Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
EG-PO-WIN-Direct access server setting
Data collected on: 2-9-2025 09:40:38
General
Details
DomainEMEA.TPG.ADS
OwnerS-1-5-21-513466819-3096973226-347852806-409962
Created15-3-2020 02:29:56
Modified9-2-2023 14:51:28
User Revisions5 (AD), 5 (SYSVOL)
Computer Revisions28 (AD), 28 (SYSVOL)
Unique ID{42f58eba-ad16-4dd6-b6ff-c4b9e38013e2}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
ServersNoEnabledemea.tpg.ads/EG/Systems/Servers

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
S-1-5-21-513466819-3096973226-347852806-719592
S-1-5-21-513466819-3096973226-347852806-737114
S-1-5-21-513466819-3096973226-347852806-737126
S-1-5-21-513466819-3096973226-347852806-769171
S-1-5-21-513466819-3096973226-347852806-927680
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\EG-G-ORG-OU AdminsEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-409962Edit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-719592Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-737114Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-737126Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-769171Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-927680Read (from Security Filtering)No
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Public Key Policies/Certificate Services Client - Auto-Enrollment Settings
PolicySetting
Automatic certificate managementEnabled
OptionSetting
Enroll new certificates, renew expired certificates, process pending certificate requests and remove revoked certificatesEnabled
Update and manage certificates that use certificate templates from Active DirectoryDisabled
Windows Firewall with Advanced Security
Global Settings
PolicySetting
Policy version2.26
Disable stateful FTPNot Configured
Disable stateful PPTPNot Configured
IPsec exemptICMP
IPsec through NATNot Configured
Preshared key encodingNot Configured
SA idle timeNot Configured
Strong CRL checkNot Configured
Inbound Rules
NameDescription
Network Location Server (HTTPS Traffic-In)Inbound allow rule to allow traffic to the network location server deployed on the Remote Access server (with a single network adapter).
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port62000
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileDomain
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupDirectAccess
Core Networking - IPHTTPS (TCP-In)Inbound TCP rule to allow IPHTTPS tunneling technology to provide connectivity across HTTP proxies and firewalls.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local portIPTLSIn, IPHTTPSIn
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileDomain
Network interface typeAll
Serviceiphlpsvc
Allow edge traversalFalse
GroupDirectAccess
Domain Name Server (UDP-In)Inbound allow rule to allow traffic to the DNS64 server deployed on the Remote Access server.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol17
Local port53
Remote portAny
ICMP settingsAny
Local scopefdcc:9ad5:f6d6:3333::1
Remote scopeAny
ProfileAll
Network interface typeAll
Serviceiphlpsvc
Allow edge traversalFalse
GroupDirectAccess
Domain Name Server (TCP-In)Inbound allow rule to allow traffic to the DNS64 server deployed on the Remote Access server.
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Program%SystemRoot%\system32\svchost.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port53
Remote portAny
ICMP settingsAny
Local scopefdcc:9ad5:f6d6:3333::1
Remote scopeAny
ProfileAll
Network interface typeAll
Serviceiphlpsvc
Allow edge traversalFalse
GroupDirectAccess
Connection Security Settings
Rules
NameDescription
DirectAccess Policy-DaServerToCorpSimplified
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Authentication modeRequire inbound and outbound
Endpoint 1fdcc:9ad5:f6d6:1::/64, fdcc:9ad5:f6d6:7777::/96, fdcc:9ad5:f6d6:3333::1
Endpoint 2Any
Endpoint 1 portAny
Endpoint 2 portAny
First authentication{CA88D760-A10A-4A6D-B958-7A5DA9F9FF35}
Second authentication{A113856B-5A17-4D6E-A570-ABB89D4CED9D}
Data protection{025BF0DC-E6E5-4F87-8B95-018289D0A9C8}
ProtocolAny
ProfileDomain
Tunnel endpoint 1Any
Tunnel endpoint 2Any
Network interface typeAny
DirectAccess Policy-CorpToCorpExempt
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
Authentication modeDo not authenticate
Endpoint 1fdcc:9ad5:f6d6:1::/64
Endpoint 2fdcc:9ad5:f6d6:1::/64
Endpoint 1 portAny
Endpoint 2 portAny
ProtocolAny
ProfileDomain
Tunnel endpoint 1Any
Tunnel endpoint 2Any
Network interface typeAny
First Authentication
NameDescription
DirectAccess - Phase1 Authentication Set {CA88D760-A10A-4A6D-B958-7A5DA9F9FF35}DirectAccess - Phase1 Authentication Set
Version2.26
AuthenticationComputer Kerberos
Second Authentication
NameDescription
DirectAccess - Phase2 Authentication Set {A113856B-5A17-4D6E-A570-ABB89D4CED9D}DirectAccess - Phase2 Authentication Set
Version2.26
AuthenticationUser Kerberos
Key Exchange (Main Mode)
NameDescription
Default setDirectAccess - Phase1 Crypto Set
Version2.26
Key lifetime in minutes480
Key lifetime in sessions0
Skip version2.0
Key exchange Diffie-Hellman Group 2
Encryption AES-128
IntegrityMD5
Skip version0.0
Key exchange Diffie-Hellman Group 2
Encryption AES-128
IntegritySHA-1
Skip version0.0
Key exchange Diffie-Hellman Group 2
Encryption 3DES
IntegritySHA-1
Data Protection (Quick Mode)
NameDescription
DirectAccess - Phase2 Crypto Set {025BF0DC-E6E5-4F87-8B95-018289D0A9C8}DirectAccess - Phase2 Crypto Set
Version2.26
Perfect forward secrecy Disabled
Skip version0.0
ProtocolESP
Encryption AES-192
ESP integritySHA-1
Key lifetime in minutes60
Key lifetime in kilobytes100000
Skip version0.0
ProtocolESP
Encryption AES-128
ESP integritySHA-1
Key lifetime in minutes60
Key lifetime in kilobytes100000
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Extra Registry Settings
Display names for some settings cannot be found. You might be able to resolve this issue by updating the .ADM files used by Group Policy Management.

SettingState
SOFTWARE\Policies\Microsoft\Cryptography\PolicyServers\{26D4954F-D304-45A5-8F25-7FC844B302F5}
SOFTWARE\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\AuthFlags2
SOFTWARE\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\Cost2147483645
SOFTWARE\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\Flags20
SOFTWARE\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\FriendlyNameActive Directory Enrollment Policy
SOFTWARE\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\PolicyID{26D4954F-D304-45A5-8F25-7FC844B302F5}
SOFTWARE\Policies\Microsoft\Cryptography\PolicyServers\37c9dc30f207f27f61a2f7c3aed598a6e2920b54\URLLDAP:
SOFTWARE\Policies\Microsoft\Cryptography\PolicyServers\Flags0
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\6To4\Enable6to42
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Accounting\Inbox\Mode0
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Accounting\Radius\Mode0
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Authentication\Radius\Mode1
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\ClientGPOsemea.tpg.ads\{31C2454D-4C86-4828-AED1-8FB88AF23925}
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\ConnectTo41.33.125.73
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\DefaultDnsServersfdcc:9ad5:f6d6:3333::1
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Dns64Nat64Prefixfdcc:9ad5:f6d6:7777::/96
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\DnsServersfdcc:9ad5:f6d6:7777::a7c:650c
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\DTE1fdcc:9ad5:f6d6:1000::1
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\DTE2fdcc:9ad5:f6d6:1000::2
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\GlobalVersion{D1D40403-5864-4F6B-9D85-30CC14C3A78F}
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\GlobalWebProbeURLdirectaccess-WebProbeHost.emea.tpg.ads
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\IpHttps\InterfaceRole1
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\IpHttps\State2
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Isatap\IsatapPrefixfdcc:9ad5:f6d6:1::/64
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Isatap\IsatapState2
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\MachineSIDs\S-1-5-21-513466819-3096973226-347852806-719512\Internalinterface{AE46EE26-534C-4BAD-B726-8FD1AE7E6A88}
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\MachineSIDs\S-1-5-21-513466819-3096973226-347852806-719512\Internetinterface{AE46EE26-534C-4BAD-B726-8FD1AE7E6A88}
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\MachineSIDs\S-1-5-21-513466819-3096973226-347852806-719512\IpHttpscertUnknown data format
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\MachineSIDs\S-1-5-21-513466819-3096973226-347852806-719512\IpHttpsCertName41.33.125.73
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\MachineSIDs\S-1-5-21-513466819-3096973226-347852806-719512\IpHttpsPrefixfdcc:9ad5:f6d6:1000::/64
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\MachineSIDs\S-1-5-21-513466819-3096973226-347852806-719512\NlscertUnknown data format
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\MachineSIDs\S-1-5-21-513466819-3096973226-347852806-719512\ServerCertForRadiusIssued To
DirectAccess-RADIUS-Encrypt-EGCAIDS01.emea.tpg.ads
Issued By
DirectAccess-RADIUS-Encrypt-EGCAIDS01.emea.tpg.ads
Expiration Date
14-3-2025 19:48:38
Intended Purposes
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\ManagementServerInfo
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Nls\NlsCertNameDirectAccess-NLS.emea.tpg.ads
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Nls\NlsPort62000
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\PingEnabled0
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\PlumbDTE11
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\PlumbDTE21
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\RADeploymentMode466953
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\ServerGPOemea.tpg.ads\{42F58EBA-AD16-4DD6-B6FF-C4B9E38013E2}
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\SiteVersion{CA5F947E-2DED-44B1-93E2-A36720B94B83}
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\SiteWebProbeIPAddress10.124.101.25
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Teredo\Type0
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\TimeStamp20200315014906.083000+000
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\Version1
SOFTWARE\Policies\Microsoft\Windows\RemoteAccess\Config\WebProbeListhttp://directaccess-WebProbeHost.emea.tpg.ads
Preferences
Windows Settings
Registry
DisabledComponents (Order: 1)
General
ActionUpdate
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSYSTEM\CurrentControlSet\Services\TCPIP6\Parameters
Value nameDisabledComponents
Value typeREG_DWORD
Value data0x20 (32)
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
User Configuration (Enabled)
No settings defined.