text
stringlengths
0
4.23k
/quiet
Suppresses screen and log output. You can still view analysis results by using the Security Configuration and Analysis snap-in to the Microsoft Management Console (MMC).
/cfg <configuration file name>
/db <database file name>
<systemroot>\Documents and Settings\<UserAccount>\My Documents\Security\Logs\<databasename>.log
Examples
To export the security database and the domain security policies to an inf file, and then import that file to a different database in order to replicate the security policy settings on another computer, type:
secedit /export /db C:\Security\FY11\SecDbContoso.sdb /mergedpolicy /cfg SecContoso.inf /log C:\Security\FY11\SecAnalysisContosoFY11.log /quiet
To import your example file to a different database on another computer, type:
secedit /import /db C:\Security\FY12\SecDbContoso.sdb /cfg SecContoso.inf /log C:\Security\FY11\SecAnalysisContosoFY12.log /quiet
secedit /generaterollback
Allows you to generate a rollback template for a specified configuration template. If an existing rollback template exists, running this command again will overwrite the existing information.
Successfully running this command logs the mismatches between the specified security template the security policy configuration into the scesrv.log file.
Syntax
secedit /generaterollback /db <database file name> /cfg <configuration file name> /rbk <rollback template file name> [/log <log file name>] [/quiet]
Parameters
Parameter
Description
/db
Required. Specifies the path and file name of the database containing the stored configuration against which the analysis is performed. If the file name specifies a database that hasn't had a security template (as represented by the configuration file) associated with it, the /cfg <configuration file name> option must also be specified.
/cfg
Required. Specifies the path and file name for the security template that will be imported into the database for analysis. This option is only valid when used with the /db <database file name> parameter. If this parameter isn't also specified, the analysis is performed against any configuration already stored in the database.
/rbk
Required. Specifies a security template into which the rollback information is written. Security templates are created using the Security Templates snap-in. Rollback files can be created with this command.
/log
Specifies the path and file name of the log file to be used in the process. If you don't specify a file location, the default log file, <systemroot>\Documents and Settings\<UserAccount>\My Documents\Security\Logs\<databasename>.log is used.
/quiet
Suppresses screen and log output. You can still view analysis results by using the Security Configuration and Analysis snap-in to the Microsoft Management Console (MMC).
/cfg <configuration file name>
/db <database file name>
<systemroot>\Documents and Settings\<UserAccount>\My Documents\Security\Logs\<databasename>.log
Examples
To create the rollback configuration file, for the previously created SecTmplContoso.inf file, while saving the original settings, and then write out the action to the SecAnalysisContosoFY11 log file, type:
secedit /generaterollback /db C:\Security\FY11\SecDbContoso.sdb /cfg sectmplcontoso.inf /rbk sectmplcontosoRBK.inf /log C:\Security\FY11\SecAnalysisContosoFY11.log
secedit /import
Imports security settings (.inf file), previously exported from the database configured with security templates.
Important
Before you import an .inf file to another computer, you must run the secedit /generaterollback command on the database on which the import will be performed.
secedit /generaterollback
You must also run the secedit /validate command on the import file to verify its integrity.
secedit /validate
Syntax
secedit /import /db <database file name> /cfg <configuration file name> [/overwrite] [/areas [securitypolicy | group_mgmt | user_rights | regkeys | filestore | services]] [/log <log file name>] [/quiet]
Parameters
Parameter
Description
/db
Required. Specifies the path and file name of the database containing the stored configuration against which the import is performed. If the file name specifies a database that hasn't had a security template (as represented by the configuration file) associated with it, the /cfg <configuration file name> option must also be specified.
/overwrite
Specifies whether the security template in the /cfg parameter should overwrite any template or composite template that is stored in the database, instead of appending the results to the stored template. This option is only valid when the /cfg <configuration file name> parameter is also used. If this parameter isn't also specified, the template in the /cfg parameter is appended to the stored template.
/cfg
Required. Specifies the path and file name for the security template that will be imported into the database for analysis. This option is only valid when used with the /db <database file name> parameter. If this parameter isn't also specified, the analysis is performed against any configuration already stored in the database.
/areas
Specifies the security areas to be applied to the system. If this parameter is not specified, all security settings defined in the database are applied to the system. To configure multiple areas, separate each area by a space. The following security areas are supported:securitypolicy: Local policy and domain policy for the system, including account policies, audit policies, security options, and so on. group_mgmt: Restricted group settings for any groups specified in the security template.user_rights: User logon rights and granting of privileges.regkeys: Security on local registry keys.filestore: Security on local file storage.services: Security for all defined services.
/log
Specifies the path and file name of the log file to be used in the process. If you don't specify a file location, the default log file, <systemroot>\Documents and Settings\<UserAccount>\My Documents\Security\Logs\<databasename>.log is used.
/quiet
Suppresses screen and log output. You can still view analysis results by using the Security Configuration and Analysis snap-in to the Microsoft Management Console (MMC).
/cfg <configuration file name>
/cfg <configuration file name>