Overview of Security Explorer
Imagine having centralized access control management from a single platform. With Security Explorer®, you can manage access controls, permissions and security in real time across your various Microsoft platforms, including Active Directory (AD), Windows Server, Exchange Server, SharePoint Server and SQL Server — all from a single console.
Security Explorer® provides an array of security enhancements, including the ability to identify who has rights to resources across the entire organization. You can also grant, revoke, clone, modify and overwrite permissions quickly and from a central location.
Having centralized access control management allows you to instantly see who has access to what in real time across Microsoft servers. Search for explicit or inherited permissions in AD, on file servers, Exchange server, SQL Server and SharePoint. Even search for permissions to services, tasks, users and groups. Security Explorer’s single console eliminates the need to manually search each server for permissions.
Make targeted or bulk changes to servers with the ability to grant, revoke or modify permissions. View and manage group membership settings directly in the access control list for a resource. Overcome access-denied errors by forcing permissions onto protected objects. Security Explorer enables you to lock down permissions faster and easier.
With Security Reporter’s access control management capabilities, you can quickly take remediation action from within the Quest Enterprise Reporter user interface to modify or remove any inappropriate permissions. Enterprise Reporter Suite paired with Security Explorer combines the reporting and remediation capabilities you need to facilitate security and compliance initiatives, enabling you to stay ahead of security vulnerabilities to prevent breaches.
Back up and restore permissions, without having to restore data, to easily baseline access controls and revert to that baseline at any time. Recover from accidental or malicious changes, and ensure that compliance requirements are enforced.
The access control management capabilities in Security Reporter allow you export a database or spreadsheet listing the permissions on items anywhere in the directory tree. Filter results to show only permissions that differ from the parent folder when exporting permissions. Perform targeted searches for all locations that a particular group or user has access across the network and export this data to create ad-hoc security reports.
Migrate access controls, and to clean up access post migration. Because Security Explorer can back up and restore security settings to an alternate location, you can be sure that necessary access is in place on the new server(s). This shortens migrations and provides a smooth post-migration user experience.
Pentium 600MHz or faster
Windows 8.1, Windows 10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016
150MB
1GB
.Net Framework v.4.0 or later
NOTE: Install either the Full or Standalone version. Do not install just the Client Profile.
SQL Server 2019, SQL Server® 2017, SQL Server 2017 Reporting Services, SQL Server 2016, SQL Server 2014, SQL Server 2012
SharePoint 2019, SharePoint® 2016, SharePoint 2013, SharePoint 2010, SharePoint Foundation
Exchange 2019, Exchange 2016, Exchange 2013, Exchange 2010
Windows Server 2019, Windows Server® 2016 Functional Level, Windows Server 2012 R2 Functional Level, Windows Server 2012 Functional Level
To see the full list of system requirements please visit the support page
Manage Microsoft server security in real time from a single platform.
Simplified Active Directory management from a single console
In this white paper, discover why an Active Directory and Exchange migration following a healthcare merger or acquisition can be easier than ever with the right planning, strategy and tools in place.
This eBook reviews insider threats and eight AD security best practices to reduce risk and recovery time.
This white paper discusses best practices to prevent healthcare data breaches — focused on implementing appropriate strategies, policies, processes, training and cybersecurity defenses — that can mitigate much of the risk that healthcare organizations fac
In this white paper, we provide a checklist for complying with EU GDPR compliance requirements.
This ebook explores the anatomy of an AD insider threat and details the best defense strategies against it.
Tired of best practices guides that explain what to do and why to do it, but not how to actually get it done? This e-book is different. It lays out four of the most fundamental security best practices for any on-prem or hybrid Microsoft shop — and explains the top tools and techniques for impl
Self-service tools will help you to install, configure and troubleshoot your product.
Find the right level of support to accommodate the unique needs of your organization.
Search from a wide range of available service offerings delivered onsite or remote to best suit your needs.