Skip navigation

JSI Tip 8632. RegView.exe is a command-line tool that allows you to view Group Policy <B>Registry.pol</B> files without applying them to the registry.

The free Windows Server 2003 Resource Kit tools contain RegView.exe, a command-line tool that allows you to view Group Policy Registry.pol files without applying them to the registry.

The ReadMe.htm file contains:

Regview.exe: Registry Viewer Tool

Registry Viewer Tool (RegView) is a command-line tool that allows you to view Group Policy Registry.pol files without applying them to the registry.

Concepts

Registry.pol Files

The Administrative Templates extension of Group Policy saves information in the Group Policy template in text files with the name Registry.pol. These files contain the customized registry settings that are applied to the Machine or User portion of the registry, which you specify by using Group Policy Object Editor. The Windows 2000 Registry.pol file is analogous to the Windows 95 or Windows 98 Config.pol file and the Windows NT® 4.0 NTConfig.pol file.

Two Registry.pol files are created and stored in the Group Policy template—one for Computer Configuration, which is stored in the \Machine subdirectory, and one for User Configuration, which is stored in the \User subdirectory.

Note

The format of the .pol files in the Group Policy template differs from that of the .pol files in previous versions of Windows.

The .pol files created by Windows NT 4.0 and Windows 95 can be applied only to the operating system on which they were created. The .pol file produced by the Windows NT 4.0 System Policy Editor was a binary file, whereas the Registry.pol file produced by the Administrative Templates node of Group Policy Object Editor is a text file with embedded binary strings.

System Requirements

The following are the system requirements for this tool:

  • Windows Server 2003 or Windows 2000 operating system.
  • You must be an Administrator on the local computer.

File Required

  • Regview.exe

RegView Syntax

regview PathName\registry.pol

PathName
Specifies the complete path to the directory containing the Registry.pol files that you want to view.

RegView Examples

Example: View a Registry.pol file

The task in this example is to use RegView to view a Registry.pol file.

Type the following at the command line:

regview c:\registry.pol

Output similar to the following is displayed:

KeyName:        Software\Policies\Microsoft\SystemCertificates\EFS
ValueName:      EFSBlob
ValueType:      REG_BINARY
Value:
01 00 01 00 01 00 00 00 77 02 00 00 73 02 00 00
00 00 00 00 00 00 00 00 01 05 00 00 00 00 00 05
15 00 00 00 96 81 73 8c ab 8b 00 94 b3 36 4b 6a
f4 01 00 00 30 82 02 37 30 82 01 a4 a0 03 02 01
02 02 10 66 f1 c8 25 99 9c 84 8d 42 65 f5 cd 3c
fa 5c b5 30 09 06 05 2b 0e 03 02 1d 05 00 30 50
31 16 30 14 06 03 55 04 03 13 0d 41 64 6d 69 6e
69 73 74 72 61 74 6f 72 31 0c 30 0a 06 03 55 04
07 13 03 45 46 53 31 28 30 26 06 03 55 04 0b 13
1f 45 46 53 20 46 69 6c 65 20 45 6e 63 72 79 70
74 69 6f 6e 20 43 65 72 74 69 66 69 63 61 74 65
30 1e 17 0d 30 33 30 33 33 31 31 39 32 39 30 36
5a 17 0d 30 36 30 33 33 30 31 39 32 39 30 36 5a
30 50 31 16 30 14 06 03 55 04 03 13 0d 41 64 6d
69 6e 69 73 74 72 61 74 6f 72 31 0c 30 0a 06 03
55 04 07 13 03 45 46 53 31 28 30 26 06 03 55 04
0b 13 1f 45 46 53 20 46 69 6c 65 20 45 6e 63 72
79 70 74 69 6f 6e 20 43 65 72 74 69 66 69 63 61
74 65 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 
01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 b7
94 55 3d 85 39 02 47 bc 64 82 08 33 60 85 36 09
a6 08 99 71 e1 fe 79 2a e0 25 84 c3 ca 28 22 97
9d fd ca 49 8d 14 1d 20 f6 81 f9 0f 47 ed cf 7c
eb e5 ad 74 e4 d4 01 ea 2b a4 4e 9b 09 19 16 05
KeyName:        Software\Policies\Microsoft\SystemCertificates\EFS\CertificatesB7140ABD7B323D6143C57395BE8867D366EAACCD
ValueName:      Blob
ValueType:      REG_BINARY
Value:
03 00 00 00 01 00 00 00 14 00 00 00 b7 14 0a bd 
7b 32 3d 61 43 c5 73 95 be 88 67 d3 66 ea ac cd
02 00 00 00 01 00 00 00 c4 00 00 00 1c 00 00 00 
6c 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 01 00 00 00 65 00 37 00 39 00 64 00
61 00 34 00 37 00 65 00 2d 00 34 00 33 00 39 00
39 00 2d 00 34 00 31 00 63 00 32 00 2d 00 38 00
39 00 37 00 35 00 2d 00 62 00 63 00 34 00 38 00
34 00 61 00 31 00 37 00 39 00 37 00 31 00 34 00
00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00
6f 00 73 00 6f 00 66 00 74 00 20 00 42 00 61 00
73 00 65 00 20 00 43 00 72 00 79 00 70 00 74 00
6f 00 67 00 72 00 61 00 70 00 68 00 69 00 63 00
20 00 50 00 72 00 6f 00 76 00 69 00 64 00 65 00
72 00 20 00 76 00 31 00 2e 00 30 00 00 00 00 00
20 00 00 00 01 00 00 00 3b 02 00 00 30 82 02 37
30 82 01 a4 a0 03 02 01 02 02 10 66 f1 c8 25 99
9c 84 8d 42 65 f5 cd 3c fa 5c b5 30 09 06 05 2b
0e 03 02 1d 05 00 30 50 31 16 30 14 06 03 55 04
03 13 0d 41 64 6d 69 6e 69 73 74 72 61 74 6f 72
31 0c 30 0a 06 03 55 04 07 13 03 45 46 53 31 28
30 26 06 03 55 04 0b 13 1f 45 46 53 20 46 69 6c
65 20 45 6e 63 72 79 70 74 69 6f 6e 20 43 65 72
74 69 66 69 63 61 74 65 30 1e 17 0d 30 33 30 33
33 31 31 39 32 39 30 36 5a 17 0d 30 36 30 33 33

KeyName:        Software\Policies\Microsoft\SystemCertificates\EFS\CRLs
ValueName:
ValueType:      REG_NONE
Value:          This key contains no values
 
KeyName:        Software\Policies\Microsoft\SystemCertificates\EFS\CTLs
ValueName:
ValueType:      REG_NONE
Value:          This key contains no values



Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish