立即与支持人员聊天
与支持团队交流

Security Explorer 9.9.2 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting

Cloning Exchange permissions

TIP: The Clone task provides a quick way to clone permissions. See Using the Clone task. For more options, add a path, and click Switch to Security Explorer Classic (Advanced). The path carries to the Clone Exchange Permissions dialog box, but the permissions do not.
1
Open the Exchange Security module.
2
Open the Browse tab.
4
Select Security | Clone Group or User.
5
In the Source Group or User area, click Advanced User Selection to select the domain or object from which to pull the permissions.
6
In the Destination Group or User area, click Advanced User Selection to select the domain or object to receive the cloned permissions.
7
Click Add. The selected pair displays in the List of users and groups to clone list.
Table 2. Clone options

Clone Permissions

By default, permissions are cloned.

Clone group memberships

Select to add the destination account to the groups of which the source user is a member.

Searching for Exchange server objects and permissions

1
Open the Exchange Security module.
2
Open the Browse tab.
4
Select Search | Search in a New Window (Empty).

Setting Exchange security search criteria

Each module has a set of search criteria grouped into tabs. As you set criteria, you can update the results by clicking Start Search at any time.

Name

Type the names of the principals you want to find. Separate names with semicolons. You can use the * and ? wildcards.

Include all group memberships

Select to find all locations that a user has access throughout the Exchange Organization, both directly and indirectly assigned. The drop-down list populates with the group names.

Directory Permissions

Mailbox Permissions

Mailbox Folder Permissions

Public Folder Permissions

By default, all Directory, Mailbox, Mailbox Folder, and Public-Folder permissions are included in the search results. To remove a permissions type from the search, clear the corresponding check box.

Permissions

You can search for a name or a permission type. If you want to search for permissions, type the permissions in the box separated by commas. Alternatively, browse to select permissions from a list.

Allow Permissions

Deny Permissions

Inherited Permissions

Explicit Permissions

By default, Allow, Deny, Inherited, and Explicit permissions are included in the search results. To remove a permissions type from the search, clear the corresponding check box.

Search for unknown accounts

Select to include accounts deleted from Active Directory®.

TIP: You also can use the Find Unknown advanced task to search easily for unknown accounts.

Search for disabled accounts

Select to include accounts that are disabled.

TIP: You also can use the Find Disabled advanced task to search easily for disabled accounts.

By default, all permissions are included in the search. To remove a permission from the list, clear the corresponding check box. To remove all permissions, click None. To select all permissions, click All.

Backing up and restoring Exchange server security

Backup

See Backing up security.

Restore

See Restoring security.

Scheduled Backups

See Scheduling a backup.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级