Chat now with support
Chat with Support

Security Explorer 9.8 - Installation Guide

Installation Considerations for Security Explorer

Minimum requirements for Security Explorer

Processor

Pentium® 600MHz or faster

Disk space

550 MB

Memory

1 GB

Supported platforms for Security Explorer

NTFS Security

Share Security

Registry Security

Printer Security

Service Security

Task Management

Group & User Management

Windows XP

Windows Vista®

Windows 7

Windows 8

Windows 8.1

Windows 10

Windows Server® 2003

Windows Server 2008

Windows Server 2008 R2

Windows Server 2012

Windows Server 2012 R2

Windows Server 2016

NTFS Security

Share Security

Group & User Management

Dell™ Fluid File System (FluidFS)

EMC® Isilon®

EMC Celerra®

EMC VNX®

NetApp® 8.2 (7-Mode and Clustered Mode)

NetApp 8.3, 9.0, 9.1 Clusters

NOTE: vsadmin must be entered in NAS credentials dlg for full management of NetApp Clusters 8.2, 8.3, 9.0, 9.1.

SQL Security

SQL Server® 2017

SQL Server 2017 Reporting Services

SQL Server 2016

SQL Server 2014

SQL Server 2012

SQL Server 2008 R2

SQL Server 2008

SQL Server 2005

SharePoint Security

SharePoint® 2016

SharePoint 2013

SharePoint 2010

SharePoint Foundation

SharePoint 2007

SharePoint Services 3.0

Exchange Security

Exchange 2016

Exchange 2013

Exchange 2010

Exchange 2007

Active Directory Security

Windows Server® 2016 Functional Level

Windows Server 2012 R2 Functional Level

Windows Server 2012 Functional Level

Windows Server 2008 R2 Functional Level

Windows Server 2008 Functional Level

Windows Server 2003 Functional Level

User privilege requirements for Security Explorer

It is recommended to be a member of the local Administrators group to use all the features in Security Explorer®. However, it is possible to run Security Explorer without being a member of the local Administrators group.

NTFS Security

To manage permissions on folders and files on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Share Security

To manage permissions on shares on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Registry Security

To manage permissions on registry keys on remote computers, the file and print sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Printer Security

To manage permissions on printers on remote computers:

Service Security

To manage permissions on services on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Task Management

To manage tasks on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Group and User Management

To manage groups and users on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

SharePoint® Security

To manage permissions on servers running SharePoint, the SharePoint site must be on the same network as the computer on which Security Explorer is installed.

To manage SharePoint sites exposed over SSL (https://), add the certificate of the server running SharePoint to the Trusted Root Certification Authorities store on the computer with Security Explorer installed.

To deploy and remove Security Explorer Web Services, and to search for SharePoint sites automatically, the current user must be a member of the Administrators local group on the servers.

SQL Server® Security

To manage permissions on servers running SQL Server:

Windows® Firewall on the server must be configured to allow SQL and WMI.

For more information please refer to: Configure the Windows Firewall to Allow SQL Server Access at http://msdn.microsoft.com/en-us/library/cc646023.aspx.

Exchange Security

To manage permissions on the Exchange organization, the Exchange organization must be on the same Active Directory® forest as the computer on which Security Explorer is installed.

Active Directory Security

To manage permissions on the domain, the domain must have a trusted relationship with the current domain on which the user is logged on.

See Managing connections for Active Directory Security In the Security Explorer 9.8 User Guide.

Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials
What's New
Contact Us
Licensing Assistance
Technical Support
View All
Related Documents