Secedit: configure command in Windows
Secedit: configure command allows you to configure the current system settings using the security settings stored in the database.To better understand how to use this command, see the example below.
Syntax command secedit: configure
Secedit / configure / db [/ cfg] [/ overwrite] [/ areas SECURITYPOLICY | GROUP_MGMT | USER_RIGHTS | REGKEYS | FILESTORE | SERVICES] [/ log] [/ quiet]
The secedit command: configure
Parameters
Describe
db
This is a required parameter.
Specify the path and file name of the database that contains the stored configuration.
If the database designation name does not have a security template (as indicated by the configuration file) associated with it, the command line / cfg option must also be specified according to
cfg
Optional parameters.
Specify the path and file name for the security template to be entered into the database for analysis.
This optional parameter / cfg is only valid when used with the parameter / db.
If this parameter is not specified, the analysis will be performed for any configuration stored in the database.
overwrite
Optional parameters.
Specify whether the security pattern in the / cfg parameter should override any synthesized templates stored in the database, instead of appending the results to the stored form. This command line option is only valid when the parameter / cfg is also used. If this parameter is not specified, the template in the / cfg parameter will be added to the template stored by default.
areas
Optional parameters.
Specify security zones to be applied to the system.If this parameter is not specified, all security settings defined in the database will be applied to the system.To configure multiple security areas, separate each area with a space.The following security zones are supported:
- SecurityPolicy
Local policies and domain policies for the system, including account policies, audit policies, security options .
- Group_Mgmt
Group settings will be restricted to any group specified in the security form.
- User_Rights
User login and grant privileges.
- RegKeys
Security on local registry keys.
- FileStore
Secure local file storage.
- Services
Security for all identified services.
log
Optional parameters.
Specify the path and name of the log file to be used in the process.
quiet
Optional parameters.
Do not display the output on the screen.You can still view the analysis results by using the Security Configuration and Analysis attachment on Microsoft Management Console (MMC).
Secedit: configure command
- If the path for the log file is not provided, the default log file, (systemrootDocuments and Settings * UserAccountMy DocumentsSecurityLogs * DatabaseName.log) will be used.
- Starting with Windows Server 2008, the Secedit / refreshpolicy subcommand has been replaced with gpupdate.For more information on how to refresh security settings, see the Gpupdate command.
For example, command secedit: configure
To conduct an analysis of the security parameters on the security database named SecDbContoso.sdb that you created with the attachment of Security Configuration and Analysis and direct the output to the SecAnalysisContosoFY11 file with the prompt for you Can verify if the command is running correctly.Type:
Secedit / analyze / db C: SecurityFY11SecDbContoso.sdb / log C: SecurityFY11SecAnalysisContosoFY11.log
Assume that the analysis process shows some inadequacies, so the SecContoso.inf security template has been modified.Rerun the command to combine the changes, direct the output to an existing file named SecAnalysisContosoFY11 without prompting, type:
Secedit / configure / db C: SecurityFY11SecDbContoso.sdb / cfg SecContoso.inf / overwrite / log C: SecurityFY11SecAnalysisContosoFY11.xml / quiet
See more:
- Summary of 20 common Run commands on Windows operating system
- Overview of Windows Server 2008
- Install Windows Server 2008
- Instructions for installing Windows Server 2012 step by step
You should read it
May be interested
- Sub-commands in nslookup Windows command (Part 2)nslookup set all command, nslookup set class, nslookup set d2, alias nslookup set debug, nslookup set domain, nslookup set port, and nslookup set querytype in windows
- Sub-commands in the nslookup Windows command (Part 1)nslookup command exit, finger nslookup, nslookup help, nslookup ls, nslookup lserver, nslookup root, commandlooklook server, nslookup set in windows
- Sub-commands in nslookup Windows command (Part 3)nslookup set recurse, nslookup set retry, nslookup set root, nslookup set search, nslookup set srchlist, nslookup set timeout, nslookup set type, nslookup set vc, and nslookup view in windows
- Command at in Windowsthe at command schedules commands and programs to run on a computer at a specified time with a specific date. you can only use the command at when schedule service is running.
- Set command in Windowsthe set command helps show, set or remove cmd.exe environment variables.
- Del command in Windowsthe del command deletes one or more files. this command is the same as the eraser command.
- 10 useful commands in Windows you should knowcommand prompt is used to execute batch files, perform tasks quickly, help you troubleshoot and solve some windows problems when the system crashes. however, not all commands in windows are useful and must be done regularly. with the 10 command lines in the following article it is very useful even if you are not an administrator.
- How to use the option equivalent to the 'ls' command in Windowsthe 'ls' command (note ls, not is) is one of the first terminal commands veterans teach to linux beginners.
- The command reg add in Windowsthe reg add command adds new subkeys or entries to the registry.
- Rem command in Windowsthe rem command helps write comments (comments) in a batch file or config.sys.