지금 지원 담당자와 채팅
지원 담당자와 채팅

Security Explorer 9.9 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting

Managing SQL Server network settings

TIP: You can use the Network Settings advanced task to modify SQL Server® security settings. Click Network Settings, add a path, and click OK.
1
Open the SQL Server Security module.
3
Open the Network Settings tab to view network protocol properties.

 

Working with Microsoft Exchange

With the Exchange Security module, you can view permissions on Administrative Groups, Exchange Administrators, Exchange Distribution Groups, Mailboxes, and Public Folders. For Microsoft® Exchange 2010, 2013, 2016, and 2019, you can manage entities in Role-Based Access Control (RBAC).

Topics:

Checking minimum requirements

The first time you expand an Exchange server in the Navigation pane of the Exchange Security module, an information message displays the minimum requirements for managing Exchange security.

For more detailed information about minimum requirements, see the Security Explorer Installation Guide.

1
Open the Exchange Security module for the first time.
2
If you click Yes to proceed, you are asked to enable Exchange Impersonation for the selected organization. Exchange Impersonation must be enabled for the currently logged on user.

Viewing Exchange permissions

1
Open the Exchange Security module.
2
Open the Browse tab.
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택