Perform System Security Configure without Overwrite
Specifies that the database should be not emptied prior to importing the security template.
Workflow inputs – Perform System Security Analyze without Overwrite
Call Workflow Input | Description | Required | Default Value |
connection details | XML document conforming to the Connection Details common object that contains the information required to execute a command via command line. | Yes | n/a |
database | Specifies the database used to perform the analysis. | Yes | n/a |
security template | Specifies a security template to import into the database prior to performing the analysis. | No | There is no default value. |
security areas | Specifies the security areas to be applied to the system.
Valid values:
| No | If no value supplied all areas are applied. |
log file | Specifies a file in which to log the status of the configuration. | No | If no value supplied data logs to %windir%/security/log/sscesrv.log |
Workflow outputs – Perform System Security Analyze without Overwrite
Call Workflow Output | Description |
output | XML document consisting of one or more <line> elements that contain the command response. Each <line> element contains an index attribute indicating the order in which the information was returned by the command. |
success | Did the operation succeed?
Valid values: true, false |