f1818d2351","title":"Adding accounts on endpoints using discovery","path":"/endpoint-privilege-management/5.5/adding-accounts-on-endpoints-using-discovery","children":[]},{"id":"ci_89222ca4b6638008f7d99630e2ea9f44c13b1b1a5fab13704a954290d2782f15","title":"Adding endpoints in bulk","path":"/endpoint-privilege-management/5.5/adding-endpoints-in-bulk","children":[]}]},{"id":"ci_be3d826b7d5232dade2f51afa13cb095a555e4e44c88991a51094eefe0ed2087","title":"Manage Groups","path":"/endpoint-privilege-management/5.5/manage-groups","children":[{"id":"ci_4a70821cc2e2e327912e2ffc6fc09576c8d42385d1caeddebf2a3d1fdddf8994","title":"Creating asset groups","path":"/endpoint-privilege-management/5.5/creating-asset-groups","children":[]},{"id":"ci_7ed81d12fca1d9842740330c4116d3d88349f51f630d82fc0d52691fc70747f3","title":"Adding assets to asset groups","path":"/endpoint-privilege-management/5.5/adding-assets-to-asset-groups","children":[]},{"id":"ci_87b66a1cc3fe46087ef65ec0851ae89103904dcff3a86d93c6405342b3e73bf6","title":"View asset group members","path":"/endpoint-privilege-management/5.5/view-asset-group-members","children":[]},{"id":"ci_6c4daf8e2d2bd8a905283e84c839ae3915ac69696dab0ecbe88c8339642a2bcd","title":"Creating user groups","path":"/endpoint-privilege-management/5.5/creating-user-groups","children":[]},{"id":"ci_fde8c09f6b622c23299b287611fd5d6afa7643e30367e9404c75412e5370d21e","title":"Adding user to user groups","path":"/endpoint-privilege-management/5.5/adding-user-to-user-groups","children":[]},{"id":"ci_c17d7191c665fddd1278b51b2661ccb4a6b180d6b4593598907e0927aa9328b1","title":"Remove users from user groups","path":"/endpoint-privilege-management/5.5/remove-users-from-user-groups","children":[]},{"id":"ci_a509058f0ed9a6aacea4f9e43c7876961644bff7c0268f0a2d28488afe486db9","title":"View user group members","path":"/endpoint-privilege-management/5.5/view-user-group-members","children":[]},{"id":"ci_1fcba5792a11a146ac9e430b108c36d88c47295ecc1f56ad4580fd8b32e22bee","title":"Managing access to assets & passwords via Active Mapping","path":"/endpoint-privilege-management/5.5/managing-access-to-assets-passwords-via-active-map","children":[]}]},{"id":"ci_27967008741c3572be41da43af7d44636661f1af7ccbcc71bbdb321d9c523f33","title":"Managing Account Operations","path":"/endpoint-privilege-management/5.5/managing-account-operations","children":[]},{"id":"ci_621b68d35eca2bf83585ebd7b7baa8e58f303e255a64d122a003912e229a773f","title":"General Configuration for EPM","path":"/endpoint-privilege-management/5.5/general-configuration-for-epm","children":[{"id":"ci_b725771d7a08d7a345f1fa14facefbd38f367c919dcd11598c79ace974dc4a80","title":"Customize web application appearance and site settings","path":"/endpoint-privilege-management/5.5/customize-web-application-appearance-and-site-sett","children":[]},{"id":"ci_e016771a5dd6782cac1700e7a95eff84baa62875ddd4059d70bad88bb9b0ab22","title":"Add new LDAP/LDAPs directory","path":"/endpoint-privilege-management/5.5/add-new-ldap-ldaps-directory","children":[]},{"id":"ci_a396b92d81fdbe2c60c4e7d2340d5da3fd7fc879f4b41b2a6ad04b35192f534c","title":"Configure location tagging","path":"/endpoint-privilege-management/5.5/configure-location-tagging","children":[]},{"id":"ci_19c808e70f1f891d4af3674d8bb2d74b9cec7160b1129071cb388d12d9185b4a","title":"Define network zones","path":"/endpoint-privilege-management/5.5/define-network-zones","children":[]},{"id":"ci_ded1130e6fa18433181b99c50049ff54e2c0fa3fa2fabb82a23ee337bf7a04a3","title":"Managing Settings for video","path":"/endpoint-privilege-management/5.5/managing-settings-for-video","children":[]},{"id":"ci_76b962d56f05e8f8cc50cbf2fb1e70800ea47bae4808d5842abe29d3e89169a2","title":"Set criticality level tags","path":"/endpoint-privilege-management/5.5/set-criticality-level-tags","children":[]},{"id":"ci_dc622b1c744bf4492b5073a0d7cf495bb44005225785691f7a86f43b4b7e1e80","title":"Configuring Email as External Service","path":"/endpoint-privilege-management/5.5/configuring-email-as-external-service","children":[]},{"id":"ci_6cc2afff1124e7676ead46aad96955251f0bb942e9e5f4db832b754ecf36d8b8","title":"Setting up a Network Proxy","path":"/endpoint-privilege-management/5.5/setting-up-a-network-proxy","children":[]},{"id":"ci_58b97f6287afee64589fe30b27a9eeb2ea95f5f501a603e68f221af55ad5b1ae","title":"Conditional Tagging","path":"/endpoint-privilege-management/5.5/conditional-tagging","children":[]},{"id":"ci_74fcde628f4c89facb69b21b2d39746cc7ded1ad3155895200beba78ad3ad2c9","title":"Configure HTTPs certificate","path":"/endpoint-privilege-management/5.5/configure-https-certificate","children":[]},{"id":"ci_7100b5ad2bc62652cace702947edc2843257fff360fb8cef10dc1e209655bdc3","title":"Update default system settings","path":"/endpoint-privilege-management/5.5/update-default-system-settings","children":[]},{"id":"ci_4984ff69dedb1dffdc81348061672300025c3ca2ac99090a30b9ac20a2658d4b","title":"Configure Multi-factor authentication","path":"/endpoint-privilege-management/5.5/configure-multi-factor-authentication","children":[{"id":"ci_b8ffc97e3cae1946272220bd6a114d3f35c9574b38d3bcd6b6333e3683c17098","title":"Sectona MFA","path":"/endpoint-privilege-management/5.5/sectona-mfa","children":[]},{"id":"ci_6a49a584bcf6d422eca1708d302195efc96ad9f1694471391f4138697c7785c8","title":"DUO MFA","path":"/endpoint-privilege-management/5.5/duo-mfa","children":[]},{"id":"ci_f60bda82e74b2a7a36e365de33fd8ff08f3e601b1a23ea06106af21cb08ed468","title":"Okta MFA","path":"/endpoint-privilege-management/5.5/okta-mfa","children":[]},{"id":"ci_729c9f48e3a65d5d261fe3d9f9d54979cc2a4920fc85737de5e2af73542c59b5","title":"OneLogin MFA","path":"/endpoint-privilege-management/5.5/onelogin-mfa","children":[]},{"id":"ci_39a8cc05ed6c456947db9dd63f74384db71d1acf07acbd9ba9f144e0fb00bb14","title":"Google Authenticator","path":"/endpoint-privilege-management/5.5/google-authenticator","children":[]},{"id":"ci_a44d31a0f221800f7d2969ac41ae24e0d88ded4aa081827cd8fbfbdede4ef6d7","title":"RSA SecureID","path":"/endpoint-privilege-management/5.5/rsa-secureid","children":[]},{"id":"ci_b3387c2f7821a43efdd90951cfb1639bf3a89048b238100b7a0cf8e5e9b4eb59","title":"Vasco","path":"/endpoint-privilege-management/5.5/vasco","children":[]},{"id":"ci_94f640f8ddac54edcdf82b808e02818cc416919bbaae521b1bba0966e005780d","title":"Generic RADIUS","path":"/endpoint-privilege-management/5.5/generic-radius","children":[]},{"id":"ci_77ab354232e7a0ffc72545078e3ec47c85f7a5d848de8ad83e088b044c8415e8","title":"Microsoft Authenticator","path":"/endpoint-privilege-management/5.5/microsoft-authenticator","children":[]},{"id":"ci_3c721593155a8a4a8c5c91706bf3c7d9c443d18af778be2593db744f30af6a97","title":"FIDO2","path":"/endpoint-privilege-management/5.5/fido2","children":[]},{"id":"ci_6a3f49c94395a85fcfd03488b1d70c8db51187e6cfe02ca892ef2d6d62544ee6","title":"Biometric","path":"/endpoint-privilege-management/5.5/biometric","children":[]}]},{"id":"ci_20721d80c56ae480bf35a24e9ed567b0a01014dd7dfd6f1ef6ff0bfce315fa9e","title":"Configure User Authentication","path":"/endpoint-privilege-management/5.5/configure-user-authentication","children":[{"id":"ci_55837f8d4514dd91cc4bab0bfc0c6ae202d2aedc3f0bc795be05bc37d61f0dd8","title":"LDAP/LDAPs supported directories","path":"/endpoint-privilege-management/5.5/ldap-ldaps-supported-directories","children":[]},{"id":"ci_19ed7f08b4466682d5eac95b05e1bb3d76e69e830b98f8d8b7ad8530f12cd287","title":"Radius authentication","path":"/endpoint-privilege-management/5.5/radius-authentication","children":[]},{"id":"ci_1c7844dce89f7f451f6daf50338e7dd5532ed2e379df80d8a7d3961fd0eed539","title":"Sectona authentication","path":"/endpoint-privilege-management/5.5/sectona-authentication","children":[]},{"id":"ci_94af8ee4844fe9c687659f6fbf2f7d284fcce7c3285fa58cd30ff2bb20a0f4c4","title":"SAML authentication","path":"/endpoint-privilege-management/5.5/saml-authentication","children":[{"id":"ci_51ea86334ee7f9cd9a93efe2bea7880b3848052da30f934cabfc6b322f2db220","title":"OneLogin SAML","path":"/endpoint-privilege-management/5.5/onelogin-saml","children":[]},{"id":"ci_c6b2dcada916b8e84411bc8ef77e5396cb378c26e20d56b2fdb4cf86304b1ec6","title":"Okta SAML","path":"/endpoint-privilege-management/5.5/okta-saml","children":[]},{"id":"ci_ece52b2779c7c546aac4ff91310566b43e56df9a0b9a83fd1a8cefb15087329a","title":"Duo SAML","path":"/endpoint-privilege-management/5.5/duo-saml","children":[]}]}]}]},{"id":"ci_1341b87f2395a3868812e38834e292819e3aaa6b57e718da1454557586f31f22","title":"Managing Accounts & Keys","path":"/endpoint-privilege-management/5.5/managing-accounts-keys","children":[{"id":"ci_cf360105914c098bfbc649736dd6f946280881b2581bed2b47c473847e9a5eb2","title":"Onboard accounts in vault","path":"/endpoint-privilege-management/5.5/onboard-accounts-in-vault","children":[]}]},{"id":"ci_c420d3f0eab8f3b88ff04f4e189e2f2573738777c1dd928090df9e92387028b8","title":"Managing User & Authentication","path":"/endpoint-privilege-management/5.5/managing-user-authentication","children":[{"id":"ci_3151fda7ea42c6885ef8165bfec38a51d147a6161f6cad3a5054f449b2a25a07","title":"Adding Users in the system","path":"/endpoint-privilege-management/5.5/adding-users-in-the-system","children":[]},{"id":"ci_7a6a8f71e0ebf4ccc756596d880b6e319e6e334eae852983c147d2ea651daf32","title":"Managing User Roles","path":"/endpoint-privilege-management/5.5/managing-user-roles","children":[]},{"id":"ci_21d6ba76966b6fe1abc1dae6dcb7b85cdc02cee57e76d00a2eb4248122711041","title":"Logon Policy Configuration","path":"/endpoint-privilege-management/5.5/logon-policy-configuration","children":[]},{"id":"ci_3dd78a70b9bffb9de8768e22b9fd0d68b4309e9d3d6926f0a3f1b7d36a29be39","title":"User authentication settings","path":"/endpoint-privilege-management/5.5/user-authentication-settings","children":[]}]},{"id":"ci_08fadc8733039a854a1e09cbb510fdce95feaf42826b5d44f3edc9b92216804a","title":"Managing System","path":"/endpoint-privilege-management/5.5/managing-the-system","children":[{"id":"ci_6efa38cca600dec751b6a30455c7ecf25c1b3b637e97395d91725cb8e8105857","title":"Auditing System Changes","path":"/endpoint-privilege-management/5.5/auditing-system-changes","children":[]},{"id":"ci_cb2d6a6b801112432bb861dd5e67894257323254d43e92ae19f78e86b6e16b59","title":"Using