Prior to downloading this Software, you must review the Software Transaction Agreement located here and confirm, by clicking the I agree check box below, that your organization accepts and is bound by the terms and conditions of the Software Transaction Agreement for this Software.
If you purchased the licenses for this Software by executing an order form with Quest or if you have an agreement with Quest that states that all purchases are governed by such agreement, then the terms and conditions of that agreement supersedes and takes precedence over the Software Transaction Agreement.
Security Explorer® provides a single console for managing access controls, permissions, and security across Microsoft platforms that span multiple servers. The product provides a broad array of security enhancements including the ability to identify who has rights to resources across the entire organization. It also provides the ability to grant, revoke, clone, modify, and overwrite permissions qu...
虚拟化是在其他系统、应用程序或最终用户与计算资源进行交互时，用于隐藏这些资源的物理特征的一项技术。它可以使服务器、操作系统、应用程序或存储设备等单个物理资源看起来像多台逻辑设备一样工作。此外，它还可以使存储设备或服务器等多个物理资源看起来像是单个逻辑资源。因此，虚拟化使IT部门可以增加资源利用率、提高可用性并简化备份、系统管理和恢复过程。它还可以使IT部门更快响应业务的动态需求。虚拟化技术的示例包括VMware ESX Server、Citrix/XenServer和Microsoft Windows Server 2008 Hyper-V。