• |
Security Explorer® provides a single console for managing access controls, permissions, and security across Microsoft platforms that span multiple servers. The product provides a broad array of security enhancements including the ability to identify who has rights to resources across the entire organization. It also provides the ability to grant, revoke, clone, modify, and overwrite permissions quickly and from a central location.
Security Explorer 9.8 is a minor release, with enhanced features and functionality. See New features and Enhancements.
Windows Server® 2003 | |
Dell™ Fluid File System (FluidFS) EMC® Isilon® NetApp® 8.2 (7-Mode and Clustered Mode) NOTE: vsadmin must be entered in NAS credentials dlg for full management of NetApp Clusters 8.2, 8.3, 9.0, 9.1.
| |
SQL Server® 2017 | |
SharePoint® 2016 | |
Windows Server® 2016 Functional Level Windows Server 2012 R2 Functional Level Windows Server 2012 Functional Level Windows Server 2008 R2 Functional Level |
• |
New Active Directory Security module: The new Active Directory Security module gives you the ability to manage Active Directory® permissions. You can grant, revoke, clone, modify, delete, export, backup and restore permissions on Active Directory objects. You also can search for permissions, back up and restore permissions, and generate reports. If you are also using Quest® Enterprise Reporter®, you can launch Security Explorer® from within Enterprise Reporter and use the new Active Directory Security module. |
• |
View Active Directory permissions: When you open the Active Directory Security module, Active Directory loads the Active Directory objects for the specified domain. You can easily drill-down to view permissions on a specific object. |
• |
In the Objects pane, select a child object. The Permissions pane displays permissions for the selected object. The Owner box displays the user or group that owns the selected object. |
• |
Search Active Directory: Search Active Directory for the name of a principal, and choose from the following options to include in the results: |
• |
Manage permissions on Active Directory objects: You can grant, revoke, clone, modify, and delete permissions on Active Directory objects. |
• |
Back up and restore permissions on Active Directory objects: As with all other Security Explorer modules, you can back up and restore permissions on Active Directory objects. The Security Explorer Active Directory Backup File has the .adb extension. You also can use the back up scheduler to schedule the backup. |
• |
Export permissions on Active Directory objects: By default, permissions are exported to a report, which you can save, print, or export. You can generate a report or export permissions to a delimited file for use with Microsoft® Excel®. This report is useful when you are asked to see which users have access to a specific Active Directory path. |
• |
Added the ability to purge backup files (Security | Purge Backup Files) and a Purge Backup Scheduler to manage scheduled purges of backup files (Security | Purge Backup Scheduler). |
• |
Added the ability to set alternate credentials for workgroup computers. Select to show workgroups in the navigation pane in Tools | Options | View, and then use the Workgroup tab to set alternate credentials (Tools | Options | Workgroup). |
• |
Added the ability to select multiple accounts from the list in the Select Accounts dialog. |
• |
Added the ability to select multiple accounts from the list in the Group Contents dialog. |
• |
Bulk removal of permissions: NTFS Security module only. You can now use the Search module to easily delete both explicit and inherited permissions on a specific user on specified folders. |
• |
SQL Server® 2017 |
• |
Retry options for resetting password: To help you manage password resets, several features were added to the Group and User Management module. |
• |
To help you quickly change the passwords on local administrator accounts, a new check box was added to the Group/User Search Criteria tab. Select Search for local administrator accounts, and run the search. From the search results, right-click the results, and choose Change Password. |
• |
If any password resets failed, you can select to save failed computers to a search scope to repeat the search with only the failed computers. Select Save Failed Computers to Scope, and repeat the search. Right-click the results, and choose Change Password. |
• |
A new column was added to the Object and Search Result panes that shows the date the password was last set so you can easily see which passwords were reset versus those that may have failed. |
• |
Modify registry values: In the Registry Security module, you can now add, modify, and delete values in a selected registry key. You also can save the list of values to a .TXT file. Open the Registry Security module, open the Browse tab, select a registry key, and select Tools | Display Registry Values. Use the buttons to modify the values in the registry key. |
• |
Enhancements to SXPExport.exe: Several options were added to the command line program. |
• |
/columns allows you to indicate which columns to include in the exported spreadsheet or report. |
• |
/exclusion allows you to indicate paths to folders and files to exclude from the export. |
• |
/showgroupmembers allows you to exclude or include nested groups and Domain Users group members from the exported spreadsheet or report. |
• |
Added the ability to log exceptions when running scheduled tasks. If a task runs normally. it is not logged. The log file name format is {call_exe_name}_{datetime}.log. Logs are located at C:\Program Files\Quest\Security Explorer\v9\Logs. |
• |
• |
Sped up the process when browsing NetApp® 7-mode shares. |
• |
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center