text stringlengths 0 4.23k |
|---|
/db <database file name> |
<systemroot>\Documents and Settings\<UserAccount>\My Documents\Security\Logs\<databasename>.log |
Examples |
To export the security database and the domain security policies to an .inf file, and then to import that file to a different database to replicate the policy settings on another computer, type: |
secedit /export /db C:\Security\FY11\SecDbContoso.sdb /mergedpolicy /cfg NetworkShare\Policies\SecContoso.inf /log C:\Security\FY11\SecAnalysisContosoFY11.log /quiet |
To import just the security policies portion of the file to a different database on another computer, type: |
secedit /import /db C:\Security\FY12\SecDbContoso.sdb /cfg NetworkShare\Policies\SecContoso.inf /areas securitypolicy /log C:\Security\FY11\SecAnalysisContosoFY12.log /quiet |
secedit /validate |
Validates the security settings stored in a security template (.inf file). Validating security templates can help you determine if one is corrupted or inappropriately set. Corrupted or inappropriately set security templates aren't applied. |
Syntax |
secedit /validate <configuration file name> |
Parameters |
Parameter |
Description |
<configuration file name> |
Required. Specifies the path and file name for the security template that will be validated. Log files aren't updated by this command. |
<configuration file name> |
Examples |
To verify that the rollback .inf file, secRBKcontoso.inf, is still valid after rollback, type: |
secedit /validate secRBKcontoso.inf |
secedit commands |
Configures and analyzes system security by comparing your current security configuration against specified security templates. |
Note |
The Microsoft Management Console (MMC) and the Security Configuration and Analysis snap-in are not available on Server Core. |
Syntax |
secedit /analyze |
secedit /configure |
secedit /export |
secedit /generaterollback |
secedit /import |
secedit /validate |
Parameters |
Parameter |
Description |
secedit /analyze |
Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results are stored in a separate area of the database and can be viewed in the Security Configuration and Analysis snap-in. |
secedit /configure |
Allows you to configure a system with security settings stored in a database. |
secedit /export |
Allows you to export security settings stored in a database. |
secedit /generaterollback |
Allows you to generate a rollback template with respect to a configuration template. |
secedit /import |
Allows you to import a security template into a database so that the settings specified in the template can be applied to a system or analyzed against a system. |
secedit /validate |
Allows you to validate the syntax of a security template. |
Remarks |
If there is no filepath specified, all filenames will default to the current directory. |
Your analysis results are stored in a separate area of the database and can be viewed in the Security Configuration and Analysis snap-in to the MMC. |
If your security templates are created by using the Security Template snap-in, and if you run the Security Configuration and Analysis snap-in against those templates, the following files are created: |
File |
Description |
scesrv.log |
Location: %windir%\security\logsCreated by: Operating systemFile type: TextRefresh rate: Overwritten when secedit analyze, secedit configure, secedit export or secedit import is run.Content: Contains the results of the analysis grouped by policy type. |
user-selected name.sdb |
Location: %windir%\<user account>\Documents\Security\DatabaseCreated by: Running the Security Configuration and Analysis snap-inFile type: ProprietaryRefresh rate: Updated whenever a new security template is created.Content: Local security policies and user-created security templates. |
user-selected name.log |
Location: User-defined, but defaults to %windir%\<user account>\Documents\Security\LogsCreated by: Running the secedit analyze or secedit configure commands, or by using the Security Configuration and Analysis snap-in.File type: TextRefresh rate: Overwritten when secedit analyze or secedit configure is run, or by using the Security Configuration and Analysis snap-in.Content: Log file name, date and time, and the results of the analysis or investigation. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.