Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
EG-PO-WIN-C-Servers Firewall
Data collected on: 2-9-2025 09:11:10
General
Details
Domainemea.tpg.ads
OwnerEMEA\ygalal.5
Created15-2-2018 11:04:30
Modified8-4-2025 12:30:04
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions34 (AD), 34 (SYSVOL)
Unique ID{0886b5b6-da3e-46d2-8d46-128ea0cb01d1}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
ServersYesEnabledemea.tpg.ads/EG/Systems/Servers

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
None
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
S-1-5-21-513466819-3096973226-347852806-479817CustomNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Windows Firewall with Advanced Security
Global Settings
PolicySetting
Policy version2.22
Disable stateful FTPNot Configured
Disable stateful PPTPNot Configured
IPsec exemptNot Configured
IPsec through NATNot Configured
Preshared key encodingNot Configured
SA idle timeNot Configured
Strong CRL checkNot Configured
Domain Profile Settings
PolicySetting
Firewall stateNot Configured
Inbound connectionsBlock
Outbound connectionsNot Configured
Apply local firewall rulesYes
Apply local connection security rulesYes
Display notificationsNot Configured
Allow unicast responsesNot Configured
Log dropped packetsYes
Log successful connectionsYes
Log file path%systemroot%\system32\logfiles\firewall\domainfw.log
Log file maximum size (KB)16384
Private Profile Settings
PolicySetting
Firewall stateOn
Inbound connectionsBlock
Outbound connectionsAllow
Apply local firewall rulesYes
Apply local connection security rulesYes
Display notificationsNo
Allow unicast responsesNo
Log dropped packetsYes
Log successful connectionsYes
Log file path%systemroot%\system32\logfiles\firewall\Private fw.log
Log file maximum size (KB)16384
Public Profile Settings
PolicySetting
Firewall stateOn
Inbound connectionsBlock
Outbound connectionsAllow
Apply local firewall rulesNo
Apply local connection security rulesNo
Display notificationsNo
Allow unicast responsesNo
Log dropped packetsYes
Log successful connectionsYes
Log file path%systemroot%\system32\logfiles\firewall\public fw.log
Log file maximum size (KB)16384
Inbound Rules
NameDescription
Windows Management Instrumentation (ASync-In)Inbound rule to allow Asynchronous WMI traffic for remote Windows Management Instrumentation. [TCP]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%systemroot%\system32\wbem\unsecapp.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupWindows Management Instrumentation (WMI)
Windows Management Instrumentation (WMI-In)Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
Servicewinmgmt
Allow edge traversalFalse
GroupWindows Management Instrumentation (WMI)
Windows Management Instrumentation (DCOM-In)Inbound rule to allow DCOM traffic for remote Windows Management Instrumentation. [TCP 135]
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port135
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
Servicerpcss
Allow edge traversalFalse
GroupWindows Management Instrumentation (WMI)
Connection Security Settings
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Network/Network Connections/Windows Defender Firewall/Domain Profile
PolicySettingComment
Windows Defender Firewall: Allow loggingEnabled
Log dropped packetsEnabled
Log successful connectionsEnabled
Log file path and name:%systemroot%\system32\logfiles\firewall\domainfw.log
Size limit (KB):16384
User Configuration (Enabled)
No settings defined.