Security Explorer 9.1. User Guide

Size: px
Start display at page:

Download "Security Explorer 9.1. User Guide"

Transcription

1 Security Explorer 9.1 User Guide

2 Security Explorer 9.1 User Guide Explorer 8 Installation Guide ii 2013 by Quest Software All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Quest Software, Inc. The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA legal@quest.com Refer to our Web site for regional and international office information. Trademarks Quest, Quest Software, the Quest Software logo, Simplicity at Work and Security Explorer are trademarks of Quest Software, Inc. and its subsidiaries. For a complete list of Quest Software trademarks, see All other trademarks are property of their respective owners. Security Explorer User Guide October 2013 Version 9.1.1

3 Security Explorer 9.1 User Guide Explorer 8 Installation Guide iii About Quest Software Corporation Quest Software simplifies and reduces the cost of managing IT for more than 100,000 customers worldwide. Our innovative solutions make solving the toughest IT management problems easier, enabling customers to save time and money across physical, virtual and cloud environments. For more information about Quest go to Contacting Quest Software Phone Mail Web site (United States and Canada) info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA USA Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a Quest product and have a valid maintenance contract. Quest Support provides unlimited 24x7 access to SupportLink, our self-service portal. Visit SupportLink at From SupportLink, you can do the following: Review thousands of solutions from our online Knowledgebase Download the latest releases and service packs Create, update and review Support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at:

4 Security Explorer 9.1 User Guide Explorer 8 Installation Guide iv Table of Contents Getting Started with Security Explorer... 1 Starting Security Explorer... 1 Examining the Tasks Tab... 1 Selecting Modules... 1 Menus... 2 File Menu... 2 View Menu... 2 Security Menu... 3 Search Menu... 3 Tools Menu... 4 Help Menu... 5 Tool Bar... 5 Choosing an Interface... 7 Examining the Browse Tab... 7 Using the Objects Pane... 8 Setting the Path... 8 Using the Permissions Pane... 8 Sorting Permissions... 8 Customizing the View... 9 Showing/Hiding Module Buttons... 9 Showing/Hiding Modules... 9 Adjusting the View... 9 Showing/Hiding the Tool Bar... 9 Showing/Hiding the Status Bar Showing/Hiding the Control Pane and Buttons Bar Showing/Hiding the Loading Progress Bar Completing a Process Managing Permissions Viewing Permissions Granting Permissions Using the Grant Task Using the Browse Tab to Grant Permissions Revoking Permissions Using the Revoke Tasks... 14

5 Security Explorer 9.1 User Guide Explorer 8 Installation Guide v Using the Browse Tab to Revoke Permissions Cloning Permissions Using the Clone Task Using the Browse Tab to Clone Permissions Selecting Users/Group Manually Selecting Users/Groups Automatically Updating Permissions Relating to a User s SID History Viewing SID History Detail Importing Groups and Users Completing the Clone Process Creating Permission Templates Copying Permissions Copying Permissions to Subfolders and Files Setting Ownership Using the Set Ownership Task Using the Browse Tab to Set Ownership Modifying Permissions Reducing Permissions to Read Only Managing Group Memberships Renaming Accounts Deleting Permissions Printing Permissions Running a Report Using the Reports or Tasks Tab Running a Report Using the Browse Tab Searching Using the Search Tasks Using the Browse Tab to Search Adding a Search Scope Setting Search Criteria Group/User Search Criteria Permission Search Criteria Folder and File Search Criteria Service and Task Search Criteria Group/User Search Criteria Advanced Search Options Starting the Search Replacing Permissions... 33

6 Security Explorer 9.1 User Guide Explorer 8 Installation Guide vi Saving Search Criteria Saving Search Results Managing Security Backing up Security Backup File Types Using the Backup Task Using the Browse Tab to Back up Security Scheduling a Backup Using the Backup Scheduler Restoring Security Exporting Security Using the Export Task Using the Browse Tab to Export Security Deleting Export Tasks Managing Objects Managing Folders and Files Creating a New Folder Deleting a Folder or File Viewing Folder and File Properties Showing Open Files Opening Files Editing Files Opening Windows Explorer Managing Shares Creating a New Share Removing a Share Finding a Share Path Managing Registry Keys Creating a New Registry Key Deleting a Registry Key Managing Services Setting Logon Accounts Removing a Service Modifying Service Properties Using the Properties Task Using the Browse Tab to Modify Service Properties Managing Tasks... 49

7 Security Explorer 9.1 User Guide Explorer 8 Installation Guide vii Running a Task Setting Account Information Creating a New Task Copying a Task Removing a Task Modifying Task Properties Managing Groups and Users Viewing Accounts Creating a New Group Creating a New User Modifying Group and User Properties Modifying Group or User Active Directory Properties Modifying Properties of Multiple Users Modifying Group Memberships Adding a User or Group Viewing Group and User Memberships Changing User Passwords Modify Memberships of Multiple Local Groups Clearing the Local Administrator Group Deleting Groups and Users Managing Favorites Adding Favorites Exporting Favorites Importing Favorites Removing Favorites Managing Enterprise Scopes Creating an Enterprise Scope While Browsing Creating an Enterprise Scope Editing an Enterprise Scope Removing an Enterprise Scope Viewing Licenses Managing Network Drives Mapping a Network Drive Disconnecting a Network Drive Working with Microsoft SQL Viewing SQL Server Permissions Granting SQL Server Permissions Revoking SQL Server Permissions Cloning SQL Server Permissions... 65

8 Security Explorer 9.1 User Guide Explorer 8 Installation Guide viii Modifying SQL Server Permissions Searching for SQL Server Objects and Permissions Setting SQL Server Search Criteria Backing Up and Restoring SQL Server Security Exporting SQL Database Permissions Managing SQL Server Objects Copying SQL Server Objects Copying SQL Permissions Managing Databases Adding a New Database Role Removing a Database Role Modifying a Database Role Adding a New SQL Database User Removing an SQL Database User Modifying an SQL Database User Adding a New Schema Removing a Schema Modifying a Schema Managing Logins Adding a New Login Removing a Login Modifying a Login Managing Server Roles Adding a Server Role Removing a Server Role Modifying Server Roles Managing Security SQL Reporting Services Managing System Roles Creating a New System Role Deleting System Roles Modifying a System Role Managing Catalog Roles Creating a New Catalog Role Deleting Catalog Roles Modifying a Catalog Role Managing Catalog Items Granting SSRS Permissions Revoking SSRS Permissions Cloning SSRS Permissions Searching for SSRS Permissions Setting Search Criteria Modifying SSRS Permissions Copying SSRS Permissions Deleting SSRS Permissions... 76

9 Security Explorer 9.1 User Guide Explorer 8 Installation Guide ix Exporting SSRS Permissions Backing Up and Restoring SSRS Permissions Setting SQL Options Modifying SQL Server Security Settings Managing SQL Network Settings Working with Microsoft Exchange Checking Minimum Requirements Viewing Exchange Permissions Granting Exchange Permissions Revoking Exchange Permissions Cloning Exchange Permissions Searching for Exchange Server Objects and Permissions Setting Exchange Security Search Criteria Backing Up and Restoring Exchange Server Security Modifying Exchange Permissions Managing Exchange Group Memberships Exporting Exchange Security Permissions Creating Exchange Databases Creating Public Folder Mailboxes Managing Exchange Administrators Adding Exchange Administrators Modifying Exchange Administrators Deleting Exchange Administrators Managing Exchange Distribution Groups Adding Distribution Groups Modifying Distribution Groups Deleting Distribution Groups Managing Mail Contacts Creating Mail Contacts Modifying Mail Contacts Deleting Mail Contacts Managing Mail Users Creating Mail Users Modifying Mail Users Deleting Mail Users Managing Mailboxes Creating Mailboxes... 89

10 Security Explorer 9.1 User Guide Explorer 8 Installation Guide x Deleting Mailboxes Creating Mailbox Folders Deleting Mailbox Folders Managing Permissions on Mailbox Folders for Multiple Users Modifying Mailbox Settings Managing Public Folders Creating Public Folders Deleting Public Folders Modifying Public Folder Settings Using Role Based Access Control Managing User Roles Adding a User Role Modifying User Roles Deleting User Roles Managing Role Groups Adding Role Groups Modifying Role Groups Deleting Role Groups Managing Roles Managing Custom Scopes Creating a Management Scope Editing a Management Scope Deleting Management Scopes Setting Options for Exchange Security Working with Microsoft SharePoint SharePoint Menu Adding SharePoint Farms or Sites Managing SharePoint Farms or Sites Deploying the SharePoint Web Service Deploying the SharePoint Web Service Manually Viewing SharePoint Permissions Previewing SharePoint Objects Granting SharePoint Permissions Revoking SharePoint Permissions Cloning SharePoint Permissions Selecting Groups or Users Manually Importing Groups and Users from a File Managing SharePoint Groups Repairing Limited Access Permissions

11 Security Explorer 9.1 User Guide Explorer 8 Installation Guide xi Removing Permissions for Deleted Accounts Removing Permissions for Disabled Accounts Removing Accounts from SharePoint Groups Searching for SharePoint Objects Setting SharePoint Security Search Criteria Modifying SharePoint Permissions Modifying SharePoint Permissions Levels Modifying SharePoint Properties Backing Up and Restoring SharePoint Security Exporting SharePoint Permissions Deleting Export Tasks Setting SharePoint Options Removing the SharePoint Web Service Removing the SharePoint Web Service Manually Working with Quest Access Manager Adding Access Manager Servers Viewing Access Manager Objects Viewing Groups and Users Viewing Computers Viewing Resource Groups Viewing Permissions Searching Access Manager Servers Running the Access Manager Permission Wizard Changing All Permissions Cloning All Permissions Deleting All Permissions Exporting All Permissions Backing Up Permissions Setting Options for Access Manager Customizing Security Explorer Setting General Options Setting View Options Setting Alternate Credentials for Services and Tasks Setting Advanced Options Controlling Access to Security Explorer

12 Security Explorer 9.1 User Guide Explorer 8 Installation Guide xii Using the Command Line Using PowerShell Cmdlets Creating or Editing the PowerShell.exe.config File Installing PowerShell Cmdlets Installing PowerShell Cmdlets Manually Removing PowerShell Plugins Opening a Command Prompt Window SxpBackup.exe SxpClone.exe SxpExport.exe SxpGrant.exe SxpHomeDir.Exe SxpInheritance.exe SxpOwner.exe SxpRestore.exe SxpRevoke.exe Troubleshooting Repairing Inheritance Creating Test Folders and Files Using Log Files SharePoint Web Service Removal Fails Uninstalling Security Explorer Index

13 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 1 Getting Started with Security Explorer Security Explorer has a robust interface that adapts to the explorer module you select so you are able to focus on the task at hand. In this chapter you will find information about the overall user interface, such as menus, icons, and adjusting the display. Starting Security Explorer Click Start, point to All Programs Quest Software Security Explorer 9, and then choose Security Explorer 9. Examining the Tasks Tab The Navigation pane has five tabs. Tab Tasks Browse Reports Search Status Description Display the Home Page for the selected module. You can browse the tree and select tasks from the Home Page, Tool Bar, or Menu Bar. Display the Browse tab where you can view the Navigation tree. When displaying All Management Targets, the Reports tab lists reports available for all modules. You also can select a specific module and select reports from shortcut menus. Create search criteria to locate specific permissions. Becomes available when a module is selected. See Using the Browse Tab to Search. Display status of current processes. The information is also available on the status bar, which is hidden by default. See Showing/Hiding the Status Bar. Selecting Modules Security Explorer is organized around modules: NTFS Security, Share Security, Registry Security, Printer Security, Service Security, Task Management, Group and User Management, SharePoint Security, SQL Server Security, and Exchange Security. For example, click the Share Security button to manage share permissions or click the Printer Security button to manage printer permissions. By default, All Management Targets is selected. To change to a different module, click the corresponding button. Module Icon Module Button Module Icon Module Button All Management Targets NTFS Security Share Security Registry Security Printer Security Task Management Group and User Management SharePoint Security SQL Server Security Exchange Security Service Security

14 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 2 Menus Note: Menu options vary depending on the selected module. File Menu Menu Option Print Exit Description Print the selected object s permissions. Close Security Explorer. View Menu Menu Option Reload Current Path Reload Current Path (No Progress) Refresh Permissions Only Reset All Standard Mode Interface Classic Mode Interface Basic Mode Interface Tasks Tab Tool Bar Small Tool Bar Status Bar Control Buttons Bar Control Pane Loading Progress Bar Progress when Loading Stop Button when Loading Active Directory Tree Node Enterprise Scope Tree Node Filters Folder Sizes Refresh Folder Sizes Reset View to Defaults Description Reload the path displayed in the Path box and show its progress. Reload the path displayed in the Path box without showing progress. Reload permissions for the selected object. Remove all selected objects and permissions from the display. Set view to Standard Mode. Set view to Classic Mode. Set view to Basic Mode. Hide or show the Tasks tab. Hide or show the Tool Bar. Hide or show the small Tool Bar. Hide or show the Status Bar. Hide or show the Control Buttons bar. Hide or show the Control Pane. Hide or show the Loading Progress Bar. Hide or show the progress when loading permissions. Hide or show a Stop button when loading permissions. Add Active Directory to the tree in the Navigation pane. Add Enterprise Scope to the tree in the Navigation pane. All Management Targets only. Hide or show the Filters pane. NTFS module only. Display folder sizes in Permissions pane. NTFS module only. Reload folder sizes. Return the main window to the default settings.

15 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 3 Security Menu Menu Option Grant Permissions Revoke Permissions Clone Group or User Set Ownership Logon Accounts Copy to Subfolders and Files Repair Inheritance Reduce to Read Only Permission Levels SharePoint Groups Repair Limed Access Permissions Remove Permissions for Deleted Accounts Delete Permission Modify Permission Copy Permission Paste Permission Select All Permissions Backup Security Restore Security Backup Scheduler Export Export Scheduler Permission Templates Description Grant permissions to the selected object. Revoke permissions from the selected object. Clone the permissions of the selected object. NTFS module only. Set the owner of the selected object[s]. Service Security module only. Set the logon account for the selected service. Copy permissions from a parent folder to its subfolders and files. Permissions on the parent folder do not change. NTFS module only. Restore inheritance to the selected folder. NTFS module only. Reduce permissions on the selected object to Read Only. SharePoint module only. Edit permission levels for a selected SharePoint object. SharePoint module only. Manage groups for SharePoint objects. SharePoint module only. Remove orphaned Limited Access permissions that remain after an account is deleted. SharePoint module only. Remove all permissions associated with deleted Active Directory accounts on a SharePoint site. Delete permissions of the selected object[s]. Change the permissions of the selected object. Copy the selected permission[s] to clipboard. Paste permissions from clipboard. Select all permissions in the active pane. Back up permissions to a file. Restore permissions from a file. Add, edit, or delete backup tasks. Export permissions to a file. NTFS and SharePoint modules only. Add, edit, or delete export tasks. NTFS module only. Create permission templates. Note: The Task Management and Group and User Management modules do not have a Security menu, so the items that you would normally find on the Security menu are found on a shortcut menu. Search Menu Menu Option Add Search Scope Start Search New Search Window (Empty) Save Search Description Add search criteria. Start the search. Start a search in a separate window. Save the search criteria.

16 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 4 Tools Menu Menu Option New Folder Delete Folder or File New Registry Key Delete Registry Key New Delete Remove Show Open Files Open File Edit File Set Account Information Start Stop Pause Restart Open with Windows Explorer Command Prompt Here Display Group Contents Display Memberships SQL Server Security Settings SQL Network Settings Change Password Properties Active Directory Properties Find Share Path Create Share Remove Share Map Network Drive Disconnect Network Drive Manage Computer Favorites Manage Exchange Favorites Manage Favorites Add to Favorites Manage Enterprise Scope Add to Enterprise Scope Access Manager Permission Wizard Access Manager Configuration Options Description NTFS module only. Create a new folder. NTFS module only. Delete the selected folder or file. Registry module only. Create a new Registry key. Registry module only. Delete the selected Registry key. Create a new group, user, SQL Server object, or Exchange Server object. Delete the selected group, user, SQL Server object or Exchange Server object. Delete the selected service or task. NTFS module only. View list of files that are open. NTFS module only. Open a file in its associated application. NTFS module only. Open a file in its associated application for editing. Task module only. Set the account to run the selected task. Service module only. Start a selected service. Service module only. Stop a selected service. Service module only. Pause a selected service. Service module only. Restart a selected service. Open Windows Explorer to the selected folder, file, or share. NTFS module only. Open a DOS window. Display the members of a selected group. Display the groups of which the selected user is a member. SQL Server module only. View and modify SQL Server Security Settings. SQL Server module only. View and modify SQL Network Settings. Group and User module only. Set the password of the selected user or generate a random password. Open the Properties window for the selected object. Group and User module only. Open the Active Directory Properties window for the selected group or user. Share module only. Go to the selected share in the NTFS module. Share module only. Create a new share. Share module only. Remove selected shares. NTFS and Share modules only. Map a selected network drive. NTFS and Share modules only. Disconnect a selected network drive. Opens the Manage Computer Favorites window. Exchange module only. Opens the Manage Exchange Favorites window. Open the Manage Favorites window. Add the selected object[s] to list of favorites. Open the Manage Enterprise Scope window. Add selected object[s] to Enterprise Scope. Make enterprise-wide changes to Access Manager objects Set up the Access Manager feature by configuring the Managed Server and adding Managed Hosts. Customize Security Explorer.

17 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 5 Help Menu Menu Option Security Explorer on the Web Technical Support Customer Feedback Help Improve Security Explorer Create Test Folders and Files Help Check for Updates About Security Explorer Description Go to the Quest Web site. Go to the Quest Technical Support page. Go to the Quest Product Feedback Page. Participate in a program to improve the next version of Security Explorer. NTFS module only. Create a directory structure of files and folders for evaluation. Access online help. By default, Security Explorer checks for updates during start up. You can disable the automatic check or you can initiate a check for updates manually. View information about the version of Security Explorer installed on your computer or view the End User License Agreement. Tool Bar The most common operations performed in Security Explorer can be accessed through the Tool Bar. Some Tool Bar buttons are unavailable depending on which module is selected. Operations on the Tool Bar are available also on the menus, the Control Pane, and the Control Buttons. Note: You can show or hide the Tool Bar, Control Pane, and Control Buttons through the View menu. By default, the icons on the Tool Bar are large and few display. To view a full Tool Bar, choose View Small Tool Bar. See View Menu. Tool Bar Description Grant permissions. Revoke permissions. Clone a group or user. Set Ownership. NTFS module only. Set passwords for logon accounts. Service module only. Add new group or user. Group and User module only. Copy to subfolders and files. NTFS module only. Repair inheritance. Reduce permission to read-only. Repair limited access permissions on selected SharePoint sites. Repair limited access permissions on selected SharePoint sites. Start a search in a separate window. Start selected service. Service module only. Run selected task. Task module only. Stop selected service. Service module only.

18 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 6 Tool Bar Description Pause selected service. Service module only. Restart selected service. Service module only. Modify the selected permissions. Delete the selected permissions. Copy the selected permissions. Pastes copied permissions. Back up permissions to a file. Restore permissions from a backup file. Schedule a backup. Export file and directory permissions to a file. Schedule Export tasks. Open the selected folder in Windows Explorer. Open a command prompt window. Open the Properties window. Create a new share. Remove selected shares Map a network drive. Disconnect a network drive. SQL View and modify SQL Server Security Settings. SQL module only. View and modify SQL Network Settings. SQL module only. Open the Manage Favorites window. Add the selected object to Favorites. Open the Manage Enterprise Scope window. Add new Enterprise Scope. Reload the path displayed in the Path box and show its progress. Reset all. Display SharePoint site in a web browser. SharePoint module only. Open online help.

19 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 7 Choosing an Interface There are three interface modes that you can select from on the View menu: Standard Mode, Classic Mode, and Basic Mode. You also can choose the individual elements to create your own unique interface. No matter which view or options you choose, the same view is restored each time you start Security Explorer. To reset the options to the default, choose View Reset View to Defaults. Interface Type Standard Mode Interface Classic Mode Interface Basic Mode Interface Reset View to Defaults View Menu Selections Task Tabs, Tool Bar, Small Tool Bar, Status Bar, Control Buttons Bar, and Control Pane Tool Bar, Small Tool Bar, Status Bar, and Control Buttons Bar None Tasks Tab, Tool Bar, and Control Pane Examining the Browse Tab The Browse tab provides greater detail when managing permissions. Some options on the Tasks tab automatically open the Browse tab. The Browse tab is organized into three panes where you can select and view information. The Navigation pane contains the tree for the selected module. You can browse the tree and select an object to display in the Objects pane. You can select objects from the local computer, or browse the Network Neighborhood or Active Directory. You can also group objects into Favorites or Enterprise Scopes. See Managing Favorites and Managing Enterprise Scopes. The Objects pane displays the folders, files, and objects for the selected item in the Navigation pane. You also can type a path in the Path box to view the contents of a folder, or the services and tasks on a computer. The Permissions pane displays the permissions for the selected object. The Task Management module does not have a Permissions pane. Other components of the main window are optional and can be hidden from view. The Menu Bar, Tool Bar, and Control Pane provide options and icons to perform functions in Security Explorer. The Loading Progress Bar displays the progress of loading permissions and allows you to stop the load if necessary.

20 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 8 Using the Objects Pane The Objects pane displays the contents of the item selected in the Navigation pane. The path to the object displays in the Path box. If the path is longer than the length of the box, click to scroll the path or hover the cursor to view the path. Note: If you see in the tree in the Navigation pane, the item was loaded from the cache, which is also indicated by CACHE in the status bar. You can disable the cache indicator by clearing the View indicator when items loaded from cache check box on the Tools Options Advanced tab. See Setting Advanced Options. Button Description Go up one level in the tree displayed in the Navigation pane. Go Set Reset Show All Go to the path displayed in the Path box. Use when you type a path in the box. SharePoint Security module only. Add the URL displayed in the Path box to the Favorites list. Set the root node in the Navigation pane based on the path or URL displayed in the Path box. Reset the path to the default selection. NTFS Security module only. You can filter the list to show only folders or file, show both folders and files, or show no folders or files. Setting the Path To help you quickly find an item in the Navigation pane, you can set a path to set a new root node. Type a path or URL in the Path box, or select a path in the Navigation pane, and then click Set. The root node in the Navigation pane is set to the new path or URL. The new root node is in effect until you click Reset or restart Security Explorer. The setting does not transfer to other modules. Using the Permissions Pane The Permissions pane displays the permissions for the object selected in the Objects pane. You can modify permissions of the parent object. If the permissions are inherited and cannot be changed, the list is gray. The Object box displays the object selected in the Objects pane. The Owner box displays the owner account name and SID. Allow inheritable permissions from parent to propagate to this object. Select to propagate permissions to the selected object from the parent. If you select this check box, a warning box displays the selected object and its parent along with the parent s permissions so you can decide whether or not to continue. Inherited permissions display in gray and cannot be changed. Show Permissions By default, permissions display when an object is selected. To save time while you browse the network, you can clear this check box. Sorting Permissions To sort a column, click on the column heading. The arrow in the heading indicates the direction of the sort. Click again to change the sort direction.

21 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 9 Customizing the View Showing/Hiding Module Buttons You can hide module buttons to increase the area for navigating the trees in the various tabs. To hide buttons, drag the split bar down. You also can click, and then select Show Fewer Buttons. To show buttons, drag the split bar up. You also can click, and then select Show More Buttons. To access a button that does not show on the icon bar, click, and then select the module. Note: By default, unlicensed modules display in the Navigation pane. To hide unlicensed module buttons, uncheck View Unlicensed Modules. Showing/Hiding Modules You can hide unused modules that display in the tree to increase the area available for navigation on the Tasks and Browse tabs. The modules buttons remain even if you filter the module. 1. Click All Management Targets. 2. Open either the Tasks or Browse tab. 3. Choose View Filters. 4. Point to Filters to view the filter selections. You can choose All, None, or select specific modules to display. To keep the filter list on the screen, click. To hide the filter list, click. Adjusting the View To rearrange the view, size panes by dragging the vertical and horizontal split bars. Note: The position of the horizontal split bar between the Objects and Permissions panes is saved on each individual module window. To return the display to the original configuration, choose View Reset to Defaults. Showing/Hiding the Tool Bar To show the large icon Tool Bar, choose View Tool Bar. To show the small icon Tool Bar, choose View Tool Bar and Small Tool Bar.

22 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 10 Showing/Hiding the Status Bar The Status Bar displays along the bottom of the Security Explorer window. The right-side of the Status Bar displays the number of selected objects and permissions. CACHED indicates that the information displayed was loaded from the cache. To reload the information, click or Reload, press F5 or Alt+F5, or choose View Reload Current Path or View Reload Current Path (No Progress). On the Browse tab, you also can choose Reload Current Path from the shortcut menu. To show or hide the Status bar, choose View Status Bar. To disable or enable the CACHE feature, choose Tools Options Advanced tab. See Setting Advanced Options. Showing/Hiding the Control Pane and Buttons Bar You can show or hide the Control Pane and the Control Buttons Bar from the View menu. Showing/Hiding the Loading Progress Bar The Loading Progress Bar displays the progress when loading large folders or containers, such as registry keys or computers. You can click Stop to stop the load, except when Security Explorer is locating computers. Once the load is complete, click Reload to reload objects and permissions. Note: You can show or hide the Loading Progress Bar from the View menu. If you experience slower than expected browsing, you also can show or hide the Stop button and the progress display. Completing a Process With most Security Explorer processes, a progress dialog displays. Display progress (un-checking this option will speed-up processing) Select to display the progress in real time. Clear the check box to stop the display. Close this dialog when processing completes. Select to close the box when the processing is complete. To always close this box, see Setting General Options. When the process is complete, the number of objects processed and elapsed time displays. The Errors area displays any errors that occur during the process. Note: If any errors occur during processing, you can click Save Error Log to save the displayed errors (path and description) to a text (.txt) file.

23 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 11 Managing Permissions To help you manage security, Security Explorer is organized into modules, which organize the permissions that are available to manage. First, click the module button that matches the permissions you want to manage. For ease of use, each module functions similarly, although menu choices and buttons may vary from module to module. Note: This chapter covers managing permissions. While the permissions vary from module to module, the process is basically the same, so several modules are covered in this chapter. Other functions in Security Explorer, including the Task Management and Group and User Management modules, are covered in the Managing Security and Managing Objects chapters. Viewing Permissions Note: The View Permissions task opens the Browse tab. 1. Open the module that reflects the permissions you want to view, and then open the Browse tab. 2. Select an item in the Navigation pane. The location displays in the Path box. The top right Objects pane displays objects along with the extended information. The bottom right Permissions pane displays permissions for the selected object. The Owner box displays the user or group that owns the selected object. Alternatively, type a path, in either drive letter notation or UNC pathname format, in the Path box, and then click Go. Note: SharePoint Security module only. To add a URL to the Favorites list, type the URL in the Path box, and then click Go. Note: You may see a message box if the item you chose contains a large number of sub items. You can choose to show or hide the progress display. Note: If loading is taking too long, you can click Stop. You can show or hide Stop and the loading progress on the View menu. See View Menu. In the Permissions pane, icons next to each account name indicate the type of user or group. Icon Group/User Users (all types) Local groups (including domain local groups) Domain users (indicator visible only if enabled on the Security Explorer Options View tab) See Setting View Options. Domain groups (indicator visible only if enabled on the Security Explorer Options View tab) See Setting View Options. Well known groups Disabled Users (indicator visible only if enabled on the Security Explorer Options View tab) See Setting View Options. Disabled Domain Users (indicator visible only if enabled on the Security Explorer Options View tab) See Setting View Options.

24 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 12 Allow inheritable permissions from parent to propagate to this object Select to propagate permissions to the selected object from the parent. If you select the Allow inheritable permissions from parent to propagate to this object check box, a warning box displays the selected object and its parent along with the parent s permissions so you can decide whether or not to continue. Include protected objects (objects with Inherit Permissions from Parent disabled) Select to inherit permissions to protected objects. The displayed permissions are inherited to protected objects once you click Yes. If you clear the Allow inheritable permissions from parent to propagate to this object check box, a warning box displays the choices you have for preventing propagation of permissions from the parent. To copy the inherited permissions to the object, click Copy. To remove the inherited permissions, click Remove. Show permissions Select to display permissions (default) for a selected object. Clear the check box to prevent the display of permissions in all windows and dialog boxes. This setting reverts to the default each time you open Security Explorer. Show Cluster File Shares Share Security module only. Select to view cluster file shares when browsing a computer that is a member of a cluster. Cluster file shares display in bold. If selected when the computer is not a member of a cluster, a message displays. Note: If the Auto-detect computers which are members of a cluster check box is selected on Tools Options Advanced tab, the check box is selected automatically for computers that are members of a cluster. For computers not members of a cluster, the Show Cluster File Shares check box is disabled even if the Auto-detect computers which are members of a cluster check box is selected. See Setting Advanced Options. Granting Permissions You can grant permissions to users and groups without affecting any other user's permissions. First, choose the permissions to grant, and then select a user or group. You can grant different permissions for several users and groups with one operation. The type of permission granted depends on the selected module. For example, if you want to grant permissions for a printer, open the Printer Security module. Using the Grant Task The Grant task provides a quick way to grant permissions. For more options, add at least one path, and then click Switch to Security Explorer Classic (Advanced). See Using the Browse Tab to Grant Permissions. 1. Open the Tasks tab, open the module for the type of permission you want to grant, and then click Grant. Include protected objects (objects with Inherit Permissions from Parent disabled Select to include objects that do not inherit permissions from the parent object. When you view the permission of the object, the Allow inheritable permissions from parent to propagate to this object check box is not selected. See Viewing Permissions. 2. Click Add to select paths.

25 Security Explorer 9.1 User Guide Explorer 8 Installation Guide Click Add to select permissions. 4. Click OK. The Granting Permissions box displays the progress. See Completing a Process. Using the Browse Tab to Grant Permissions 1. Open the module for the type of permission you want to grant, and then open the Browse tab. 2. Select an item in the Navigation pane. Alternatively, type a path in the Path box, and then click. 3. Select an object in the Objects pane or a permission in the Permissions pane, and then click or Grant. Alternatively, choose Grant Permissions from the Security menu or the Control Pane, or right-click the object or permission, and then choose Grant Permissions from the shortcut menu. The Grant Folder Permissions dialog box displays the path, and the associated groups and users for the current object. 4. Select the groups and users to apply the permission. There are a variety of ways to select groups and users. To select a group or user, you can choose from the Groups and Users list in the left pane, or from the list in the right pane. The selected group or user displays in the Group/User box and the currently applied permission displays in the Permission box. Time Saver: If you want to apply the same permission to several groups and users, select the permission settings first, and then double-click the groups and users in the left pane. The groups and users are added to the List of users and groups to grant list with the selected permission settings. Note: During loading the Reload button becomes a Stop button. If loading is taking too long, you can click Stop. You can show or hide the Stop button on the View menu. To filter the list in the left pane, type a server name or base path in the box, and then click Set. To return the full list to view, click Reset. The list returns to full view the next time you open Grant Permissions. To change to another domain or to the local computer, select the domain or the local computer from the List Names From list. To display users in the list, click Show Users. To return the list to show only groups, click Refresh. To select a group/user who is not displayed, type a name or click Advanced User Selection. 5. From the Permission list, select the permissions to grant. Note: If you select Special, a Permission tab specific to the module opens. You also can open the tab by clicking Advanced Permission Selection. The Permission tab displays the permissions based on the selection in the Permission list. If you make any changes, the Permission type changes to Special with the selected permissions in parenthesis. Note: NTFS module only. Selecting the List Folder Contents permission grants a Read and Execute permission, but excludes files. The scope for Read and Execute includes files; the scope for List Folder Contents excludes files. 6. Windows Server 2012 or Windows 8 only. In the Conditions box, you can type a condition expression or click Condition Selection to build an expression. 7. From the Applies To list, select how to apply the permissions.

26 Security Explorer 9.1 User Guide Explorer 8 Installation Guide From the Action list, select whether to replace or add to the group/user s current permissions. 9. To add the group/user to the List of users and groups to grant list, click Add. The selection is added to the list. Note: To add a selected group or user automatically to the List of users and groups to grant list with the selected permission settings, you can hold down CTRL or SHIFT, and then click a group or user in the top pane; or double-click a group or user in the left pane. Overwrite ALL permissions with the groups and users listed below (use with caution) Select to overwrite the permissions on the selected folders, subfolders, and/or files with the specified permissions. Include protected objects (objects with Inherit Permissions from Parent disabled) Select to grant permissions on protected objects. Note: Only users and groups in the List of users and groups to grant list are affected by the grant action. You can sort each column by clicking the column heading. To remove a selected user or group from the list, click Remove. 10. Click OK. The Granting Permissions box displays the progress. See Completing a Process. Revoking Permissions You can revoke access for users and groups. The type of permission revoked depends on the selected module. For example, if you want to revoke permissions for a printer, open the Printer Security module. Using the Revoke Tasks The Revoke basic task provides a quick way to revoke permissions. For more options, add at least one path, and then click Switch to Security Explorer Classic (Advanced). See Using the Browse Tab to Revoke Permissions. You also can use the Revoke All, Revoke Unknown, Revoke Disabled, and Revoke SID History advanced tasks to easily revoke permissions for those specific situations. 1. Open the Tasks tab, open the module for the type of permission you want to revoke, and then click Revoke. Include protected objects (objects with Inherit Permissions from Parent disabled Select to include objects that do not inherit permissions from the parent object. When you view the permission of the object, the Allow inheritable permissions from parent to propagate to this object check box is not selected. See Viewing Permissions. 2. Click Add to select paths. 3. Click Add to select permissions. 4. Click OK. See Completing a Process.

27 Security Explorer 9.1 User Guide Explorer 8 Installation Guide 15 Using the Browse Tab to Revoke Permissions 1. Open the module for the type of permission you want to revoke, and then open the Browse tab, if necessary. 2. Select an item in the Navigation pane, or type a path in the Path box, and then click Go. 3. Select an object in the Objects pane or a permission in the Permissions pane, and then click or Revoke. Alternatively, choose Revoke Permissions from the Security menu or Control Pane, or right-click the object, and then choose Revoke Permissions from the shortcut menu. 4. Select the groups and users to revoke the permission. There are a variety of ways to select groups and users. To select a group or user, you can choose from the Groups and Users list in the left pane, or from the list in the right pane. The selected group or user displays in the Group/User box. Time Saver: If you want to revoke the same permission from several groups and users, select the permission settings first, and then double-click the groups and users in the left pane. The groups and users are added to the List of users and groups to revoke list with the selected permission settings. Note: During loading the Reload button becomes a Stop button. If loading is taking too long, you can click Stop. You can show or hide the Stop button on the View menu. To filter the list in the left pane, you can type a server name or base path in the box, and then click Set. To return the full list to view, click Reset. The list returns to full view the next time you open Revoke Permissions. To change to another domain or to the local computer, select the domain or the local computer from the List Names From list. To change to another domain, select the domain from the List Names From list. To display users in the list, click Show Users. To return the list to show only groups, click Refresh. To add multiple users or groups, click. You can type names or paste names from a text file. You also can click Advanced User Selection to pick groups and users from a list. To select a group/user that is not displayed, type a name or click Advanced User Selection. 5. From the Permission list, select the permissions to revoke, and whether or not to Allow or Deny. If the choice is not available in the list, click Advanced Permission Selection to create a custom choice. Revoke all permissions (Allow and Deny) for the selected user Not available in the Task Management and Groups and Users Select to revoke all permissions (Allow and Deny) for the selected user. Include SID history search when adding permissions for revoking Select to invoke a SID history search when you click Add to add the selected group/user to the List of users and groups to revoke list. Since there may be more than one SID associated with the selected account, selecting this check box adds all existing SIDs to the List of users and groups to revoke list so that all existing permissions are revoked. Note: You also can use the Revoke SID History advanced task to easily revoke permissions.

28 Security Explorer 9.1 User Guide Explorer 8 Installation Guide To add the group/user to the List of users and groups to revoke list, click Add. Note: If you double-click a group or user in the left pane, it is added automatically to the List of users and groups to revoke list with the selected permission settings To remove a selected user or group from the list, click Remove. Advanced Revoke Options If you select this check box, a warning message displays and the Revoke Folder Permissions dialog box becomes inactive, so the other users/groups and permissions you selected are not included in this action. To continue, click Yes. To activate the Revoke Folder Permissions dialog box, clear the Advanced Revoke Options check box. Revoke all unknown and deleted accounts Active only when the Advanced Revoke Options check box is selected. Select to revoke permissions on unknown or deleted accounts. Note: You also can use the Revoke Unknown advanced task to easily revoke permissions on unknown. Revoke all disabled accounts Active only when the Advanced Revoke Options check box is selected. Select to revoke permissions on all disabled accounts. Note: You also can use the Revoke Disabled advanced task to easily revoke permissions on disabled accounts. Log Actions Active only when the Advanced Revoke Options check box is selected. Select to create a log file. Click to name the file. Include protected objects (objects with Inherit Permissions from Parent disabled) Select to revoke permissions on protected objects. 7. Click OK. The Revoking Permissions box displays the progress. See Completing a Process.

Quest ChangeAuditor 5.1 FOR LDAP. User Guide

Quest ChangeAuditor 5.1 FOR LDAP. User Guide Quest ChangeAuditor FOR LDAP 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this

More information

LiteSpeed for SQL Server 6.1. Configure Log Shipping

LiteSpeed for SQL Server 6.1. Configure Log Shipping LiteSpeed for SQL Server 6.1 Configure Log Shipping 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Management Console for SharePoint

Management Console for SharePoint Management Console for SharePoint User Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described

More information

ChangeAuditor 5.6. For NetApp User Guide

ChangeAuditor 5.6. For NetApp User Guide ChangeAuditor 5.6 For NetApp User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE 1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

8.2. Quick Start Guide

8.2. Quick Start Guide 8.2 Quick Start Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Quest NetVault Backup Plug-in for SnapMirror To Tape. User s Guide. version 7.6. Version: Product Number: NTG EN-01 NTG

Quest NetVault Backup Plug-in for SnapMirror To Tape. User s Guide. version 7.6. Version: Product Number: NTG EN-01 NTG Quest NetVault Backup Plug-in for SnapMirror To Tape version 7.6 User s Guide Version: Product Number: NTG-101-7.6-EN-01 NTG-101-7.6-EN-01 09/30/11 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide

More information

Quest Collaboration Services 3.6. Installation Guide

Quest Collaboration Services 3.6. Installation Guide Quest Collaboration Services 3.6 Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

One Identity Active Roles 7.2

One Identity Active Roles 7.2 One Identity December 2017 This document provides information about the Active Roles Add_on Manager7.2. About Active Roles Add_on Manager New features Known issues System requirements Getting started with

More information

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

One Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide

One Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide One Identity Adapter 6.0 Administrator Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Rapid Recovery License Portal Version User Guide

Rapid Recovery License Portal Version User Guide Rapid Recovery License Portal Version 6.1.0 User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quest Migration Manager Upgrade Guide

Quest Migration Manager Upgrade Guide Quest Migration Manager 8.14 Upgrade Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Change Auditor 6.5. Event Reference Guide

Dell Change Auditor 6.5. Event Reference Guide Dell Change Auditor 6.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate

More information

6.7. Web Interface. User Guide

6.7. Web Interface. User Guide 6.7 Web Interface User Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a

More information

voptimizer Pro Version What s New

voptimizer Pro Version What s New voptimizer Pro Version 3.1.1 What s New 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Toad Data Point - Professional Edition. The Toad Data Point Professional edition includes the following new features and enhancements.

Toad Data Point - Professional Edition. The Toad Data Point Professional edition includes the following new features and enhancements. Toad Data Point Version 3.4 New in This Release November 08, 2013 Contents Toad Data Point - Professional Edition Toad Data Point - Base and Professional Editions Idea Pond Toad Data Point - Professional

More information

Knowledge Portal 2.6. Installation and Configuration Guide

Knowledge Portal 2.6. Installation and Configuration Guide Knowledge Portal 2.6 Installation and Configuration Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

ChangeAuditor 5.6. What s New

ChangeAuditor 5.6. What s New ChangeAuditor 5.6 What s New 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a

More information

4.0. Resynchronizing Public Folders, Mailboxes, and Calendars

4.0. Resynchronizing Public Folders, Mailboxes, and Calendars 4.0 Resynchronizing Public Folders, Mailboxes, and Calendars Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Quest Recovery Manager for Active Directory 9.0. Quick Start Guide

Quest Recovery Manager for Active Directory 9.0. Quick Start Guide Quest Recovery Manager for Active Directory 9.0 Quick Start Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Spotlight on SQL Server Enterprise Spotlight Management Pack for SCOM

Spotlight on SQL Server Enterprise Spotlight Management Pack for SCOM Spotlight on SQL Server Enterprise 11.7.1 Spotlight Management Pack for SCOM Copyright 2016 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Quest NetVault Backup Plug-in for NDMP. Application Notes for Dell FluidFS NAS Appliances. NCG x-EN-01 03/20/13

Quest NetVault Backup Plug-in for NDMP. Application Notes for Dell FluidFS NAS Appliances. NCG x-EN-01 03/20/13 Quest NetVault Backup Plug-in for NDMP Application Notes for Dell FluidFS NAS Appliances NCG-120-2.x-EN-01 03/20/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information

More information

Dell Statistica. Statistica Enterprise Server Installation Instructions

Dell Statistica. Statistica Enterprise Server Installation Instructions Dell Statistica Statistica Enterprise Server Installation Instructions 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Quest Knowledge Portal 2.9

Quest Knowledge Portal 2.9 Quest May 2017 These release notes provide information about the Quest Knowledge Portal release. Topics: About this release New features Known issues System requirements Product licensing Upgrade and installation

More information

One Identity Password Manager User Guide

One Identity Password Manager User Guide One Identity Password Manager 5.8.2 User Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

One Identity Active Roles Diagnostic Tools 1.2.0

One Identity Active Roles Diagnostic Tools 1.2.0 1 One Identity Active Roles Diagnostic Tools 1.2.0 Release Notes October 2017 These release notes provide information about the One Identity Active Roles Diagnostic Tools release. About One Identity Active

More information

One Identity Active Roles 7.2. Web Interface User Guide

One Identity Active Roles 7.2. Web Interface User Guide One Identity Active Roles 7.2 Web Interface User Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate

More information

Quest Recovery Manager for Active Directory Forest Edition 9.0. Quick Start Guide

Quest Recovery Manager for Active Directory Forest Edition 9.0. Quick Start Guide Quest Recovery Manager for Active Directory Forest Edition 9.0 Quick Start Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The

More information

Metalogix ControlPoint 7.6. for Office 365 Installation Guide

Metalogix ControlPoint 7.6. for Office 365 Installation Guide Metalogix 7.6 for Office 365 Installation Guide 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is

More information

Dell Change Auditor for SharePoint 6.5. User Guide

Dell Change Auditor for SharePoint 6.5. User Guide Dell Change Auditor for SharePoint 6.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a

More information

Quest Access Manager 1.6. Quick Start Guide

Quest Access Manager 1.6. Quick Start Guide Quest Access Manager 1.6 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide One Identity Starling Two-Factor Desktop Login 1.0 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Quest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2013 Migration

Quest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2013 Migration Quest Migration Manager for Exchange 8.14 Granular Account s for 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

One Identity Active Roles 7.2. User's Guide

One Identity Active Roles 7.2. User's Guide One Identity Active Roles 7.2 User's Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2010 Migration

Quest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2010 Migration Quest Migration Manager for Exchange 8.14 Granular Account s for 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Metalogix Intelligent Migration. Installation Guide

Metalogix Intelligent Migration. Installation Guide Metalogix Intelligent Migration Installation Guide 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

One Identity Manager User Guide for One Identity Manager Tools User Interface and Default Functions

One Identity Manager User Guide for One Identity Manager Tools User Interface and Default Functions One Identity Manager 8.0.1 User Guide for One Identity Manager Tools User Interface and Default Functions Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information

More information

One Identity Active Roles 7.2. Replication: Best Practices and Troubleshooting Guide

One Identity Active Roles 7.2. Replication: Best Practices and Troubleshooting Guide One Identity Active Roles 7.2 Replication: Best Practices and Troubleshooting Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The

More information

Spotlight Management Pack for SCOM. User Guide

Spotlight Management Pack for SCOM. User Guide Spotlight Management Pack for SCOM 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Quest Migration Manager for Exchange Resource Kit User Guide

Quest Migration Manager for Exchange Resource Kit User Guide Quest Migration Manager for Exchange 8.14 Resource Kit User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Secure Mobile Access Connect Tunnel Service User Guide

Dell Secure Mobile Access Connect Tunnel Service User Guide Dell Secure Mobile Access 11.4 Connect Tunnel Service 2016 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Toad Intelligence Central 3.3 New in This Release

Toad Intelligence Central 3.3 New in This Release Toad Intelligence Central 3.3 New in This Release Tuesday, March 28, 2017 This release of Toad Intelligence Central includes the following new features and enhancements. Toad Data Point Enter Variable

More information

One Identity Active Roles 7.2. Configuration Transfer Wizard Administrator Guide

One Identity Active Roles 7.2. Configuration Transfer Wizard Administrator Guide One Identity Active Roles 7.2 Configuration Transfer Wizard Administrator Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Setting up the DR Series System on Acronis Backup & Recovery v11.5. Technical White Paper

Setting up the DR Series System on Acronis Backup & Recovery v11.5. Technical White Paper Setting up the DR Series System on Acronis Backup & Recovery v11.5 Technical White Paper Quest Engineering November 2017 2017 Quest Software Inc. ALL RIGHTS RESERVED. THIS WHITE PAPER IS FOR INFORMATIONAL

More information

One Identity Quick Connect for Base Systems 2.4. Administrator Guide

One Identity Quick Connect for Base Systems 2.4. Administrator Guide One Identity Quick Connect for Base Systems 2.4 Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

TOAD TIPS & TRICKS. Written by Jeff Podlasek, Toad DB2 product manager, Quest

TOAD TIPS & TRICKS. Written by Jeff Podlasek, Toad DB2 product manager, Quest TOAD TIPS & TRICKS Written by Jeff Podlasek, Toad DB2 product manager, Quest Abstract Want to get the most from Toad? This technical brief will walk you through some of its most useful features. You ll

More information

One Identity Manager Data Governance Edition 8.0. User Guide

One Identity Manager Data Governance Edition 8.0. User Guide One Identity Manager Data Governance Edition 8.0 User Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

2011 Quest Software, Inc. ALL RIGHTS RESERVED.

2011 Quest Software, Inc. ALL RIGHTS RESERVED. 2.6 User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a software

More information

Copyright Quest Software, Inc All rights reserved. DISCLAIMER TRADEMARKS

Copyright Quest Software, Inc All rights reserved. DISCLAIMER TRADEMARKS 4.0 User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

SQL Optimizer for Oracle Installation Guide

SQL Optimizer for Oracle Installation Guide SQL Optimizer for Oracle 9.2.2 Installation Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

One Identity Active Roles 7.2. Web Interface Administrator Guide

One Identity Active Roles 7.2. Web Interface Administrator Guide One Identity Active Roles 7.2 Web Interface Administrator Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Toad Data Point 3.2. Getting Started Guide

Toad Data Point 3.2. Getting Started Guide Toad Data Point 3.2 Toad Data Point Page 2 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

One Identity Starling Two-Factor Authentication. Administrator Guide

One Identity Starling Two-Factor Authentication. Administrator Guide One Identity Authentication Administrator Guide Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Toad Edge Installation Guide

Toad Edge Installation Guide Toad Edge 1.1.0 Installation Guide Copyright Copyright 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quest One Password Manager

Quest One Password Manager Quest One Password Manager Version 5.5 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

EAM Portal User's Guide

EAM Portal User's Guide EAM Portal 9.0.2 User's Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Metalogix StoragePoint 5.7. Release Notes

Metalogix StoragePoint 5.7. Release Notes Metalogix StoragePoint 5.7 Release Notes 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud Cloud Access Manager 8.1.3 How to Deploy Cloud Access Manager in Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

One Identity Manager Administration Guide for Connecting to SharePoint

One Identity Manager Administration Guide for Connecting to SharePoint One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0 Cloud Access Manager 8.1.3 How to Configure for SSO to SAP Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quest NetVault Backup Plug-in for SnapMirror to Tape

Quest NetVault Backup Plug-in for SnapMirror to Tape Quest NetVault Backup Plug-in for SnapMirror to Tape version 7.6.107 User s Guide Version: Product Number: NTG-101-7.6.107-EN-01 NTG-101-7.6.107-EN-01 12/12/12 2012 Quest Software, Inc. ALL RIGHTS RESERVED.

More information

About One Identity Quick Connect for Base Systems 2.4.0

About One Identity Quick Connect for Base Systems 2.4.0 One Identity Quick Connect for Base Systems 2.4.0 October 2018 These release notes provide information about the One Identity Quick Connect for Base Systems release. About New features Resolved issues

More information

Metalogix ControlPoint 7.6

Metalogix ControlPoint 7.6 Metalogix ControlPoint 7.6 October 2018 These release notes provide information about the latest Metalogix ControlPoint release. New Features Resolved Issues Known Issues About Us New Features Version

More information

Metalogix Essentials for Office Creating a Backup

Metalogix Essentials for Office Creating a Backup Metalogix Essentials for Office 365 2.1 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

One Identity Quick Connect Express

One Identity Quick Connect Express One Identity Quick Connect Express for Active Directory 5.6.0 October 2017 These release notes provide information about the One Identity Quick Connect Express for Active Directory release. About New features

More information

One Identity Active Roles 7.2. Management Pack Technical Description

One Identity Active Roles 7.2. Management Pack Technical Description One Identity Active Roles 7.2 Management Pack Technical Description Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

One Identity Starling Two-Factor Authentication. Administration Guide

One Identity Starling Two-Factor Authentication. Administration Guide One Identity Starling Two-Factor Authentication Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Quest Unified Communications Diagnostics Data Recorder User Guide

Quest Unified Communications Diagnostics Data Recorder User Guide Quest Unified Communications Diagnostics 8.4.1 Data Recorder User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quest vworkspace. What s New. Version 7.5

Quest vworkspace. What s New. Version 7.5 Quest vworkspace What s New Version 7.5 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright. The software described in this

More information

Metalogix ControlPoint 7.6. Advanced Iinstallation Guide

Metalogix ControlPoint 7.6. Advanced Iinstallation Guide Metalogix ControlPoint 7.6 Advanced Iinstallation Guide 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

One Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface

One Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface One Identity Manager 8.0 Administration Guide for Connecting to a Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

One Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory

One Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Toad for Oracle Learn Core Features and Tasks

Toad for Oracle Learn Core Features and Tasks Toad for Oracle 10.5 Learn Core Features and Tasks 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Metalogix StoragePoint 5.7. Advanced Installation Guide

Metalogix StoragePoint 5.7. Advanced Installation Guide Metalogix StoragePoint 5.7 Guide 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

One Identity Manager Target System Synchronization Reference Guide

One Identity Manager Target System Synchronization Reference Guide One Identity Manager 8.0.1 Target System Synchronization Reference Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

One Identity Defender 5.9. Product Overview

One Identity Defender 5.9. Product Overview One Identity 5.9 Product Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Toad DevOps Toolkit 1.0

Toad DevOps Toolkit 1.0 Toad DevOps Toolkit 1.0 Release Notes 9/29/2017 These release notes provide information about the Toad DevOps Toolkit release. About Toad DevOps Toolkit Toad DevOps Toolkit exposes key Toad for Oracle

More information

Quest Code Tester for Oracle 3.1. Installation and Configuration Guide

Quest Code Tester for Oracle 3.1. Installation and Configuration Guide Quest Code Tester for Oracle 3.1 Installation and Configuration Guide Contents Introduction to this Guide 3 Installation and Administration of Code Tester for Oracle 4 System Requirements 5 Test Repository

More information

One Identity Starling Two-Factor HTTP Module 2.1. Administration Guide

One Identity Starling Two-Factor HTTP Module 2.1. Administration Guide One Identity Starling Two-Factor HTTP Module 2.1 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Rapid Recovery DocRetriever for SharePoint User Guide

Rapid Recovery DocRetriever for SharePoint User Guide Rapid Recovery 6.1.3 Table of Contents Introduction to DocRetriever for SharePoint... 6 Using this documentation... 6 About DocRetriever for SharePoint...7 DocRetriever, AppAssure, and Rapid Recovery compatibility...

More information

Quest NetVault Bare Metal Recovery for Quest NetVault Backup Server

Quest NetVault Bare Metal Recovery for Quest NetVault Backup Server Quest NetVault Bare Metal Recovery for Quest NetVault Backup Server version 4.3 User s Guide VOG-103-4.3-EN-01 12/02/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information

More information

Dell Change Auditor for Active Directory 6.5. User Guide

Dell Change Auditor for Active Directory 6.5. User Guide Dell Change Auditor for Active Directory 6.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Quest NetVault Backup Plug-in for NDMP

Quest NetVault Backup Plug-in for NDMP Quest NetVault Backup Plug-in for NDMP Application Notes for NetApp Data ONTAP (7.x 7G and 8.x) NCG-103-7.6.x-EN-02 06/05/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information

One Identity Manager Administration Guide for Connecting to SharePoint Online

One Identity Manager Administration Guide for Connecting to SharePoint Online One Identity Manager 8.0.1 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

One Identity Management Console for Unix 2.5.1

One Identity Management Console for Unix 2.5.1 One Identity Management Console for Unix 2.5.1 October 2017 These release notes provide information about the One Identity Management Console for Unix release. NOTE: This version of the One Identity Management

More information

Quest InTrust Objects Created and Used by InTrust

Quest InTrust Objects Created and Used by InTrust Quest InTrust 11.3 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

One Identity Manager 8.0. IT Shop Administration Guide

One Identity Manager 8.0. IT Shop Administration Guide One Identity Manager 8.0 IT Shop Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Quest Migrator for Notes to Exchange SSDM User Guide

Quest Migrator for Notes to Exchange SSDM User Guide Quest Migrator for Notes to Exchange 4.15.0 SSDM User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

One Identity Manager 8.0. Administration Guide for Connecting Unix-Based Target Systems

One Identity Manager 8.0. Administration Guide for Connecting Unix-Based Target Systems One Identity Manager 8.0 Administration Guide for Connecting Unix- Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell SonicWALL SonicOS 5.9 Upgrade Guide

Dell SonicWALL SonicOS 5.9 Upgrade Guide Dell SonicWALL Upgrade Guide April, 2015 This provides instructions for upgrading your Dell SonicWALL network security appliance to from a previous release. This guide also provides information about importing

More information

KACE GO Mobile App 3.1. Release Notes

KACE GO Mobile App 3.1. Release Notes KACE GO Mobile App 3.1 Release Notes Table of Contents Quest KACE GO 3.1 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance (K1000) administrators...

More information

Quest NetVault Backup

Quest NetVault Backup Quest NetVault Backup version 8.6.x Built-in Plug-ins User s Guide Version: Product Number: NVG-129-8.6.x-EN-01 NVG-129-8.6.x-EN-01 09/30/11 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains

More information

4.0. Quick Start Guide

4.0. Quick Start Guide 4.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information