For a Microsoft Windows 2000 version of this article, see 313203.
This step-by-step article describes how to use Security Configuration and Analysis in Microsoft Management Console (MMC) to analyze and to configure security on a computer that is running Windows Server 2003.
You can use Security Configuration and Analysis to compare the current security configuration with a security configuration that is stored in a database. You can create a database that contains a preferred level of security and then run an analysis that compares the current configuration to the settings in the database.
Security Configuration and Analysis includes the following features:
Security Configuration and Analysis
Secedit command-line command
To analyze the security configuration of your computer, you must perform the following two steps:
Create the security database by using a security template.
Compare the computer security analysis to the database settings.
Create the Security Database
Click Start, click Run, type mmc, and then click OK.
On the File menu, click Add/Remove Snap-in.
In the Add/Remove Snap-in dialog box, click Add.
Click Security Configuration and Analysis, click Add, click Close, and then click OK.
In the left pane, expand Security Configuration and Analysis, and then read the instructions in the right pane.
Right-click Security Configuration and Analysis, and then click Open Database.
In the File name box, type the name of the database file, and then click Open.
Click the Securedc.inf template, and then click Open.
Note You do not have to click Clear this database before importing because there are no entries in the database at this time. If the database was used previously, you can click to select this check box to clear previous entries from the database.
Analyze System Security
No changes are made to the system when you analyze system security. The results of the security analysis indicate where there are differences between the settings in the template and the actual system settings.
To compare system security with the settings in the security database, follow these steps:
In the left pane, right-click Security Configuration and Analysis, and then click Analyze Computer Now.
Note the location of the error log file, and then click OK.
Note You can change the location of the error log file if you want to.
When the security analysis is complete, expand all nodes in the left pane. Expand the Registry and File System node last because these nodes have complex hierarchies.
View the entries in the right pane as you click each of the nodes.
The entries in the right pane may be marked with various symbols to indicate their status. These symbols are defined in the following table:
SYMBOL DESCRIPTION--------------------------------------------------------------------------------------Red X The entry is defined in the analysis database and on the system, but the security setting values do not match.Green check mark The entry is defined in the analysis database and on the system, and the setting values match.Question mark The entry is not defined in the analysis database and was not analyzed. If an entry is not analyzed, the entry may not be defined in the analysis database, or the user who is running the analysis may not have permissions to perform analysis on a specific object or area.Exclamation point The entry is defined in the analysis database, but does not exist on the actual system. For example, there may be a restricted group that is defined in the analysis database but does not actually exist on the system that you are analyzing.No symbol If no symbol appears, the entry is not defined in the analysis database or on the system.
If a setting is not contained in the database, you can add it. To do so, follow these steps:
Right-click an entry that is not defined in the database, and then click Properties.
Click to select the Define this policy in the database check box, and then click to select the appropriate check boxes, and then click OK.
To apply the database settings to the computer configuration, right-click Security Configuration and Analysis in the left pane, and then click Save.