Secedit:analyze
Applies To: Windows 7, Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, Windows Server 2008 R2, Windows Vista, Windows XP
Allows you to analyze current systems settings against baseline settings that are stored in a database. For examples of how this command can be used, see Examples.
Syntax
Secedit /analyze /db <database file name> [/cfg <configuration file name>] [/overwrite] [/log <log file name>] [/quiet}]
Parameters
Parameter | Description |
---|---|
db |
Required. Specifies the path and file name of a database that contains the stored configuration against which the analysis will be performed. If file name specifies a database that has not had a security template (as represented by the configuration file) associated with it, the |
cfg |
Optional. Specifies the path and file name for the security template that will be imported into the database for analysis. This /cfg option is only valid when used with the |
overwrite |
Optional. Specifies whether the security template in the /cfg parameter should overwrite any template or composite template that is stored in the database instead of appending the results to the stored template. This command-line option is only valid when the |
log |
Optional. Specifies the path and file name of the log file to be used in the process. |
quiet |
Optional. Suppresses screen output. You can still view analysis results by using the Security Configuration and Analysis snap-in to the Microsoft Management Console (MMC). |
Remarks
The analysis results are stored in a separate area of the database and can be viewed in the Security Configuration and Analysis snap-in to the MMC.
If the path for the log file is not provided, the default log file, (systemroot\Documents and Settings\UserAccount\My Documents\Security\Logs\DatabaseName.log) is used.
In Windows Server 2008, Secedit /refreshpolicy
has been replaced with gpupdate
. For information on how to refresh security settings, see Gpupdate.
Scripting <optional section>
<Here is where you discuss using the command within a script. You should also provide an FWLink to the Script Center.>
Examples
Perform the analysis for the security parameters on the security database, SecDbContoso.sdb, you created using the Security Configuration and Analysis snap-in. Direct the output to the file SecAnalysisContosoFY11 with prompting so you can verify the command ran correctly.
Secedit /analyze /db C:\Security\FY11\SecDbContoso.sdb /log C:\Security\FY11\SecAnalysisContosoFY11.log
Let’s say that the analysis revealed some inadequacies so the security template, SecContoso.inf, was modified. Run the command again to incorporate the changes, directing the output to the existing file SecAnalysisContosoFY11 with no prompting.
Secedit /analyze /db C:\Security\FY11\SecDbContoso.sdb /cfg SecContoso.inf /overwrite /log C:\Security\FY11\SecAnalysisContosoFY11.xml /quiet