Chat now with support
Chat with Support

Security Explorer 9.8 - Release Notes

Hardware requirements

Processor

Pentium® 600MHz or faster

Memory

1 GB

Hard disk space

550 MB

Operating system

Software requirements

User privilege requirements

It is recommended to be a member of the local Administrators group to use all the features in Security Explorer®. However, it is possible to run Security Explorer without being a member of the local Administrators group.

NTFS Security

To manage permissions on folders and files on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Share Security

To manage permissions on shares on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Registry Security

To manage permissions on registry keys on remote computers, the file and print sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Printer Security

To manage permissions on printers on remote computers:

Service Security

To manage permissions on services on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Task Management

To manage tasks on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Group and User Management

To manage groups and users on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

SharePoint® Security

To manage permissions on servers running SharePoint, the SharePoint site must be on the same network as the computer on which Security Explorer is installed.

To manage SharePoint sites exposed over SSL (https://), add the certificate of the server running SharePoint to the Trusted Root Certification Authorities store on the computer with Security Explorer installed.

To deploy and remove Security Explorer Web Services, and to search for SharePoint sites automatically, the current user must be a member of the Administrators local group on the servers.

SQL Server® Security

To manage permissions on servers running SQL Server:

Windows® Firewall on the server must be configured to allow SQL and WMI.

For more information please refer to: Configure the Windows Firewall to Allow SQL Server Access at http://msdn.microsoft.com/en-us/library/cc646023.aspx.

Exchange Security

To manage permissions on the Exchange organization, the Exchange organization must be on the same Active Directory® forest as the computer on which Security Explorer is installed.

Active Directory Security

To manage permissions on the domain, the domain must have a trusted relationship with the current domain on which the user is logged on.

See Setting Options for Active Directory Security In the Security Explorer 9.8 User Guide.

Minimum permissions for Access Explorer

Logged in user

To create the Access Explorer database, the logged in user (Windows® Authentication) or SQL account must have rights to create databases, logins, and groups on the computer running SQL Server®.

Security Explorer service account

Service accounts for managed computers

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating