Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2008 Server Core : Virus and External Intrusion Protection (part 4) - Configuring Local Security Policies with the SecEdit Utility

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/26/2011 9:50:46 PM

5. Configuring Local Security Policies with the SecEdit Utility

The Security Edit (SecEdit) utility helps you analyze and manage security policies on your system. This utility uses the following syntax:

secedit /analyze /db FileName [/cfg FileName] [/overwrite]
[/log FileName] [/quiet]
secedit /configure /db FileName [/cfg FileName ] [/overwrite]
[/areas Area1 Area2 ...] [/log FileName] [/quiet]
secedit /export [/db FileName] [/cfg FileName]
[/mergedpolicy] [/areasArea1 Area2 ...] [/log FileName] [/quiet]
secedit /import /db FileName.sdb /cfg FileName [/overwrite]
[/areas Area1 Area2 ...] [/log FileName] [/quiet]
secedit /validate FileName
secedit /GenerateRollback /CFG FileName /RBK SecurityTemplatefilename
[/log FileName] [/quiet]

The following list describes each of the command line arguments.


/analyze

Provides performance analysis of the security policy on a system by comparing it to the settings in a database.


/db
FileName

Specifies the database used to perform the analysis, configuration, or other tasks.


/cfg
FileName

Specifies a security template to import into the database before the utility performs a task. You can create a security template using the Security Template Microsoft Management Console (MMC) snap-in.


/overwrite

Overwrites any existing database entries before the utility imports the security template. Otherwise, the utility adds the settings in the security template to the existing database.


/log
FileName

Specifies the file to use for logging purposes. The log receives the status of the configuration process. If you don't specify this command line switch, the utility uses the SCESrv.LOG file located in the \WINDOWS\security\logs folder.


/quiet

Performs the analysis without displaying any comments.


/configure

Performs a security configuration based on the content of the specified security database.


/areas Area1 Area2 ...

Specifies the security areas to manage. If you don't include this command line switch, the utility manages all security areas. You can specify multiple areas by separating each area with a space. The following list contains the valid security areas.


SECURITYPOLICY

Defines the user security policy, which includes account policies, audit policies, event log settings, and security options.


GROUP_MGMT

Defines the restricted group settings.


USER_RIGHTS

Defines the user rights assignments to system objects.


REGKEYS

Defines the registry permissions.


FILESTORE

Defines the file system permissions.


SERVICES

Defines the system service settings.


/export

Exports the security settings to a database file.


/mergedpolicy

Creates a merged database file that includes both local and domain security settings.


/import

Imports the security settings from a database file. You can use a template file to provide overrides for settings in the database.


/validate
FileName

Validates the contents of a security template. Use this option to reduce syntax-induced errors.


/GenerateRollback

Generates a security rollback based on the content of a security rollback template. The system offers you the opportunity to create a rollback template when you apply a security update to the system. This rollback template returns the system to the state it was in before the security update.


/RBK
SecurityTemplatefilename

Specifies the name of the file that contains the security rollback template.

Other -----------------
- Windows Server 2008 Server Core : Managing System Users - Discovering User Identity with the WhoAmI Utility
- Exchange Server 2010 : Installing a Windows Certification Authority Server
- Exchange Server 2010 : Understanding Public Key Infrastructure (part 2) - Manual Encrypted Communications Using Outlook
- Exchange Server 2010 : Understanding Public Key Infrastructure (part 1)
- BizTalk 2010 Recipes : Document Mapping - Organizing Maps
- BizTalk 2010 Recipes : Document Mapping - Creating Simple Maps
- BizTalk 2010 Recipes : Creating SOAP Header Schemas
- Windows Server 2008 R2 : Managing Active Directory with Policies (part 5)
- Windows Server 2008 R2 : Managing Active Directory with Policies (part 4) - Deploying Software Packages Using Domain Group Policy Objects
- Windows Server 2008 R2 : Managing Active Directory with Policies (part 3) - Extending Group Policy Functionality
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server