Chatee ahora con Soporte
Chat con el soporte

Security Explorer 9.9.2 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting

Using PowerShell cmdlets

Microsoft® Windows PowerShell® is a Windows® command-line shell and scripting language designed specifically for system administrators and built on top of the Microsoft .NET Framework. Security Explorer supports the use of PowerShell cmdlets.

Topics:

What are cmdlets?

Windows PowerShell® has the concept of cmdlets. A cmdlet is a simple, single-function command that manipulates objects and is designed to be used in combination with other cmdlets.

If you already had Windows PowerShell installed on your computer before you installed Security Explorer, the Security Explorer cmdlets were automatically installed and registered with Windows PowerShell.

The examples in this section show you leverage the cmdlets available in Security Explorer. These cmdlets allow you to perform many of the functions of Security Explorer in an automation environment. The cmdlets also can be of great use in any environment where a repetitive process involving Security Explorer is needed.

This table lists the Access Explorer cmdlets included with Security Explorer.

Add-AEManagedComputer

AccessExplorer

Adding managed computers

Add-AEManagedDomain

AccessExplorer

Adding a domain to manage

Add-AEServiceAccount

AccessExplorer

Adding a service account

Connect-AEService

AccessExplorer

Getting service account information

Export-AEResourceAccessAsCSV

AccessExplorer

Getting resource access information

Get-AEAccessibleComputersForAccount

AccessExplorer

 

Get-AEAccountsForComputer

AccessExplorer

 

Get-AEAgentInstances

AccessExplorer

Identifying agents on a managed computer

Get-AEDatabases

AccessExplorer

 

Get-AEIndexedAccounts

AccessExplorer

 

Get-AEIndexedComputers

AccessExplorer

 

Get-AEManagedComputers

AccessExplorer

Getting managed computer information

Get-AEManagedDomains

AccessExplorer

Getting managed domain information

Get-AEResourceAccess

AccessExplorer

Getting resource access information

Get-AEResourceSecurity

AccessExplorer

Getting security information for a resource

Get-AEServiceAccounts

AccessExplorer

Getting service account information

Get-AEServiceConnectionPoints

AccessExplorer

 

Remove-AEManagedComputer

AccessExplorer

Removing a managed computer

Remove-AEManagedDomain

AccessExplorer

Removing a managed domain

Remove-AEServiceAccount

AccessExplorer

Removing a service account

Restart-AEAgent

AccessExplorer

Restarting the agent

Restart-AEAgentForComputer

AccessExplorer

Restarting a single agent

Set-AEAccountPassword

AccessExplorer

Changing the service account password

Set-AEAgentConfiguration

AccessExplorer

Changing the agent configuration on a managed computer

Set-AEDatabase

AccessExplorer

Creating the Access Explorer database

Set-AEDBAccessAccount

AccessExplorer

Changing the SQL account password

Update-AEAgent

Access Explorer

Updating an agent

Using Security Explorer cmdlets

IMPORTANT: All command utilities should be run while logged on as an Administrator. The Security Explorer® cmdlets must be run as an administrator with elevated privileges (if UAC is enabled). The Security Explorer cmdlets should be used only by those familiar with Windows PowerShell®.

The Security Explorer cmdlets function very similarly to the included command utilities. You can view help by typing the cmdlt name with no arguments or by typing get-help set-sxpbackup.

To use the Security Explorer cmdlets, you must create or edit the PowerShell.exe.config file, and install the cmdlets.

Topics:

Creating or editing the PowerShell.exe.config file

PowerShell.exe.config is found at:

Windows® 64 bit: %SystemRoot%\SysWOW64\WindowsPowerShell\v1.0
Windows 32 bit: %SystemRoot%\system32\WindowsPowerShell\v1.0

Create or edit the file as follows:

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación