JSI Tip 8632. RegView.exe is a command-line tool that allows you to view Group Policy Registry.pol files without applying them to the registry.
October 31, 2004
The free Windows Server 2003 Resource Kit tools contain RegView.exe, a command-line tool that allows you to view Group Policy Registry.pol files without applying them to the registry.
The ReadMe.htm file contains:
Regview.exe: Registry Viewer Tool
Registry Viewer Tool (RegView) is a command-line tool that allows you to view Group Policy Registry.pol files without applying them to the registry.
Concepts
Registry.pol Files
The Administrative Templates extension of Group Policy saves information in the Group Policy template in text files with the name Registry.pol. These files contain the customized registry settings that are applied to the Machine or User portion of the registry, which you specify by using Group Policy Object Editor. The Windows 2000 Registry.pol file is analogous to the Windows 95 or Windows 98 Config.pol file and the Windows NT® 4.0 NTConfig.pol file.
Two Registry.pol files are created and stored in the Group Policy template—one for Computer Configuration, which is stored in the Machine subdirectory, and one for User Configuration, which is stored in the User subdirectory.
Note
The format of the .pol files in the Group Policy template differs from that of the .pol files in previous versions of Windows.
The .pol files created by Windows NT 4.0 and Windows 95 can be applied only to the operating system on which they were created. The .pol file produced by the Windows NT 4.0 System Policy Editor was a binary file, whereas the Registry.pol file produced by the Administrative Templates node of Group Policy Object Editor is a text file with embedded binary strings.
System Requirements
The following are the system requirements for this tool:
Windows Server 2003 or Windows 2000 operating system.
You must be an Administrator on the local computer.
File Required
Regview.exe
RegView Syntax
regview PathNameregistry.pol
PathNameSpecifies the complete path to the directory containing the Registry.pol files that you want to view.
RegView Examples
Example: View a Registry.pol file
The task in this example is to use RegView to view a Registry.pol file.
Type the following at the command line:
regview c:registry.pol
Output similar to the following is displayed:
KeyName: SoftwarePoliciesMicrosoftSystemCertificatesEFSValueName: EFSBlobValueType: REG_BINARYValue:01 00 01 00 01 00 00 00 77 02 00 00 73 02 00 0000 00 00 00 00 00 00 00 01 05 00 00 00 00 00 0515 00 00 00 96 81 73 8c ab 8b 00 94 b3 36 4b 6af4 01 00 00 30 82 02 37 30 82 01 a4 a0 03 02 0102 02 10 66 f1 c8 25 99 9c 84 8d 42 65 f5 cd 3cfa 5c b5 30 09 06 05 2b 0e 03 02 1d 05 00 30 5031 16 30 14 06 03 55 04 03 13 0d 41 64 6d 69 6e69 73 74 72 61 74 6f 72 31 0c 30 0a 06 03 55 0407 13 03 45 46 53 31 28 30 26 06 03 55 04 0b 131f 45 46 53 20 46 69 6c 65 20 45 6e 63 72 79 7074 69 6f 6e 20 43 65 72 74 69 66 69 63 61 74 6530 1e 17 0d 30 33 30 33 33 31 31 39 32 39 30 365a 17 0d 30 36 30 33 33 30 31 39 32 39 30 36 5a30 50 31 16 30 14 06 03 55 04 03 13 0d 41 64 6d69 6e 69 73 74 72 61 74 6f 72 31 0c 30 0a 06 0355 04 07 13 03 45 46 53 31 28 30 26 06 03 55 040b 13 1f 45 46 53 20 46 69 6c 65 20 45 6e 63 7279 70 74 69 6f 6e 20 43 65 72 74 69 66 69 63 6174 65 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 b794 55 3d 85 39 02 47 bc 64 82 08 33 60 85 36 09a6 08 99 71 e1 fe 79 2a e0 25 84 c3 ca 28 22 979d fd ca 49 8d 14 1d 20 f6 81 f9 0f 47 ed cf 7ceb e5 ad 74 e4 d4 01 ea 2b a4 4e 9b 09 19 16 05KeyName: SoftwarePoliciesMicrosoftSystemCertificatesEFSCertificatesB7140ABD7B323D6143C57395BE8867D366EAACCDValueName: BlobValueType: REG_BINARYValue:03 00 00 00 01 00 00 00 14 00 00 00 b7 14 0a bd 7b 32 3d 61 43 c5 73 95 be 88 67 d3 66 ea ac cd02 00 00 00 01 00 00 00 c4 00 00 00 1c 00 00 00 6c 00 00 00 01 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 01 00 00 00 65 00 37 00 39 00 64 0061 00 34 00 37 00 65 00 2d 00 34 00 33 00 39 0039 00 2d 00 34 00 31 00 63 00 32 00 2d 00 38 0039 00 37 00 35 00 2d 00 62 00 63 00 34 00 38 0034 00 61 00 31 00 37 00 39 00 37 00 31 00 34 0000 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 006f 00 73 00 6f 00 66 00 74 00 20 00 42 00 61 0073 00 65 00 20 00 43 00 72 00 79 00 70 00 74 006f 00 67 00 72 00 61 00 70 00 68 00 69 00 63 0020 00 50 00 72 00 6f 00 76 00 69 00 64 00 65 0072 00 20 00 76 00 31 00 2e 00 30 00 00 00 00 0020 00 00 00 01 00 00 00 3b 02 00 00 30 82 02 3730 82 01 a4 a0 03 02 01 02 02 10 66 f1 c8 25 999c 84 8d 42 65 f5 cd 3c fa 5c b5 30 09 06 05 2b0e 03 02 1d 05 00 30 50 31 16 30 14 06 03 55 0403 13 0d 41 64 6d 69 6e 69 73 74 72 61 74 6f 7231 0c 30 0a 06 03 55 04 07 13 03 45 46 53 31 2830 26 06 03 55 04 0b 13 1f 45 46 53 20 46 69 6c65 20 45 6e 63 72 79 70 74 69 6f 6e 20 43 65 7274 69 66 69 63 61 74 65 30 1e 17 0d 30 33 30 3333 31 31 39 32 39 30 36 5a 17 0d 30 36 30 33 33KeyName: SoftwarePoliciesMicrosoftSystemCertificatesEFSCRLsValueName:ValueType: REG_NONEValue: This key contains no values KeyName: SoftwarePoliciesMicrosoftSystemCertificatesEFSCTLsValueName:ValueType: REG_NONEValue: This key contains no values
About the Author
You May Also Like