Secedit: import command in Windows
Secedit: import command allows you to enter the security settings that were previously exported from the configured database with security templates, and are currently stored in the inf file.To better understand how to use this command, see the example below.
The command secedit: import command
Secedit / import / db / cfg [/ overwrite] [/ areas [securitypolicy | group_mgmt | user_rights | regkeys | filestore | services]] [/ log] [/ quiet]
Secedit: import command parameter
This is a required parameter.
Specify the path and name of the database file containing the stored configuration to conduct the analysis.
If the database designation name does not have a security template (as indicated by the configuration file) associated with it, the command line / cfg option must also be specified according to
Specify whether the security pattern in the / cfg parameter should override any synthesized templates stored in the database, instead of appending the results to the stored form.This command line option is only valid when the parameter / cfg is also used.If this parameter is not specified, the template in the / cfg parameter will be added to the template stored by default.
This is a required parameter.
Specify the path and file name for the security template to be entered into the database for analysis.
This optional parameter / cfg is only valid when used with the parameter / db.
If this parameter is not specified, the analysis will be performed for any configuration stored in the database.
Specify security zones to be applied to the system.If this parameter is not specified, all security settings defined in the database will be applied to the system.To configure multiple security areas, separate each area with a space.The following security zones are supported:
Local policies and domain policies for the system, including account policies, audit policies, security options .
Group settings will be restricted to any group specified in the security form.
User login and grant privileges.
Security on local registry keys.
Secure local file storage.
Security for all identified services.
Specify the path and name of the log file to be used in the process.
Do not display the output on the screen.You can still view the analysis results by using the Security Configuration and Analysis attachment on Microsoft Management Console (MMC).
Secedit: import command comment
- Before importing the .inf file into another computer, run the secedit / generalaterollback command on the database that the import will be performed on, and run the secedit / validate command on the import file (import file) to verify the Its integrity.
- If the path for the log file is not provided, the default log file, (systemrootDocuments and Settings * UserAccountMy DocumentsSecurityLogs * DatabaseName.log) is used.
- Starting withWindows Server 2008, the Secedit / refreshpolicy subcommand has been replaced with gpupdate.For more information on how to refresh security settings, see the Gpupdate command.
For example, secedit: import command
To export the security database and domain security policies to an inf file and then import these files to another database to copy the security policy settings on another computer, type:
Secedit / export / db C: SecurityFY11SecDbContoso.sdb / mergedpolicy / cfg NetworkSharePoliciesSecContoso.inf / log C: SecurityFY11SecAnalysisContosoFY11.log / quiet
To enter only the security policy section of the file into another database on another computer, type:
Secedit / import / db C: SecurityFY12SecDbContoso.sdb / cfg NetworkSharePoliciesSecContoso.inf / securitypolicy areas / log C: SecurityFY11SecAnalysisContosoFY12.log / quiet
- Install Windows Server 2008
- Instructions for installing Windows Server 2012 step by step
- Summary of 20 common Run commands on Windows operating system
- Summary of shortcuts to know in Windows 10
- Secedit command: generaterollback in Windows
- Secedit: configure command in Windows
- Secedit command: export in Windows
- Secedit: validate command in Windows
- The command reg import and reg load in Windows
- How to Import PST Files to Office 365
- Sub-commands in nslookup Windows command (Part 2)
- Sub-commands in the nslookup Windows command (Part 1)