Troubleshooting Utilities","path":"/endpoint-privilege-management/5.5/using-troubleshooting-utilities","children":[]},{"id":"ci_d232ad4c1a509c414b46ad0ef1249780782a817c34a92ead247d8f5e2361b4c0","title":"Monitoring System Health & Service Status","path":"/endpoint-privilege-management/5.5/monitoring-system-health-service-status","children":[]},{"id":"ci_8d8d45eedfffc21e0320546e00ed07521ab44d4753e77c0725450534ae114102","title":"Managing Licenses","path":"/endpoint-privilege-management/5.5/managing-licenses","children":[]},{"id":"ci_2b6ec89f6b3e5f33c0ce5d665a0bc137e76b8f2bc952b37b1414002d3f5369cf","title":"Workflow Administration","path":"/endpoint-privilege-management/5.5/workflow-administration","children":[{"id":"ci_ed7c6f0b5226c92f0e6d42a5ca94e70f2a23b724d7bba6b48e9ef20c3d34d0d7","title":"Configuring Workflow rule","path":"/endpoint-privilege-management/5.5/configuring-workflow-rule","children":[]},{"id":"ci_12ff92e25618b01f2f7d82bac19bc4e10e7f59ae10fe30f39fae43a505ce0b22","title":"Overriding workflow-based access","path":"/endpoint-privilege-management/5.5/overriding-workflow-based-access","children":[]},{"id":"ci_f605c2308ed40583505f29c4a2b05b5c7ca2627ff9cfe68e50acbf2a62735a74","title":"Auditing logs","path":"/endpoint-privilege-management/5.5/auditing-logs","children":[]},{"id":"ci_e65f43c32b6f1dc6632d043c28814b48b8c20c5e538404140c1068219dc701ef","title":"Managing approvals","path":"/endpoint-privilege-management/5.5/managing-approvals","children":[]},{"id":"ci_9092a6d38f34c9187b34e9efec2f1c6dacab9080bb15b8f3bdfad269de87dc86","title":"Workflow-based access","path":"/endpoint-privilege-management/5.5/workflow-based-access","children":[{"id":"ci_3d52f3cab46ca6430b79866f67d4ba2773be8c0306c71e76516c5a8cebc73dd3","title":"Enabling Maker Checker","path":"/endpoint-privilege-management/5.5/enabling-maker-checker","children":[]}]}]}]},{"id":"ci_63554978dfeaa4292b70a792c0cf7eb7f5895ab3a4f3f9d443adad4b07961bed","title":"Password Management","path":"/endpoint-privilege-management/5.5/password-management","children":[{"id":"ci_2b7be483c839534894d4e2b5a226c7e68108628a1d260b025ab7e0f42f006f54","title":"Setting up password management","path":"/endpoint-privilege-management/5.5/setting-up-password-management","children":[]},{"id":"ci_787aba9c8ba66625fc467ca9705f29f4335529a5eaa550e0d824bef125f65207","title":"On-demand password change","path":"/endpoint-privilege-management/5.5/on-demand-password-change","children":[]},{"id":"ci_7ed77b4b60633ac804f45202f6e0cdf60ceca1cdfd3db5dd6c962b8b86ecffbb","title":"Configuring password formation rules","path":"/endpoint-privilege-management/5.5/configuring-password-formation-rules","children":[]},{"id":"ci_869f3237e5baba007119d12e34716947793b85259989a4e44433f3d6976e6176","title":"Defining automatic password rotation","path":"/endpoint-privilege-management/5.5/defining-automatic-password-rotation","children":[]},{"id":"ci_94cfc97dbd3fe12f4e3b5cd6489ed79f2ae52737b869e01d81066b5d69b2aa14","title":"Defining password checkout rules","path":"/endpoint-privilege-management/5.5/defining-password-checkout-rules","children":[]},{"id":"ci_14191187ac3744d10743796db713adbad2118c765af31f604ad78b899c73511f","title":"Configuring reconciliation