The free Windows Server 2003 Resource Kit tools contain RegView.exe, a command-line tool that allows you to view Group Policy Registry.pol files without applying them to the registry.
The ReadMe.htm file contains:
Regview.exe: Registry Viewer Tool
Registry Viewer Tool (RegView) is a command-line tool that allows you to view Group Policy Registry.pol files without applying them to the registry.
Concepts
Registry.pol Files
The Administrative Templates extension of Group Policy saves information in the Group Policy template in text files with the name Registry.pol. These files contain the customized registry settings that are applied to the Machine or User portion of the registry, which you specify by using Group Policy Object Editor. The Windows 2000 Registry.pol file is analogous to the Windows 95 or Windows 98 Config.pol file and the Windows NT® 4.0 NTConfig.pol file.
Two Registry.pol files are created and stored in the Group Policy template—one for Computer Configuration, which is stored in the \Machine subdirectory, and one for User Configuration, which is stored in the \User subdirectory.
Note
The format of the .pol files in the Group Policy template differs from that of the .pol files in previous versions of Windows.
The .pol files created by Windows NT 4.0 and Windows 95 can be applied only to the operating system on which they were created. The .pol file produced by the Windows NT 4.0 System Policy Editor was a binary file, whereas the Registry.pol file produced by the Administrative Templates node of Group Policy Object Editor is a text file with embedded binary strings.
System Requirements
The following are the system requirements for this tool:
- Windows Server 2003 or Windows 2000 operating system.
- You must be an Administrator on the local computer.
File Required
- Regview.exe
RegView Syntax
regview PathName\registry.pol
- PathName
- Specifies the complete path to the directory containing the Registry.pol files that you want to view.
RegView Examples
Example: View a Registry.pol file
The task in this example is to use RegView to view a Registry.pol file.
Type the following at the command line:
regview c:\registry.pol
Output similar to the following is displayed:
KeyName: Software\Policies\Microsoft\SystemCertificates\EFS ValueName: EFSBlob ValueType: REG_BINARY Value: 01 00 01 00 01 00 00 00 77 02 00 00 73 02 00 00 00 00 00 00 00 00 00 00 01 05 00 00 00 00 00 05 15 00 00 00 96 81 73 8c ab 8b 00 94 b3 36 4b 6a f4 01 00 00 30 82 02 37 30 82 01 a4 a0 03 02 01 02 02 10 66 f1 c8 25 99 9c 84 8d 42 65 f5 cd 3c fa 5c b5 30 09 06 05 2b 0e 03 02 1d 05 00 30 50 31 16 30 14 06 03 55 04 03 13 0d 41 64 6d 69 6e 69 73 74 72 61 74 6f 72 31 0c 30 0a 06 03 55 04 07 13 03 45 46 53 31 28 30 26 06 03 55 04 0b 13 1f 45 46 53 20 46 69 6c 65 20 45 6e 63 72 79 70 74 69 6f 6e 20 43 65 72 74 69 66 69 63 61 74 65 30 1e 17 0d 30 33 30 33 33 31 31 39 32 39 30 36 5a 17 0d 30 36 30 33 33 30 31 39 32 39 30 36 5a 30 50 31 16 30 14 06 03 55 04 03 13 0d 41 64 6d 69 6e 69 73 74 72 61 74 6f 72 31 0c 30 0a 06 03 55 04 07 13 03 45 46 53 31 28 30 26 06 03 55 04 0b 13 1f 45 46 53 20 46 69 6c 65 20 45 6e 63 72 79 70 74 69 6f 6e 20 43 65 72 74 69 66 69 63 61 74 65 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 b7 94 55 3d 85 39 02 47 bc 64 82 08 33 60 85 36 09 a6 08 99 71 e1 fe 79 2a e0 25 84 c3 ca 28 22 97 9d fd ca 49 8d 14 1d 20 f6 81 f9 0f 47 ed cf 7c eb e5 ad 74 e4 d4 01 ea 2b a4 4e 9b 09 19 16 05 KeyName: Software\Policies\Microsoft\SystemCertificates\EFS\CertificatesB7140ABD7B323D6143C57395BE8867D366EAACCD ValueName: Blob ValueType: REG_BINARY Value: 03 00 00 00 01 00 00 00 14 00 00 00 b7 14 0a bd 7b 32 3d 61 43 c5 73 95 be 88 67 d3 66 ea ac cd 02 00 00 00 01 00 00 00 c4 00 00 00 1c 00 00 00 6c 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 65 00 37 00 39 00 64 00 61 00 34 00 37 00 65 00 2d 00 34 00 33 00 39 00 39 00 2d 00 34 00 31 00 63 00 32 00 2d 00 38 00 39 00 37 00 35 00 2d 00 62 00 63 00 34 00 38 00 34 00 61 00 31 00 37 00 39 00 37 00 31 00 34 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 42 00 61 00 73 00 65 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00 69 00 63 00 20 00 50 00 72 00 6f 00 76 00 69 00 64 00 65 00 72 00 20 00 76 00 31 00 2e 00 30 00 00 00 00 00 20 00 00 00 01 00 00 00 3b 02 00 00 30 82 02 37 30 82 01 a4 a0 03 02 01 02 02 10 66 f1 c8 25 99 9c 84 8d 42 65 f5 cd 3c fa 5c b5 30 09 06 05 2b 0e 03 02 1d 05 00 30 50 31 16 30 14 06 03 55 04 03 13 0d 41 64 6d 69 6e 69 73 74 72 61 74 6f 72 31 0c 30 0a 06 03 55 04 07 13 03 45 46 53 31 28 30 26 06 03 55 04 0b 13 1f 45 46 53 20 46 69 6c 65 20 45 6e 63 72 79 70 74 69 6f 6e 20 43 65 72 74 69 66 69 63 61 74 65 30 1e 17 0d 30 33 30 33 33 31 31 39 32 39 30 36 5a 17 0d 30 36 30 33 33 KeyName: Software\Policies\Microsoft\SystemCertificates\EFS\CRLs ValueName: ValueType: REG_NONE Value: This key contains no values KeyName: Software\Policies\Microsoft\SystemCertificates\EFS\CTLs ValueName: ValueType: REG_NONE Value: This key contains no values