立即与支持人员聊天
与支持团队交流

Security Explorer 9.9.2 - User Guide

Getting Started with Security Explorer Managing permissions Searching Managing security Managing objects
Managing folders and files Managing shares Managing registry keys Managing services Managing tasks Managing groups and users Managing Favorites Managing Enterprise Scopes Updating licenses Managing network drives
Working with Microsoft SQL Server Working with Microsoft Exchange
Checking minimum requirements Viewing Exchange permissions Granting Exchange permissions Revoking Exchange permissions Cloning Exchange permissions Searching for Exchange server objects and permissions Backing up and restoring Exchange server security Modifying Exchange permissions Managing Exchange group memberships Exporting Exchange security permissions Creating Exchange databases Creating public folder mailboxes Managing Exchange administrators Managing Exchange distribution groups Managing mail contacts Managing mail users Managing mailboxes Managing mailbox folders Managing public folders Using role based access control Setting options for Exchange security
Working with Microsoft SharePoint Working with Access Explorer Working with Microsoft Active Directory Customizing Security Explorer Using the command line Using PowerShell cmdlets Troubleshooting

Setting options for SQL Server

1
Select Tools | Options.
2
Open the SQL tab.

Display separate domain column in permissions list

By default, the domain for each object is listed in the Permissions pane. Clear the check box to remove the Domain column from the Permissions pane.

Display SQL Server version

By default, SQL Server displays in the Type column in the Objects pane when you select the SQL Server Security module. Select to display the version and service pack level in the Type column.

Use Windows Authentication

By default, Security Explorer uses Windows® Authentication when connecting to SQL Server.

Always open authentication dialog

Select to display the Open Authentication dialog box when connecting to SQL Server.

Use alternate credentials list

Select to use the alternate credentials list when connecting to SQL Server. Security Explorer tries each account in the order they appear in the list until an account is found with sufficient privileges. If no account is found, Access Denied is displayed.

Add

Add an alternate credential.

NOTE: If you do not enter a computer name, each account is tried in the order listed until an account is found with sufficient privileges.
4

Edit

Edit a selected alternate credential.

Del

Delete a name from the list.

Clear

Clear all names from the list.

Modifying SQL Server security settings

TIP: You can use the Security Settings advanced task to modify SQL Server® security settings. Click Security Settings, add a path, and click OK.
1
Open the SQL Server Security module.
2
In the Navigation pane, select a server, and select Tools | SQL Server Security Settings.

Managing SQL Server network settings

TIP: You can use the Network Settings advanced task to modify SQL Server® security settings. Click Network Settings, add a path, and click OK.
1
Open the SQL Server Security module.
3
Open the Network Settings tab to view network protocol properties.

 

Working with Microsoft Exchange

With the Exchange Security module, you can view permissions on Administrative Groups, Exchange Administrators, Exchange Distribution Groups, Mailboxes, and Public Folders. For Microsoft® Exchange 2010, 2013, 2016, and 2019, you can manage entities in Role-Based Access Control (RBAC).

Topics:

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级