To configure local computer security
Notes
secedit/configure /DB FileName [/CFG FileName][/overwrite][/areas Area1 Area2...] [/log LogPath] [/quiet]
Argument | Description | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
/DB FileName | Specifies the database used to perform the security configuration. | ||||||||||||||
/CFG FileName | Specifies a security template to import into the database prior to configuring the computer. Security templates are created using the Security Templates snap-in. | ||||||||||||||
/overwrite | Specifies that the database should be emptied prior to importing the security template. If this parameter is not specified, the settings in the security template are accumulated in the database. If this parameter is not specified and there are conflicting settings in the database and the template that is being imported, the template settings take precedence. | ||||||||||||||
/areas Area1 Area2... | Specifies the security areas to be applied to the system. If this parameter is not specified, all security settings that are defined in the database are applied to the system. To configure multiple areas, separate each area by a space. The following security areas are supported:
|
||||||||||||||
/log LogPath | Specifies a file in which to log the status of the configuration process. If not specified, configuration data is logged in the scesrv.log file, which is located in the |
||||||||||||||
/quiet | Specifies that the configuration process should take place without prompting the user. |
Examples:
Notes
secedit /?