Chatta subito con l'assistenza
Chat con il supporto

Security Explorer 9.9.2 - Installation Guide

Installing Security Explorer

Upgrading Security Explorer

Security Explorer 9 does not require that you uninstall version 5, version 6, version 7, or version 8. You can install Security Explorer 9.9.2 side-by-side with all of these previous versions.

As with all software installations, it is recommended that you back up your files before installing the new software. The simplest way to back up your files is to navigate to the directory on the server where Security Explorer is installed. Press CTRL-A to select all files in this folder. Press CTRL-C to copy the files to the clipboard. Create a new folder and press CTRL-V to paste these files into this new backup folder.

For Security Explorer 9.9.2, you must have a Quest® license file (.dlv) or a Site Administrator QLL license file (*asc). Your previous licenses will not be recognized by version 9.9.2.

The User Centric Security Management features provided by Security Explorer appear as an Access Explorer node in the navigation tree on the Browse tab if the Access Explorer feature is installed and the license is enabled for Access Explorer. If installed, the Access Explorer menu options are present regardless of whether the license is enabled for Access Explorer.

Installing Security Explorer

During the install process, you can choose to install Access Explorer and the Security Explorer cmdlets for use with Windows PowerShell®.

The Access Explorer service scans and indexes security access information on files, folders, and shares on managed computers in managed domains. The Access Explorer Permission Wizard helps you manipulate explicit permissions and/or group memberships for Access Explorer accounts, computers, and/or resource groups. For more information, see chapter 9, Working with Access Explorer, in the Security Explorer User Guide.

The Security Explorer cmdlets perform common functions, such as Backup, Clone, Export, Grant, Restore, and Revoke, from the command line. For more information, see chapter 11, Using the command line, in the Security Explorer User Guide.

On the computer where Security Explorer is installed: Network Properties | Advanced TCP/IP Settings | DNS tab | Append DNS suffixes
2
Select Install Security Explorer.
Security Explorer (32 bit) can be installed to 32-bit and 64-bit operating systems. The installation folder is Program Files for 32-bit operating systems and Program Files (x86) for 64-bit operating systems.
Security Explorer (64 bit) can be installed to 64-bit operating systems only. The installation folder is Program Files.
5
Click View License Agreement.
7
Click I accept these terms, and click OK.
8
Click Next.
9
On the Custom Setup page, you can change the location of the program files, install Access Explorer, install the Security Explorer cmdlets for use with Windows PowerShell®, and check disk usage.
To install Access Explorer, click the icon next to Access Explorer and choose to install the feature.
To install the Security Explorer cmdlets, click the icon next to PowerShell Snap-Ins, and choose to install the feature.
10
Click Next.
11
Click Install.
12
Click Finish.

Starting Security Explorer

The first time you start Security Explorer you must apply a license file.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione