You can now configure or analyze your computer by using the security settings in this database. To Configure Your Computer ...


You can now configure or analyze your computer by using the security settings in this database.

To Configure Your Computer

  1. Right-click the Security Configuration and Analysis scope item
  2. Select Configure Computer Now
  3. In the dialog, type the name of the log file you wish to view, and then click OK
NOTE: After configuration is complete, you must perform an analysis to view the information in your database

To Analyze Your Computer Security Settings

  1. Right-click the Security Configuration and Analysis scope item
  2. Select Analyze Computer Now
  3. In the dialog, type the log file path, and then click OK

NOTE: To view the log file created during a configuration or analysis, select View Log File on the Security Configuration and Analysis context menu.