지금 지원 담당자와 채팅
지원 담당자와 채팅

Security Explorer 9.8.1 - Installation Guide

Installation Considerations for Security Explorer

Minimum requirements for Security Explorer

Processor

Pentium® 600MHz or faster

Disk space

550 MB

Memory

1 GB

Supported platforms for Security Explorer

NTFS Security

Share Security

Registry Security

Printer Security

Service Security

Task Management

Group & User Management

Windows XP

Windows Vista®

Windows 7

Windows 8

Windows 8.1

Windows 10

Windows Server® 2003

Windows Server 2008

Windows Server 2008 R2

Windows Server 2012

Windows Server 2012 R2

Windows Server 2016

Windows Server 2019

NTFS Security

Share Security

Group & User Management

Dell™ Fluid File System (FluidFS)

EMC® Isilon®

EMC Celerra®

EMC VNX®

NetApp® 8.2 (7-Mode and Clustered Mode)

NetApp 8.3, 9.0, 9.1, 9.2, 9.3 and 9.4 Clusters

NOTE: vsadmin must be entered in NAS credentials dlg for full management of NetApp Clusters 8.2, 8.3, 9.0, 9.1, 9.2, 9.3 and 9.4.

SQL Security

SQL Server® 2019

SQL Server 2017

SQL Server 2017 Reporting Services

SQL Server 2016

SQL Server 2014

SQL Server 2012

SQL Server 2008 R2

SQL Server 2008

SQL Server 2005

SharePoint Security

SharePoint® 2019

SharePoint 2016

SharePoint 2013

SharePoint 2010

SharePoint Foundation

SharePoint 2007

SharePoint Services 3.0

Exchange Security

Exchange 2019

Exchange 2016

Exchange 2013

Exchange 2010

Exchange 2007

Active Directory Security

Windows Server® 2019 Functional Level

Windows Server 2016 Functional Level

Windows Server 2012 R2 Functional Level

Windows Server 2012 Functional Level

Windows Server 2008 R2 Functional Level

Windows Server 2008 Functional Level

Windows Server 2003 Functional Level

User privilege requirements for Security Explorer

It is recommended to be a member of the local Administrators group to use all the features in Security Explorer®. However, it is possible to run Security Explorer without being a member of the local Administrators group.

NTFS Security

To manage permissions on folders and files on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Share Security

To manage permissions on shares on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Registry Security

To manage permissions on registry keys on remote computers, the file and print sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Printer Security

To manage permissions on printers on remote computers:

Service Security

To manage permissions on services on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Task Management

To manage tasks on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Group and User Management

To manage groups and users on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

SharePoint® Security

To manage permissions on servers running SharePoint, the SharePoint site must be on the same network as the computer on which Security Explorer is installed.

To manage SharePoint sites exposed over SSL (https://), add the certificate of the server running SharePoint to the Trusted Root Certification Authorities store on the computer with Security Explorer installed.

To deploy and remove Security Explorer Web Services, and to search for SharePoint sites automatically, the current user must be a member of the Administrators local group on the servers.

SQL Server® Security

To manage permissions on servers running SQL Server:

Windows® Firewall on the server must be configured to allow SQL and WMI.

For more information please refer to: Configure the Windows Firewall to Allow SQL Server Access at http://msdn.microsoft.com/en-us/library/cc646023.aspx.

Exchange Security

To manage permissions on the Exchange organization, the Exchange organization must be on the same Active Directory® forest as the computer on which Security Explorer is installed.

Active Directory Security

To manage permissions on the domain, the domain must have a trusted relationship with the current domain on which the user is logged on.

See Managing connections for Active Directory Security In the Security Explorer 9.8 User Guide.

셀프 서비스 도구
지식 기반
공지 및 알림
제품 지원
소프트웨어 다운로드
기술 설명서
사용자 포럼
비디오 자습서
RSS 피드
문의처
라이센싱 지원가져오기
기술 지원
모두 보기
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택