小编给大家分享一下如何利用secedit.exe 配置本地审核策略,相信大部分人都还不怎么了解,因此分享这篇文章给大家参考一下,希望大家阅读完这篇文章后大有收获,下面让我们一起去了解一下吧!
创新互联专注于企业成都全网营销、网站重做改版、前郭网站定制设计、自适应品牌网站建设、html5、商城网站开发、集团公司官网建设、外贸网站建设、高端网站制作、响应式网页设计等建站业务,价格优惠性价比高,为前郭等各大城市提供网站开发制作服务。代码没什么技术含量,图形化操作转换为命令行而已。
效果图:
代码(samtool.bat):
代码如下:
@echo off
if {%1} == {} goto :help
if {%2} == {} goto :help
if exist SAMTool.sdb erase SAMTool.sdb /q
if exist SAMTool.inf erase SAMTool.inf /q
if exist SAMTool.log erase SAMTool.log /q
if {%1} == {-b} secedit /export /cfg %2 /log SAMTool.log /quiet
if {%1} == {-r} secedit /configure /db SAMTool.sdb /cfg %2 /log SAMTool.log /quiet
if {%1} == {-o} (
if {%4} == {} goto :help
if not {%3} == {-p} goto :help
echo %4 | findstr "[0-3]" >nul || goto :help
rem pushd %windir%\system32\
echo.[version] >>SAMTool.inf
echo.signature="$CHICAGO$" >>SAMTool.inf
echo.[Event Audit] >>SAMTool.inf
echo.%2 | findstr "D" >nul && echo.AuditDSAccess=%4 >>SAMTool.inf
echo.%2 | findstr "E" >nul && echo.AuditLogonEvents=%4 >>SAMTool.inf
echo.%2 | findstr "S" >nul && echo.AuditSystemEvents=%4 >>SAMTool.inf
echo.%2 | findstr "O" >nul && echo.AuditObjectAccess=%4 >>SAMTool.inf
echo.%2 | findstr "U" >nul && echo.AuditPrivilegeUse=%4 >>SAMTool.inf
echo.%2 | findstr "C" >nul && echo.AuditPolicyChange=%4 >>SAMTool.inf
echo.%2 | findstr "L" >nul && echo.AuditAccountLogon=%4 >>SAMTool.inf
echo.%2 | findstr "M" >nul && echo.AuditAccountManage=%4 >>SAMTool.inf
echo.%2 | findstr "P" >nul && echo.AuditProcessTracking=%4 >>SAMTool.inf
if {%2} == {A} (
echo.AuditDSAccess=%4 >>SAMTool.inf
echo.AuditLogonEvents=%4 >>SAMTool.inf
echo.AuditSystemEvents=%4 >>SAMTool.inf
echo.AuditObjectAccess=%4 >>SAMTool.inf
echo.AuditPrivilegeUse=%4 >>SAMTool.inf
echo.AuditPolicyChange=%4 >>SAMTool.inf
echo.AuditAccountLogon=%4 >>SAMTool.inf
echo.AuditAccountManage=%4 >>SAMTool.inf
echo.AuditProcessTracking=%4 >>SAMTool.inf
)
secedit /configure /db SAMTool.sdb /cfg SAMTool.inf /log SAMTool.log /quiet
)
if {%3} == {-v} type SAMTool.log
if {%5} == {-v} type SAMTool.log
if exist SAMTool.sdb erase SAMTool.sdb /q
if exist SAMTool.inf erase SAMTool.inf /q
if exist SAMTool.log erase SAMTool.log /q
exit /b
:help
cls
echo.System audit strategy manage tool. (C) Copyright 2013 enun-net.
echo.
echo.Usage: SAMTool -b^|r [drive:][path][filename] -o options -p parameters -v
echo.
echo. -b Backup the current configuration, Specifies an INF file.
echo. -r From an INF file recovery configuration.
echo. -o options^(Support multiple^):
echo. D: Directory Service Access
echo. E: Logon Events
echo. S: System Events
echo. O: Object Access
echo. U: Privilege Use
echo. C: Policy Change
echo. L: Account Logon
echo. M: Account Manage
echo. P: Process Tracking
echo. A: All audit
echo. -p parameters:
echo. 0: Don't audit
echo. 1: Only audit successful
echo. 2: Only audit failure
echo. 3: All audit ^(successful and failure^)
echo. -v Detailed results.
echo.
echo.Example: SAMTool -o EC -p 0 -v
echo. SAMTool -b c:\myconfig.inf -v
exit /b
例如:SAMTool -o EC -p 1 -v ,配置审核策略为:审核策略更改(成功),审核登录事件(成功),并显示较详细的输出。
以上是“如何利用secedit.exe 配置本地审核策略”这篇文章的所有内容,感谢各位的阅读!相信大家都有了一定的了解,希望分享的内容对大家有所帮助,如果还想学习更多知识,欢迎关注创新互联行业资讯频道!
售后响应及时
7×24小时客服热线数据备份
更安全、更高效、更稳定价格公道精准
项目经理精准报价不弄虚作假合作无风险
重合同讲信誉,无效全额退款