Chat now with support
Chat with Support

Security Explorer 9.9.2 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting

Setting general options

1
Choose Tools | Options.

Reload window state (size and view menu entries)

By default, the size of the Security Explorer window and choices on the View menu are saved upon exiting the application. Clear to use the standard size and center the Security Explorer window on your display.

Always display progress dialog

Display progress dialog for long operations only

Never display progress dialog

Select an option to manage the display of the progress dialog when you modify permissions. Choosing to display the progress dialog for long operations only (default) or to never display the progress dialog may help with memory management.

Auto-close progress dialog on completion

Select to always close the progress dialog upon completion of a process, such as granting or cloning.

Perform an inheritance check after creating new folders

Select to always perform an inheritance check and repair after creating new folders.

Include Security Explorer context menu

Select to display the Security Explorer context menu in Windows Explorer. You can access the context menu from the Start menu, the Windows Explorer File menu or a shortcut menu.

NOTE: If the current user is not a member of local Administrator group, the Include Security Explorer context menu check box is disabled.

Prefix backup name with date and time

By default, backup file names begin with the date and time. To remove the date and timestamp prefix from backup file names, clear the check box.

Purge NTFS Backup Files

Click to purge backup files. See Purging backup files and Scheduling a backup purge.

Send email notification upon completion of a scheduled task

Select to send an email notification when a scheduled task completes.

SMTP Settings

Click to configure SMTP settings for the email notification.

Log all security changes

Select to log all permission changes to the selected root path displayed in the box. Browse to locate the root folder. Only information about the selected root path is logged; no information about changes to sub-items is logged.

To prefix each security change entry, type a string in the Change management prefix box. If the Change Management prefix is set to 0 (zero), no prefix is used.

Show detailed error messages

Select to show detail for error messages in the log file.

8

Setting view options

1
Choose Tools | Options, and open the View tab.

Use advanced style for users and groups

Select to include a UPN, if available, following the name in the Name column. For example: Joseph Smith (J.Smith@123.com). If the UPN is unavailable, the basic style is used. The advanced style may slow the display of permissions.

Use basic style for users and groups (ie name only)

By default, only the domain name\user name displays in the Name column. For example: ACME\JSmith.

Include SID on permission change/search dialogs

Select to show the SID column in dialog boxes. By default, the SID column is hidden.

Show Workgroup collection (Groups/Users module only)

Group and User Management module only. Select to display workgroup computers of local groups and local users in the navigation pane. Also adds the Workgroup tab to Security Explorer options. See Setting alternate credentials for workgroups.

Show domain controllers when selecting groups and users

Select to enable domain controller selection when browsing groups and users on the Grant, Revoke, and Clone dialog boxes. In addition, a Domain Controllers node displays under each domain parent node in the Navigation pane.

Show description column for permissions (not SharePoint, Exchange)

Select to display a Description column in the Permissions pane. Not available in the Exchange Security and SharePoint Security modules.

Highlight disabled users (may slow browsing performance)

Select to display an icon next to disabled users in the Permissions pane and Owner box.

Highlight shared folders (may slow performance)

Select to display icons next to shared folders in the Navigation pane and in the Objects pane.

Show Printer Shares

Select to display printer shares in the Objects pane. By default, printer shares do not display.

Do not show disabled users (Groups/Users module only)

Group and User Management module only. Select to hide disabled users from the display.

Display warning message before loading large NTFS folders, registry keys and Exchange mailboxes

By default, a warning message displays if the number of NTFS subfolders and files, registry keys, or Exchange mailboxes exceeds the value specified in the Trigger box.

Display warning if inheritance fault detected (NTFS only)

Select to display a warning if incorrectly inherited permissions are found.

5

Setting alternate credentials for workgroups

Group and User Management module only. Use alternate credentials to specify additional accounts that have administrative privileges to various computers on your network. Each account in the list is tried in the order listed until an account is found with sufficient privileges. If no account is found with administrative privileges, Access Denied is displayed.

By default, Security Explorer uses the credentials of the logged-in user. Alternate credentials are used only for command processing, such as management operations, and not for search operations, which are executed under the logged-in user’s account.

NOTE: To use alternate credentials for workgroups, you need to select the Show Workgroup collection check box on the View tab in Security Explorer Options. See Setting view options.
1
Choose Tools | Options, and open the Workgroup tab.
a
Click Add.
e
4

Setting alternate credentials for services and tasks

Use alternate credentials to specify additional accounts that have administrative privileges to various computers on your network. Each account in the list is tried in the order listed until an account is found with sufficient privileges. If no account is found with administrative privileges, Access Denied is displayed.

By default, Security Explorer uses the credentials of the logged-in user. Alternate credentials are used only for command processing, such as management operations, and not for search operations, which are executed under the logged-in user’s account.

1
Choose Tools | Options, and open the Services/Tasks tab.
a
Click Add.
e
4
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating