What is Security Explorer - PowerPoint PPT Presentation

1 / 27
About This Presentation
Title:

What is Security Explorer

Description:

According to Microsoft, 'Windows 2000 can help you reduce costs through ... fantastic work filling in the holes that Microsoft habitually leaves gaping open... – PowerPoint PPT presentation

Number of Views:30
Avg rating:3.0/5.0
Slides: 28
Provided by: danl74
Category:

less

Transcript and Presenter's Notes

Title: What is Security Explorer


1
  • A powerful and intuitive utility to search for
    and modify Windows NT/2000 security on NTFS
    drives, the Registry, and Shares.

2
Todays Networks
More companies are building their networks around
Microsoft Windows NT/2000 than ever
before. According to Microsoft, Windows 2000 can
help you reduce costs through improved management
and increase productivity through improved
reliability and ease of use. Networks built on
Windows 2000 Professional could reduce the
firm's directly related IT costs by 15
percent. But as a network grows in size,
administering it becomes much more difficult.
Thats where Small Wonders Software can help
3
Managing Your Network
While it may be easy to add a user or group, or
set permissions on a particular directory, how
easy is it to backup permissions? Restore
Permissions? Modify permissions without
affecting other users? Clone a group or
user?The answer is Virtually Impossible At
least without a product like Security
Explorer. Security Explorer allows you to
administer group and user permissions on NTFS
drives, as well as on Shares and the Registry.
Grant, Revoke, Clone, Search, Backup, Restore,
and Export permissions on your network. Security
Explorer's reliability does it right every time.
4
Security Explorer Benefits
  • Assists in Administering
  • NTFS Permissions
  • Registry Permissions
  • Share Permissions

5
What Security Explorer will help you accomplish
  • Add or remove permissions for a user without
    affecting other user's permissions.
  • Search for a particular users access on the
    drive.
  • Grant, Revoke, Clone, Search, Backup, Restore,
    and Export permissions on your network.
  • Easily Set Ownership of files.

6
Why do you need Security Explorer?
  • Security Explorer Allows You to
  • Grant, Revoke, and Clone permissions across
    subdirectories. without affecting any other group
    or user's permissions.
  • Modify Permissions on files you dont have access
    to without taking ownership.
  • Backup permissions from a command line and
    restore them to the same or separate location
    (including files to which you do not have
    access).
  • Clone Permissions from one user/group to another.
    (Everyone to Users, for example).
  • Search for specific permissions on a set of
    folders.

7
Why do you need Security Explorer? Cont..
  • Security Explorer Allows You to
  • Deploy to help desk personnel to reduce
    permissions mistakes made by using Windows
    NT/2000s native tools.
  • Create Enterprise Scopes allow you to target
    multiple drives and servers for a single
    operation.
  • Use full command line support for the "Clone",
    "Export", "Grant", and "Backup" functions.
  • Save Time! It is fully integrated with the
    Windows NT Desktop - Including Windows NT
    Explorer, "My Computer" and "Network
    Neighborhood."

8
Other Functions
  • Set Ownership of folders and files.
  • Export permissions to an ODBC database.

9
Security Explorers Main Screen
10
Grant Permissions
  • Grant permissions to a user or a group.
  • Does not affect other users permissions.
  • Override on access denied. (for administrators
    only)
  • Recurse across subfolders.
  • Modify more than one user or group at a time.

11
Revoke Permissions
  • Revoke permissions from a user or a group.
  • Does not affect other users.
  • Override on access denied. (for administrators
    only)
  • Recurse across subfolders.
  • Modify permissions on files.
  • Modify more than one user or group at a time.

12
Clone A Group or User
  • Clone a Group or User.
  • Clone users for a Domain Migration.
  • Does not affect existing users permissions.
  • Example
  • Clone User A to User B
  • User B now has the same permissions as User A

13
Set Ownership
  • Set Ownership of Files and Directories.
  • No more Take Ownership
  • Set the owner across subfolders in one
    operation.

14
Search for Permissions
  • Answer questions about your network.
  • Where does the everyone group have access?
  • Simply choose
  • The Everyone Group.
  • A set of permissions to search for.
  • A dialog box displays the results.
  • Modify the permissions straight from the dialog
    box!

15
Backup Permissions
  • Network Security
  • Saves Time
  • Reduces Risk
  • Peace of Mind
  • Simple to use

16
Restore Permissions
  • Network Security
  • Saves Time.
  • Reduces Risk.
  • Peace of Mind.
  • Simple to use.
  • Options
  • Restore
  • Ownership.
  • Files.
  • Or both.
  • Restore to a new path.
  • Restore files with a certain extensions.

17
Export Permissions
  • Export Permissions to a Database
  • MS Access 97 Database provided.
  • Use any ODBC compliant Database.
  • Ability to print security.

18
Registry Permissions
  • Browse Registry Permissions across your network
  • Modify security.
  • Print Registry Security.

19
Share Permissions
  • Browse Share Permissions
  • Modify Permissions.
  • Select Multiple Shares to modify at once.
  • Print share permissions.

20
Command Line Utilities
  • SXPGRANT
  • SXPGRANTSHARE
  • SXPCLONE
  • SBACKUP
  • SXPEXPORT

21
Example using SXPGRANT and SXPGRANTSHARE
  • Situation
  • Some Users have granted EVERYONE permissions in
    their HOME Folders.
  • Original SHARE permissions for Users HOME
    Folders was EVERYONE FULL CONTROL.
  • You need to tighten up security!
  • Solution
  • Use SXPGRANT and SXPGRANTSHARE in the cmd line
    utility.

22
Useful Functions for Security Explorer
  • Grant and Revoke permissions for users and groups
    across subfolders without affecting existing
    permissions.
  • Clone groups and users permissions to aid in
    Domain Migration.
  • Backup all your permissions to a file and restore
    them if necessary.

23
The Right Choice
  • Why have so many Windows NT/2000 Network
    Administrators chosen Security Explorer?
  • Ease of use.
  • Time savings.
  • Features not found in Windows NT/2000.
  • Reduced administrative costs.
  • Reliability.

24
What our customers say
  • "Security Explorer is one of the best pieces of
    third party software I've purchased in the last 6
    years - keep up the fantastic work filling in the
    holes that Microsoft habitually leaves gaping
    open..." Kevin Bolger IST Manager
  • "I have a license for Security Explorer and I use
    it quite extensively. Just last week our PDC was
    reconfigured and I had to create over 600 shares
    from the data that we restored. Thanks for saving
    me from at least two weeks of pure drudgery. It
    only took me one and a half days. Thanks again."
    Jim Publow CTS Instructor Grand Centre High
    School

25
What our customers say
  • "We like and use the feature for reviewing groups
    and members while in various modes. Also, the add
    to existing permissions features for
    current directories and sub directories is great.
    Overall, it (Security Explorer) is easy to use
    and more powerful than user manager in NT to set
    and check permissions on our file server." Ron
    Cadenhead Bolder Technologies Corporation
  • "The time-savings alone makes Security Explorer
    worth the investment."Windows NT Magazine
  • "Recently, I purchased Security Explorer had
    great success with it! Also, I showed Security
    Explorer to a fellow associate and now he uses it
    too - with the same great results! I love how
    Security Explorer is fully integrated into the
    Windows NT/2000 desktop and how it makes it very
    easy to see the user's rights. Also, Security
    Explorer's design is very user friendly!"Curt
    SchnorfHoneywell FMT

26
About Small Wonders Software
  • Small Wonders Software, a privately held
    corporation founded in 1993, specializes in
    developing administrative and security software
    for Windows NT/2000 networks.
  • Dedicated to providing innovative software
    solutions, our goal is to ease and improve
    administration while increasing company
    efficiency and reducing costs.
  • Our expert products, reputed for their superior
    performance, value and reliability offer
    solutions for small, medium and large
    enterprises. Security Explorer, Secure Copy and
    Enterprise Security Reporter are distributed
    globally both directly from Small Wonders
    Software and through a network of distributors.
  • Our products capture the trust of numerous
    companies including Shell, Deutsche Financial
    Services, Intel, EDS, Lucent Technologies,
    Federal Reserve Bank of New York, Siemens,
    Pepsi-Cola and Gateway.

27
Contact Small Wonders Software
Address Small Wonders Software 7345 Sand
Lake Road Suite 318 Orlando, FL
32819 Sales Phone 1 407.248.2558, press
"1" Support Phone 1 407.248.2558, press "2"
General Fax 1 407.248.9017   Website
http//www.smallwonders.com/ Online
Store https//shop.smallwonders.com Support
Email support_at_smallwonders.com General
Email info_at_smallwonders.com Sales Email
sales_at_smallwonders.com
Write a Comment
User Comments (0)
About PowerShow.com