This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\FR-L-SEC-GPO-WSUS_Servers_IT
Delegation
These groups and users have the specified permission for this GPO
Name
Allowed Permissions
Inherited
EMEA\Domain Admins
Edit settings, delete, modify security
No
EMEA\FR-G-ORG-OU Admins
Edit settings, delete, modify security
No
EMEA\FR-L-SEC-GPO-WSUS_Servers_IT
Read (from Security Filtering)
No
NT AUTHORITY\Authenticated Users
Read
No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS
Read
No
NT AUTHORITY\SYSTEM
Edit settings, delete, modify security
No
ROOT\Enterprise Admins
Edit settings, delete, modify security
No
Computer Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Windows Update/Legacy Policies
Policy
Setting
Comment
Allow non-administrators to receive update notifications
Disabled
Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog box
Enabled
No auto-restart with logged on users for scheduled automatic updates installations
Enabled
Turn on Software Notifications
Enabled
Windows Components/Windows Update/Manage end user experience
Policy
Setting
Comment
Configure Automatic Updates
Enabled
Configure automatic updating:
3 - Auto download and notify for install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenance
Disabled
Scheduled install day:
5 - Every Thursday
Scheduled install time:
22:00
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every week
First week of the month
Second week of the month
Third week of the month
Fourth week of the month
Install updates for other Microsoft products
Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
Policy
Setting
Comment
Allow signed updates from an intranet Microsoft update service location
Enabled
Automatic Updates detection frequency
Enabled
Check for updates at the following
interval (hours):
1
Policy
Setting
Comment
Enable client-side targeting
Enabled
Target group name for this computer
Servers_IT
Policy
Setting
Comment
Specify intranet Microsoft update service location
Enabled
Set the intranet update service for detecting updates:
http://frparwsus11.emea.tpg.ads:8530
Set the intranet statistics server:
http://frparwsus11.emea.tpg.ads:8530
Set the alternate download server:
(example: https://IntranetUpd01)
Download files with no Url in the metadata if alternate download server is set.
Disabled
Do not enforce TLS certificate pinning for Windows Update client for detecting updates.
Select the proxy behavior for Windows Update client for detecting updates:
Extra Registry Settings
Display names for some settings cannot be found. You might be able to resolve this issue by updating the .ADM files used by Group Policy Management.