Converse agora com nosso suporte
Chat com o suporte

Security Explorer 9.9 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting

Troubleshooting

Repairing inheritance

You may need to repair the inheritance on folders and files because some or all subfolders and files are not inheriting permissions correctly from their parent. Incorrect inheritance can include missing permissions, such as a subfolder missing an inherited permission from the parent, and unwanted extra permissions, such as a subfolder containing an extra inherited permission that is not present on the parent.

1
Open the NTFS Security module.

Creating test folders and files

To help you evaluate or troubleshoot issues, you can create a test folder that contains files and permissions.

1
Open the NTFS Security module.
2
Select Help | Create Test Folders and Files.
4
Click Create Evaluation Folders and Files. A message box appears asking if you want to apply a standard set of permissions to the folders and files.

Using log files

By default, there is one log file written to the Security Explorer installation directory. To get more log information, run Security Explorer.exe with /d key to write two log files to the installation directory.

For the Exchange Security module, the ExchangeAccess log files contain Exchange module log data.

Because Security Explorer is digitally signed, you may see event log entries when starting Security Explorer if the Update Root Certificates component is turned on and the computer cannot connect to the Windows® Update server on the Internet. The Update Root Certificates component automatically updates trusted root-certificate authorities from the Microsoft Update server at regular intervals.

To resolve this behavior, connect to the Internet, or turn off the Update Root Certificates component.

1
2
Click Add/Remove Windows Components.
3
Clear the Update Root Certificates check box, and continue with the Windows Components Wizard.
Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação