Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
C - MSFT Windows 11 24H2
Data collected on: 2/26/2025 10:04:56 PM
General
Details
Domaingo.euc
OwnerGO\Domain Admins
Created2/19/2025 4:54:52 PM
Modified2/19/2025 4:55:56 PM
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions1 (AD), 1 (SYSVOL)
Unique ID{C16E41E5-3986-4E50-990F-E73A24AB7053}
GPO StatusUser settings disabled
Links
LocationEnforcedLink StatusPath
None

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
GO\Domain AdminsEdit settings, delete, modify securityNo
GO\Enterprise AdminsEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersRead (from Security Filtering)No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Local Policies/User Rights Assignment
PolicySetting
Access Credential Manager as a trusted caller
Access this computer from the networkBUILTIN\Remote Desktop Users, BUILTIN\Administrators
Act as part of the operating system
Allow log on locallyBUILTIN\Users, BUILTIN\Administrators
Back up files and directoriesBUILTIN\Administrators
Create a pagefileBUILTIN\Administrators
Create a token object
Create global objectsNT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, NT AUTHORITY\SERVICE, BUILTIN\Administrators
Create permanent shared objects
Debug programsBUILTIN\Administrators
Deny access to this computer from the networkNT AUTHORITY\Local account
Deny log on through Terminal ServicesNT AUTHORITY\Local account
Enable computer and user accounts to be trusted for delegation
Force shutdown from a remote systemBUILTIN\Administrators
Impersonate a client after authenticationNT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, NT AUTHORITY\SERVICE, BUILTIN\Administrators
Load and unload device driversBUILTIN\Administrators
Lock pages in memory
Manage auditing and security logBUILTIN\Administrators
Modify firmware environment valuesBUILTIN\Administrators
Perform volume maintenance tasksBUILTIN\Administrators
Profile single processBUILTIN\Administrators
Restore files and directoriesBUILTIN\Administrators
Take ownership of files or other objectsBUILTIN\Administrators
Local Policies/Security Options
Accounts
PolicySetting
Accounts: Limit local account use of blank passwords to console logon onlyEnabled
Domain Member
PolicySetting
Domain member: Disable machine account password changesDisabled
Interactive Logon
PolicySetting
Interactive logon: Smart card removal behaviorLock Workstation
Microsoft Network Client
PolicySetting
Microsoft network client: Digitally sign communications (always)Enabled
Microsoft network client: Send unencrypted password to third-party SMB serversDisabled
Network Access
PolicySetting
Network access: Allow anonymous SID/Name translationDisabled
Network access: Do not allow anonymous enumeration of SAM accountsEnabled
Network access: Do not allow anonymous enumeration of SAM accounts and sharesEnabled
Network access: Restrict anonymous access to Named Pipes and SharesEnabled
Network Security
PolicySetting
Network security: Do not store LAN Manager hash value on next password changeEnabled
Network security: LAN Manager authentication levelSend NTLMv2 response only. Refuse LM & NTLM
Network security: LDAP client signing requirementsNegotiate signing
Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsEnabled
Require NTLMv2 session securityEnabled
Require 128-bit encryptionEnabled
Network security: Minimum session security for NTLM SSP based (including secure RPC) serversEnabled
Require NTLMv2 session securityEnabled
Require 128-bit encryptionEnabled
System Objects
PolicySetting
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)Enabled
User Account Control
PolicySetting
User Account Control: Admin Approval Mode for the Built-in Administrator accountEnabled
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval ModePrompt for consent on the secure desktop
User Account Control: Behavior of the elevation prompt for standard usersAutomatically deny elevation requests
User Account Control: Detect application installations and prompt for elevationEnabled
User Account Control: Only elevate UIAccess applications that are installed in secure locationsEnabled
User Account Control: Run all administrators in Admin Approval ModeEnabled
User Account Control: Virtualize file and registry write failures to per-user locationsEnabled
Other
PolicySetting
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settingsEnabled
Domain member: Digitally encrypt or sign secure channel data (always)Enabled
Domain member: Digitally encrypt secure channel data (when possible)Enabled
Domain member: Digitally sign secure channel data (when possible)Enabled
Domain member: Require strong (Windows 2000 or later) session keyEnabled
Interactive logon: Machine inactivity limit900 seconds
Microsoft network server: Digitally sign communications (always)Enabled
Network access: Restrict clients allowed to make remote calls to SAM"O:BAG:BAD:(A;;RC;;;BA)"
Network security: Allow LocalSystem NULL session fallbackDisabled
Registry Values
PolicySetting
MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorEnhancedAdmin1
MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\TypeOfAdminApprovalMode2
System Services
XblAuthManager (Startup Mode: Disabled)
Permissions
No permissions specified
Auditing
No auditing specified
XblGameSave (Startup Mode: Disabled)
Permissions
No permissions specified
Auditing
No auditing specified
XboxGipSvc (Startup Mode: Disabled)
Permissions
No permissions specified
Auditing
No auditing specified
XboxNetApiSvc (Startup Mode: Disabled)
Permissions
No permissions specified
Auditing
No auditing specified
Windows Firewall with Advanced Security
Global Settings
PolicySetting
Policy version2.26
Disable stateful FTPNot Configured
Disable stateful PPTPNot Configured
IPsec exemptNot Configured
IPsec through NATNot Configured
Preshared key encodingNot Configured
SA idle timeNot Configured
Strong CRL checkNot Configured
Domain Profile Settings
PolicySetting
Firewall stateOn
Inbound connectionsBlock
Outbound connectionsAllow
Apply local firewall rulesNot Configured
Apply local connection security rulesNot Configured
Display notificationsNo
Allow unicast responsesNot Configured
Log dropped packetsYes
Log successful connectionsYes
Log file pathNot Configured
Log file maximum size (KB)16384
Private Profile Settings
PolicySetting
Firewall stateOn
Inbound connectionsBlock
Outbound connectionsAllow
Apply local firewall rulesNot Configured
Apply local connection security rulesNot Configured
Display notificationsNo
Allow unicast responsesNot Configured
Log dropped packetsYes
Log successful connectionsYes
Log file pathNot Configured
Log file maximum size (KB)16384
Public Profile Settings
PolicySetting
Firewall stateOn
Inbound connectionsBlock
Outbound connectionsAllow
Apply local firewall rulesNo
Apply local connection security rulesNo
Display notificationsNo
Allow unicast responsesNot Configured
Log dropped packetsYes
Log successful connectionsYes
Log file pathNot Configured
Log file maximum size (KB)16384
Connection Security Settings
Advanced Audit Configuration
Account Logon
PolicySetting
Audit Credential ValidationSuccess, Failure
Account Management
PolicySetting
Audit Security Group ManagementSuccess
Audit User Account ManagementSuccess, Failure
Detailed Tracking
PolicySetting
Audit PNP ActivitySuccess
Audit Process CreationSuccess
Logon/Logoff
PolicySetting
Audit Account LockoutFailure
Audit Group MembershipSuccess
Audit LogonSuccess, Failure
Audit Other Logon/Logoff EventsSuccess, Failure
Audit Special LogonSuccess
Object Access
PolicySetting
Audit Detailed File ShareFailure
Audit File ShareSuccess, Failure
Audit Other Object Access EventsSuccess, Failure
Audit Removable StorageSuccess, Failure
Policy Change
PolicySetting
Audit Audit Policy ChangeSuccess
Audit Authentication Policy ChangeSuccess
Audit MPSSVC Rule-Level Policy ChangeSuccess, Failure
Audit Other Policy Change EventsFailure
Privilege Use
PolicySetting
Audit Sensitive Privilege UseSuccess
System
PolicySetting
Audit Other System EventsSuccess, Failure
Audit Security State ChangeSuccess
Audit Security System ExtensionSuccess
Audit System IntegritySuccess, Failure
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Control Panel/Personalization
PolicySettingComment
Prevent enabling lock screen cameraEnabled
Prevent enabling lock screen slide showEnabled
Network/DNS Client
PolicySettingComment
Turn off multicast name resolutionEnabled
Network/Lanman Workstation
PolicySettingComment
Enable insecure guest logonsDisabled
Network/Network Connections
PolicySettingComment
Prohibit use of Internet Connection Sharing on your DNS domain networkEnabled
Network/Network Connections/Windows Defender Firewall/Domain Profile
PolicySettingComment
Windows Defender Firewall: Allow loggingEnabled
Log dropped packetsEnabled
Log successful connectionsEnabled
Log file path and name: 
Size limit (KB):16384
PolicySettingComment
Windows Defender Firewall: Prohibit notificationsEnabled
Windows Defender Firewall: Protect all network connectionsEnabled
Network/Network Provider
PolicySettingComment
Hardened UNC PathsEnabled
Specify hardened network paths. In the name field, type a fully-qualified UNC path for each network resource. To secure all access to a share with a particular name, regardless of the server name, specify a server name of '*' (asterisk). For example, "\\*\NETLOGON". To secure all access to all shares hosted on a server, the share name portion of the UNC path may be omitted. For example, "\\SERVER". In the value field, specify one or more of the following options, separated by commas: 'RequireMutualAuthentication=1': Mutual authentication between the client and server is required to ensure the client connects to the correct server. 'RequireIntegrity=1': Communication between the client and server must employ an integrity mechanism to prevent data tampering. 'RequirePrivacy=1': Communication between the client and the server must be encrypted to prevent third parties from observing sensitive data.
Hardened UNC Paths: 
\\*\SYSVOLRequireMutualAuthentication=1,RequireIntegrity=1
\\*\NETLOGONRequireMutualAuthentication=1,RequireIntegrity=1
You should require both Integrity and Mutual Authentication for any UNC paths that host executable programs, script files, or files that control security policies. Consider hosting files that do not require Integrity or Privacy on separate shares from those that absolutely need such security for optimal performance. For additional details on configuring Windows computers to require additional security when accessing specific UNC paths, visit http://support.microsoft.com/kb/3000483.
Network/Windows Connection Manager
PolicySettingComment
Prohibit connection to non-domain networks when connected to domain authenticated networkEnabled
Network/WLAN Service/WLAN Settings
PolicySettingComment
Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid servicesDisabled
Printers
PolicySettingComment
Configure Redirection GuardEnabled
Configure options for Redirection Guard
Redirection Guard OptionsRedirection Guard Enabled
PolicySettingComment
Limits print driver installation to AdministratorsEnabled
System/Credentials Delegation
PolicySettingComment
Encryption Oracle RemediationEnabled
Protection Level:Force Updated Clients
PolicySettingComment
Remote host allows delegation of non-exportable credentialsEnabled
System/Early Launch Antimalware
PolicySettingComment
Boot-Start Driver Initialization PolicyEnabled
Choose the boot-start drivers that can be initialized:Good, unknown and bad but critical
System/Internet Communication Management/Internet Communication settings
PolicySettingComment
Turn off downloading of print drivers over HTTPEnabled
Turn off Internet download for Web publishing and online ordering wizardsEnabled
System/Kernel DMA Protection
PolicySettingComment
Enumeration policy for external devices incompatible with Kernel DMA ProtectionEnabled
Enumeration policyBlock all
System/Local Security Authority
PolicySettingComment
Allow Custom SSPs and APs to be loaded into LSASSDisabled
Configures LSASS to run as a protected processEnabled
Configure LSA to run as a protected processEnabled with UEFI Lock
System/Logon
PolicySettingComment
Enumerate local users on domain-joined computersDisabled
Turn on convenience PIN sign-inDisabled
System/Power Management/Sleep Settings
PolicySettingComment
Require a password when a computer wakes (on battery)Enabled
Require a password when a computer wakes (plugged in)Enabled
System/Remote Assistance
PolicySettingComment
Configure Solicited Remote AssistanceDisabled
System/Remote Procedure Call
PolicySettingComment
Restrict Unauthenticated RPC clientsEnabled
RPC Runtime Unauthenticated Client Restriction to Apply:Authenticated
Windows Components/App Privacy
PolicySettingComment
Let Windows apps activate with voice while the system is lockedEnabled
Default for all apps:Force Deny
Windows Components/App runtime
PolicySettingComment
Allow Microsoft accounts to be optionalEnabled
Windows Components/AutoPlay Policies
PolicySettingComment
Disallow Autoplay for non-volume devicesEnabled
Set the default behavior for AutoRunEnabled
Default AutoRun BehaviorDo not execute any autorun commands
PolicySettingComment
Turn off AutoplayEnabled
Turn off Autoplay on:All drives
Windows Components/Biometrics/Facial Features
PolicySettingComment
Configure enhanced anti-spoofingEnabled
Windows Components/Cloud Content
PolicySettingComment
Turn off Microsoft consumer experiencesEnabled
Windows Components/Credential User Interface
PolicySettingComment
Enumerate administrator accounts on elevationDisabled
Windows Components/Event Log Service/Application
PolicySettingComment
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)32768
Windows Components/Event Log Service/Security
PolicySettingComment
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)196608
Windows Components/Event Log Service/System
PolicySettingComment
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)32768
Windows Components/Remote Desktop Services/Remote Desktop Connection Client
PolicySettingComment
Do not allow passwords to be savedEnabled
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Device and Resource Redirection
PolicySettingComment
Do not allow drive redirectionEnabled
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security
PolicySettingComment
Always prompt for password upon connectionEnabled
Require secure RPC communicationEnabled
Set client connection encryption levelEnabled
Encryption LevelHigh Level
Choose the encryption level from the drop-down list.
Windows Components/RSS Feeds
PolicySettingComment
Prevent downloading of enclosuresEnabled
Windows Components/Search
PolicySettingComment
Allow indexing of encrypted filesDisabled
Windows Components/Windows Defender SmartScreen/Enhanced Phishing Protection
PolicySettingComment
Notify MaliciousEnabled
Notify Password ReuseEnabled
Notify Unsafe AppEnabled
Service EnabledEnabled
Windows Components/Windows Defender SmartScreen/Explorer
PolicySettingComment
Configure Windows Defender SmartScreenEnabled
Pick one of the following settings:Warn and prevent bypass
Windows Components/Windows Game Recording and Broadcasting
PolicySettingComment
Enables or disables Windows Game Recording and BroadcastingDisabled
Windows Components/Windows Ink Workspace
PolicySettingComment
Allow Windows Ink WorkspaceEnabled
Choose one of the following actions 
Windows Components/Windows Installer
PolicySettingComment
Allow user control over installsDisabled
Always install with elevated privilegesDisabled
Windows Components/Windows Logon Options
PolicySettingComment
Sign-in and lock last interactive user automatically after a restartDisabled
Windows Components/Windows PowerShell
PolicySettingComment
Turn on PowerShell Script Block LoggingEnabled
Log script block invocation start / stop events:Disabled
Windows Components/Windows Remote Management (WinRM)/WinRM Client
PolicySettingComment
Allow Basic authenticationDisabled
Allow unencrypted trafficDisabled
Disallow Digest authenticationEnabled
Windows Components/Windows Remote Management (WinRM)/WinRM Service
PolicySettingComment
Allow Basic authenticationDisabled
Allow unencrypted trafficDisabled
Disallow WinRM from storing RunAs credentialsEnabled
Extra Registry Settings
Display names for some settings cannot be found. You might be able to resolve this issue by updating the .ADM files used by Group Policy Management.

SettingState
Software\Microsoft\Windows\CurrentVersion\Policies\LAPS\ADBackupDSRMPassword1
Software\Microsoft\Windows\CurrentVersion\Policies\LAPS\ADPasswordEncryptionEnabled1
Software\Microsoft\Windows\CurrentVersion\Policies\LAPS\BackupDirectory2
Software\Microsoft\Windows\CurrentVersion\Policies\System\EnableMPR0
Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITHashAlgorithmConfigurationEnabled1
Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA10
Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA2563
Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA3843
Software\Microsoft\Windows\CurrentVersion\Policies\System\KDC\Parameters\PKINITSHA5123
Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitHashAlgorithmConfigurationEnabled1
Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitSHA10
Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitSHA2563
Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitSHA3843
Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\PKInitSHA5123
Software\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy0
Software\Policies\Microsoft\Windows NT\Printers\CopyFilesPolicy1
Software\Policies\Microsoft\Windows NT\Printers\RPC\ForceKerberosForRpc0
Software\Policies\Microsoft\Windows NT\Printers\RPC\RpcAuthentication0
Software\Policies\Microsoft\Windows NT\Printers\RPC\RpcProtocols5
Software\Policies\Microsoft\Windows NT\Printers\RPC\RpcTcpPort0
Software\Policies\Microsoft\Windows NT\Printers\RPC\RpcUseNamedPipeProtocol0
Software\Policies\Microsoft\Windows\Bowser\EnableMailslots0
Software\Policies\Microsoft\Windows\Explorer\DisableMotWOnInsecurePathCopy0
Software\Policies\Microsoft\Windows\LanmanServer\AuditClientDoesNotSupportEncryption1
Software\Policies\Microsoft\Windows\LanmanServer\AuditClientDoesNotSupportSigning1
Software\Policies\Microsoft\Windows\LanmanServer\AuditInsecureGuestLogon1
Software\Policies\Microsoft\Windows\LanmanServer\EnableAuthRateLimiter1
Software\Policies\Microsoft\Windows\LanmanServer\InvalidAuthenticationDelayTimeInMs2000
Software\Policies\Microsoft\Windows\LanmanServer\MaxSmb2Dialect785
Software\Policies\Microsoft\Windows\LanmanServer\MinSmb2Dialect768
Software\Policies\Microsoft\Windows\LanmanWorkstation\AuditInsecureGuestLogon1
Software\Policies\Microsoft\Windows\LanmanWorkstation\AuditServerDoesNotSupportEncryption1
Software\Policies\Microsoft\Windows\LanmanWorkstation\AuditServerDoesNotSupportSigning1
Software\Policies\Microsoft\Windows\LanmanWorkstation\MaxSmb2Dialect785
Software\Policies\Microsoft\Windows\LanmanWorkstation\MinSmb2Dialect768
Software\Policies\Microsoft\Windows\LanmanWorkstation\RequireEncryption0
Software\Policies\Microsoft\Windows\NetworkProvider\EnableMailslots0
Software\Policies\Microsoft\Windows\Sudo\Enabled0
Software\Policies\Microsoft\Windows\System\RunAsPPL1
SYSTEM\CurrentControlSet\Control\Print\RpcAuthnLevelPrivacyEnabled1
SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest\UseLogonCredential0
SYSTEM\CurrentControlSet\Control\Session Manager\kernel\DisableExceptionChainValidation0
SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\SMB10
SYSTEM\CurrentControlSet\Services\MrxSmb10\Start4
SYSTEM\CurrentControlSet\Services\Netbt\Parameters\NodeType2
SYSTEM\CurrentControlSet\Services\Netbt\Parameters\NoNameReleaseOnDemand1
SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DisableIPSourceRouting2
SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\EnableICMPRedirect0
SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\DisableIPSourceRouting2
User Configuration (Disabled)
No settings defined.