Chat now with support
Chat with Support

We are currently preforming website maintenance, any feature requiring sign-in is temporarily unavailable, if you have an issue requiring immediate assistance please call Technical Support.

Security Explorer 9.8 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting


Have you ever wondered just which files and directories on your network the group Everyone can delete permissions on? Finding information like this is a snap with Security Explorer®. Simply choose a group or user, and a set of permissions to search for, and begin your search. When the search results display, you can click on any files or directories in your search results to modify their permissions immediately.

NOTE: For searching the SQL Security module, see Searching for SQL Server objects and permissions. For searching the Exchange Security module, see Searching for Exchange server objects and permissions. For searching in SharePoint Security module, see Searching for SharePoint objects. For searching the Active Directory Security module, see Searching for Active Directory objects.


Using the Browse tab to search

Open the Browse tab.
Click , press Shift + F3, or right-click an object, and choose Search in a New Window.
Click Start Search.
The Permissions column in the Permissions pane may list abbreviations of some permissions.
Click Modify in the Control Button bar, or select Security | Modify Permission.
Select Auto-update results to automatically update the search results after you select to grant, revoke, clone, replace, modify, or delete a permission. The search is performed again during the refresh, so if you have a search that takes a long time, you may want to clear this check box.

Add Scope

Add a Search Scope, which is what you want to search, such as domains, computers, or folders. See Adding a search scope.

Load from Share

NTFS Security module only. Load saved search scope and criteria from an XML file exported from the Share Security module.

Load from NTFS

Share Security module only. Load saved search scope and criteria from an XML file exported from the NTFS Security module.


Save the Search Scope and selected criteria to reuse at a later time. The saved search displays under User Searches.

Start Search

Start the search based on the current Search Scope and selected criteria.

Stop Search

Stop the search process.

Clear Results

Clear the results area.


Return to the default selections on all search criteria tabs.

Save Results

Save the results as a .txt file.


Display the results in a report format that you can save, print, or export.


Service Security and Task Management modules only. Export the results. See Using the Browse tab to export security.

Managing saved searches

You can save the search scope and selected criteria to reuse. You also can export the scope and settings to an XML file for later import into another module. Saved searches appear under Saved Searched | User Searches.

Table 2.  


Load a saved search to run.

Delete Saved Search

Delete the saved search.


Import the search scope and search criteria from an exported XML file.


Export the search scope and search criteria to an XML file.

Adding a search scope

The Search Scope determines what objects to search, such as domains, computers, or folders.

Click Add Scope.
Type a location (all modules) or LDAP path (Service Security and Active Directory Security modules only) in the box. If you enter a location or LDAP path, you must select a type: Domain, Computer, Folder (NTFS Security module only), AD Forest, AD OU, or AD Container (Service Security module only).
TIP: Use the Select all children for the current item or De-select all children for the current item check boxes to help you create the scope.
NOTE: In the Group and User Management module, you can select individual computers, computers in a Network node, or Active Directory® organizational units and containers that contain computers. When the Active Directory tree is used in the search scope, Security Explorer® searches only local users and groups for the computers in the selected organizational unit or container, or local users and groups for selected computers. Security Explorer does not search domain users and groups in Active Directory. If you want to search for domain users and groups, select computers in the Network node.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating