Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
GC-PO-SEC-C-USB Block Policy
Data collected on: 2-9-2025 11:07:38
General
Details
Domainemea.tpg.ads
OwnerS-1-5-21-513466819-3096973226-347852806-1051962
Created20-2-2023 11:44:46
Modified7-8-2025 12:04:18
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions1 (AD), 1 (SYSVOL)
Unique ID{1ac3287b-9d2c-46b6-ada7-542a0a250926}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
ClientsNoEnabledemea.tpg.ads/Special-Services/GC/Systems/Clients

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\GC-G-ORG-AQK-MAF Computers
EMEA\GC-G-ORG-AQK-STAFF Computers
EMEA\GC-G-ORG-DMM-Citzen Account Computers
EMEA\GC-G-ORG-DXB-DLD Computers
EMEA\GC-G-ORG-DXB-EHS Computers
EMEA\GC-G-ORG-DXB-ENOC Computers
EMEA\GC-G-ORG-DXB-MAF Computers
EMEA\GC-G-ORG-DXB-Mercedes Computer
EMEA\GC-G-ORG-DXB-MOCD Computer
EMEA\GC-G-ORG-DXB-MOIAT Computers
EMEA\GC-G-ORG-DXB-STAFF Computers
EMEA\GC-G-ORG-DXB-TIKTOK Computer
EMEA\GC-G-ORG-DXB-XIAOMI Computer
EMEA\GC-G-ORG-RUH-ABB Computers
EMEA\GC-G-ORG-RUH-AC Computers
EMEA\GC-G-ORG-RUH-ALTAYER Computers
EMEA\GC-G-ORG-RUH-Citzen Account Computers
EMEA\GC-G-ORG-RUH-CNTXT Computers
EMEA\GC-G-ORG-RUH-Collinson Computers
EMEA\GC-G-ORG-RUH-Hala Computers
EMEA\GC-G-ORG-RUH-Landmark Computers
EMEA\GC-G-ORG-RUH-LEAN Computers
EMEA\GC-G-ORG-RUH-McDonalds Computers
EMEA\GC-G-ORG-RUH-NTDP Computers
EMEA\GC-G-ORG-RUH-RX Computers
EMEA\GC-G-ORG-RUH-SAPTCO Computers
EMEA\GC-G-ORG-RUH-SFC Computers
EMEA\GC-G-ORG-RUH-STAFF Computers
EMEA\GC-G-ORG-RUH-Thamanyah Computers
EMEA\GC-G-ORG-RUH-Thiqah Computers
EMEA\GC-G-ORG-RUH-UBER Computers
EMEA\GC-G-ORG-RUH-Xiaomi Computers
S-1-5-21-513466819-3096973226-347852806-1232123
S-1-5-21-513466819-3096973226-347852806-1232722
S-1-5-21-513466819-3096973226-347852806-1232724
S-1-5-21-513466819-3096973226-347852806-1239393
S-1-5-21-513466819-3096973226-347852806-1516830
S-1-5-21-513466819-3096973226-347852806-1555792
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\GC-G-ORG-AQK-MAF ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-AQK-STAFF ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-DMM-Citzen Account ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-DLD ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-EHS ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-ENOC ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-MAF ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-Mercedes ComputerRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-MOCD ComputerRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-MOIAT ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-STAFF ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-TIKTOK ComputerRead (from Security Filtering)No
EMEA\GC-G-ORG-DXB-XIAOMI ComputerRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-ABB ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-AC ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-ALTAYER ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Citzen Account ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-CNTXT ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Collinson ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Hala ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Landmark ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-LEAN ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-McDonalds ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-NTDP ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-RX ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-SAPTCO ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-SFC ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-STAFF ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Thamanyah ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Thiqah ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-UBER ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-RUH-Xiaomi ComputersRead (from Security Filtering)No
EMEA\GC-G-ORG-ServerAdminEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-1051962Edit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-1232123Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1232722Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1232724Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1239393Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1516830Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-1555792Read (from Security Filtering)No
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
File System
%SystemRoot%\inf\cdrom.inf
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\inf\cdrom.PNF
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\inf\flpydisk.inf
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\inf\flpydisk.PNF
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\inf\usbstor.inf
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\inf\usbstor.PNF
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\system32\drivers\usbstor.sys
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\system32\PortableDeviceApi.dll
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\system32\PortableDeviceConnectApi.dll
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%SystemRoot%\system32\PortableDeviceTypes.dll
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
Registry
MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom
Configure this key then: Propagate inheritable permissions to all subkeys
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\UsersFull controlThis key and subkeys
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
MACHINE\SYSTEM\CurrentControlSet\Services\Flpydisk
Configure this key then: Propagate inheritable permissions to all subkeys
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\UsersFull controlThis key and subkeys
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
MACHINE\SYSTEM\CurrentControlSet\services\USBSTOR
Configure this key then: Propagate inheritable permissions to all subkeys
Owner
Permissions
TypeNamePermissionApply To
DenyBUILTIN\AdministratorsFull controlThis key and subkeys
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
System/Removable Storage Access
PolicySettingComment
CD and DVD: Deny execute accessEnabled
CD and DVD: Deny read accessEnabled
CD and DVD: Deny write accessEnabled
Removable Disks: Deny execute accessEnabled
Removable Disks: Deny read accessEnabled
Removable Disks: Deny write accessEnabled
WPD Devices: Deny read accessEnabled
WPD Devices: Deny write accessEnabled
User Configuration (Enabled)
No settings defined.