How to search for a disabled Active Directory user that has explicit permission to a SharePoint site. ... Open the Security Explorer console and select the SharePoint module. ... Select the Search menu and then select Add Search Scope.
The information in this article applies to: ... Security Explorer 7.x and up ... Enable debugging in Security Explorer ... Security Explorer can be started in debug mode and can also be configured to log folder and file paths when processing actions.
Need to know what inbound and outbound ports need to be open in the firewall. ... (SXP) Security Explorer will be installed on a virtual machine in the cloud, and connecting to on-premises file shares.
There may be a need for a NTFS security report for folders only. ... Please follow the steps below to accomplish this. ... Via the NTFS Security module select “Browse” and go to the desired path, or type the server name, using the UNC path and the Admin share.
<p>User or Group’s SID must be determined. ... This can be done by using “Group and User Management” module. ... Once the target has been found, access its properties by double clicking or right click and select “Properties”.</p>
Each time a user launches the software, it prompts for the location and does not save Favorites. ... Security Explorer is installed in a Citrix environment that is using roaming profiles. ... Fix for the prompting of the location each time the software is launched:
When deleting an Active Directory user account within the Group and User Management module, receiving error "The directory service can perform the requested operation only on a leaf object".
Browse to a folder on the NetApp Filer and select the option to "display group contents" of a local group which contains a global group. ... This error occurred since the Certificate on the NetApp filer was 512 bit.
How to log all security changes made from within the Security Explorer console. ... <p>Choose Tools | Options | General tab.</p>
Would like process where specific, known unused accounts can be selected and removed across all sites. ... <p><span>None.</span></p>
Export Permissions takes a long time to complete, and produces 200,000+ pages showing folder and file permissions. ... If subfolders contain only inherited permissions, then select the option "Recurse subfolders" and Recurse to Depth 0.
Need to search and report on local administrators on domain computers. ... <p> </p>
How to search for unknown accounts (orphaned SIDs or unresolved accounts) in the NTFS Security module. ... <p>In the Group/User Search Criteria tab check the option to Search for unknown accounts.</p>
The error "At least one root path cannot be found in the backup file" is displayed when a user tries to preview objects in a Security Explorer backup archive file. ... All the backup archive files are only 1KB in size indicating that the backups are not completing successfully, although the Windows Task Scheduler showed that the Schedule backup task ran and completing successfully.
What are the hardware and software requirements? ... Requirement
Using SXPExport.exe results in the below error: ... Exception: Object reference not set to an instance of an object. ... This issue has been identified in version 9.7 and has been addressed in 9.7 Hotfix #1 which can be found here.
<p><font face="Arial" size="2">Select the source domain from the “List Names From” dropdown list and click “Show Users”. ... Select the target domain from the “List Names From” dropdown list and click “Show Users”.
How to change multiple local administrators account passwords at one time. ... Due to security reasons all local administrator passwords may have to be changed in a domain. ... This operation can be done via Security Explorer.
When two different permissions (one using a custom security template) are applied to the same account on the same folder and you modify one of the permissions “Applies To” option, it will remove the other permission for that account without warning.
When using Security Exlporer to export or report on permissions in a file share, the job fails after several hours. ... "Error: Not enough storage is available to complete this operation" ... The target file system contains too many items to be enumerated in the available memory.
Currently can see who has permissions to a folder in report results. ... Need the report to show a list of the Security Groups with permission to the folder, along with the group members. ... WORKAROUND
The Revoke task provides a quick way to revoke permissions at the folder and/or file level. ... It is possible for more than one Security Identifier (SID) to be assocatied with objects in the file system and the domain.
Meltdown and Spectre exploit critical vulnerabilities in modern processors. ... These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. ... While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of data stored in the memory of other running programs.
Security Explorer users often need to report on group membership in shares and file systems. ... When users need to report on Global groups such as 'Domain Admins', a simple procedure will produce the desired results.
<p>File ACLs are administered at each individual physical share. ... There is no mechanism to administrate ACLs system-wide from the Dfs root, nor is there an attempt to keep ACLs consistent between alternate volumes.
© 2025 Quest Software Inc. ALL RIGHTS RESERVED. 使用条款 隐私 Cookie Preference Center