Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
PT-PO-WIN-C-Client System Salt - W11
Data collected on: 2-9-2025 12:06:27
General
Details
Domainemea.tpg.ads
OwnerEMEA\junior.388-adm
Created8-5-2024 15:30:34
Modified5-2-2025 16:09:08
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions44 (AD), 44 (SYSVOL)
Unique ID{04bbb79a-19b3-4ef2-a60f-c8f9c0586c11}
GPO StatusUser settings disabled
Links
LocationEnforcedLink StatusPath
ClientsNoEnabledemea.tpg.ads/PT/Systems/Clients

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\PT-G-ORG-Client System Salt
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\junior.388-admEdit settings, delete, modify securityNo
EMEA\PT-G-ORG-Client System SaltRead (from Security Filtering)No
EMEA\PT-L-SEC-Delegation Modify Group Policy Settings AccessEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Scripts
Startup
For this GPO, Script order: Windows PowerShell scripts will run first
NameParameters
Keyboard_Salt.ps1
Security Settings
Local Policies/User Rights Assignment
PolicySetting
Allow log on locallyEMEA\PT-L-SEC-Operation Salt, EMEA\PTCIT-G-ORG-Users-TIER2, BUILTIN\Administrators
Local Policies/Security Options
Interactive Logon
PolicySetting
Interactive logon: Number of previous logons to cache (in case domain controller is not available)0 logons
Interactive logon: Require Domain Controller authentication to unlock workstationEnabled
Network Access
PolicySetting
Network access: Do not allow storage of passwords and credentials for network authenticationEnabled
File System
%ProgramFiles%\NixxisClient\Nixxis
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
AllowAPPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGESFull ControlThis folder, subfolders and files
AllowCREATOR OWNERFull ControlThis folder, subfolders and files
AllowNT AUTHORITY\SYSTEMFull ControlThis folder, subfolders and files
AllowBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
AllowBUILTIN\UsersModifyThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
%username%\AppData\Roaming\NixxisClient\Nixxis
Configure this file or folder then: Propagate inheritable permissions to all subfolders and files
Owner
Permissions
TypeNamePermissionApply To
AllowAPPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGESFull ControlThis folder, subfolders and files
AllowCREATOR OWNERFull ControlThis folder, subfolders and files
AllowNT AUTHORITY\SYSTEMFull ControlThis folder, subfolders and files
AllowBUILTIN\AdministratorsFull ControlThis folder, subfolders and files
AllowBUILTIN\UsersRead and ExecuteThis folder, subfolders and files
Allow inheritable permissions from the parent to propagate to this object and all child objectsDisabled
Auditing
No auditing specified
Windows Firewall with Advanced Security
Global Settings
PolicySetting
Policy version2.29
Disable stateful FTPNot Configured
Disable stateful PPTPNot Configured
IPsec exemptNot Configured
IPsec through NATNot Configured
Preshared key encodingNot Configured
SA idle timeNot Configured
Strong CRL checkNot Configured
Inbound Rules
NameDescription
MicroSip
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramC:\Program Files\Microsip\microsip.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Nixxis
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramC:\Program Files\NixxisClient\Nixxis\NixxisClientDesktop.exe
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Outbound Rules
NameDescription
MicroSip
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramC:\Program Files\Microsip\microsip.exe
ActionAllow
SecurityRequire authentication
Authorized computers
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Group
Nixxis
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramC:\Program Files\NixxisClient\Nixxis\NixxisClientDesktop.exe
ActionAllow
SecurityRequire authentication
Authorized computers
ProtocolAny
Local portAny
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileAll
Network interface typeAll
ServiceAll programs and services
Group
Connection Security Settings
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Google/Google Chrome
PolicySettingComment
Clear Browsing Data on ExitEnabled
Clear Browsing Data on Exit
autofill
browsing_history
cached_images_and_files
cookies_and_other_site_data
download_history
hosted_app_data
password_signin
site_settings
Microsoft Edge
PolicySettingComment
Allow sites configured for Internet Explorer mode to open in Microsoft EdgeEnabled
Configure Internet Explorer integrationEnabled
Configure Internet Explorer integrationInternet Explorer mode
PolicySettingComment
Configure the Enterprise Mode Site ListEnabled
Configure the Enterprise Mode Site List\\emea.tpg.ads\pt\Lisbon-CIT\Clients\Settings\GPO\Sites\Generic\sites.xml
Windows Components/App Privacy
PolicySettingComment
Let Windows apps access the cameraEnabled
Default for all apps:Force Allow
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access the microphoneEnabled
Default for all apps:Force Allow
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
Windows Components/File Explorer
PolicySettingComment
Set a default associations configuration fileEnabled
Default Associations Configuration FileC:\Bin\PDF_Acrobat_Chrome_Media_Photos.xml
Windows Components/Internet Explorer/Compatibility View
PolicySettingComment
Turn on Internet Explorer Standards Mode for local intranetEnabled
Preferences
Windows Settings
Files
File (Target Path: C:\Bin\PDF_Acrobat_Chrome_Media_Photos.xml)
PDF_Acrobat_Chrome_Media_Photos.xml (Order: 1)
General
ActionReplace
Properties
Source file(s)\\emea.tpg.ads\pt\Lisbon-CIT\Clients\Settings\GPO\File Association\PDF_Acrobat_Chrome_Media_Photos.xml
Destination fileC:\Bin\PDF_Acrobat_Chrome_Media_Photos.xml
Suppress errors on individual file actionsDisabled
Attributes
Read-onlyDisabled
HiddenDisabled
ArchiveEnabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedYes
File (Target Path: C:\Bin\LocalStartMenuSalt.xml)
LocalStartMenuSalt.xml (Order: 2)
General
ActionReplace
Properties
Source file(s)\\emea.tpg.ads\pt\Lisbon-CIT\Clients\Settings\GPO\StartMenu\LocalStartMenuSalt.xml
Destination fileC:\Bin\LocalStartMenuSalt.xml
Suppress errors on individual file actionsDisabled
Attributes
Read-onlyDisabled
HiddenDisabled
ArchiveEnabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
File (Target Path: C:\Windows\System32\drivers\etc\hosts)
hosts (Order: 3)
General
ActionReplace
Properties
Source file(s)\\emea.tpg.ads\pt\Lisbon-CIT\Clients\Settings\GPO\HostFiles\Salt\hosts
Destination fileC:\Windows\System32\drivers\etc\hosts
Suppress errors on individual file actionsDisabled
Attributes
Read-onlyDisabled
HiddenDisabled
ArchiveEnabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
File (Target Path: C:\bin\Keyboard_Salt.ps1)
Keyboard_Salt.ps1 (Order: 4)
General
ActionReplace
Properties
Source file(s)\\emea.tpg.ads\pt\Lisbon-CIT\Clients\Settings\GPO\Scripts\Keyboard\Keyboard_Salt.ps1
Destination fileC:\bin\Keyboard_Salt.ps1
Suppress errors on individual file actionsDisabled
Attributes
Read-onlyDisabled
HiddenDisabled
ArchiveEnabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
Registry
Portal (Order: 1)
General
ActionReplace
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSOFTWARE\Palo Alto Networks\GlobalProtect\PanSetup
Value namePortal
Value typeREG_SZ
Value datagp1110.teleperformance.pt
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedYes
Portal1 (Order: 2)
General
ActionReplace
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSOFTWARE\Palo Alto Networks\GlobalProtect\CBL
Value namePortal1
Value typeREG_SZ
Value datagp1110.teleperformance.pt
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedYes
Portal2 (Order: 3)
General
ActionReplace
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSOFTWARE\Palo Alto Networks\GlobalProtect\CBL
Value namePortal2
Value typeREG_SZ
Value datagp1710.teleperformance.pt
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
User Configuration (Disabled)
No settings defined.