Microsoft Windows graphic

To reapply default security settings

Using the Windows interface

  1. Open Security Configuration and Analysis.
  2. In the console tree, right-click Security Configuration and Analysis, and then click Open Database.
  3. In File name, type the file name, and then click Open.
  4. Do one of the following:
    • For a domain controller, in the console tree, right-click Security Configuration and Analysis, click Import Template, and then click DC security.
    • For other computers, in the console tree, right-click Security Configuration and Analysis, click Import Template, and then click setup security.
  5. Select the Clear this database before importing check box, and then click Open.
  6. In the console tree, right-click Security Configuration and Analysis, and then click Configure Computer Now.
  7. Do one of the following:
    • To use the default log specified in Error log file path, click OK.
    • To specify a different log, in Error log file path, type a valid path and file name, and then click OK.
  8. When the configuration is done, right-click Security Configuration and Analysis, and then click View Log File.

Important

Notes

Using a command line

Argument Description
/DB FileName Required. Provides the path to a database that contains the security template that should be applied. To create a new database, type the database file name and path.
/CFG "%windir%\Security\Templates\Setup security.inf" Specifies the Setup Security.inf template that contains the default security settings.
/overwrite Specifies that the database should be emptied prior to importing the security template. If this parameter is not specified, the settings in the security template are accumulated into the database. If this parameter is not specified and there are conflicting settings in the database and the template being imported, the template settings win.
/areas Area1 Area2... Specifies the security areas to be applied to the system. If this parameter is not specified, all security settings defined in the database are applied to the system. To configure multiple areas, separate each area by a space. The following security areas are supported:
Area name Description
SECURITYPOLICY Includes account policies, audit policies, event log settings, and security options.
GROUP_MGMT Includes Restricted Group settings.
USER_RIGHTS Includes user rights assignment.
REGKEYS Includes registry permissions.
FILESTORE Includes file system permissions.
SERVICES Includes System Service settings.
/log LogPath Specifies a file in which to log the status of the configuration process. If not specified, configuration data is logged in the Scesrv.log file, which is located in the %windir%\Security\Logs folder.
/quiet Specifies that the configuration process should take place without prompting the user.

Important

Notes

Related Topics