Security Explorer® provides a single console for managing access controls, permissions, and security across Microsoft platforms that span multiple servers. The product provides a broad array of security enhancements including the ability to identify who has rights to resources across the entire organization. It also provides the ability to grant, revoke, clone, modify, and overwrite permissions quickly and from a central location. Unlike native tools, Security Explorer provides the ability to back up and restore permissions only, ensuring the integrity of data. To help meet auditing requirements, Security Explorer provides convenient reports that can be generated at your convenience. Lastly, the product's cleanup capabilities address common post-migration security issues.
Pour vous assurer de l’intégrité de votre téléchargement, vérifiez la valeur de somme de contrôle.
SHA256: 1c555400d9cd1a426d6f63655516a727f6584f2004eaa6af5568c1e8fa041534
Titre du document | ||
---|---|---|
view pdf | ||
© ALL RIGHTS RESERVED. Conditions d’utilisation Confidentialité Cookie Preference Center