Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
EG-PO-ADM-C-GG WSUS Policy
Data collected on: 2-9-2025 13:13:28
General
Details
Domainemea.tpg.ads
OwnerEMEA\sameh.30-adm
Created28-7-2025 11:20:16
Modified29-7-2025 16:47:54
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions4 (AD), 4 (SYSVOL)
Unique ID{ffab0a1b-93c2-4981-85ba-5aa2fe6940c8}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
ClientsNoEnabledemea.tpg.ads/EG/Systems/Clients

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\EGAGZ-G-ORG-CLient System Alrasheed
EMEA\EGAGZ-G-ORG-Client System Ekar
EMEA\EGAGZ-G-ORG-Client System ERC
EMEA\EGAGZ-G-ORG-Client System Haleon
EMEA\EGAGZ-G-ORG-Client System Honor
EMEA\EGAGZ-G-ORG-CLient System Infinity
EMEA\EGAGZ-G-ORG-Client system Kuishou
EMEA\EGAGZ-G-ORG-Client system Mansour
EMEA\EGAGZ-G-ORG-Client System MG
EMEA\EGAGZ-G-ORG-Client System Michelin
EMEA\EGAGZ-G-ORG-Client System Mova
EMEA\EGAGZ-G-ORG-Client System NouvelAge
EMEA\EGAGZ-G-ORG-Client system P&G
EMEA\EGAGZ-G-ORG-Client System Pearson
EMEA\EGAGZ-G-ORG-Client System Realme
EMEA\EGAGZ-G-ORG-Client System Rizek
EMEA\EGAGZ-G-ORG-Client System Seagate
EMEA\EGAGZ-G-ORG-Client System Trip
EMEA\EGAGZ-G-ORG-Client System Trip.comHotels
EMEA\EGAGZ-G-ORG-Client System Xiaomi
EMEA\EGAGZ-G-ORG-Client Systems LLS
EMEA\EGAGZ-G-ORG-Client Systems OPPO
EMEA\EGCAI-G-ORG-Client System Careem
EMEA\EGCAI-G-ORG-Client System MAF
EMEA\EGCAI-G-ORG-Client Systems Talabat
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\Domain ComputersReadNo
EMEA\EGAGZ-G-ORG-CLient System AlrasheedRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System EkarRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System ERCRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System HaleonRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System HonorRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-CLient System InfinityRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client system KuishouRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client system MansourRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System MGRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System MichelinRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System MovaRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System NouvelAgeRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client system P&GRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System PearsonRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System RealmeRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System RizekRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System SeagateRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System TripRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System Trip.comHotelsRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client System XiaomiRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client Systems LLSRead (from Security Filtering)No
EMEA\EGAGZ-G-ORG-Client Systems OPPORead (from Security Filtering)No
EMEA\EGCAI-G-ORG-Client System CareemRead (from Security Filtering)No
EMEA\EGCAI-G-ORG-Client System MAFRead (from Security Filtering)No
EMEA\EGCAI-G-ORG-Client Systems TalabatRead (from Security Filtering)No
EMEA\EG-G-ORG-OU AdminsEdit settings, delete, modify securityNo
EMEA\sameh.30-admEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
System Services
Delivery Optimization (Startup Mode: Automatic)
Permissions
TypeNamePermission
AllowBUILTIN\AdministratorsFull Control
AllowNT AUTHORITY\SYSTEMFull Control
AllowNT AUTHORITY\INTERACTIVERead
Auditing
TypeNameAccess
FailureEveryoneFull Control
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Delivery Optimization
PolicySettingComment
Download ModeEnabled
Download Mode:HTTP only (0)
Windows Components/Windows Update/Legacy Policies
PolicySettingComment
Allow non-administrators to receive update notificationsEnabled
Configure auto-restart reminder notifications for updatesEnabled
Specify the period for auto-restart reminder notifications:
Period (min): 15
PolicySettingComment
Configure auto-restart warning notifications schedule for updatesEnabled
Specify the period for auto-restart warning reminder notifications:
Reminder (hours): 4
Specify the period for auto-restart immiment warning notifications:
Warning (mins): 15
PolicySettingComment
No auto-restart with logged on users for scheduled automatic updates installationsDisabled
Windows Components/Windows Update/Manage end user experience
PolicySettingComment
Always automatically restart at the scheduled timeEnabled
The restart timer will give users this much time to save their
work (minutes): 180
PolicySettingComment
Configure Automatic UpdatesEnabled
Configure automatic updating:4 - Auto download and schedule the install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenanceDisabled
Scheduled install day: 0 - Every day
Scheduled install time:Automatic
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every weekEnabled
First week of the monthDisabled
Second week of the monthDisabled
Third week of the monthDisabled
Fourth week of the monthDisabled
Install updates for other Microsoft productsDisabled
PolicySettingComment
Display options for update notificationsEnabled
Specify the update notifications display options :1 – Disable all notifications, excluding restart warnings
Apply only during active hoursDisabled
PolicySettingComment
Specify active hours range for auto-restartsEnabled
Specify the max active hours range:
Max range: 10
Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
PolicySettingComment
Automatic Updates detection frequencyEnabled
Check for updates at the following
interval (hours): 8
PolicySettingComment
Do not connect to any Windows Update Internet locationsEnabled
Specify intranet Microsoft update service locationEnabled
Set the intranet update service for detecting updates:http://egag2pacfile03.emea.tpg.ads:8530
Set the intranet statistics server:http://egag2pacfile03.emea.tpg.ads:8530
Set the alternate download server:
(example: https://IntranetUpd01)
Download files with no Url in the metadata if alternate download server is set.Disabled
Do not enforce TLS certificate pinning for Windows Update client for detecting updates.Disabled
Select the proxy behavior for Windows Update client for detecting updates:Only use system proxy for detecting updates (default)
User Configuration (Enabled)
No settings defined.