Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure /db filename [/cfg filename] [/overwrite][/areas area1 area2...] [/log filename] [/quiet] /db filename - Specifies the database used to perform the security configuration. /cfg filename - Specifies a security template to import into the database prior to configuring the computer. Security templates are created using the Security Templates snap-in. /overwrite - Specifies that the database should be emptied prior to importing the security template. If this parameter is not specified, the settings in the security template are accumulated into the database. If this parameter is not specified and there are conflicting settings in the database and the template being imported, the template settings win. /areas - Specifies the security areas to be applied to the system. If this parameter is not specified, all security settings defined in the database are applied to the system. To configure multiple areas, separate each area by a space. The following security areas are supported: SECURITYPOLICY - Includes Account Policies, Audit Policies, Event Log Settings and Security Options. GROUP_MGMT - Includes Restricted Group settings USER_RIGHTS - Includes User Rights Assignment REGKEYS - Includes Registry Permissions FILESTORE - Includes File System permissions SERVICES - Includes System Service settings /log filename - Specifies a file in which to log the status of the configuration process. If not specified, configuration processing information is logged in the scesrv.log file which is located in the %%windir%%\security\logs directory. /quiet - Specifies that the configuration process should take place without prompting the user for any confirmation. Example: secedit /configure /db hisecws.sdb /cfg hisecws.inf /overwrite /log hisecws.log For all filenames, the current directory is used if no path is specified.
Allows voice communication during a remote assistance session. (Note: The Remote Assistance feature will automatically configure ...
Allows Web-based programs to install software on the computer without notifying the user. By default, when a script hosted ...
Allows Windows Firewall to record information about the unsolicited incoming messages that it receives. If you enable this ...
Allows you to analyze current systems settings against baseline settings that are stored in a database. The analysis results ...
Allows you to configure a system with security settings stored in a database. The syntax of this command is: secedit /configure ...
Allows you to configure how often a Distributed File System (DFS) client attempts to discover domain controllers on their ...
Allows you to disable Windows Messenger. If you enable this setting, Windows Messenger will not run. If you disable or do ...
Allows you to export security settings stored in a database. The syntax of this command is: secedit /export /db filename ...
Allows you to generate a rollback template with respect to a configuration template. The syntax of this command is: secedit ...