Chat now with support
Chat with Support

Security Explorer 9.9.2 - Installation Guide

Installation Considerations for Security Explorer

Minimum requirements for Security Explorer

Processor

Pentium® 600MHz or faster

Disk space

550 MB

Memory

1 GB

Supported platforms for Security Explorer

NTFS Security

Share Security

Registry Security

Printer Security

Service Security

Task Management

Group & User Management

Windows 8.1

Windows 10

Windows Server 2012

Windows Server 2012 R2

Windows Server 2016

Windows Server 2019

Windows Server 2022

NTFS Security

Share Security

Group & User Management

Dell™ Fluid File System (FluidFS)

EMC® Isilon®

EMC Celerra®

EMC VNX®

NetApp® 8.2 (7-Mode and Clustered Mode)

NetApp 8.3, 9.0, 9.1, 9.2, 9.3 and 9.4 Clusters

NOTE: vsadmin must be entered in NAS credentials dlg for full management of NetApp Clusters 8.2, 8.3, 9.0, 9.1, 9.2, 9.3 and 9.4.

SQL Security

SQL Server® 2019

SQL Server 2019 Reporting Services

SQL Server 2017

SQL Server 2017 Reporting Services

SQL Server 2016

SQL Server 2014

SQL Server 2012

SharePoint Security

SharePoint® 2019

SharePoint 2016

SharePoint 2013

SharePoint 2010

SharePoint Foundation

Exchange Security

Exchange 2019

Exchange 2016

Exchange 2013

Exchange 2010

Active Directory Security

Windows Server® 2019 Functional Level

Windows Server 2016 Functional Level

Windows Server 2012 R2 Functional Level

Windows Server 2012 Functional Level

User privilege requirements for Security Explorer

It is recommended to be a member of the local Administrators group to use all the features in Security Explorer®. However, it is possible to run Security Explorer without being a member of the local Administrators group.

NTFS Security

To manage permissions on folders and files on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Share Security

To manage permissions on shares on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Registry Security

To manage permissions on registry keys on remote computers, the file and print sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Printer Security

To manage permissions on printers on remote computers:

Service Security

To manage permissions on services on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Task Management

To manage tasks on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

Group and User Management

To manage groups and users on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer.

SharePoint® Security

To manage permissions on servers running SharePoint, the SharePoint site must be on the same network as the computer on which Security Explorer is installed.

To manage SharePoint sites exposed over SSL (https://), add the certificate of the server running SharePoint to the Trusted Root Certification Authorities store on the computer with Security Explorer installed.

To deploy and remove Security Explorer Web Services, and to search for SharePoint sites automatically, the current user must be a member of the Administrators local group on the servers.

SQL Server® Security

To manage permissions on servers running SQL Server:

Windows® Firewall on the server must be configured to allow SQL and WMI.

For more information please refer to: Configure the Windows Firewall to Allow SQL Server Access at http://msdn.microsoft.com/en-us/library/cc646023.aspx.

Exchange Security

To manage permissions on the Exchange organization, the Exchange organization must be on the same Active Directory® forest as the computer on which Security Explorer is installed.

Active Directory Security

To manage permissions on the domain, the domain must have a trusted relationship with the current domain on which the user is logged on.

See Managing connections for Active Directory Security in the Security Explorer 9.9.2 User Guide.

Self Service Tools
Knowledge Base
Notifications & Alerts
Product Support
Software Downloads
Technical Documentation
User Forums
Video Tutorials
RSS Feed
Contact Us
Licensing Assistance
Technical Support
View All
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating