Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
GRTVR-PO-WIN-C-WSUS Settings Clients
Data collected on: 2-9-2025 08:57:46
General
Details
Domainemea.tpg.ads
OwnerEMEA\tentolouris.5
Created9-3-2016 14:25:14
Modified17-10-2023 08:57:58
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions27 (AD), 27 (SYSVOL)
Unique ID{386ac1ec-c399-4172-a57c-9c7a2a8b1ad0}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
None

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\Domain ComputersReadNo
EMEA\GR-G-ORG-OU AdminsEdit settings, delete, modify securityNo
EMEA\tentolouris.5Edit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersRead (from Security Filtering)No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-203252ReadNo
Computer Configuration (Enabled)
Policies
Windows Settings
Scripts
Startup
For this GPO, Script order: Not configured
NameParameters
\\grkalfs01\netconfigfiles\GlobalSettings\Win10Updates.bat
Security Settings
System Services
Windows Update (Startup Mode: Automatic)
Permissions
No permissions specified
Auditing
No auditing specified
Public Key Policies/Trusted Root Certification Authorities
Certificates
Issued ToIssued ByExpiration DateIntended Purposes
WSUS Publishers Self-signedWSUS Publishers Self-signed16-11-2019 09:05:27Code Signing

For additional information about individual settings, launch the Local Group Policy Object Editor.
Public Key Policies/Trusted Publishers Certificates
Issued ToIssued ByExpiration DateIntended Purposes
WSUS Publishers Self-signedWSUS Publishers Self-signed16-11-2019 09:05:27Code Signing

For additional information about individual settings, launch the Local Group Policy Object Editor.
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Windows Update/Legacy Policies
PolicySettingComment
Allow Automatic Updates immediate installationEnabled
Do not allow update deferral policies to cause scans against Windows UpdateEnabled
Enabling Windows Update Power Management to automatically wake up the system to install scheduled updatesEnabled
No auto-restart with logged on users for scheduled automatic updates installationsEnabled
Re-prompt for restart with scheduled installationsEnabled
Wait the following period before prompting again with a scheduled
restart (minutes): 240
PolicySettingComment
Reschedule Automatic Updates scheduled installationsEnabled
Wait after system
startup (minutes): 60
PolicySettingComment
Specify Engaged restart transition and notification schedule for updatesDisabled
Windows Components/Windows Update/Manage end user experience
PolicySettingComment
Configure Automatic UpdatesEnabled
Configure automatic updating:4 - Auto download and schedule the install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenanceEnabled
Scheduled install day: 0 - Every day
Scheduled install time:02:00
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every week 
First week of the month 
Second week of the month 
Third week of the month 
Fourth week of the month 
Install updates for other Microsoft products 
PolicySettingComment
Remove access to "Pause updates" featureEnabled
Specify active hours range for auto-restartsDisabled
Turn off auto-restart for updates during active hoursEnabled
Active Hours
Start: 8 AM
End:2 AM
Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
PolicySettingComment
Allow signed updates from an intranet Microsoft update service location Enabled
Automatic Updates detection frequencyEnabled
Check for updates at the following
interval (hours): 6
PolicySettingComment
Do not connect to any Windows Update Internet locationsDisabled
Specify intranet Microsoft update service locationEnabled
Set the intranet update service for detecting updates:http://wsus04.teleperformance.gr:8530/
Set the intranet statistics server:http://wsus04.teleperformance.gr:8530/
Set the alternate download server:
(example: https://IntranetUpd01)
Download files with no Url in the metadata if alternate download server is set.Disabled
Do not enforce TLS certificate pinning for Windows Update client for detecting updates.Disabled
Select the proxy behavior for Windows Update client for detecting updates:Only use system proxy for detecting updates (default)
Extra Registry Settings
Display names for some settings cannot be found. You might be able to resolve this issue by updating the .ADM files used by Group Policy Management.

SettingState
Software\Policies\Microsoft\Windows\WindowsUpdate\AU\AUPowerManagement1
User Configuration (Enabled)
No settings defined.