This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
Delegation
These groups and users have the specified permission for this GPO
Name
Allowed Permissions
Inherited
EMEA\Domain Admins
Edit settings, delete, modify security
No
EMEA\tentolouris.5
Edit settings, delete, modify security
No
NT AUTHORITY\Authenticated Users
Read (from Security Filtering)
No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS
Read
No
NT AUTHORITY\SYSTEM
Edit settings, delete, modify security
No
ROOT\Enterprise Admins
Edit settings, delete, modify security
No
S-1-5-21-513466819-3096973226-347852806-203252
Read
No
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Public Key Policies/Trusted Root Certification Authorities
Certificates
Issued To
Issued By
Expiration Date
Intended Purposes
WSUS Publishers Self-signed
WSUS Publishers Self-signed
16-11-2019 09:05:27
Code Signing
For additional information about individual settings, launch the Local Group Policy Object Editor.
Public Key Policies/Trusted Publishers Certificates
Issued To
Issued By
Expiration Date
Intended Purposes
WSUS Publishers Self-signed
WSUS Publishers Self-signed
16-11-2019 09:05:27
Code Signing
For additional information about individual settings, launch the Local Group Policy Object Editor.
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Windows Update/Legacy Policies
Policy
Setting
Comment
Allow Automatic Updates immediate installation
Disabled
Delay Restart for scheduled installations
Enabled
Wait the following period before proceeding with a scheduled
restart (minutes):
30
Windows Components/Windows Update/Manage end user experience
Policy
Setting
Comment
Configure Automatic Updates
Enabled
Configure automatic updating:
3 - Auto download and notify for install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenance
Disabled
Scheduled install day:
0 - Every day
Scheduled install time:
03:00
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every week
First week of the month
Second week of the month
Third week of the month
Fourth week of the month
Install updates for other Microsoft products
Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
Policy
Setting
Comment
Allow signed updates from an intranet Microsoft update service location
Enabled
Automatic Updates detection frequency
Enabled
Check for updates at the following
interval (hours):
5
Policy
Setting
Comment
Specify intranet Microsoft update service location
Enabled
Set the intranet update service for detecting updates:
https://wsus01.teleperformance.gr:8531/
Set the intranet statistics server:
https://wsus01.teleperformance.gr:8531/
Set the alternate download server:
(example: https://IntranetUpd01)
Download files with no Url in the metadata if alternate download server is set.
Do not enforce TLS certificate pinning for Windows Update client for detecting updates.
Select the proxy behavior for Windows Update client for detecting updates: