Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
EG-PO-WIN-ADM-C-Workstation Policies SF
Data collected on: 2-9-2025 09:20:06
General
Details
Domainemea.tpg.ads
OwnerEMEA\ygalal.5
Created15-11-2018 14:24:48
Modified26-8-2025 13:50:14
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions47 (AD), 47 (SYSVOL)
Unique ID{9b5198e4-546f-4e2a-80c3-91d940db8115}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
ClientsNoEnabledemea.tpg.ads/EG/Systems/Clients

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
None
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\EGCAIDT8778$CustomNo
Computer Configuration (Enabled)
Policies
Windows Settings
Scripts
Startup
For this GPO, Script order: Not configured
NameParameters
\\EGCAIFS01\EGCAIDepartments$\IT\Policies\Patches\Bios Boot and PW.bat
CairoEMEA.bat
Security Settings
Account Policies/Password Policy
PolicySetting
Enforce password history24 passwords remembered
Maximum password age30 days
Minimum password age1 days
Minimum password length8 characters
Password must meet complexity requirementsEnabled
Store passwords using reversible encryptionDisabled
Account Policies/Account Lockout Policy
PolicySetting
Account lockout duration60 minutes
Account lockout threshold5 invalid logon attempts
Reset account lockout counter after60 minutes
Account Policies/Kerberos Policy
PolicySetting
Enforce user logon restrictionsEnabled
Maximum lifetime for service ticket600 minutes
Maximum lifetime for user ticket10 hours
Maximum lifetime for user ticket renewal7 days
Maximum tolerance for computer clock synchronization5 minutes
Local Policies/Audit Policy
PolicySetting
Audit account logon eventsSuccess, Failure
Audit account managementSuccess, Failure
Audit directory service accessSuccess, Failure
Audit logon eventsSuccess, Failure
Audit object accessSuccess, Failure
Audit policy changeSuccess, Failure
Audit privilege useSuccess, Failure
Audit process trackingSuccess, Failure
Audit system eventsSuccess, Failure
Local Policies/User Rights Assignment
PolicySetting
Access this computer from the networkEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Allow log on locallyBUILTIN\Users, EMEA\Domain Users, BUILTIN\Administrators
Back up files and directoriesEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Change the system timeBUILTIN\Administrators, EMEA\EG-G-ORG-Helpdesk Admins, EMEA\EG-G-ORG-OU Admins
Change the time zoneBUILTIN\Administrators, EMEA\EG-G-ORG-Helpdesk Admins, EMEA\EG-G-ORG-OU Admins
Create global objectsNT AUTHORITY\SERVICE, NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, BUILTIN\Administrators
Create permanent shared objects
Debug programsEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Deny access to this computer from the networkTPUser, TPladmin
Deny log on as a batch jobTPUser
Deny log on as a serviceTPUser
Deny log on locallyTPUser, EMEA\EG-G-ORG-ServiceAccounts, EMEA\EG-G-ORG-OU Admins
Deny log on through Terminal ServicesTPUser, TPLadmin, EMEA\EG-G-ORG-ServiceAccounts, EMEA\EG-G-ORG-OU Admins
Enable computer and user accounts to be trusted for delegation
Force shutdown from a remote systemEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Generate security auditsNT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE
Impersonate a client after authenticationNT AUTHORITY\SERVICE, NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, BUILTIN\Administrators
Increase scheduling priorityEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Load and unload device driversEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Lock pages in memory
Log on as a batch jobEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Manage auditing and security logEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Modify an object label
Modify firmware environment valuesEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Perform volume maintenance tasksEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Profile single processEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Profile system performanceNT SERVICE\WdiServiceHost, EMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Replace a process level tokenNT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE
Restore files and directoriesEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Shut down the systemBUILTIN\Users, EMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, EMEA\Domain Users, BUILTIN\Administrators
Take ownership of files or other objectsEMEA\EG-G-ORG-OU Admins, EMEA\EG-G-ORG-Helpdesk Admins, BUILTIN\Administrators
Local Policies/Security Options
Accounts
PolicySetting
Accounts: Administrator account statusEnabled
Accounts: Guest account statusDisabled
Accounts: Rename administrator account"TPLAdmin"
Accounts: Rename guest account"TPUser"
Audit
PolicySetting
Audit: Shut down system immediately if unable to log security auditsDisabled
Devices
PolicySetting
Devices: Allow undock without having to log onEnabled
Devices: Prevent users from installing printer driversDisabled
Domain Member
PolicySetting
Domain member: Digitally encrypt or sign secure channel data (always)Disabled
Domain member: Digitally encrypt secure channel data (when possible)Enabled
Domain member: Digitally sign secure channel data (when possible)Enabled
Domain member: Disable machine account password changesDisabled
Domain member: Maximum machine account password age30 days
Domain member: Require strong (Windows 2000 or later) session keyEnabled
Interactive Logon
PolicySetting
Interactive logon: Do not require CTRL+ALT+DELDisabled
Interactive logon: Don't display last signed-inEnabled
Interactive logon: Message text for users attempting to log onThis computer system (including all hardware, software, and peripheral equipment) is the property of Teleperformance. Use of this computer system is restricted to official Teleperformance business. Teleperformance reserves the right to monitor use of the computer system at any time. Use of this system constitutes consent to such monitoring. Any unauthorized access, use, or modification of the computer system can result in civil liability and/or criminal penalties
Interactive logon: Message title for users attempting to log on"Warning Banner"
Interactive logon: Number of previous logons to cache (in case domain controller is not available)4 logons
Interactive logon: Prompt user to change password before expiration5 days
Microsoft Network Client
PolicySetting
Microsoft network client: Digitally sign communications (always)Enabled
Microsoft network client: Digitally sign communications (if server agrees)Enabled
Microsoft network client: Send unencrypted password to third-party SMB serversDisabled
Microsoft Network Server
PolicySetting
Microsoft network server: Amount of idle time required before suspending session15 minutes
Microsoft network server: Digitally sign communications (always)Enabled
Microsoft network server: Digitally sign communications (if client agrees)Enabled
Network Access
PolicySetting
Network access: Allow anonymous SID/Name translationDisabled
Network access: Do not allow anonymous enumeration of SAM accountsEnabled
Network access: Do not allow anonymous enumeration of SAM accounts and sharesDisabled
Network access: Do not allow storage of passwords and credentials for network authenticationEnabled
Network access: Let Everyone permissions apply to anonymous usersDisabled
Network access: Named Pipes that can be accessed anonymously
Network access: Restrict anonymous access to Named Pipes and SharesEnabled
Network access: Shares that can be accessed anonymously
Network access: Sharing and security model for local accountsClassic - local users authenticate as themselves
Network Security
PolicySetting
Network security: Do not store LAN Manager hash value on next password changeEnabled
Network security: LAN Manager authentication levelSend NTLMv2 response only. Refuse LM & NTLM
Network security: LDAP client signing requirementsNegotiate signing
Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsEnabled
Require NTLMv2 session securityDisabled
Require 128-bit encryptionEnabled
Network security: Minimum session security for NTLM SSP based (including secure RPC) serversEnabled
Require NTLMv2 session securityDisabled
Require 128-bit encryptionEnabled
Shutdown
PolicySetting
Shutdown: Clear virtual memory pagefileEnabled
System Cryptography
PolicySetting
System cryptography: Force strong key protection for user keys stored on the computerUser is prompted when the key is first used
System Objects
PolicySetting
System objects: Require case insensitivity for non-Windows subsystemsEnabled
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)Enabled
User Account Control
PolicySetting
User Account Control: Admin Approval Mode for the Built-in Administrator accountEnabled
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktopDisabled
User Account Control: Detect application installations and prompt for elevationEnabled
User Account Control: Only elevate UIAccess applications that are installed in secure locationsEnabled
User Account Control: Run all administrators in Admin Approval ModeEnabled
User Account Control: Switch to the secure desktop when prompting for elevationEnabled
User Account Control: Virtualize file and registry write failures to per-user locationsEnabled
Other
PolicySetting
Accounts: Block Microsoft accountsUsers can't add or log on with Microsoft accounts
Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settingsEnabled
Interactive logon: Machine inactivity limit300 seconds
Network security: Allow Local System to use computer identity for NTLMEnabled
Network security: Allow LocalSystem NULL session fallbackDisabled
Network security: Allow PKU2U authentication requests to this computer to use online identities. Disabled
Network security: Configure encryption types allowed for KerberosEnabled
DES_CBC_CRCEnabled
DES_CBC_MD5Enabled
RC4_HMAC_MD5Enabled
AES128_HMAC_SHA1Enabled
AES256_HMAC_SHA1Enabled
Future encryption typesEnabled
Event Log
PolicySetting
Prevent local guests group from accessing application logEnabled
Prevent local guests group from accessing security logEnabled
Prevent local guests group from accessing system logEnabled
Retention method for application logAs needed
Retention method for security logAs needed
Retention method for system logAs needed
File System
%ProgramFiles%\Avaya\Avaya IP Softphone
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
AllowCREATOR OWNERFull ControlSubfolders and files only
AllowNT AUTHORITY\SYSTEMFull ControlThis folder, subfolders and files
AllowBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
AllowEMEA\Domain UsersModifyThis folder, subfolders and files
AllowBUILTIN\UsersRead and ExecuteThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemDrive%\Users\Public
Configure this file or folder then: Replace existing permissions on all subfolders and files with inheritable permissions
Owner
Permissions
TypeNamePermissionApply To
AllowAPPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGESRead and ExecuteThis folder, subfolders and files
AllowCREATOR OWNERFull ControlSubfolders and files only
AllowNT AUTHORITY\SYSTEMFull ControlThis folder, subfolders and files
AllowEMEA\Domain UsersRead and ExecuteThis folder, subfolders and files
AllowBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
AllowBUILTIN\UsersRead and ExecuteThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\HelpPane.exe
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
AllowBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
AllowCREATOR OWNERFull ControlSubfolders and files only
AllowNT AUTHORITY\SYSTEMFull ControlThis folder, subfolders and files
AllowBUILTIN\UsersRead and ExecuteThis folder, subfolders and files
AllowAPPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGESRead and ExecuteThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\System32\stikynot
Configure this file or folder then: Replace existing permissions on all subfolders and files with inheritable permissions
Owner
Permissions
TypeNamePermissionApply To
AllowNT AUTHORITY\SYSTEMFull ControlThis folder, subfolders and files
AllowBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
AllowEMEA\EG-L-SEC-Allow StickyNotesFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\System32\stikynot.exe
Configure this file or folder then: Replace existing permissions on all subfolders and files with inheritable permissions
Owner
Permissions
TypeNamePermissionApply To
AllowNT AUTHORITY\SYSTEMFull ControlThis folder, subfolders and files
AllowBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
AllowEMEA\EG-L-SEC-Allow StickyNotesFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\System32\UIRibbon.dll
Configure this file or folder then: Replace existing permissions on all subfolders and files with inheritable permissions
Owner
Permissions
TypeNamePermissionApply To
AllowNT AUTHORITY\SYSTEMFull ControlThis folder, subfolders and files
AllowEMEA\Domain UsersRead and ExecuteThis folder, subfolders and files
AllowBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
AllowBUILTIN\UsersRead and ExecuteThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\System32\winevt
Configure this file or folder then: Replace existing permissions on all subfolders and files with inheritable permissions
Owner
Permissions
TypeNamePermissionApply To
AllowAPPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGESRead and ExecuteThis folder, subfolders and files
AllowCREATOR OWNERFull ControlSubfolders and files only
AllowEveryoneFull ControlThis folder, subfolders and files
AllowNT AUTHORITY\SYSTEMFull ControlThis folder, subfolders and files
AllowBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
AllowBUILTIN\UsersRead and ExecuteThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%UserProfile%\AppData\Local\Google\Chrome\User Data\Default\Extensions
Configure this file or folder then: Replace existing permissions on all subfolders and files with inheritable permissions
Owner
Permissions
TypeNamePermissionApply To
DenyEMEA\Domain UsersFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
Registry
MACHINE\SOFTWARE\Avaya
Configure this key then: Propagate inheritable permissions to all subkeys
Owner
Permissions
TypeNamePermissionApply To
AllowAPPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGESReadThis key and subkeys
AllowCREATOR OWNERFull controlSubkeys only
AllowEMEA\Domain UsersFull controlThis key and subkeys
AllowNT AUTHORITY\SYSTEMFull controlThis key and subkeys
AllowBUILTIN\AdministratorsFull controlThis key and subkeys
AllowBUILTIN\UsersReadThis key and subkeys
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
Public Key Policies/Trusted Root Certification Authorities
Certificates
Issued ToIssued ByExpiration DateIntended Purposes
TPEGYTPEGY12-2-2023 20:28:28<All>

For additional information about individual settings, launch the Local Group Policy Object Editor.
Advanced Audit Configuration
Account Logon
PolicySetting
Audit Credential ValidationSuccess, Failure
Audit Kerberos Authentication ServiceSuccess, Failure
Audit Kerberos Service Ticket OperationsSuccess, Failure
Audit Other Account Logon EventsSuccess, Failure
Account Management
PolicySetting
Audit Application Group ManagementSuccess, Failure
Audit Computer Account ManagementSuccess, Failure
Audit Other Account Management EventsSuccess, Failure
Audit Security Group ManagementSuccess, Failure
Audit User Account ManagementSuccess, Failure
Detailed Tracking
PolicySetting
Audit DPAPI ActivitySuccess, Failure
Audit PNP ActivitySuccess, Failure
Audit Process CreationSuccess, Failure
Audit Process TerminationSuccess, Failure
Logon/Logoff
PolicySetting
Audit Account LockoutSuccess, Failure
Audit LogoffSuccess
Audit LogonSuccess, Failure
Audit Other Logon/Logoff EventsSuccess, Failure
Audit Special LogonSuccess, Failure
Object Access
PolicySetting
Audit File ShareSuccess, Failure
Audit Other Object Access EventsSuccess, Failure
Audit Removable StorageSuccess, Failure
Policy Change
PolicySetting
Audit Audit Policy ChangeSuccess, Failure
Audit Authentication Policy ChangeSuccess, Failure
Audit Authorization Policy ChangeSuccess
Audit MPSSVC Rule-Level Policy ChangeSuccess
Privilege Use
PolicySetting
Audit Sensitive Privilege UseSuccess, Failure
System
PolicySetting
Audit IPsec DriverSuccess, Failure
Audit Other System EventsSuccess, Failure
Audit Security State ChangeSuccess, Failure
Audit Security System ExtensionSuccess, Failure
Audit System IntegritySuccess, Failure
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Google/Google Chrome
PolicySettingComment
Disable synchronization of data with GoogleEnabled
Restrict which Google accounts are allowed to be set as browser primary accounts in Google ChromeEnabled
Restrict which Google accounts are allowed to be set as browser primary accounts in Google Chromeyoyoyassergalal@gmail.com
Network/Offline Files
PolicySettingComment
Prevent use of Offline Files folderEnabled
Prohibit user configuration of Offline FilesEnabled
Prevents users from changing any cache configuration settings.
PolicySettingComment
Remove "Make Available Offline" commandEnabled
System/Removable Storage Access
PolicySettingComment
All Removable Storage classes: Deny all accessEnabled
All Removable Storage: Allow direct access in remote sessionsDisabled
CD and DVD: Deny execute accessEnabled
CD and DVD: Deny read accessEnabled
CD and DVD: Deny write accessEnabled
Floppy Drives: Deny execute accessEnabled
Floppy Drives: Deny read accessEnabled
Floppy Drives: Deny write accessEnabled
Removable Disks: Deny execute accessEnabled
Removable Disks: Deny read accessEnabled
Removable Disks: Deny write accessEnabled
Tape Drives: Deny execute accessEnabled
Tape Drives: Deny read accessEnabled
Tape Drives: Deny write accessEnabled
WPD Devices: Deny read accessEnabled
WPD Devices: Deny write accessEnabled
Windows Components/AutoPlay Policies
PolicySettingComment
Turn off AutoplayEnabled
Turn off Autoplay on:All drives
Windows Components/BitLocker Drive Encryption
PolicySettingComment
Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)Enabled
Select the encryption method for operating system drives:XTS-AES 256-bit
Select the encryption method for fixed data drives:XTS-AES 256-bit
Select the encryption method for removable data drives:XTS-AES 256-bit
PolicySettingComment
Choose drive encryption method and cipher strength (Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10 [Version 1507])Enabled
Select the encryption method:AES 256-bit
PolicySettingComment
Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2)Enabled
Select the encryption method:AES 256-bit
Windows Components/Event Log Service/Application
PolicySettingComment
Back up log automatically when fullEnabled
Control Event Log behavior when the log file reaches its maximum sizeEnabled
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)3145728
Windows Components/Event Log Service/Security
PolicySettingComment
Back up log automatically when fullEnabled
Control Event Log behavior when the log file reaches its maximum sizeEnabled
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)3145728
Windows Components/Event Log Service/Setup
PolicySettingComment
Back up log automatically when fullEnabled
Control Event Log behavior when the log file reaches its maximum sizeEnabled
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)3145728
Windows Components/Event Log Service/System
PolicySettingComment
Back up log automatically when fullEnabled
Control Event Log behavior when the log file reaches its maximum sizeEnabled
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)3145728
Windows Components/OneDrive
PolicySettingComment
Prevent the usage of OneDrive for file storageEnabled
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Connections
PolicySettingComment
Allow users to connect remotely by using Remote Desktop ServicesDisabled
Windows Components/Store
PolicySettingComment
Turn off the Store applicationEnabled
Windows Components/Sync your settings
PolicySettingComment
Do not syncEnabled
Allow users to turn syncing on.Disabled
PolicySettingComment
Do not sync app settingsEnabled
Allow users to turn "app settings" syncing on.Disabled
PolicySettingComment
Do not sync AppsEnabled
Allow users to turn "AppSync" syncing on.Disabled
PolicySettingComment
Do not sync browser settingsEnabled
Allow users to turn "browser" syncing on.Disabled
PolicySettingComment
Do not sync desktop personalizationEnabled
Allow users to turn "desktop personalization" syncing on.Disabled
PolicySettingComment
Do not sync on metered connectionsEnabled
Do not sync other Windows settingsEnabled
Allow users to turn "other Windows settings" syncing on.Disabled
PolicySettingComment
Do not sync passwordsEnabled
Allow users to turn "passwords" syncing on.Disabled
PolicySettingComment
Do not sync personalizeEnabled
Allow users to turn "personalize" syncing on.Disabled
PolicySettingComment
Do not sync start settingsEnabled
Allow users to turn "start layout" syncing on.Disabled
Windows Components/Windows Ink Workspace
PolicySettingComment
Allow Windows Ink WorkspaceDisabled
Windows Components/Windows PowerShell
PolicySettingComment
Turn on Script ExecutionEnabled
Execution PolicyAllow all scripts
Windows Components/Windows Update/Manage end user experience
PolicySettingComment
Configure Automatic UpdatesDisabled
Preferences
Windows Settings
Files
File (Target Path: C:\Windows\HelpPane.exe)
HelpPane.exe (Order: 1)
General
ActionDelete
Properties
Destination fileC:\Windows\HelpPane.exe
Suppress errors on individual file actionsDisabled
Attributes
Read-onlyDisabled
HiddenDisabled
ArchiveEnabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Apply once and do not reapplyNo
File (Target Path: c:\windows\system32\UIRibbon.dll)
UIRibbon.dll (Order: 2)
General
ActionCreate
Properties
Source file(s)\\emea.tpg.ads\sysvol\emea.tpg.ads\Policies\{3E37B931-7978-40C4-BCB9-8EA5BE51E9D6}\Machine\UIRibbon.dll
Destination filec:\windows\system32\UIRibbon.dll
Attributes
Read-onlyDisabled
HiddenDisabled
ArchiveEnabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
File (Target Path: c:\windows\system32\UIRibbonRes.dll)
UIRibbonRes.dll (Order: 3)
General
ActionCreate
Properties
Source file(s)\\emea.tpg.ads\sysvol\emea.tpg.ads\Policies\{3E37B931-7978-40C4-BCB9-8EA5BE51E9D6}\Machine\UIRibbonRes.dll
Destination filec:\windows\system32\UIRibbonRes.dll
Attributes
Read-onlyDisabled
HiddenDisabled
ArchiveEnabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
File (Target Path: %USERPROFILE%\APPDATA\Local\BraveSoftware\Brave-Browser\Application\brave.exe)
brave.exe (Order: 4)
General
ActionDelete
Properties
Destination file%USERPROFILE%\APPDATA\Local\BraveSoftware\Brave-Browser\Application\brave.exe
Suppress errors on individual file actionsDisabled
Attributes
Read-onlyDisabled
HiddenDisabled
ArchiveEnabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Apply once and do not reapplyNo
Folders
Folder (Path: C:\Windows\Help)
Help (Order: 1)
General
ActionDelete
Attributes
PathC:\Windows\Help
Delete this folder (if emptied)Enabled
Recursively delete all subfolders (if emptied)Disabled
Delete all files in the folder(s)Enabled
Allow deletion of read-only files/foldersDisabled
Ignore errors for files/folders that cannot be deletedDisabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Apply once and do not reapplyNo
Registry
DisableFileTransfer (Order: 1)
General
ActionCreate
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSOFTWARE\Policies\Skype\Phone
Value nameDisableFileTransfer
Value typeREG_DWORD
Value data0x1 (1)
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
DisableFileTransfer (Order: 2)
General
ActionUpdate
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSOFTWARE\Policies\Skype\Phone
Value nameDisableFileTransfer
Value typeREG_DWORD
Value data0x1 (1)
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
{F02C1A0D-BE21-4350-88B0-7367FC96EF3C} (Order: 3)
General
ActionCreate
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSOFTWARE\Microsoft\Windows\CurrentVersion\policies\NonEnum
Value name{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}
Value typeREG_DWORD
Value data0x1 (1)
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
Debugger (Order: 4)
General
ActionCreate
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\system_a.exe
Value nameDebugger
Value typeREG_SZ
Value data"c:\windows\system32\systray.exe" /z
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
User Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Google/Google Chrome/Removed policies
PolicySettingComment
Block access to a list of URLsEnabled
Block access to a list of URLs
file://*
file
file://