Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
GRMKT-PO-WIN-C-WSUS Settings Servers
Data collected on: 2-9-2025 09:01:42
General
Details
Domainemea.tpg.ads
OwnerEMEA\tentolouris.5
Created17-2-2017 09:35:18
Modified10-7-2025 09:44:26
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions9 (AD), 9 (SYSVOL)
Unique ID{c09d5474-d558-4296-9a37-f54aad5e6abe}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
MKTNoEnabledemea.tpg.ads/GR/Systems/Servers/MKT

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\GR-G-ORG-OU AdminsEdit settings, delete, modify securityNo
EMEA\tentolouris.5Edit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersRead (from Security Filtering)No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Public Key Policies/Trusted Root Certification Authorities
Certificates
Issued ToIssued ByExpiration DateIntended Purposes
WSUS Publishers Self-signedWSUS Publishers Self-signed16-11-2019 09:05:27Code Signing

For additional information about individual settings, launch the Local Group Policy Object Editor.
Public Key Policies/Trusted Publishers Certificates
Issued ToIssued ByExpiration DateIntended Purposes
WSUS Publishers Self-signedWSUS Publishers Self-signed16-11-2019 09:05:27Code Signing

For additional information about individual settings, launch the Local Group Policy Object Editor.
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Windows Update/Legacy Policies
PolicySettingComment
Allow Automatic Updates immediate installationDisabled
Delay Restart for scheduled installationsDisabled
No auto-restart with logged on users for scheduled automatic updates installationsEnabled
Windows Components/Windows Update/Manage end user experience
PolicySettingComment
Configure Automatic UpdatesEnabled
Configure automatic updating:3 - Auto download and notify for install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenanceDisabled
Scheduled install day: 0 - Every day
Scheduled install time:23:00
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every weekEnabled
First week of the monthDisabled
Second week of the monthDisabled
Third week of the monthDisabled
Fourth week of the monthDisabled
Install updates for other Microsoft productsDisabled
Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
PolicySettingComment
Allow signed updates from an intranet Microsoft update service location Enabled
Automatic Updates detection frequencyEnabled
Check for updates at the following
interval (hours): 5
PolicySettingComment
Specify intranet Microsoft update service locationEnabled
Set the intranet update service for detecting updates:http://wsus01.teleperformance.gr:8530/
Set the intranet statistics server:http://wsus01.teleperformance.gr:8530/
Set the alternate download server:
(example: https://IntranetUpd01)
Download files with no Url in the metadata if alternate download server is set.Disabled
Do not enforce TLS certificate pinning for Windows Update client for detecting updates.Disabled
Select the proxy behavior for Windows Update client for detecting updates:Only use system proxy for detecting updates (default)
User Configuration (Enabled)
No settings defined.