Image

Security Explorer FAQ

Security Explorer

Security Explorer DownloadDownload Security Explorer | Price - orderPrice - order Security Explorer
Security-Explorer

Security-Explorer Download
  • Change and manage Server Security
  • Easy Graphical User Interface
  • Report and Backup ACLs
Security Explorer Pricing

Why do I need Security Explorer?

Security Explorer is a must-have program for any NT/2000 administrator dealing with file permissions. When using Microsoft?s Windows NT/2000 operating system, you will notice a lack of crucial file security capabilities. For example, when administrators add or remove permissions across subdirectories, this affects the permissions of other users. Security Explorer allows you to change the permissions of just the parent directory, the parent and the child directory, or just the child directory. Furthermore, Security Explorer allows you to view and modify permissions on the files without having access to the file. Security Explorer makes finding security holes and filling them a snap!

Modify Permissions on Windows 20000 and NT 4.0 on my Network ?

Yes, Security Explorer 4 will auto-detect the operating system on the target server where you are viewing/modifying permissions. This powerful feature allows you to run Security Explorer 4 on your Windows NT or Windows 2000 desktop to properly modify permissions on remote servers which, are running either Windows NT 4.0 or Windows 2000.

Is Security Explorer 4 safe to use on Windows NT 4.0?

Yes, Security Explorer 4 is completely backwards compatible with Windows NT 4.0

What are these new Windows 2000 "extended permissions" and does Security Explorer support these ?

Microsoft split the six NT 4.0 permissions (RWXDPO) into thirteen permissions. Actually, these 13 permissions have always been there, but Microsoft combined similar permissions to make the 6 generic permissions you see in Windows NT 3.51 and 4.0 ? below you will find a chart mapping the NT4 permissions to the new Windows 2000 permissions.

Windows 2000?s ACL editor forces you to use the extended permissions set, where Security Explorer 4 gives you a more user-friendly option of using either the generic permissions or the extended permissions.

Does Security Explorer allow me to backup and restore permissions?

Yes. In order for an administrator to have a fault tolerant network, he/she must have the ability to backup and restore permissions. Windows NT/2000 does not have this function built in. Security Explorer allows users to back up and save permissions to file, and restore them when necessary from the click of the mouse.

Can I search for a specific user or group´s permissions?

Yes. Windows NT/2000?s native tools do not allow an administrator to search through subdirectories for a specific user or group?s permissions. This inadequacy results in the inability for the administrator to obtain an over all depiction of file security. Finding information like this is a snap with Security Explorer(tm).

  1. Simply choose a group or user, and a set of permissions to search for, and begin your search.
  2. A dialog box will pop-up with your search results.
  3. At that point, you can click on any file or directory in your search results to modify its permissions immediately!

This is a very powerful tool to analyze your user´s permissions and close hard-to-find security holes.

Do I have to have access to a file to view or change the permissions as an admin

No. You can view and modify permissions on files without having access to the file as long as you are an administrator. Regular users cannot override security using our products.

Do I have to take ownership of a file or group to change the ownership like W2K?

No. Security Explorer enables you to set ownership of any file to any user or group without taking ownership. Again, this is for Administrators only.

Can I print a hard copy of the security for a specific file?

Yes. Security explorer has built in functionality that will allow you to print the permissions of a file, as well as a directory. This is a great feature to help document security.

What is the Enterprise Scope feature, and how do I use it?

Before this feature, Security Explorer was limited in the fact that you can only target one drive at a time for any given function (Grant, Revoke, etc.) This has all changed with the introduction of Enterprise Scopes. You can now target multiple drives on one or many servers located across your network. For example, you can group together all home directories ? even if they span several drives on several servers. It can also be used for 'quick access' of complicated paths. You can create a scope called 'Quick Access' and add frequently accessed paths to the scope. The scope data is contained in three text files 'NTFSScp.dat', 'REGScp.dat' and 'ShareScp.dat' ? you can edit these files in any text editor, or use our GUI to add paths to your scopes. At any time, you can use the tool bar, or right-click menu to Grant, Revoke, etc.

Can I back up permissions of file that I don´t have access to?

Yes. You can now backup permissions on files that you don't have access to. As long as you are an administrator, or have the specific user right 'Backup files and directories', you can backup all files' permissions.

If you have the specific user right 'Restore files and directories', you can restore permissions on files that you do not have access to. This feature is very helpful when backing up and restoring user's home directories.

How does the licensing work?

Security Explorer is licensed on a per server basis. Each server that is to be administered by Security Explorer must have a license purchased for it. Security Explorer® may be installed on the server itself, as well as on one remote workstation per server.

Can I change the security of my Registry keys?

Yes. This feature allows you to easily browse permissions on registry keys across your network. Browse for, or type in, a Windows NT/2000 Server or Workstation name, and you can modify registry security on your network.

  1. Select a registry key and click on any of the tool bar items seen below to modify permissions.
  2. As you are selecting registry keys, the currently selected object's security is shown on the right side of the screen.


And you are done !

Can I revoke permissions of certain groups or users without effecting others ?

Yes. This tool will be used when you would like to revoke access to a specific file or directory. Let's say that you would like to revoke all or 'some' permission on all files and directories for the user 'Everyone'. This would normally be very difficult to do (especially without affecting any other user's permissions); however, with Security Explorer(tm) it is very easy.

  1. Simply go to the root directory (or any other directory where you would like to start) and Choose 'Tools | Revoke Permissions'.
  2. Then select the user 'Everyone', and the permissions that you would like to revoke '(All)' or just the 'Delete' permission.
  3. Select that you would like to modify all files and directories, and recurse subdirectories.
  4. Click 'OK' and your all finished!

The group Everyone's rights have been removed without affecting anyone else's permissions.

Can I use the features of Security Explorer in Windows Explorer?

It has never been easier to use Security Explorer's functions. Security Explorer's functions can now be accessed through the context menu (right-click menu) on Windows NT/2000 Explorer, Network Neighborhood, and "My Computer" dialogs.

Why would I use the search feature included with Security Explorer?

For example: Have you ever wondered just which files and directories on your network the group 'Everyone' has delete permissions on?

Finding information like this is a snap with Security Explorer(tm).

  1. Simply choose a group or user, and a set of permissions to search for, and begin your search.
  2. Dialog boxs will pop-up with your search results.
  3. Click on any file or directory in your search results to modify its permissions immediately!

This is a very powerful tool to analyze your user's permissions and close hard-to-find security holes.

How do I set the owner of a file from Security Explorer?

A nice feature of Security Explorer allows an administrator to set the owner on a file or directory structure. This feature is very helpful when setting up home directories.

  1. Simply choose the user or group you would like to be the owner of the file or directory, and set the ownership of the file by clicking 'Apply' or 'OK'.

What about Share Permissions, can I set those with Security Explorer?

This dialog screen allows you to easily browse permissions on shares across your network. Browse for, or type in, a Windows NT/2000 Server or Workstation name, and you can modify share security on your network.

  1. Select one or more shares and click on any of the tool bar items seen below to modify permissions.
  2. As you are selecting shares, the currently selected object's security is shown on the right side of the screen.

A nice new feature is the ability to document any object's security by selecting the 'Print' option.

What other features does Security Explorer have?

Security Explorer has the ability to allow administrators to close open files on servers throughout a network.

Suggestion Box
Your comments can help make our site better for everyone.

If you've found something incorrect, broken, or frustrating on this page, let us know so that we can improve it.

USA
Image
Select Country
Switzerland
Denmark
Finland
France
UK
Norway
Sweden
USA
Products
Active Administrator
ChangeAuditor for Windows File Servers
Desktop Authority
Desktop Authority Express
Desktop Authority MSI Studio
Desktop Authority Password Self Service
Enterprise Security Reporter
Help Desk Authority
Hyena
Patch Authority Ultimate
Print Manager Plus
Privilege Authority
Quest Change Base
Ramdisk Plus
Secure Copy
Security Explorer
Product Category
All products
Active Directory
Administration
CITRIX
Compliance
Data Replication
Deployment
Event Monitoring
Exchange
Help Desk Management
High Availability
Management
Network Management
NTFS
Remote Control
Reporting
Scripting
Security
Server Management
Sharepoint
SOX in Europe
User Management
Utilities
 
Updated Pages
Updated:7/4/2012
Active Administrator Updates and Upgrades
Updated:7/4/2012
Hyena Enterprise Edition
Updated:7/4/2012
Hyena Download and Purchase at best price from AMT Software International
Updated:7/4/2012
Managing rights on SecurityExplorer
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Hyena - Price
Updated:7/4/2012
Sharepoint Access Right Reporting
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers
Updated:7/4/2012
Managing Printer Rights on Windows Servers