policy","path":"/endpoint-privilege-management/5.5/configuring-reconciliation-policy","children":[]}]},{"id":"ci_6dc5c37909571459db90a05ca885aa6b180cff86ed1c71cda4e0069f5a2f9c52","title":"Access Endpoints","path":"/endpoint-privilege-management/5.5/access-endpoints","children":[]},{"id":"ci_03485cde726cd002e8bae483b8bb25b58d858de9196a0bd324a5dfe181f3bac7","title":"Password Checkout","path":"/endpoint-privilege-management/5.5/password-checkout","children":[]},{"id":"ci_6b2109d58b60facf62bddab9ce4bc749e12e85ff2f006c34233994c9833c7c60","title":"Windows Privilege Management","path":"/endpoint-privilege-management/5.5/windows-privilege-management","children":[{"id":"ci_a09509e25658972b753e7c5d6caeba93221682d178e43d8dd3a5c00719198ce5","title":"Installing EPM Agent","path":"/endpoint-privilege-management/5.5/installing-epm-agent","children":[]},{"id":"ci_527f09aaec3029af51e4a6f55cd077dd175a07958e0b755a61443f86204af240","title":"Distributing Agents via Group Policy","path":"/endpoint-privilege-management/5.5/distributing-agents-via-group-policy","children":[]},{"id":"ci_ce3e530be5ae1d283bede47588bc3fcfe425b923641992f6c7f1d5acaf128640","title":"Privilege Management","path":"/endpoint-privilege-management/5.5/privilege-management","children":[]},{"id":"ci_3bc926ad0cabd754585555c335003f2e952afcbc2219cfbb31bed166f4898941","title":"Audit activites","path":"/endpoint-privilege-management/5.5/audit-activites","children":[]},{"id":"ci_ff3d5497b08df481ba387e245040287f0e13da234265e215d00ee29f1db63daf","title":"Adding Local Admin Membership","path":"/endpoint-privilege-management/5.5/adding-local-admin-membership","children":[]}]},{"id":"ci_1c20a088d59e8728dcc0d63d8743aa01d06e229cf5e489a0f1b49d79112e8ed3","title":"Reporting","path":"/endpoint-privilege-management/5.5/reporting","children":[{"id":"ci_f65b63b7c6bca15d012dc87efe2392777281b10d3275e7006702d90fcf5b39d4","title":"Designing a report","path":"/endpoint-privilege-management/5.5/designing-a-report","children":[]},{"id":"ci_4370f25bf8f8cf8983de81aaa3554fcc4e9865d7caeb5ac3ed8623afe0b97c04","title":"Editing a custom report","path":"/endpoint-privilege-management/5.5/editing-a-custom-report","children":[]},{"id":"ci_6160f2b2c38abdac987d8acfaa217bd284acd077dca97781ef97819576f5200c","title":"Deleting a custom report","path":"/endpoint-privilege-management/5.5/deleting-a-custom-report","children":[]},{"id":"ci_5629a34d0f0c3dd1b45401fbb6932357b22dd8584d2c498d27b73c18e2dbc1fb","title":"Exporting a report","path":"/endpoint-privilege-management/5.5/exporting-a-report","children":[]},{"id":"ci_a0ef6dde17cc68d90d136fe0fb202eedccb3548146eef79c84edb897ab4c36cd","title":"Scheduling a report","path":"/endpoint-privilege-management/5.5/scheduling-a-report","children":[]},{"id":"ci_9ed62f88a7e92a6679fdfa238290e5ed61f76036cc2fdcdad4e75e0f53413abf","title":"Navigating dashboard","path":"/endpoint-privilege-management/5.5/navigating-dashboard","children":[]},{"id":"ci_6726922b4af840528237a6dda307e52b1c3a99a176e0361b2617932cbdfa28cb","title":"Creating the Dashboard","path":"/endpoint-privilege-management/5.5/creating-the-dashboard","children":[]}]},{"id":"ci_03928ad1db52930683b3701c82c1cf5867c8440730d2380373b9f5712c963733","title":"End User Access","path":"/endpoint-privilege-management/5.5/end-user-access","children":[]},{"id":"ci_c72c9bb4facd2087e87bfcbb2e4f000f4b399ed4206d3fca74deea97d7eb335d","title":"Launching EPM","path":"/endpoint-privilege-management/5.5/launching-epm","children":[]}]