Chatta subito con l'assistenza
Chat con il supporto

Security Explorer 9.9.2 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting

Revoking permissions on disabled accounts

You also can use the Revoke Unknown advanced task to revoke all permissions on disabled accounts. See Using the Revoke tasks.

Open the Browse tab.
Type a path in the Path box, and click Go.
Select Advanced Revoke Options.
Click Yes.
Select Revoke all disabled accounts.
Click OK. The Revoking Permissions box displays the progress. See Completing a process.

Using the Revoke tasks

The Revoke task provides a quick way to revoke permissions. You also can use the Revoke All, Revoke Unknown, Revoke Disabled, and Revoke SID History advanced tasks to easily revoke permissions for those specific situations. For more options, add at least one path, and click Switch to Security Explorer Classic (Advanced). See Using the Browse tab to revoke permissions.

NOTE: The Tasks tab is hidden by default. To display the Tasks tab, select View | Tasks tab.
Open the Tasks tab.
Open the module for the type of permission you want to revoke, and click Revoke, Revoke All, Revoke Unknown, Revoke Disabled, or Revoke SID.
Click Add to select paths.
If you clicked Revoke or Revoke All:
Click Add to select permissions.

Cloning permissions

Use the Clone feature to copy individual permissions, permissions in an entire domain, or permissions relating to a user’s SID history. The type of permission cloned depends on the selected module. For example, if you want to clone permissions for a printer, open the Printer Security module.


Using the Browse tab to clone permissions

Open the Browse tab.
Type a path in the Path box, and click Go.
Select Security | Clone Group or User.
Click on the Tool Bar, click Clone on the Control Buttons Bar; or right-click the object or permission, and choose Clone Group or User.
The Clone Folder Permissions box opens to the Manual User/Group Selection tab and displays the path to the selected object and the associated groups and users.
To load a previously saved Security Explorer Clone List (.dat), click Load. Not available in the SQL Server Security, SharePoint Security, and Exchange Security modules.
Table 3. Clone options

Clone Permissions

By default, permissions are cloned.

Clone Ownership

Select to clone ownership.

Clone group memberships

Select to add the destination account to the groups of which the source user is a member.

If you choose this check box, a warning message displays. The destination is cloned into the same parent groups as the source. The contents of the groups selected as the source are not cloned.

Replace source permissions with destination permissions

Select to change the source permissions to match the destination permissions.

Include protected objects when cloning (objects with ‘Inherit Permissions from Parent’ disabled)

Not available in the SQL Server Security, SharePoint Security, Exchange Security, and Active Directory Security modules. Select to include those objects for which the Allow inheritable permissions from parent to propagate to this object check box is unavailable. See Viewing permissions.

To save the selections as a Security Explorer Clone List (.dat) for reuse, click Save. Not available in the SQL Server Security, SharePoint Security, Exchange Security, and Active Directory modules.
Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione