Secedit command: export in Windows
The secedit: export command allows you to export the security settings stored in the configured database with security templates.To better understand how to use this command, see the example below.
Syntax secedit command: export
Secedit / export / db [/ mergedpolicy] / cfg [/ areas [securitypolicy | group_mgmt | user_rights | regkeys | filestore | services]] [/ log] [/ quiet]
Parameter secedit command: export
Parameters
Describe
db
This is a required parameter.
Specify the path and name of the database file containing the stored configuration to conduct the analysis.
If the database designation name does not have a security template (as indicated by the configuration file) associated with it, the command line / cfg option must also be specified according to
mergedpolicy
Optional parameters.
Merging and exporting domain names as well as local security policy settings
cfg
This is a required parameter.
Specify the path and name for the security template to be entered into the database for analysis.
This optional parameter / cfg is only valid when used with the parameter / db.
If this parameter is not specified, the analysis will be performed for any configuration stored in the database.
areas
Optional parameters.
Specify security zones to be applied to the system.If this parameter is not specified, all security settings defined in the database will be applied to the system.To configure multiple security areas, separate each area with a space.The following security zones are supported:
- SecurityPolicy
Local policies and domain policies for the system, including account policies, audit policies, security options .
- Group_Mgmt
Group settings will be restricted to any group specified in the security form.
- User_Rights
User login and grant privileges.
- RegKeys
Security on local registry keys.
- FileStore
Secure local file storage.
- Services
Security for all identified services.
log
Optional parameters.
Specify the path and name of the log file to be used in the process.
quiet
Optional parameters.
Do not display the output on the screen.You can still view the analysis results by using the Security Configuration and Analysis attachment on Microsoft Management Console (MMC).
Note the secedit command: export
- You can use this command to back up your security policy on the local computer in addition to entering the settings to another computer.
- If the path for the log file is not provided, the default log file, (systemrootDocuments and Settings * UserAccountMy DocumentsSecurityLogs * DatabaseName.log) will be used.
- Starting withWindows Server 2008, the Secedit / refreshpolicy subcommand has been replaced with gpupdate.For more information on how to refresh security settings, see the Gpupdate command.
For example, secedit command: export
To export the security database and domain security policies to an inf file and then import this file to another database to copy the security policy settings on another computer, type:
Secedit / export / db C: SecurityFY11SecDbContoso.sdb / mergedpolicy / cfg SecContoso.inf / log C: SecurityFY11SecAnalysisContosoFY11.log / quiet
To import this file into a database on another computer, type:
Secedit / import / db C: SecurityFY12SecDbContoso.sdb / cfg SecContoso.inf / log C: SecurityFY11SecAnalysisContosoFY12.log / quiet
See more:
- Summary of 20 common Run commands on Windows operating system
- Overview of Windows Server 2008
- Instructions for installing Windows Server 2012 step by step
- Install Windows Server 2008
You should read it
- Secedit command in Windows
- Secedit: import command in Windows
- Secedit: analyze command in Windows
- Secedit: configure command in Windows
- Secedit command: generaterollback in Windows
- Secedit: validate command in Windows
- The reg export command in Windows
- Offer PDF Export Kit - a PDF converter to other formats for $ 49, which is free
- How to set up and use the Quick Export feature in Photoshop
- How to export emails from Mail to Note on Mac
- How to export printing images in Photoshop
- Steps to export Microsoft Access data to Word documents
Maybe you are interested
Should I buy a USB, Bluetooth or NFC security key?
4 Security Steps to Follow When Using Remote Access Applications
Series of DrayTek router models have security holes
If you have an AMD CPU, install this important security update!
Roundup of new Chrome features and security updates
Google releases emergency security patch, fixes 4 security flaws on Chrome