Determines whether a machine is in compliance with a policy. Results are returned in an XML file. Also accepts a list of ...

Determines whether a machine is in compliance with a policy. Results are returned in an XML file. Also accepts a list of machines as input. To view the analysis results in your browser, use `scwcmd view' and specify %windir%\security\msscw	ransformfiles\scwanalysis.xsl as the XSL transform.    Syntax: scwcmd analyze [[[/m:machine | /ou:ou] /p:policy] | /i:machinelist] [/o:resultdir] [/u:username] [/t:threads] [/l] [/e]    /m:machine Specifies the NetBIOS Name, DNS Name or IP Address of the     machine to analyze. If /m is specified, then /p must also     be specified.    /ou:ou  Specifies the Fully Qualified Domain Name (FQDN) of an OU     in the Active Directory. If /ou is specified, then /p must     also be specified. All machines in the OU will be analyzed     against the given policy.    /p:policy Specifies the path and filename of the xml policy file that     should be used to perform the analysis.    /i:machinelist Specifies the path and filename of an xml file that contains     a list of machines along with their expected policy files.     All machines in the xml file will be analyzed against their     corresponding policy files.     See %windir%\security\msscw\kbs\SampleMachineList.xml    /o:resultdir Specifies the path and directory where the analysis result     files should be dumped. Default is the current directory.    /u:username Specifies an alternate credential to use when performing the     analysis on a remote machine. Default is the logged on     username.    /t:threads Specifies the number of simultaneous outstanding analysis     operations that should be maintained during the analysis     process. Default is 40.    /l  Causes the analysis operation to be logged. One log file     will be generated for each machine being analyzed.  The log     files will be stored in the same directory as the result     files.  Use the /o option to specify the directory for the     result files.    /e  Log an event to the Application Event Log if a mismatch is    found.    Examples:  scwcmd analyze /p:webpolicy.xml  scwcmd analyze /m:webserver /p:webpolicy.xml /u:webadmin  scwcmd analyze /i:campusmachines.xml /t:100 /o:\
esultserver
esults  scwcmd analyze /ou:OU=WebServers,DC=Marketing,DC=ABCCompany,DC=com /p:webpolicy.xml /u:DomainAdmin
English
English (United States)
日本語
Japanese