Chat now with support
Chat with Support

Security Explorer 9.9 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting

Using the Search tasks

The Search basic task provides a quick way to search for permissions. For more options, click Switch to Security Explorer Classic (Advanced). See Using the Browse tab to search.

You also can use the Find Unknown, Find Disabled, and Find SID History advanced tasks to easily search permissions for those specific situations.

NOTE: The Tasks tab is hidden by default. To display the Tasks tab, select View | Tasks tab.
2
Open the Tasks tab.
3
Click Search, Find Unknown, Find Disabled, or Find SID History.
4
Click Add to select paths.
5
6
Click OK. An information message displays.
7
Click OK. A new Security Explorer® window opens displaying the search progress on the Status tab. When the search is complete, the results display in the right pane. See Using the Browse tab to search.

Replacing permissions

In the Search Results area, you can select one or more permissions, and replace them with the permissions of a selected user or group.

1
Right-click one or more of the permissions displayed in the Search Results area, and choose Replace.
2
In the Select Group or User area, select a group or user whose permissions will be used as the replacement.
You can select from the Account Selection Chooser area. The name displays in the Group or User box.
You can select a domain from the Domain list. By default, only the groups display. To include users in the list, click Show Users. Select a group or user from the list. The name displays in the Group or User box.
You can type a group or user name in the Group or User box or click Advanced User Selection to select a group or user name from a list.
3

Scheduling a search

If you would prefer to run the search at a set time, schedule it as a Windows® task.

2
Open the Browse tab.
Click , press Shift + F3, or right-click an object, and choose Search in a New Window.
6
Click Schedule.
7
In the File Name box, browse to locate the destination for the Security Explorer Report File (.pdf). A search status file (<report file name>_status.txt) will be also saved in the destination along with the report.
8
In the Account box, browse to locate an account under which to run the export. Make sure the account has access to the resources you export. If you do not enter an account, the export task runs under the local system account.
9
To receive an email notification when the search completes, select Send email when task completes, and click Configure Email to enter the email recipients and subject. The email contains the report as attachment if the size of the report file is not larger than 10 MB. For a report file that is larger than 10 MB, the email provides the report location information in the message body instead of containing the report as attachment.
NOTE: Before you select this option, enable Email Notification and configure SMTP settings on Tools > Options > General. See Setting general options for details.
NOTE: The email notification will be sent under the local system account if you do not enter any account in the Account box. To make sure the email notification has been enabled for the local system account:
1
Enable Email Notification and configure SMTP settings on Tools > Options > General. See Setting general options for details.
2
Copy the file C:\Users\[user_name]\AppData\Local\Quest\Security Explorer\v9\PersistentData.xml
to
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Quest\Security Explorer\v9 (for 32-bit Security Explorer)
or
C:\Windows\System32\config\systemprofile\AppData\Local\Quest\Security Explorer\v9 (for 64-bit Security Explorer)
(If a file named PersistentData.xml already exists in the target folder, replace the file with the one you copied)
10
To save the report to a shared folder when the search completes, select Deliver report to a shared folder, and click the ellipsis (...) to select the folder.
11
Click Schedule. The task is assigned the default run time of Weekly, every Monday at midnight.
NOTE: Errors that occur during the task are captured in the logs located at C:\ProgramData\Quest\Security Explorer\v9\Logs. The file names are prefixed by “SXPSEARCH”.

Managing search tasks

The Search Scheduler provides a central location for management of search tasks. You can add new search tasks, edit existing search tasks, and delete selected search tasks.

2
Select Search | Search Scheduler.

Open Task Dialog

Open the task in Task module.

Edit

Edit an existing search task.

Delete

Delete selected search tasks.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating