Chat now with support
Chat mit Support

Security Explorer 9.9 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting

Setting SharePoint options

1
Select Tools | Options.
2
Open the SharePoint tab.

Download SharePoint Icons when Browsing and Searching

By default, icons representing each SharePoint object display next to each item. These icons are downloaded automatically from the SharePoint site. To remove the icons and use simpler default icons, clear the check box.

Show web applications (when browsing to a server only)

By default, web applications display when browsing through the web server and all site collections within web applications.

Show progress information when searching

By default, the name of the objects being searched do not display in the progress bar, which is the fastest way to load objects. Select to display the name of the object currently being loaded in the progress bar.

Use Security Explorer Web Service to extract sites, lists, and items

By default, the Security Explorer SharePoint Web Service extracts sites/webs, lists and items, and, optionally, to save time, can include permissions for each item returned when backing up, exporting, and searching. To turn off this feature, clear the check box.

Suppress authentication dialogs when searching and backing up

By default, authentication dialogs do not display when searching or backing up. If you want the dialogs to display, clear the check box.

Use Windows Authentication

By default, Security Explorer uses Windows® Authentication when connecting to a SharePoint server.

Always open authentication dialog

Select to display the open authentication dialog box when connecting to a SharePoint server.

Use alternate credentials list

Select to use the alternate credentials list when connecting to a SharePoint server. Security Explorer tries each account in the order they appear in the list until an account is found with sufficient privileges. If no account is found, Access Denied is displayed.

Add

Add an alternate credential.

4

Edit

Edit a selected alternate credential.

Del

Delete a name from the list.

Clear

Clear all names from the list.

Removing the SharePoint web service

3
Click Next.
5
If necessary, type a server name in the Server name box. Alternatively, click Browse and locate a server. To test communication with the server, click Test.
6
Click Next.
7
Click Next.
8
Click Finish. A message displays.
9
Click Yes.
10
Click Close.

Removing the SharePoint web service manually

To remove the SharePoint® web service manually
1
From the Manage SharePoint Farms and Sites box (see Managing SharePoint farms or sites), click Manual Web Service Deployment/Removal, and click Manual Web Service Removal.
NOTE: Click Removal Commands to open the SharePoint Web Service Commands page where you can copy and paste the commands. Be sure to select the correct version of SharePoint.
NOTE: Click More Information for a command that lists all of the SharePoint web service solutions present on your farm or site. See step three.
NOTE: Click Verify Command to open the SharePoint Web Service Commands page where you can copy and paste the command.

 

Working with Access Explorer

To ensure network resources are secured in a manner that meets your business needs, you must be able to easily identify who has access to those resources and manage that access appropriately. With Access Explorer, you can quickly see who has access to specific resources (files, folders, and shares) and the explicit permissions associated with those resources. At any point in the exploration of an account, you can run reports on the available information.

NOTE: The User Centric Security Management features provided by Security Explorer® appear as an Access Explorer node in the navigation tree on the Browse tab if the Access Explorer feature is installed and the license is enabled for Access Explorer. If installed, the Access Explorer menu options are present regardless of whether the license is enabled for Access Explorer.

Topics:

Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen