Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014

Size: px
Start display at page:

Download "Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014"

Transcription

1 June 2014 These release notes provide information about Dell. About New features s Known issues System requirements Product licensing Getting started with Security Explorer Globalization About Dell About Security Explorer provides a single console for managing access controls, permissions, and security across Microsoft platforms that span multiple servers. The product provides a broad array of security enhancements including the ability to identify who has rights to resources across the entire organization. It also provides the ability to grant, revoke, clone, modify, and overwrite permissions quickly and from a central location. Unlike native tools, Security Explorer provides the ability to back up and restore permissions only, ensuring the integrity of data. To help meet auditing requirements, Security Explorer provides convenient reports that can be generated at your convenience. Lastly, the product s cleanup capabilities address common post-migration security issues. is a minor release, with enhanced features and functionality. See New features. New features New features in Short Product Name Version: Additional supported platforms: NetApp 8.2 (7-Mode and Clustered Mode) Dell FluidFS Microsoft SQL Server

2 Change account login for services The new Bulk Change Password task is available in the Service Security module. You can search Windows services by the logon account and by either computer or domain. From the resultant list of services, you can change the password for the logon account. Schedule password changes for services The new Scheduled Tasks task in the Service Security module provides you the option to schedule password changes for service logon accounts. Sort options for Exchange mailboxes Using Tools Options Exchange tab, you can specify how to sort mailboxes in the Navigation tree. You can sort mailboxes by display name, first name, or last name. Once you make a change, refresh the tree to see the new sort order. Add shares to a Search Scope In previous versions of Security Explorer, you could only add computers and domains to a Search Scope. In version 9.5, you now can add shares to a Search Scope. PowerShell cmdlets accept multiple permission level arguments Set-SXPSharePointGrant and Set- SXPSharePointRevoke commandlets can be used to grant and revoke multiple permission levels. In previous versions, you could grant and revoke permissions for one permission level only. See also: s s The following is a list of issues addressed in this release. Table 1. General resolved issues The Active Directory tree node does not appear after enabling it on the View menu Cannot create an Enterprise Scope with an empty name PowerShell commandlets: Set-SXPExport to Access database does not work PowerShell commandlets: Set-SXPSharePointRevoke does not work for SharePoint Groups Command line utilities: SXPExport to CSV file is tab-delimited Table 2. NTFS Security resolved issues Scheduled export to tab-delimited file works incorrectly Set Ownership works incorrectly if domain account is selected from the Set 2174 Ownership list. Attempting to modify a file deny permission results in an Invalid Pointer error Table 3. Share Security resolved issues Cannot add several shares with the same name to an Enterprise scope

3 Table 4. Task Management resolved issues An error occurs when setting account information for remote scheduled tasks Table 5. SQL Security resolved issues Incorrect error message occurs after attempting to modify inherited permissions Stop service works incorrectly Table 6. Exchange Security resolved issues Cannot set Read Items permissions for the Calendar Mailbox Folder in the Grant and 2065 Modify dialog boxes if several Advanced Permissions are selected. Cannot select Free/Busy time, subject, and location permission in Advanced 2405 Permission Selection. Cannot copy permissions under alternate credentials when the Clone group 2024 memberships checkbox is selected. Cannot manage Exchange after changing the port Cannot add a member (with complex Name) to a group in Exchange Administrators Exchange 2013: The Search for Public Folder permissions option does not work Backup file for an alphabetic group is not created after it is scheduled and run in 2126 Task Manager. Table 7. SharePoint Security resolved issues SharePoint Group Membership Report titles are a problem if multiple paths reported Search for exact permission levels or better should work for all permission levels with 2583 the same masks, independently on permission level names and languages. Remove Members task does not work Problems with authentication: errors occur for Site Collection Administrators and 2540 SharePoint groups Cannot grant multiple accounts in Grant Task Copying permissions between site collections works incorrectly Permissions are lost when a custom level is renamed It is impossible to search in a new window under alternative credentials Cannot grant permissions to Everyone and Authenticated Users with claims-based 2178 authentication. Cannot grant permission to a user with the same name from other domain

4 Known issues The following is a list of issues, including those attributed to third-party products, known to exist at the time of release. Table 8. NTFS Security known issues Known issue The Progress window goes through all subfolders and files when permissions are granted and the This folder only checkbox is selected Table 9. SQL Security known issues Known issue It is necessary to restart the Remote Registry service, if it was not used for more than several minutes, to see SQL instances installed on Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R Table 10. Exchange Security known issues Known issue The Revoke Disabled and Revoke Unknown tasks do not work for Public Folders Cannot create a mailbox for a new user if Exchange 2013 is in the mode: Active Directory split permission security model to the Exchange organization. Table 11. SharePoint Security known issues Known issue Cannot change Active Directory permissions under alternate credentials Restoring permissions to a different path can work only if the source and target sites are identical. If one site item is different, permissions cannot be restored to all site items. Table 12. Task Management known issues Known issue Cannot set Active Directory group accounts to task user accounts Cannot copy tasks configured to run with group accounts Cannot change network connection for remote tasks Table 13. Dell Fluid FS support known issues Known issue Security Explorer cannot get the local groups list in all modules Cannot see Group Contents for local groups Group and User Management: Cannot create new local users and groups

5 Known issue Group and User Management: Cannot delete local users Group and User Management: Cannot see the local groups list in the Select account dialog box Group and User Management: Domain Group appears in Group Properties dialog box Group and User Management: Error occurs in the Clear Local Admin task Group and User Management: Memberships list is empty NTFS Security: Cannot see Group Contents for local groups NTFS Security: Cannot see Memberships for local users after selecting a container NTFS Security: Cannot rename local accounts NTFS Security: Cannot search for permissions on the root NTFS Security: In the Search function, an error occurs after selecting a local user and enabling the Include all group memberships checkbox NTFS Security: An error occurs after attempting to create a share NTFS Security and Share Security: It is impossible to add any user (domain or local) into a local group NTFS Security: Cannot back up security when the Include SACL checkbox is selected NTFS Security and Share Security: Cannot search for disabled accounts System requirements Before installing, ensure that your system meets the following minimum hardware and software requirements. Hardware requirements Software requirements Supported platforms for Security Explorer User privilege requirements Required software for Microsoft Exchange 2013 for Security Explorer Setting up Microsoft Exchange for Security Explorer Upgrade and compatibility Hardware requirements Table 14. Hardware requirements Requirement Details Processor Pentium 600MHz or faster Memory 768 MB for Windows XP and Windows GB for Windows Vista and later Hard Disk space 150 MB Monitor 1024 x 768 screen resolution 5

6 Requirement Operating System Details Windows XP Windows Vista Windows 7 Windows 8 Windows 8.1 Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 NetApp 8.2 (7-Mode and Clustered Mode) Dell FluidFS Software requirements Table 15. Software requirements Requirement.Net Framework v.4.0 or later Details Install either the Full or Standalone version. Do not install just the Client Profile. Supported platforms for Security Explorer Table 16. Supported platforms for Security Explorer Security Explorer Module NTFS Security Share Security Registry Security Printer Security Service Security Task Management Group & User Management NTFS Security Share Security Group & User Management Supported Platform Windows NT 4.0 Windows 2000 Professional or Server Windows XP Windows Vista Windows 7 Windows 8 Windows 8.1 Windows 2000 Server Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 NetApp 8.2 (7-Mode and Clustered Mode) NOTE: Security Explorer supports CIFS volumes. Mixed CIFS/UNIX volumes are supported if the volume root owner is a Windows account. NOTE: For NetApp Clustered mode, to see changes after a permission action, such as Grant, Revoke, or Modify, on folders and shares, you must refresh the tree in the Navigation pane. 6

7 Security Explorer Module Supported Platform NTFS Security Dell FluidFS Share Security SQL Security SQL Server 2014 SQL Server 2012 SQL Server 2008 R2 SQL Server 2008 SQL Server 2005 SharePoint Security SharePoint 2013 SharePoint 2010 SharePoint Foundation SharePoint 2007 SharePoint Services 3.0 Exchange Security Exchange 2013 Exchange 2010 Exchange 2007 Exchange 2003 User privilege requirements To start Security Explorer, a user must be a member of the local Administrators, otherwise error messages display. Each module in Security Explorer has additional requirements to enable permission management. Table 17. Requirements to enable permission management Module NTFS Security Share Security Registry Security Printer Security Service Security Task Management Group and User Management Requirement To manage permissions on folders and files on remote computers, the File and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage permissions on shares on remote computers, the File and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage permissions on registry keys on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage permissions on printers on remote computers: The Printer Spooler service must be running on the target computer. The File and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed. To manage permissions on services on remote computers, the File and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage tasks on remote computers, the File and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage groups and users on remote computers, the File and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. 7

8 Module SharePoint Security SQL Server Security Exchange Security Requirement To manage permissions on SharePoint servers, the SharePoint site must be on the same network as the computer on which Security Explorer is installed. To manage SharePoint sites exposed over SSL (https://), add the SharePoint server s certificate to the Trusted Root Certification Authorities store on the computer with Security Explorer installed. To manage permissions on SQL Servers: Remote Registry service should be started on remote SQL servers. Computer Browser service should be started on the computer where Security Explorer installed. Current user must be a member of the Administrators local group on the SQL server. Windows Firewall on remote SQL servers must be configured to allow 'file and printer sharing' and network access with the SQL instance(s). For more information please refer to: Configure the Windows Firewall to Allow SQL Server Access at To manage permissions on the Exchange organization, the Exchange organization must be on the same Active Directory forest as the computer on which Security Explorer is installed. Required software for Microsoft Exchange 2013 for Security Explorer NOTE: For previous versions of Microsoft Exchange and mixed mode configurations, refer to Security Explorer Installation Guide. Table 18. Required software for Microsoft Exchange 2013 Client type Windows XP Windows Server 2003 Windows Vista Required software NOTE: Cannot manage Exchange Windows Server 2008 NET Framework 3.5 Service Pack 1 Power Shell 2.0 NET Framework 4.5 Full Extended Protection for Authentication PowerShell 3.0 Windows 7 NET Framework 4.5 Full Windows Server 2008 R2 Power Shell 3.0 Windows 8 Windows Server 2012 NET Framework 4.5 and PowerShell 3.0 already included 8

9 Setting up Microsoft Exchange for Security Explorer Client access server configuration 1 Check that all Exchange Windows services with Automatic startup are started. 2 Check that IIS Admin Service and World Wide Web Publishing Service IIS Services are started. 3 Check that the Exchange Web Application is configured correctly in IIS: Authentication: Windows Authentication is Enabled SSL Settings: Require SSL is switched on 4 Exchange Server 2010 and 2013 only: Enable PowerShell Remoting on the Exchange Server by running the PowerShell command: Enable-PSRemoting force. Client Configuration 1 Open port 443 on the firewall. 2 Install an Exchange Server SSL certificate. Upgrade and compatibility Security Explorer 9 does not require that you uninstall version 5, version 6, version 7, or version 8. You can install side-by-side with all of these previous versions. Product licensing You must have a new license file to use version 9. Your previous licenses will not be recognized by version 9. A utility is provided to upgrade your version 7 or 8 license to version 9. You can launch the license upgrade utility (LicenseUpgrade.exe) from the Auto Run feature or from the Security Explorer installation folder. To upgrade your license 1 Launch the autorun. 2 Click Run to launch the License Update Utility. 3 Click Find Now to locate your current license. 4 Click Get License to generate a version 9 license. To activate a trial or purchased commercial license 1 Start Security Explorer. When you start Security Explorer, a license check is performed. If you are installing Security Explorer for the first time, you are asked to update the license. 2 Click Update License and locate the license file. The license file is approximately 1 KB in size and has an.asc file extension. 9

10 To update a license 1 Start Security Explorer. 2 Select Help About Security Explorer. To view the applied licenses, click Licenses. To update a selected license, click Update License. Getting started with Installation instructions Additional resources Installation instructions IMPORTANT: If you are running Active Administrator on the same computer as Security Explorer, exit Active Administrator and stop all Active Administrator services before upgrading to Security Explorer. Use the autorun to install Security Explorer. To install Security Explorer 1 Launch the autorun. 2 On the Welcome screen of the Install Wizard, click Next. 3 Click View License Agreement. 4 Scroll to the end of the license agreement. 5 Click I accept these terms, and click OK. 6 Click Next. 7 Enter customer information, and click Next. 8 To change the location of the program files, click Change, or click Next to accept the default installation directory. 9 Click Install. 10 Click Finish. Additional resources Additional information is available from the following: Online product documentation (https://support.software.dell.com/security-explorer/release-notesguides) What s New Guide Installation Guide Upgrade Guide User Guide 10

11 Globalization This section contains information about installing and operating this product in non-english configurations, such as those needed by customers outside of North America. This section does not replace the materials about supported platforms and configurations found elsewhere in the product documentation. This release is Unicode-enabled and supports any character set. In this release, all product components should be configured to use the same or compatible character encodings and should be installed to use the same locale and regional options. This release is targeted to support operations in the following regions: North America, Western Europe and Latin America, Central and Eastern Europe, Far-East Asia, Japan. About Dell Dell listens to customers and delivers worldwide innovative technology, business solutions and services they trust and value. For more information, visit Contacting Dell Technical support: Online support Product questions and sales: (800) Technical support resources Technical support is available to customers who have purchased Dell software with a valid maintenance contract and to customers who have trial versions. To access the Support Portal, go to The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. In addition, the portal provides direct access to product support engineers through an online Service Request system. The site enables you to: Create, update, and manage Service Requests (cases) View Knowledge Base articles Obtain product notifications Download software. For trial software, go to Trial Downloads. View how-to videos Engage in community discussions Chat with a support engineer 11

12 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Dell Inc. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Dell Inc. Attn: LEGAL Dept 5 Polaris Way Aliso Viejo, CA Refer to our web site (software.dell.com) for regional and international office information. Trademarks Dell, and the Dell logo are trademarks of Dell Inc. Microsoft, Windows, Windows Server, Windows Vista, SharePoint, SQL Server, and Active Directory are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Pentium is a trademark of Intel Corporation in the U.S. and/or other countries. NetApp and the NetApp logo are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others. Legend CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death. IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information. 12

Dell Security Explorer 9.6

Dell Security Explorer 9.6 Dell June 2015 These release notes provide information about Dell. About New features Resolved issues Known issues System requirements Product licensing Getting started with Security Explorer Globalization

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Dell Migration Manager Upgrade Guide

Dell Migration Manager Upgrade Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Dell One Identity Quick Connect for Cloud Services 3.6.1

Dell One Identity Quick Connect for Cloud Services 3.6.1 Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Recovery Manager for Active Directory 8.6.0

Dell Recovery Manager for Active Directory 8.6.0 Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell NetVault Backup Plug-in for SQL Server 6.1

Dell NetVault Backup Plug-in for SQL Server 6.1 Dell NetVault Backup Plug-in for SQL Server 6.1 April 2014 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Enhancements Resolved issues Known

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

Dell NetVault Backup Plug-in for SQL Server 10.0.1

Dell NetVault Backup Plug-in for SQL Server 10.0.1 Dell NetVault Backup Plug-in for SQL Server 10.0.1, Revision 1 February 2015 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Dell NetVault Backup

More information

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell Recovery Manager for Active Directory 8.6.3

Dell Recovery Manager for Active Directory 8.6.3 Dell Recovery Manager for Active Directory 8.6.3 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. Resolved Issues Known Issues System Requirements

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell AppAssure License Portal User Guide

Dell AppAssure License Portal User Guide Dell AppAssure License Portal 5.5.3.1 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Dell Active Administrator 7.5. User Guide

Dell Active Administrator 7.5. User Guide Dell Active Administrator 7.5 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Dell One Identity Manager 7.0. Help Desk Module Administration Guide Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider Dell One Identity Cloud Access Manager 8.1.1 - How to Configure as an Identity Provider January 2016 To provide end-users located on another network with access to your applications, you can configure

More information

Quest One Password Manager

Quest One Password Manager Quest One Password Manager Version 5.5 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Dell InTrust 11.0 Best Practices Report Pack

Dell InTrust 11.0 Best Practices Report Pack Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

Object Level Authentication

Object Level Authentication Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required

More information

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0 - How to Configure Microsoft Office 365 February 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager;

More information

Dell Migration Manager for Exchange 8.11. Product Overview

Dell Migration Manager for Exchange 8.11. Product Overview Dell Migration Manager for Exchange 8.11 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

Toad for Apache Hadoop 1.1.0

Toad for Apache Hadoop 1.1.0 Toad for Apache Hadoop 1.1.0 January 23, 2015 These release notes provide information about the Toad for Apache Hadoop release. About New features Enhancements Known issues System requirements Product

More information

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

About Dell Statistica 12.6... 2

About Dell Statistica 12.6... 2 Complete Product Name with Trademarks Version Dell TM Statistica TM 12.6 Contents Dell TM Statistica TM... 1 About Dell Statistica 12.6... 2 New Features... 2 Workspace Enhancements: Statistica Enterprise

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Dell Active Administrator 7.5. Install Guide

Dell Active Administrator 7.5. Install Guide Dell Active Administrator 7.5 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell Recovery Manager for Active Directory 8.6. Deployment Guide

Dell Recovery Manager for Active Directory 8.6. Deployment Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.4 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. About About Recovery Manager for Active

More information

Dell NetVault Backup Plug-in for Hyper-V 10.5

Dell NetVault Backup Plug-in for Hyper-V 10.5 Dell NetVault Backup Plug-in for Hyper-V 10.5 August 2015 These release notes provide information about the Dell NetVault Backup Plug-in for Hyper-V release. Topics: About this release New features Enhancements

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

Wise Package Studio 8.0 MR1 Release Notes

Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the

More information

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Interactive Visualizations & Dashboards Quick Start Guide

Interactive Visualizations & Dashboards Quick Start Guide Statistica TM Interactive Visualizations & Dashboards Create a new dashboard Ribbon bar. On the Home tab, in the File group, click the New arrow and from the drop-down list, select Dashboard to display

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

8.10. Target Exchange 2013 Environment Preparation

8.10. Target Exchange 2013 Environment Preparation 8.10 Target Exchange 2013 Environment Preparation 2015 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

Toad for Apache Hadoop 1.2.0

Toad for Apache Hadoop 1.2.0 Toad for Apache Hadoop 1.2.0 September 16, 2015 These release notes provide information about the Toad for Apache Hadoop release. About New features Enhancements Known issues System requirements Product

More information

Companion for MS Analysis Server, v4

Companion for MS Analysis Server, v4 Companion for MS Analysis Server, v4 Application Deployment Guide 2012 Enterprise Software Solutions, LLC ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell NetVault Backup Plug-in for Hyper-V 10.0.1. User s Guide

Dell NetVault Backup Plug-in for Hyper-V 10.0.1. User s Guide Dell NetVault Backup Plug-in for Hyper-V 10.0.1 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell InTrust 11.0. Real-Time Monitoring Guide

Dell InTrust 11.0. Real-Time Monitoring Guide Dell InTrust 11.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Dell Active Administrator 8.0. About Active Administrator 8.0

Dell Active Administrator 8.0. About Active Administrator 8.0 Dell Active Administrator 8.0 January 2016 These release notes provide information about the Dell Active Administrator release. About Active Administrator 8.0 New features Resolved issues System requirements

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview May 2015 Overview Functional highlights Functional details Legal notices Overview Support for Dell SonicWALL malware detection

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Symantec Backup Exec TM 10d for Windows Servers

Symantec Backup Exec TM 10d for Windows Servers Symantec Backup Exec TM 10d for Windows Servers Quick Installation Guide N180808 September 2005 Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Dell NetVault Bare Metal Recovery for Dell NetVault Backup Server User s Guide

Dell NetVault Bare Metal Recovery for Dell NetVault Backup Server User s Guide Dell NetVault Bare Metal Recovery for Dell NetVault Backup Server 10.0.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Dell Remote Support Center 2.6.5

Dell Remote Support Center 2.6.5 2.6.5 5/12/2014 These release notes provide information about the Dell Remote Support Center release. About Dell Remote Support Center Resolved issues Known issues System requirements Product licensing

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell Active Administrator 8.0

Dell Active Administrator 8.0 What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,

More information

Top 10 Most Popular Reports in Enterprise Reporter

Top 10 Most Popular Reports in Enterprise Reporter Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software

More information