Chat now with support
Chat with Support

Quest has tools and processes in place to identify, protect, detect, and remediate vulnerabilities and incidents when they occur, including external security partners. As part of our standard security operations, Quest does not use CrowdStrike in any of our operations. We are reviewing our third parties, and so far, there is minimal affect. It is Quest's policy not to provide further technical details unless they directly impact customer data.

Security Explorer 9.9 - Release Notes

Minimum requirements for Microsoft Exchange for Security Explorer

Topics:

Client access server configuration

4
Exchange Server 2010 and 2013 only: Enable Windows PowerShell® Remoting on the Exchange Server by running the Windows PowerShell command: Enable-PSRemoting –force.

Client Configuration

Permission requirements to manage Microsoft Exchange in Security Explorer

1
In the Navigation pane, expand Role Based Access Control | Roles | ApplicationImpersonation | Assignments.
2
Select Assignments, and select File | New.
4
Select RecipientRelativeWriteScope and choose Organization from the list.
5
Click OK and restart Security Explorer.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating