Quest Security Explorer 9.9

Download Now

Security Explorer® provides an array of security enhancements, including the ability to identify who has rights to resources across the entire organization. You can also grant, revoke, clone, modify and overwrite permissions quickly and from a central location.

Imagine having centralized access control management from a single platform. With Security Explorer®, you can manage access controls, permissions and security in real time across your various Microsoft platforms, including Active Directory (AD), Windows Server, Exchange Server, SharePoint Server and SQL Server — all from a single console.

Features
  • Search Microsoft servers to see who has rights to resources enterprise-wide
  • Manage permissions across Microsoft servers from a central, unified console
  • Back up, baseline and restore security and permissions, all while retaining data integrity
  • Report on who has access to what to streamline security audits

Key Features
Enterprise–wide rights review
Having centralized access control management allows you to instantly see who has access to what in real time across Microsoft servers. Search for explicit or inherited permissions in AD, on file servers, Exchange server, SQL Server and SharePoint. Even search for permissions to services, tasks, users and groups. Security Explorer’s single console eliminates the need to manually search each server for permissions.

Centralized permissions management
Make targeted or bulk changes to servers with the ability to grant, revoke or modify permissions. View and manage group membership settings directly in the access control list for a resource. Overcome access-denied errors by forcing permissions onto protected objects. Security Explorer enables you to lock down permissions faster and easier.

Enterprise Reporter Suite integration
With Security Reporter’s access control management capabilities, you can quickly take remediation action from within the Quest Enterprise Reporter user interface to modify or remove any inappropriate permissions. Enterprise Reporter Suite paired with Security Explorer combines the reporting and remediation capabilities you need to facilitate security and compliance initiatives, enabling you to stay ahead of security vulnerabilities to prevent breaches.

Advanced security and permissions
Back up and restore permissions, without having to restore data, to easily baseline access controls and revert to that baseline at any time. Recover from accidental or malicious changes, and ensure that compliance requirements are enforced.

Complete reporting
The access control management capabilities in Security Reporter allow you export a database or spreadsheet listing the permissions on items anywhere in the directory tree. Filter results to show only permissions that differ from the parent folder when exporting permissions. Perform targeted searches for all locations that a particular group or user has access across the network and export this data to create ad-hoc security reports.

Intuitive access controls
Migrate access controls, and to clean up access post migration. Because Security Explorer can back up and restore security settings to an alternate location, you can be sure that necessary access is in place on the new server(s). This shortens migrations and provides a smooth post-migration user

Screenshots
 

Homepage
OS: Windows 8 / 8.1 / 10 / Server 2012 / 2012 R2 / 2016 / 2019
Language: ENG
Medicine: Activated
Size: 179,31 MB.
Login or register to see spoiler's content

Spoilers are only visible for VIP users.
Reasons for raising the release: Links fixed
Share:

Direct Download

6 comments

hmoobgolian
Hi, links are for EveryLang Pro.  Can you post the correct links for Quest Security?  Thanks.
Dimar0n
Hello! Thank you very much for the alert. I don't know how I made such a mistake… All links have been updated. I apologize.
jfaubin
where is the lic file? i installed and the security explorer is not activated.
Dimar0n
The description of the file indicated that the program was already activated. Show video or screenshots with program activation.