c:\windows\security folder

Posted on 2006-05-11
Last Modified: 2013-12-04
Hello guys,

I need some info about this folder. I do know the security templates are inhere, but are trying to make a backup and some of the files in this dir are in use when we try to backup (tmp.edb, edb.log..). Does anybody have any idea what these files are for?? I can figure out myself that this is some sort of database (the tmp.edb) and even that it's a temp db. Also the other one will most probably be the log of the db (like a transaction log kinda thing in Exchange), but what's stored in this database and log file??

Prefarably with a Microsoft document if possible....
Question by:rhandels
    LVL 16

    Assisted Solution

    I couldn't find a Microsoft article that did not deal with exchange but this article says

    edb.log "Any changes made to objects in Active Directory are first saved to a transaction log. During lulls in CPU activity, the database engine commits the transactions into the main Ntds.dit database"

    Temp.edb "This is a scratch pad used to store information about in-progress transactions and to hold pages pulled out of Ntds.dit during compaction"

    It sounds like you knew what they did but here are some Exchange articles from MS that pretty much say the same thing:
    LVL 15

    Expert Comment

    try copying in safemode...
    LVL 9

    Accepted Solution

    Found a very old Microsoft article that "explains" the purpose of these files:

    LVL 23

    Author Comment

    Hello Guys,

    Thanx for all the info. mdiglio, i was actually looking for the files within the security directory, thanx for the Exchange links, it does explain something, but like you said that's what i've figured out myself.. ;)

    JackOfPH, i was actually looking for the purpose of the files and there content, not another way to backup.. I konw that that's an option, but my main problem was to figure out if i actually had to backup them or not.

    MNH1966, that's the info i was looking for, wasn't able to find it myself.. Better luck next time i guess.... Looking at the article, i guess i don't really need to worry if they aren't backed up...

    Thanx all, it will be a split points between MNH and mdiglio.. ;)

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    There are several problems reported according slow link speeds or poor performance in TMG 2010, UAG 2010 or ISA 2006. I want to collect here some of the common issues together to give a brief overview what can be the reason. Nevertheless, not all of…
    Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    23 Experts available now in Live!

    Get 1:1 Help Now