This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
None
Delegation
These groups and users have the specified permission for this GPO
Name
Allowed Permissions
Inherited
EMEA\Domain Admins
Edit settings, delete, modify security
No
EMEA\RO-G-ORG-OU Admins
Edit settings, delete, modify security
No
NT AUTHORITY\Authenticated Users
Read
No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS
Read
No
NT AUTHORITY\SYSTEM
Edit settings, delete, modify security
No
ROOT\Enterprise Admins
Edit settings, delete, modify security
No
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Windows Firewall with Advanced Security
Global Settings
Policy
Setting
Policy version
2.28
Disable stateful FTP
Not Configured
Disable stateful PPTP
Not Configured
IPsec exempt
Not Configured
IPsec through NAT
Not Configured
Preshared key encoding
Not Configured
SA idle time
Not Configured
Strong CRL check
Not Configured
Connection Security Settings
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Windows Update/Legacy Policies
Policy
Setting
Comment
Allow Automatic Updates immediate installation
Enabled
Turn on recommended updates via Automatic Updates
Enabled
Windows Components/Windows Update/Manage end user experience
Policy
Setting
Comment
Always automatically restart at the scheduled time
Enabled
The restart timer will give users this much time to save their
work (minutes):
180
Policy
Setting
Comment
Configure Automatic Updates
Enabled
Configure automatic updating:
4 - Auto download and schedule the install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenance
Enabled
Scheduled install day:
0 - Every day
Scheduled install time:
12:00
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every week
Enabled
First week of the month
Disabled
Second week of the month
Disabled
Third week of the month
Disabled
Fourth week of the month
Disabled
Install updates for other Microsoft products
Enabled
Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
Policy
Setting
Comment
Allow signed updates from an intranet Microsoft update service location
Enabled
Automatic Updates detection frequency
Enabled
Check for updates at the following
interval (hours):
3
Policy
Setting
Comment
Specify intranet Microsoft update service location
Enabled
Set the intranet update service for detecting updates:
http://robuhdeploy02.emea.tpg.ads:8530
Set the intranet statistics server:
http://robuhdeploy02.emea.tpg.ads:8530
Set the alternate download server:
(example: https://IntranetUpd01)
Download files with no Url in the metadata if alternate download server is set.
Disabled
Do not enforce TLS certificate pinning for Windows Update client for detecting updates.
Select the proxy behavior for Windows Update client for detecting updates:
Extra Registry Settings
Display names for some settings cannot be found. You might be able to resolve this issue by updating the .ADM files used by Group Policy Management.