All licenses requests from merge licensing to new license file.
Next, highlight the server you wish to remove and click the licensing@Scriptlogic.com link. ... NOTE: The email address in the application hasn't been update, but all license requests should now be sent to licensing@quest.com.
How to search for a disabled Active Directory user that has explicit permission to a SharePoint site. ... Open the Security Explorer console and select the SharePoint module. ... Select the Search menu and then select Add Search Scope.
The information in this article applies to: ... Security Explorer 7.x and up ... Enable debugging in Security Explorer ... Security Explorer can be started in debug mode and can also be configured to log folder and file paths when processing actions.
Each time a user launches the software, it prompts for the location and does not save Favorites. ... Security Explorer is installed in a Citrix environment that is using roaming profiles. ... Fix for the prompting of the location each time the software is launched:
When deleting an Active Directory user account within the Group and User Management module, receiving error "The directory service can perform the requested operation only on a leaf object".
Browse to a folder on the NetApp Filer and select the option to "display group contents" of a local group which contains a global group. ... This error occurred since the Certificate on the NetApp filer was 512 bit.
How to log all security changes made from within the Security Explorer console. ... <p>Choose Tools | Options | General tab.</p>
Would like process where specific, known unused accounts can be selected and removed across all sites. ... <p><span>None.</span></p>
Export Permissions takes a long time to complete, and produces 200,000+ pages showing folder and file permissions. ... If subfolders contain only inherited permissions, then select the option "Recurse subfolders" and Recurse to Depth 0.
Need to search and report on local administrators on domain computers. ... <p> </p>
How to search for unknown accounts (orphaned SIDs or unresolved accounts) in the NTFS Security module. ... <p>In the Group/User Search Criteria tab check the option to Search for unknown accounts.</p>
The error "At least one root path cannot be found in the backup file" is displayed when a user tries to preview objects in a Security Explorer backup archive file. ... All the backup archive files are only 1KB in size indicating that the backups are not completing successfully, although the Windows Task Scheduler showed that the Schedule backup task ran and completing successfully.
What are the hardware and software requirements? ... Requirement
Using SXPExport.exe results in the below error: ... Exception: Object reference not set to an instance of an object. ... This issue has been identified in version 9.7 and has been addressed in 9.7 Hotfix #1 which can be found here.
When two different permissions (one using a custom security template) are applied to the same account on the same folder and you modify one of the permissions “Applies To” option, it will remove the other permission for that account without warning.
When using Security Exlporer to export or report on permissions in a file share, the job fails after several hours. ... "Error: Not enough storage is available to complete this operation" ... The target file system contains too many items to be enumerated in the available memory.
Currently can see who has permissions to a folder in report results. ... Need the report to show a list of the Security Groups with permission to the folder, along with the group members. ... WORKAROUND
The Revoke task provides a quick way to revoke permissions at the folder and/or file level. ... It is possible for more than one Security Identifier (SID) to be assocatied with objects in the file system and the domain.
Meltdown and Spectre exploit critical vulnerabilities in modern processors. ... These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. ... While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of data stored in the memory of other running programs.
Security Explorer users often need to report on group membership in shares and file systems. ... When users need to report on Global groups such as 'Domain Admins', a simple procedure will produce the desired results.
<p>File ACLs are administered at each individual physical share. ... There is no mechanism to administrate ACLs system-wide from the Dfs root, nor is there an attempt to keep ACLs consistent between alternate volumes.
Need to run a report for all sub-folders that do not have inheritance enabled.
Scheduled backup will not backup a top level folder with German character in folder name. ... <div> <p><strong>WORKAROUND</strong></p>
Ability to show the "description" attribute for tasks when exporting to a report. ... WORKAROUND<br><br>None.<br><br><br><br>STATUS<br><br>Enhancement request number “482191" has been submitted to Development for consideration in a future release of Security Explorer.
© 2025 Quest Software Inc. ALL RIGHTS RESERVED. Nutzungsbedingungen Datenschutz Cookie Preference Center