Security Explorer 5 3 User Guide
Security Explorer 5 3 User Guide
ScriptLogic
™
Security Explorer 5
User Guide
SECURITY EXPLORER™ II
This publication is protected by copyright and all rights are reserved by ScriptLogic
Corporation. It may not, in whole or part, be copied, photocopied, reproduced,
translated, or reduced to any electronic medium or machine‐readable form without prior
consent, in writing, from ScriptLogic Corporation. This publication supports Security
Explorer 5.x. It is possible that it may contain technical or typographical errors.
ScriptLogic Corporation provides this publication “as is,” without warranty of any kind,
either expressed or implied.
ScriptLogic Corporation
6000 Broken Sound Parkway NW
Boca Raton, Florida 33487‐2742
1.561.886.2400
www.scriptlogic.com
Trademark Acknowledgements:
Security Explorer is a registered trademark of ScriptLogic Corporation in the United
States and/or other countries. The names of other companies and products mentioned
herein may be the trademarks of their respective owners.
DOCUMENTATION CONVENTIONS
Typeface Conventions
Indicates a button, menu selection, tab, dialog box title, text to type, selections
Bold
from drop-down lists, or prompts on a dialog box.
CONTACTING SCRIPTLOGIC
ScriptLogic may be contacted about any questions, problems or concerns you might
have at:
ScriptLogic Corporation
6000 Broken Sound Parkway NW
Boca Raton, Florida 33487-2742
561.886.2499 Fax
www.scriptlogic.com
ScriptLogic can be found on the web at www.scriptlogic.com. Our web site offers
customers a variety of information:
Download product updates, patches and/or evaluation products.
Locate product information and technical details.
Find out about Product Pricing.
Search the Knowledge Base for Technical Notes containing an extensive
collection of technical articles, troubleshooting tips and white papers.
Search Frequently Asked Questions, for the answers to the most common non‐
technical issues.
Participate in Discussion Forums to discuss problems or ideas with other users
and ScriptLogic representatives.
Contents
WHAT IS SECURITY EXPLORER?................................................................................................................... 1
GETTING STARTED ........................................................................................................................................ 3
STARTING SECURITY EXPLORER ................................................................................................................. 3
EXAMINING THE MAIN WINDOW................................................................................................................. 4
ADJUSTING THE VIEW ................................................................................................................................. 5
QUICK REFERENCE: TOOLBAR, CONTROL BUTTONS BAR, MENUS .............................................................. 7
MENUS ........................................................................................................................................................ 8
STATUS BAR.............................................................................................................................................. 11
MANAGING PERMISSIONS............................................................................................................................ 12
VIEWING PERMISSIONS ............................................................................................................................. 13
GRANTING PERMISSIONS ........................................................................................................................... 14
REVOKING PERMISSIONS ........................................................................................................................... 18
CLONING PERMISSIONS ............................................................................................................................. 21
Selecting Users/Groups Automatically................................................................................................. 24
Updating Permissions Relating to a User’s SID History ..................................................................... 25
Viewing SID History Detail .............................................................................................................................. 26
CREATING PERMISSION TEMPLATES.......................................................................................................... 27
COPYING PERMISSIONS ............................................................................................................................. 29
COPYING PERMISSIONS TO SUBFOLDERS AND FILES ................................................................................. 30
SETTING OWNERSHIP ................................................................................................................................ 31
BROWSING ALL GROUPS AND USERS ........................................................................................................ 32
SEARCHING FOR PERMISSIONS .................................................................................................................. 33
Setting Groups/Users Options .............................................................................................................. 34
Setting Folders and Files Options ........................................................................................................ 35
Setting Permissions Options................................................................................................................. 36
Starting the Search ............................................................................................................................... 38
Sorting the Results............................................................................................................................................. 39
Interpreting the Permissions Column................................................................................................................. 39
Replacing Permissions....................................................................................................................................... 40
MODIFYING PERMISSIONS ......................................................................................................................... 41
MANAGING GROUP MEMBERSHIPS ........................................................................................................... 42
Adding a User or Group....................................................................................................................... 43
RENAMING ACCOUNTS .............................................................................................................................. 44
DELETING PERMISSIONS ............................................................................................................................ 44
PRINTING PERMISSIONS ............................................................................................................................. 45
MANAGING SECURITY ................................................................................................................................. 47
BACKING UP SECURITY ............................................................................................................................. 47
SCHEDULING A BACKUP ............................................................................................................................ 49
USING THE BACKUP SCHEDULER .............................................................................................................. 50
RESTORING SECURITY ............................................................................................................................... 52
EXPORTING PERMISSIONS ......................................................................................................................... 55
Manage Permissions
Permissions are automatically presented as each folder, file, Registry key, share or
printer is selected. Security Explorer allows specific changes to be made without
affecting any of the existing permissions. Permissions changes can be made on
individual objects or en‐masse.
Manage Security
Manage Objects
Getting Started
Security Explorer provides a tool for viewing and modifying permissions on groups,
users, registry items, shares, and printers. To streamline your tasks, you can create
Enterprise Scopes that group commonly accessed servers and paths or add objects to
your Favorites folder.
The main window in Security Explorer offers many choices for ease of use. You can
manipulate the panes to maximize the viewing area. Depending on your preference,
select functions from the main menu, toolbar, control buttons bar, or shortcut menus.
The left Directory pane contains the hierarchy for the selected tab. You can
browse and select an object.
The top right Objects pane displays the folders, files, and objects as you browse
the hierarchy. You also can type a path in the Path box to view the contents of a
folder.
The lower right Permissions pane displays the permissions for the selected
object.
To rearrange the view, you can size all three panes by dragging the vertical and
horizontal split bars.
Note: The position of the horizontal split bar between the Objects and
Permissions panes is saved on each individual tab.
To hide the Permissions and Objects panes, Toolbar, Status Bar, and Control
Buttons Bar, clear the corresponding check boxes on the View menu.
To hide the Directory pane, click the AutoHide button . The Directory pane
collapses to a vertical toolbar along the left side of the window. This
configuration provides maximum view of the Objects and Permissions panes.
Click the vertical button to expand the Directory pane. Click anywhere in the
right panes to roll the left pane out of sight.
To return the Directory pane back to the original configuration, click the
AutoHide button .
Note: You can show or hide the Toolbar and Control Buttons Bar by clearing the
corresponding check box on the View menu. See View Menu.
MENUS
Note: The available menu options vary depending on the selected tab. The menus
shown are for the NTFS Permissions tab.
File Menu
View Menu
Control Buttons Bar Show the buttons at the bottom of the tab (default).
Security Menu
Tools Menu
Browse all Groups and Look through all the groups and users
Users in the system
View Licensed Server List Manage Security Explorer licenses.
Window Menu
Help Menu
STATUS BAR
The status bar is displayed along the bottom of the Security Explorer window. The
left area of the status bar displays the number of selected objects and permissions.
Note: You can show or hide the status bar from the View menu. See View Menu.
Managing Permissions
To help you manage your security, Security Explorer is organized into tabs, which
organize the permissions that are available to manage. First, open the tab that
matches the permissions you want to manage. Browse for or type in a server name,
select one or more objects, and then use the Toolbar buttons, Control Buttons Bar
buttons, menus, and/or shortcut menus to manage permissions. For ease of use, each
tab functions in the same fashion, although the menu choices and available buttons
may vary from tab to tab.
Use the NTFS Permissions tab to browse for and manage permissions on
directories and files across your network.
Use the Registry Permissions tab to browse for and manage permissions on
registry keys across the network.
Use the Share Permissions tab to browse for and manage permissions on shares
across the network.
Use the Printer Permissions tab to browse for and manage permissions on the
printers across the network.
Use the Open Files tab to view open resources. You can close selected or all open
resources.
Use the Messages tab to view errors that occur during processing. The Message
tab is hidden by default. If you want to view errors that occur with Security
Explorer, turn on the Messages tab. See Viewing Error Messages.
VIEWING PERMISSIONS
1. Click the tab that reflects the object you want to view: NTFS, Registry, Share, or
Printer.
2. Select an item from the hierarchical list in Directory pane. The location displays
in the Path box. The top right Objects pane displays objects along with the
extended information. The bottom right Permissions pane displays permissions
for the selected object. The Owner box displays the user or group that owns the
selected object.
Alternatively, type a path, in either drive letter notation or UNC pathname
format, in the Path box, and then click Load. The hierarchical list in the Directory
pane updates to reflect your entry.
Note: On the NTFS Permissions tab, you can restrict what displays in the
Objects pane. By default, Show All is selected so both folders and files display.
To restrict the list to folders only, choose Show Folders Only from the drop‐
down list. To hide both folders and files, choose None from the drop‐down list.
You also can hide the Objects pane on all tabs by clearing the Objects check box
on the View menu.
Icons next to each account name indicate the type of user or group.
Icon Group/User
To copy the inherited permissions to the object, click Copy. To remove the
inherited permissions, click Remove.
Show permissions
Select to display permissions (default) for a selected object. Clear the check box to
prevent the display of permissions in all windows and dialog boxes. This setting
reverts to the default each time you open Security Explorer.
GRANTING PERMISSIONS
You can grant permissions to users and groups without affecting any other userʹs
permissions. First, choose the permissions to grant, and then select a user or group.
You can grant different permissions for several users and groups with one operation.
1. Open the tab for the type of permission you want to grant: NTFS, Registry,
Share, or Printer.
2. From the hierarchical list in the Directory pane, select an item; or type a path in
the Path box, and then click Go.
3. Click or . Alternatively, right‐click the object, and then choose Grant
Permissions; or choose Grant Permissions from the Security menu.
The Grant Folder Permissions dialog box displays the path, and the associated
groups and users for the current object.
4. Select the groups and users to apply the permission. There are a variety of ways
to select groups and users.
To select a group or user, you can choose from the Groups and Users list in the
left pane, or from the list in the right pane. The selected group or user displays in
the Group/User box and the currently applied permission displays in the
Permission box.
Time Saver: If you want to apply the same permission to several groups and
users, select the permission settings first, and then double‐click the groups and
users in the hierarchical list in the left pane. The groups and users are added to
the List of users and groups to grant list with the selected permission settings.
To display users in the list, click Show Users. To return the list to show only
groups, click Refresh.
To add a group or user not included in the current Names list, click
Advanced User Selection.
5. From the Permission list, select the permissions to grant. The options are:
NTFS Permissions Share Permissions
Full Control Full control
Modify Change
Read and Execute Special
List Folder Contents
Printer Permissions
Read Print (Pr)
Write Manage Printer (Mp)
Special Manage documents (Md)
Registry Permissions Special
Full control
Read
Special
Note: If you select Special, the Folder Permission tab opens. You also can open
the tab by clicking Advanced Permission Selection. The Folder Permission tab
displays the permissions based on the selection in the Permission list. If you
make any changes, the Permission type changes to Special with the selected
permissions in parenthesis.
Note: Selecting the List Folder Contents permission grants a Read and Execute
permission, but excludes files. The scope for Read and Execute includes files; the
scope for List Folder Contents excludes files.
6. From the Applies To list, select how to apply the permissions. The options are:
NTFS Permissions Registry Permissions
This folder only This key only
This folder, subfolders and This key and subkeys
files Subkeys only
This folder and subfolders
Share Permissions
This folder and files This share only
Subfolders and files only
Subfolders only Printer Permissions
Files only This printer only
Documents only
This printer and documents
7. From the Action list, select whether to replace or add to the group/user’s current
permissions.
8. To add the group/user to the List of users and groups to grant list, click Add.
The selection is added to the list.
Note: To add a selected group or user automatically to the List of users and
groups to grant list with the selected permission settings, you can hold down
CTRL and click a group or user in the top pane, or double‐click a group or user
in the left pane.
Overwrite ALL permissions with the groups and users listed below (use with caution)
Select to overwrite the permissions on the selected folders, subfolders, and/or
files with the specified permissions.
Include protected objects (objects with ‘Inherit Permissions from Parent’ disabled)
Select to grant permissions on protected accounts.
Note: Only users and groups in the List of users and groups to grant list are
affected by the grant action. You can sort each column by clicking the column
heading. To remove a selected user or group from the list, click Remove.
9. Click OK. The Granting Permissions box displays the progress in the Granting
permissions on box.
Note: The grant process can occur so quickly that the Grant Completed box
appears before you can change any settings.
The Errors area displays any errors that occur during the process.
REVOKING PERMISSIONS
You can revoke access for users and groups. The type of permission revoked
depends on the selected tab. For example, if you want to revoke permissions for a
printer, open the Printer Permissions tab.
1. Open the tab for the type of permission you want to revoke: NTFS, Registry,
Share, or Printer.
2. In the Directory or Object pane, select an object. The Path box displays the path
to the selected object.
Time Saver: If you want to revoke the same permission from several groups and
users, select the permission settings first, and then double‐click the groups and
users in the hierarchical list in the left pane. The groups and users are added to
the List of users and groups to revoke list with the selected permission settings.
To change to another domain, select the domain from the List Names From
list.
To display users in the list, click Show Users. To return the list to show only
groups, click Refresh.
To add a group or user not included in the current Names list, click
Advanced User Selection.
5. From the Permission list, select the permissions to revoke, and whether or not to
Allow or Deny. If the choice is not available in the list, click Advanced
Permission Selection to create a custom choice.
Revoke all permissions (Allow and Deny) for the selected user
Select to revoke all permissions (Allow and Deny) for the selected user.
Include SID history search when adding permissions for revoking
Select to invoke a SID history search when you click Add to add the selected
group/user to the List of users and groups to revoke list. Since there may be
more than one SID associated with the selected account, selecting this check box
adds all existing SIDs to the List of users and groups to revoke list so that all
existing permissions are revoked.
6. To add the group/user to the List of users and groups to revoke list, click Add.
Note: Only users and groups in the List of users and groups to revoke list are
affected by the revoke action. You can sort each column by clicking the column
heading. To remove a selected user or group from the list, click Remove.
7. Click OK. The Revoking Permissions box displays the progress in the Revoking
permissions on box. The Errors area displays any errors that occur during the
process.
Note: The revoking process can occur so quickly that the Revoke Completed box
appears before you can change any settings.
CLONING PERMISSIONS
1. Open the tab that is associated with the permissions you want to clone: NTFS,
Registry, Share, or Printer.
2. In the Directory or Object pane, select an object. The Path box displays the path
to the selected object.
The top pane changes depending on the tab you select. The bottom tab remains
the same for each tab.
To: Open:
Select individual users/groups to clone Manual User/Group Selection tab
Select entire domains to clone Automatic User/Group Selection tab
Update permissions relating to a user’s SID history SID History tab
4. In the Source Group or User area, select the domain or object from which to pull
the permissions. The default is the current object, whose path displays in the top
box.
In the Destination Group or User area, select the domain or object to receive the
cloned permissions. The default is the current object, whose path displays in the
top box.
To select a specific user to add to the list, click Advanced User Selection.
Note: The manual method allows you to select permissions one at a time. To
select multiple permissions easily to clone from one domain to another, use the
Automatic User/Group Selection tab.
5. Click Add. The selected pair displays in the List of users and groups to clone
list.
Note: Only users and groups in the List of users and groups to clone list are
affected by the clone action. You can sort each column by clicking the column
heading. To remove selected user[s] or group[s] from the list, click Remove. To
remove all users and groups from the list, click Clear.
To: Click:
Save clone settings as a Security Explorer Clone List (.dat)
Use SID History to update Access Control Lists (ACLs) with SIDs relating to the
user’s SID in the new domain, which is valuable in migrating from Windows NT4 to
Active Directory.
1. Open the SID History tab.
2. In the Domain and AD Query boxes, create a query filter to find the user or
group in Active Directory.
4. Click Close. If you want to see the groups and users that were checked, use the
Advanced button. See Viewing SID History Detail.
To include the SID in the display, select the Include SID check box.
2. Click Load. The groups and users are listed as they are checked.
If you selected the Include SID check box, you can use the scroll bar to view
the entire SID, or point the cursor to group or user.
Security Explorer provides six built‐in permission templates that you can use to
apply permissions. You cannot modify the built‐in permission templates, but you can
create custom permission templates.
1. From the Security menu, choose Permission Templates. The NTFS Permission
Templates dialog box displays the Full Control permission template. The other
built‐in templates are Modify, Read and Execute, List Folder Contents, Read, and
Write.
2. To create a new permission template, click New. The Create New Permission
Template box appears.
3. In the Name box, type a name for the template, and then click OK. The template
name displays in the Template box.
4. Select or clear the check boxes to create the template.
5. Click Close. When you apply permissions, the template is available for selection.
COPYING PERMISSIONS
Note: To select all permissions in the list, right‐click any permission, and then
choose Select All Permissions. Alternatively, you can select a permission, and
then choose Select All Permissions from the Security menu, or press Ctrl‐A.
2. Open the object where you want to paste the selected permissions, right‐click any
permission, and then choose Paste Permission. Alternatively, you can select a
permission, and then choose Paste Permission from the Security menu, or press
Ctrl‐V.
The Grant Folder Permissions dialog box opens showing the pasted permissions
in the List of users and groups to grant list. See Granting Permissions for details
about the Grant Folder Permissions dialog box.
You can copy permissions from a parent folder to its subfolders and files. The
permissions on the parent folder do not change; the subfolders and files inherit the
permissions from the parent.
Note: The Copy Permissions to Subfolders and Files function is available only on
the NTFS Permissions tab.
3. To remove all the explicitly‐defined permissions on all subfolders and files for
the selected parent folder, click Yes. All subfolders and files inherit permissions
from the selected parent folder.
SETTING OWNERSHIP
You can set the owner on a file or directory structure, which is very helpful when
setting up home directories. Choose the user or group to be the owner of the file or
folder, and then choose how to apply the ownership.
Note: The Set Ownership function is available only on the NTFS Permissions tab.
3. To set ownership on the selected object, click . Alternatively, you can right‐
click the object, and then choose Set Ownership; or choose Set Ownership from
the Security menu.
The Owner dialog box displays the selection and the associated groups and
users.
4. To change the owner, select a group from the list. The selection displays in the
Owner box. You also can type a name in the Owner box.
Note: By default only groups display. To view a list of users, click Advanced
User Selection. The Select Users or Groups selection box opens where you can
choose a user to be the owner of the folder.
5. In the Folder Options area, choose whether to set the ownership on files and/or
folders. To target specific file types, enter a wildcard, such as *.exe. You also can
choose to recurse across subfolders.
Note: To grant permissions to the current folder only, clear all check boxes in the
Folder Options area. To grant permissions to all files and folders, and recurse
through all subfolders, select all check boxes.
While you are in the Grant, Revoke, and Search dialog boxes, you see only domain
groups and users, or groups and users for the local computer. If you need to see local
groups and users on individual computers on the network, you can browse a list.
Note: This is a display only list box. You cannot select a group or user to perform an
action.
X From the Tools menu, choose Browse All Groups and Users. The Browse All
Groups and Users list box appears.
You can set the root node for a domain or
computer so that the list box shows only
that object. Type either the domain or
computer name in the box at the top, and
then click Go. To return the list to its
original state, click Reset.
If you select a category and the loading is
taking too long, you can click Stop.
Have you ever wondered just which files and directories on your network the group
Everyone has delete permissions on? Finding information like this is a snap with
Security Explorer. Simply choose a group or user, and a set of permissions to search
for, and begin your search. A dialog box will pop up with your search results. At that
point, you can click on any files or directories in your search results to modify their
permissions immediately. This is a very powerful tool to analyze your userʹs
permissions and close hard‐to‐find security holes.
Note: The Search for Permissions function is available only on the NTFS
Permissions tab.
3. To search for permissions on the selected object, click . Alternatively, you can
right‐click the object, and then choose Search for Permissions; or choose Search
for Permissions from the Security menu.
The Search dialog box displays the path to the selected object. The Group/Users
Options tab lists the associated accounts.
Note: If you cleared the Show permissions check box on the main window, the
permissions do not display.
There are three options you can set to search for permissions, which are grouped
into three tabs: Group/User Options, Folder and File Options, and Permission
Options.
Note: To change the path at any time, click , and then select a new path.
Note: To return to the default selections on all three tabs, click Defaults.
By default, a search includes folder and file permissions and all subfolders.
1. From the Search dialog box, open the Folder and File Options tab.
Note: To change the path at any time, click , and then select a new path.
2. Choose whether to search files and/or folders. You can choose to recurse across
all subfolders or to a specific depth. To target specific file types, enter a file
extension, such as *.exe, in the File Extension box.
Search for folder permissions
Select to include folder permissions in the search results.
Search for file permissions
Select to include file permissions in the search results.
Recurse all subfolders
Select to include all subfolders in the search results.
Recurse to Depth
Select to include subfolders to the depth specified in the box. The default depth is
1, which is one level below the folder displayed in the path box.
Note: To return to the default selections on all three tabs, click Defaults.
By default, the Discretionary Access Control List (DACL) is searched for any allow or
deny permissions. Inherited and explicit permissions are included.
1. From the Search dialog box, open the Permission Options tab.
Note: To change the path at any time, click , and then select a new path.
Note: Selecting some permissions, such as Write (W), select other permissions
automatically (Rp, Ad, Wd, Wa, Wx). If you do not want to include those
permissions in the results, click Advanced Permission Selection to manually
deselect those permissions.
Example: This table shows how the Invert permissions result set check box
affects a search for the Write permission.
Note: Selecting some permissions, such as Write (W), select other permissions
automatically (Rp, Ad, Wd, Wa, Wx). If you select the Invert permissions result
set check box, those permissions are not included in the results. If you want to
include those permissions in the results, click Advanced Permission Selection to
manually deselect those permissions. This rule does not apply to Full Control
(All), so even though you searched for permissions other than Write (W), Full
Control (All) is included in the results.
Inherited Permissions
Includes inherited permissions in the search results. Inherited permissions are
indicated by (I) in the Type column.
Explicit Permissions
Includes explicit permissions in the search results.
Note: To return to the default selections on all three tabs, click Defaults.
X Click Start Search. The results display in the Search Results area. The status bar
displays the number of objects searched and permissions found.
Note: To stop the search, click Stop Search. To clear the results, click Clear
Results.
Within the Search Results area, you can use the buttons along the bottom, the
toolbar icons, or the menus to grant, revoke, clone, modify, delete, or print the
permissions. See Quick Reference: Toolbar, Control Buttons Bar, Menus. You also can
replace selected permissions with those of another. See Replacing Permissions.
Automatically update results
Select to automatically update the search results after you select to grant, revoke,
clone, replace, modify, or delete a permission. The search is performed again
during the refresh, so if you have a search that takes a long time, you may want
to clear this check box.
Permissions Abrv
Full control ALL
Generic Read R
Generic Write W
Generic Execute X
Delete De
Change permissions Wp
Take Ownership To
List folders Lf
Read data Rd
Read attributes Ra
Read extended attributes Rx
Read permissions Rp
Append data Ad
Create subfolders Cs
Create files Cf
Write data Wd
Write attributes Wa
Write extended attributes Wx
Execute file Ex
Traverse folders Tf
Delete subfolders and files Ds
Replacing Permissions
In the Search Results area, you can select one or more permissions, and then replace
them with the permissions of a selected user or group.
1. Select one or more of the permissions displayed in the Search Results area, and
then click Replace.
You can select other sources from the List Names From list. By default, only
the groups display. To include users in the list, click Show Users. Select a
group or user from the list. The name displays in the Group or User box.
You can type a group or user name in the Group or User box or click
Advanced User Selection to select a group or user name from a list.
3. Click OK. The permissions associated with the group or user that displays in the
Group or User box replaces those of the group or user selected from the Search
Results area.
MODIFYING PERMISSIONS
Modify the permissions of a group or user on the selected directory or file. Use for
quick changes to someone who is already in the list. Use the Grant feature to give
permissions to accounts that are not in the permissions list already. See Granting
Permissions.
1. Open the tab that is associated with the permissions you want to modify: NTFS,
Registry, Share, or Printer.
2. In the Directory or Objects pane, select an object. The Path box displays the path
to the selected object.
Note: The permissions listed vary depending on the tab and object selected. This
graphic shows the permission lists for a folder and a file selected on the NTFS
Permissions tab.
Note: If you want to change the display to a different user or group, click
Change.
4. From the Permissions lists, select the permission and how to apply it. The
resultant permissions display in the check boxes. If you make changes to the
check boxes, the permission type changes to Special Access.
Note: You also can create custom permission templates to refer to non‐standard
sets of permissions. See Creating Permission Templates.
1. Right‐click a group in the Permissions pane, and then choose Display Group
Members. The Group memberships dialog box opens displaying the currently
selected group name, description, and members.
2. Select a member, and then click a button corresponding to the action you want to
perform.
To: Click:
Add members to a selected group
To: Click:
Save the list as a .txt file
2. Select a group or user from the Members list, and then click Add. The Add to
Group Membership dialog box appears listing the permissions for the currently
selected object.
To change to another domain, select the domain from the List Names From
list.
To display users in the list, click Show Users. To return the list to show only
groups, click Refresh.
To add a group or user not included in the current Names list, click
Advanced User Selection.
3. Select users and/or groups, and then click Add to list to add them to the List of
users and groups to add list. You also can double‐click a group/user to add it to
the list. Only users and groups in the List of users and groups to add are added.
RENAMING ACCOUNTS
1. In the Permissions pane, right‐click a group or user, and then choose Rename
Group or User. The Rename Group or User box displays the selected user or
group in the Name box.
2. In the Name box, type a new name. Do not include any domain information.
3. Click OK.
DELETING PERMISSIONS
Note: You cannot delete inherited permissions, which are indicated by (I) in the Type
column of the Permissions pane. Navigate up the directory hierarchy to locate the
parent, and then continue with the delete process.
PRINTING PERMISSIONS
The Print function formats the permissions displayed in the Permissions pane for
printing.
X From the File menu, choose Print, or click . The Print Permissions tab
displays the default settings.
Button Description
Set the font for the header, report content, and footer. Click Font and then
choose a font, font type, font size, font color, and whether to underline or
strikeout the text.
Opens the Page Setup dialog box where you can specify the paper size, paper
source, paper orientation, set the margins for the report, and specify the printer
to use.
Prints the report to the default system printer. To specify a different printer, click
Setup, and then click Printer.
Opens the Print Preview window where you can see the report before it is
printed.
Show Border
Select to add a rectangle around each page at the set margin.
Show Date
Select to display the date and time at the bottom of each page (default).
Show Page Numbers
Select to display the page number at the bottom of each page (default).
Show Header
Select to display the path and owner of the selected object (default).
Managing Security
With Security Explorer, administrators can back up and restore their NTFS
permissions, providing the ability to recover permissions. Additionally, permissions
can be exported for reporting and backup.
BACKING UP SECURITY
Before modifying any security permissions, make a backup in case you need to
restore the permissions to their original state. You also can back up permissions on
files for which you donʹt have access. As long as you are an administrator, or have
the Backup files and directories user right, you can back up and restore permissions on
all files, which is helpful when backing up and restoring a userʹs home directories.
Note: The Backup and Restore functions are not available on the Printer Permissions
tab.
1. Open the tab that is associated with the object[s] you want to back up: NTFS,
Registry, or Share.
2. From the Directory or Object pane, select an object to back up, and then click .
Alternatively, you can right‐click an object, and then select Backup Security, or
select Backup Security from the Security menu. The Backup Security dialog box
appears with the selected objects displayed in the Path list box.
3. In the Backup File Name box, type the full path and name for the backup file, or
click to locate a path and name the backup file.
To: Click:
Add a path to the list
Save the list of paths to a Security Explorer Backup List (*.bkn) file
Note: The Registry Security dialog box does not support the addition of deletion
of paths from the Path list, saving and loading the Path list, nor scheduling a
backup.
4. To back up only specified file types, type a value, such as *.exe, in the Wildcard
box.
Note: The Wildcard box is not available when backing up Registry Permissions.
5. To schedule the backup, type a name for the backup job in the Job Name box,
and then click Schedule. See Scheduling a Backup.
6. To back up the selected paths, click Backup Security.
SCHEDULING A BACKUP
If you would prefer to run the backup at a set time, schedule it as a Windows task.
1. From the Backup Security dialog box, type a name for the job in the Job Name
box, and then click Schedule. The Schedule a Backup dialog box opens.
Depending on if the backup job is local or remote, the appropriate option is
selected.
Note: You can make changes to a single job directly. If you want to edit a remote
job, click Edit.
2. In the Account box, click to locate an account under which to run the backup. If
you do not enter an account, the backup runs under the local system account. For
remote jobs, click Edit, and then add an account.
3. To schedule the task, click Schedule. The task is assigned the default run time of
Weekly, every Monday at midnight. If you want to change the run time, edit the
backup using the Backup Scheduler.
The Backup Scheduler provides a convenient place in which to create, edit, and
delete backup jobs for NTFS Permissions only.
X Open the NTFS Permissions tab, and then click . Alternatively, you can right‐
click an object, and then select Backup Scheduler, or select Backup Scheduler
from the Security menu. The Backup Scheduler Task List dialog box lists the
currently defined backup jobs in ascending alphabetical order by computer
name.
To sort the columns, click the column heading once for ascending order and
again for descending order.
To create a new backup job, click New. The Backup Security dialog box
opens where you can create a new backup job. See Backing Up Security.
To edit a selected backup job, click Edit. The Backup Security dialog box
opens where you can make changes to the backup job. To make changes to
the schedule, click Open Task Dialog.
To locate a backup job for a specific computer, select the Browse tasks by
computer check box. The Backup Scheduler Alternate View appears.
Expand the hierarchical list to locate the computer.
To edit a selected backup job, click Edit. The Backup Security dialog box
opens where you can make changes to the backup job. To make changes
to the schedule, click Open Task Dialog.
RESTORING SECURITY
You can restore your permissions from a backup file created by using the Backup
function. You can restore some or all of the backup file. Prior to initiating the restore
process, you can verify the permissions against the current permissions.
Note: The Restore function is not available on the Printer Permissions tab.
1. Open the tab that is associated with the object[s] you want to restore: NTFS,
Registry, or Share.
2. Click . Alternatively, you can right‐click an object, and then select Restore
Security, or select Restore Security from the Security menu. The Restore
Security dialog box appears.
3. In the Backup File Name box, type the full path and name for the backup file, or
click Load to locate a backup file. The contents of the backup file display in the
left pane.
4. Expand the backup file and examine the contents. You can choose specific objects
to restore by selecting the box next to the object.
Important: Only select the Include files when previewing backup check box if
you are restoring a small number of individual files. If you are restoring a large
number of objects, selecting this check box can slow the loading of the backup
file, so restore the parent folder instead.
Restore owner
Restore permissions
By default, both the owner and permissions are restored. Clear the appropriate
check box for the item you do not want to restore.
Restore missing folders
Select to recreate folders that are present in the backup file, but are no longer
present in the destination path.
Restore to a different path
To restore the permissions to a different path, select the Restore to a different
path check box, and then click to locate the path.
Note: The restore location must have the same folder structure as the backup file.
Note: The Advanced button is available only when restoring permissions from
the NTFS Permissions tab.
Path Wildcard
Select to enter a wildcard to filter folders and files. For example, *docs will skip
any path that does not include docs.
Group/User Wildcard
Select to enter a wildcard to filter groups or users. For example, *smith will skip
any group or user that does not include smith in the path. To select a group or
user, click Advanced User Selection.
Note: Before restoring, you can grant or revoke permissions on either the
Current Permissions or the Backed‐up Permissions panes. Right‐click a
permission, and then choose either Grant Permissions or Revoke Permissions.
The corresponding dialog box opens populated with the specific permission you
selected.
6. Click Restore.
EXPORTING PERMISSIONS
You can export permissions on a folder to a Microsoft Access 2000 database (.mdb
file) or to a delimited file for use with Microsoft Excel.
Note: You can export permissions on folders only. This feature is available only on
the NTFS Permissions tab.
4. In the Folder Options area, select whether to include files and/or subfolder
permissions. You also can choose to recurse down all subfolders or to a specified
depth. For example, if you are only concerned with the subfolders, and not the
sub‐sub‐folders, type 1 in the Recurse to depth box.
Export file permissions
Select to export the permissions of the files (default).
Export subfolder permissions
Select to export the subfolder permissions (default).
Recurse subfolders
Select to retrieve the subfolders and sub files of the parent directory (default).
Managing Objects
In addition to managing permissions and security, Security Explorer provides
features to manage objects so you don’t need to leave the application.
3. In the Name box, type a name for the new folder, and then click OK. A
confirmation message appears.
4. Click OK.
DELETING A FOLDER
Note: If the selected folder is included in an Enterprise Scope, the folder is not
removed from the Enterprise Scope. You also must remove the folder from the
Enterprise Scope. Use the Managed Scope feature to delete the folder from the
Enterprise Scope. See Removing Paths from an Enterprise Scope.
Use the Open files tab to view and modify the status of resources that are currently
open on a selected server. You have the option to close any open resources.
1. Open the Open Files tab, click Choose Server/Base Path, and then select either a
server or a base path from the hierarchical list.
If you chose a server, its name displays in the View all open resources on Server
box. If you chose a base path, its name displays in the View only resources
within Base Path box. The open resources for the item you chose display in the
Open Resources list box.
2. To refresh the list of open resources, click or right‐click anywhere in the box,
and then choose Refresh. Alternatively, select the Auto refresh interval check
box, and then type a value in the Seconds box.
X To close one or more selected resources, right‐click the selection, and then choose
Close Selected Resources.
X To close all displayed resources, right‐click anywhere in the box, and then choose
Close All Resources.
VIEWING PROPERTIES
You can view properties on files and folders accessed from the NTFS Permissions
tab.
1. Open the NTFS Permissions tab.
2. In the Directory or Objects pane, select the object, and then click .
Alternatively, right‐click the object, and then choose Properties, or select
Properties from the Tools menu. The Properties window for the selected object
appears.
You can select a folder or file, and then open Windows Explorer to the same location.
1. Open the NTFS Permissions or Share Permissions tab.
2. In the Objects pane, select a folder or file, and then click . Alternatively, right‐
click an object, and then choose Open with Windows Explorer, or choose Open
with Windows Explorer from the Tools menu. Windows Explorer opens to the
select object.
Note: If the selected Registry key is included in an Enterprise Scope, the folder is
not removed from the Enterprise Scope. You also must remove the Registry key
from the Enterprise Scope. Use the Managed Scope feature to delete the Registry
key from the Enterprise Scope. See Removing Paths from an Enterprise Scope.
Note: You can create a share only on the NTFS Permissions tab. To remove a share,
use the Share Permissions tab. See Removing a Share.
REMOVING A SHARE
Note: You can remove a share only on the Share Permissions tab. To create a share,
use the NTFS Permissions tab. See Creating a New Share.
USING FAVORITES
Note: The Favorites function is not available on the Printer Permissions tab.
You can add frequently‐accessed objects to a list of favorites. Each tab has a separate
list of favorites in the Directory pane.
1. Open the tab that is associated with the object[s] you want to add to the
Favorites list.
2. Click . Alternatively, you can right‐click an object, and then select Add to
Favorites, or select Add to Favorites from the Tools menu. The Add to Favorites
dialog box opens showing the selected path in the New Favorites list.
To add a path to the New Favorites list, click Browse, and then select a path;
or type a path in the Path box, and then click Add.
To remove a selected path from the New Favorites list, click Del.
To remove all paths from the New Favorites list, click Clear.
3. Click OK. The object appears under the Favorites heading in the Directory pane.
You can remove a single object from the Favorites list shown in the Directory pane.
To view all the Favorites regardless of type, and remove multiple objects, use the
Manage Favorites function.
X To remove a single object from the Favorites list, open the tab that is associated
with the object, right‐click the object in the Directory pane, and then choose
Remove from Favorites.
X To remove multiple objects from the Favorites list, choose Manage Favorites
from the Tools menu, or click . The Manage Favorites box lists all the objects
in the Favorites list on all the tabs. Select the object, and then click Remove.
Use Enterprise Scopes to organize objects into logical groups so that you can more
easily manage the permissions associated with these objects. For example, you could
target multiple drives on one or many servers located across your network. You
could group together all home directories, even if they span several drives on several
servers. You also could use Enterprise Scopes for quick access of frequently‐used
paths.
When you have created a scope and added objects to it, there are several options that
you can choose depending on the type of the scope.
To create a new Enterprise Scope with the selected object, select Create and
add into a new Enterprise Scope, and then type a name for the scope in the
Name box.
Note: Enterprise Scopes are associated with a specific tab. For example, scopes that
you create on the NTFS Permissions tab do not display in the Directory pane on the
Registry Permissions tab.
Note: The Manage Enterprise Scope function is specific to the tab that you open. For
example, to create an Enterprise Scope that contains paths to Share Permissions, open
the Share Permissions tab.
1. Open the tab that is associated with the Enterprise Scope you want to create:
NTFS, Registry, Share, or Printer.
2. Click . Alternatively, choose Manage Enterprise Scope from the Tools menu.
The Manage Enterprise Scope dialog box lists the existing Enterprise Scopes for
the selected tab.
1. Open the tab that is associated with the Enterprise Scope you want to edit:
NTFS, Registry, Share, or Printer.
2. Click . Alternatively, choose Manage Enterprise Scope from the Tools menu.
The Manage Enterprise Scope dialog box lists the existing Enterprise Scopes for
the selected tab.
3. Select an Enterprise Scope, and then click Edit. The Edit Enterprise Scope list
box displays the paths currently assigned to the selected Enterprise Scope.
Note: The paths included in the selected Enterprise Scope are listed in ascending
alphabetical order. To change the order to descending, click the Name column
heading.
To add a path to the Name list, click Browse, and then select a path; or type a
path in the Path box, and then click Add.
1. Open the tab that is associated with the Enterprise Scope you want to edit:
NTFS, Registry, Share, or Printer.
2. Click . Alternatively, choose Manage Enterprise Scope from the Tools menu.
The Manage Enterprise Scope dialog box lists the existing Enterprise Scopes for
the selected tab.
3. Select an Enterprise Scope, and then click Edit. The Edit Enterprise Scope list
box displays the paths currently assigned to the selected Enterprise Scope.
Note: The paths included in the selected Enterprise Scope are listed in ascending
alphabetical order. To change the order to descending, click the Name column
heading.
4. To delete a selected path, click Del. To delete all paths from the Enterprise Scope,
click Clear.
5. When you are finished editing, click OK to apply the changes.
Note: The Manage Enterprise Scope function is specific to the tab that you open. For
example, to remove an Enterprise Scope that contains paths to Share Permissions,
open the Share Permissions tab.
1. Open the tab that is associated with the Enterprise Scope you want to remove.
2. Click . Alternatively, choose Manage Enterprise Scope from the Tools menu.
The Manage Enterprise Scope dialog box lists the existing Enterprise Scopes for
the selected tab.
3. Select the Enterprise Scope[s] to remove, and then click Remove. A confirmation
message appears. To remove the selected Enterprise Scope[s], click Yes.
Security Explorer 5 helps you keep track of the number of server licenses.
X From any tab, click . Alternatively, select View Licensed Server List from the
Tools menu. The Server List dialog box displays the number of licenses used
and available.
Removing a Server
Security Explorer lets you access Windows functionality to help you manage your
network drives easily.
1. From any tab, select Map Network Drives from the Tools menu. The Windows
Map Network Drive wizard appears.
1. From any tab, select Disconnect Network Drives from the Tools menu. The
Windows Disconnect Network Drive window appears.
2. Select the drive to disconnect, and then click OK.
X From the Tools menu, select Options, or click . The Options dialog box opens to
the General tab.
Reload at startup
X From the Tools menu, select Options, or click . The Options dialog box opens to
the General tab. Open the View tab.
Appearance
Tabs
NTFS Permissions
Registry Permissions
Share Permissions
Printer Permissions
Enterprise Scopes
Open Files
Messages
Select to include the tab along the top right Objects pane. Clear to exclude the
tab. The Messages tab is excluded by default. The NTFS Permissions tab is
unavailable for selection.
Permissions
X From the Tools menu, select Options, or click . The Options dialog box opens to
the General tab. Open the Advanced tab.
Windows Explorer
Warnings
Display warning before loading large folders
By default, Security Explorer displays a warning message before loading large
folders. Clear the check box to turn off the display.
Command Description
SxpBackup.exe Backs up permissions
SxpClone.exe Clones group or user permissions on a set of files or folders on the
network
SxpExport.exe Exports group or user NTFS file permissions
SxpGrant.exe Grants group and user file permissions without affecting other users
SxpOwner.exe Sets the owner of the selected object
SxpInheritence.exe Repairs the inheritance on the specified source path
SXPBACKUP.EXE
Back up permissions from the command line. You may wish to schedule regular
backups through the schedule service or any other scheduling software.
Usage
SXPBackup -file [parameter file]
SXPBackup -backup [wild card] [source file] [backup file]
SXPCLONE.EXE
Use to clone group or user permissions on a set of files and folders on the network.
Usage
SXPClone <options> <source user name> <destination user name> <source
path>
<options> Switch letters can be in any order, upper or lower case
/? This help message
/progress Show progress
/force Force down tree
/overwrite Overwrite permissions
/replace Add/Replace flag (Replace=true, Add=false)
/file Source path represents a file (default: folder)
SXPEXPORT.EXE
You can export permissions on a folder to a Microsoft Access 2000 database (.mdb
file) or to a delimited file for use with Microsoft Excel. Used in conjunction with any
scheduling utility, you can export permissions to a database off hours automatically.
Usage
SXPExport <options> <source path> <destination file name>
<options> Switch letters can be in any order, upper or lower case
/? This help message
/s Export to spreadsheet
/d Export to database
SXPGRANT.EXE
Grant group and user file permissions without affecting other users. Will not affect
any other userʹs and groupʹs permissions while recursing across subfolders. This
utility should be run while logged on as an Administrator.
Usage
SXPGrant <options> <user name> <source path>
<options> Switch letters can be in any order, upper or lower case
/? This help message
/progress Show progress
/force Force down tree
/overwrite Overwrite permissions
/replace Add/Replace flag (Replace=true, Add=false)
/allow Allow/Deny flag (Allow=true, Deny=false) (default:Allow)
/noprop No propagate
/noarch Do not set archive attribute
/file Source path represents a file (default: folder)
/scope [scope type] Scope (default: this folder, subfolders and files)
[scope type]
1 This folder only
2 This folder subfolders and files
3 This folder and subfolders
4 This folder and files
5 Subfolders and files only
6 Subfolders only
7 Files only
SXPOWNER.EXE
Set the owner an object. This utility should be run while logged on as an
Administrator.
Usage
SXPOwner <options> <user name> <source path>
<options> Switch letters can be in any order, upper or lower case
/? This help message
/progress Show progress
/files Process files
/folders Process Folders
/recurse Recurse subfolders and files
/wildcard [wildcard characters] Wildcard
Note: Do not use asterisk (*) as a wildcard character. For example, if you want only
JPG files, use /wildcard .jpg
SXPINHERITANCE.EXE
Repairs the inheritance on the specified source path. See Repairing Inheritance.
Usage
SXPInheritance <options> <source path>
<options> Switch letters can be in any order, upper or lower case
/? This help message
/progress Show progress
/file Source path represents a file (default: folder)
/add Add inheritance to specified path
/copy Remove inheritance from specified path (and make inherited
permissions explicit)
/remove Remove inheritance from specified path
Troubleshooting
In its Knowledge Base, ScriptLogic Corporation has a library of articles that may
provide an answer to a problem you are experiencing. Before calling technical
support, check to see if your problem is documented here. You might also browse the
Discussion Forums to see if anyone else is experiencing the same issue.
http://www.scriptlogic.com/support
REPAIRING INHERITANCE
On occasion, you man need to repair the inheritance on folders and files because
some or all subfolders and files are not inheriting permissions correctly from their
parent. The incorrect inheritance can include missing permissions, such as a
subfolder is missing an inherited permission from the parent, and unwanted extra
permissions, such as a subfolder contains an extra inherited permission that is not
present on the parent.
3. Click Yes. The Modifying Permissions box displays the progress in the
Modifying permissions on box. The Errors area displays any errors that occur
during the process.
Note: The process can occur so quickly that the Completed box appears before
you can change any settings.
The Messages tab is hidden by default. If you want to view errors that occur with
Security Explorer, turn on the Messages tab.
1. From the Tools menu, select Options, or click . The Options dialog box opens
to the General tab. Open the View tab.
2. Select the Messages check box, and then click OK. The Messages tab appears.
3. Open the Messages tab to view the errors.
Note: The installation directory that contained Security Explorer remains after
the process is complete. This directory contains the license file for the product
and any files created after the product was installed. These may be deleted
manually if you wish to completely remove Security Explorer.
Index
Search, 33
. Set Owner, 31
.csv, 55
.mbd, 55, 79
C
.txt, 55 Cf, 39
Clone button, 22
A cloning
permissions, 21
abbreviations selecting by SID history, 25
permissions, 39 selecting pairs automatically, 24
Ad, 39 collapsing
adding Directory pane, 6
user or group, 43 colors
adjusting changing, 73
panes, 5 command line
archive setting, 76 sxpbackup.exe, 78
authorization code, 70 sxpclone.exe, 79
Autohide button, 6 sxpexport.exe, 79
sxpgrant.exe, 80
B sxpinheritance.exe, 81
sxpowner.exe, 81
backing up
context menu
security, 47
hiding, 76
backup
Control Bar, 7
deleting, 50
hiding, 7
editing, 50
copying
restoring, 52
permissions, 29
scheduler, 50
permissions to subfolders and files, 30
scheduling, 49
creating
backup files
enterprise scopes, 65, 66, 67
filtering, 53
favorites, 62
blue permissions, 41
new folder, 57
browsing
new share, 61
all groups and users, 32
permission templates, 27
building a query, 25
Registry key, 60
buttons, 7
Cs, 39
Autohide, 6
customizing
Clone, 22
permissions report, 45
Delete, 44
Grant, 14
Manage Enterprise Scope, 67 D
Managing Favorites, 64 date, 45
Modify, 41 De, 39
Print, 45 defaults
Revoke, 18 restore to, 5
Q
P
query
page numbers, 45
constructing, 25
panes
adjusting, 5
Directory, 4 R
hiding, 5 R, 39
Objects, 4 Ra, 39
Permissions, 4 Rd, 39
pasting Registry key
permissions, 29 creating, 60
permission deleting, 60
templates, 27 remote computers
permissions managing permissions, 12
abbreviations, 39 remove
backing up, 47 group/user from list, 17, 20
cloning, 21 removing
copying, 29 favorite, 64
copying to subfolders and files, 30 shares, 61
customizing printout, 45 removing servers, 70
deleting, 44 renaming
exporting, 55 users and groups, 44
granting, 14 repairing
inheritance, 82 windows, 72
Resistry permissions sorting
types of, 16 search results, 39
restore view, 5 start menu, 3
restoring starting
permissions, 52 Security Explorer, 3
using wildcards, 53 status bar, 11
Revoke button, 18 sxpbackup.exe, 78
revoking sxpclone.exe, 79
permissions, 18 sxpexport.exe, 79
Rp, 39 sxpgrant.exe, 80
Rx, 39 sxpinheritance.exe, 81
sxpowner.exe, 81
S
scheduling
T
backup, 49 tabs, 4
Search button, 33 hiding, 74
searching templates
for permissions, 33 permission, 27
setting folders and files options, 35 Tf, 39
setting group/user options, 34 To, 39
setting permission options, 36 toolbar, 7
sorting search results, 39 Tools menu, 10
starting the search, 38
security U
backing up, 47
logging changes to, 73 unknown accounts
restoring, 52 revoking permissions, 20
Security Explorer searching for, 35
exiting, 8 users
removing, 84 renaming, 44
setting options, 72
starting, 3 V
Security menu, 9
view
select all permissions, 29
adjusting, 5
servers
restore to default, 5
licenses, 70
View menu, 8
removing, 70
viewing
Set Owner button, 31
open resources, 58
setting
permissions, 13
ownership, 31
properties, 59
share permissions
server licenses, 70
types of, 16
shares
creating, 61 W
removing, 61
W, 39
showing
Wa, 39
status bar, 11
Wd, 39
Toolbar, 7
wildcards, 48
SID history
using to restore, 53
selecting, 25
Window menu, 10
sizing
windows
color scheme, 73 X
Windows Explorer, 60
Wp, 39 X, 39
Wx, 39