Prior to downloading this Software, you must review the Software Transaction Agreement located here and confirm, by clicking the I agree check box below, that your organization accepts and is bound by the terms and conditions of the Software Transaction Agreement for this Software.
If you purchased the licenses for this Software by executing an order form with Quest or if you have an agreement with Quest that states that all purchases are governed by such agreement, then the terms and conditions of that agreement supersedes and takes precedence over the Software Transaction Agreement.
Can license apply automatically for Security Explorer? You have to copy .dlv file in to C:\Program Files\Quest\Security Explorer, but the product does not activate. The license needs to be applied, and after that, it creates the file C:\ProgramData\Quest\ProductLicenses.xml. Is there a way to automate the generation of this file?
There are folder permissions for a group that are inherited from the parent folder in all subfolders and in a few subfolders the permissions were changed and these permissions are required to be given to another group in the same way it is set in all folders.
When setting the options in SXP under VIEW the radio button for User Advanced Styles for Users and Groups will cause an Arithmetic error when enumerating folders under NTFS security. "Error: Arithmetic Operation resulted in an overflow."
Security Explorer® provides a single console for managing access controls, permissions, and security across Microsoft platforms that span multiple servers. The product provides a broad array of security enhancements including the ability to identify who has rights to resources across the entire organization. It also provides the ability to grant, revoke, clone, modify, and overwrite permissions qu...
Security Explorer® provides a single console for managing access controls, permissions, and security across Microsoft platforms that span multiple servers. The product provides a broad array of security enhancements including the ability to identify who has rights to resources across the entire organization. It also provides the ability to grant, revoke, clone, modify, and overwrite permissions qu...
When trying to search for the users or groups from a trusted domain from the Group and User Management module using the Network node, the error message 'Error: The service is not operational' is displayed.
Missing SharePoint and exchange modules from security Explorer, after upgrade to latest version the icons for SharePoint and Exchange disappeared from the console.
When trying to search for the users or groups from a trusted domain from the Group and User Management module using the Network node, the error message 'Error: The service is not operational' is displayed.
There are folder permissions for a group that are inherited from the parent folder in all subfolders and in a few subfolders the permissions were changed and these permissions are required to be given to another group in the same way it is set in all folders.
In a scenario where high-privilege accounts—such as Domain Admins—are members of the Protected Users group, can those accounts still function properly with Security Explorer?