Security Explorer® provides a single console for managing access controls, permissions, and security across Microsoft platforms that span multiple servers. The product provides a broad array of security enhancements including the ability to identify who has rights to resources across the entire organization. It also provides the ability to grant, revoke, clone, modify, and overwrite permissions quickly and from a central location. Unlike native tools, Security Explorer provides the ability to back up and restore permissions only, ensuring the integrity of data. To help meet auditing requirements, Security Explorer provides convenient reports that can be generated at your convenience. Lastly, the product's cleanup capabilities address common post-migration security issues.
Bitte prÜfen Sie den PrÜfsummenwert, um die Integrität Ihres Downloads sicherzustellen.
SHA256: 1c555400d9cd1a426d6f63655516a727f6584f2004eaa6af5568c1e8fa041534
Titel des Dokuments | ||
---|---|---|
view pdf | ||
© ALL RIGHTS RESERVED. Nutzungsbedingungen Datenschutz Cookie Preference Center