Secedit command in Windows
The secedit command helps configure and analyze system security by comparing your current configuration with the specified security patterns.
Syntax secedit command
secedit
[/ analyze / db / cfg [/ overwrite] / log [/ quiet]]
[/ configure / db [/ cfg] [/ overwrite] [/ areas [securitypolicy | group_mgmt | user_rights | regkeys | filestore | services]] [/ log] [/ quiet]]
[/ export / db [/ mergedpolicy] / cfg [/ areas [securitypolicy | group_mgmt | user_rights | regkeys | filestore | services]] [/ log]]
[/ generaterollback / db / cfg / rbk [/ log] [/ quiet]]
[/ import / db / cfg [/ overwrite] [/ areas [securitypolicy | group_mgmt | user_rights | regkeys | filestore | services]] [/ log] [/ quiet]]
[/ hợp lệ]
The secedit command parameter
Parameter (subcommand)
Describe
Secedit: analyze
Allows you to analyze the current system settings based on the basic settings stored in the database.The analytical results will be stored in a separate area of the database and can be viewed in the attachment of the Security Configuration and Analysis section.
Secedit: configure
Allows you to configure the system with security settings stored in the database.
Secedit: export
Allows you to export security settings stored in the database.
Secedit: generaterollback
Allows you to create rollback patterns for configuration templates.
Secedit: import
Allows you to enter security templates into the database so that the settings specified in the form can be applied to the system or analyzed by the system.
Secedit: validate
Allows you to validate the syntax of the security template.
Note the secedit command
For the filenames parameter, the current directory will be used by default if no path is specified.When a security pattern is created using the Security Template attachment and the attachment of Security Configuration and Analysis is run, the following files will be created:
File
Describe
Scesrv.log
Location:% Windir% securitylog
Created by: Operating system
File type: Text
Refresh rate: Perform overwriting when the sub-command secedit / analyze, / configure, / export or / import is started.
Content: Contains analytical results grouped by type of policy.
User-selected name.sdb
Location:% windir% * user accountDocumentsSecurityDatabase
Created by: When running the attachment of Security Configuration and Analysis
File type: Exclusive
Refresh rate: Perform an update whenever a new security template is created.
Content: Includes local security policies and user-created security templates.
User-selected name.log
Location: Can be specified by the user but by default it will be% windir% * user accountDocumentsSecurityLogs
Created by: When running child / analyze commands and / configure (or using the attachment of Security Configuration and Analysis)
File type: Basic
Refresh rate: Override when sub-commands the child / analyze and / configure commands (or use the attachment of the Security Configuration and Analysis) are initialized.
Content included:
1. Log file name
2. Date and time
3. Results of analysis or investigation.
User-selected name.inf
Location:% windir% * user accountDocumentsSecurityTemplates
Created by: When running an attachment of Security Template
File type: Text
Refresh rate: Each time the security template is updated
Content: Contains setting information for the template for each policy selected by the attachment.
Note: Microsoft Management Console (MMC) and the Security Configuration and Analysis attachments are not available on Server Core.
See more:
- Summary of 20 common Run commands on Windows operating system
- Summary of shortcuts to know in Windows 10
- Basic Linux commands everyone needs to know
- Table summarizes the basic PowerShell commands
You should read it
May be interested
- Set command in Windowsthe set command helps show, set or remove cmd.exe environment variables.
- Del command in Windowsthe del command deletes one or more files. this command is the same as the eraser command.
- 10 useful commands in Windows you should knowcommand prompt is used to execute batch files, perform tasks quickly, help you troubleshoot and solve some windows problems when the system crashes. however, not all commands in windows are useful and must be done regularly. with the 10 command lines in the following article it is very useful even if you are not an administrator.
- How to use the option equivalent to the 'ls' command in Windowsthe 'ls' command (note ls, not is) is one of the first terminal commands veterans teach to linux beginners.
- The command reg add in Windowsthe reg add command adds new subkeys or entries to the registry.
- Rem command in Windowsthe rem command helps write comments (comments) in a batch file or config.sys.
- Instructions for using Command Promptdeep in windows is a command-line world that is obscure. in this article, we will show you how to solve errors and make your computer more secure.
- Rd command in Windowsthe rd command helps delete a directory
- Cmd command in Windowsthe cmd command starts a new version of the command interpreter, cmd.exe. if used without parameters, cmd will display copyright information and the version of the operating system.
- How to use the command history function in Command Promptcommand prompt is an extremely familiar command for anyone using windows operating system. besides, a lot of current software also supports the command line to perform actions on the command prompt window, instead of on the screen.