Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
ROBUH-PO-WSUS-Wks
Data collected on: 2-9-2025 10:17:14
General
Details
Domainemea.tpg.ads
OwnerS-1-5-21-513466819-3096973226-347852806-569433
Created2-3-2022 15:46:54
Modified9-2-2023 15:18:40
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions19 (AD), 19 (SYSVOL)
Unique ID{3c13001a-355e-4dbd-8bd3-74bf7c7452bf}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
SystemsYesEnabledemea.tpg.ads/RO/Systems

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
S-1-5-21-513466819-3096973226-347852806-295291
S-1-5-21-513466819-3096973226-347852806-577703
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\RO-G-ORG-OU AdminsEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-295291Read (from Security Filtering)No
S-1-5-21-513466819-3096973226-347852806-49070Edit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-577703Read (from Security Filtering)No
Computer Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Windows Update/Legacy Policies
PolicySettingComment
Allow Automatic Updates immediate installationEnabled
Configure auto-restart reminder notifications for updatesEnabled
Specify the period for auto-restart reminder notifications:
Period (min): 240
PolicySettingComment
Configure auto-restart required notification for updatesEnabled
Specify the method by which the auto-restart required notification is dismissed:
Method: 2 - User Action
PolicySettingComment
Enabling Windows Update Power Management to automatically wake up the system to install scheduled updatesEnabled
Re-prompt for restart with scheduled installationsEnabled
Wait the following period before prompting again with a scheduled
restart (minutes): 60
PolicySettingComment
Specify deadline before auto-restart for update installationEnabled
Specify the number of days before a pending restart will automatically be executed outside of active hours:
Quality Updates (days): 2
Feature Updates (days): 2
Windows Components/Windows Update/Manage end user experience
PolicySettingComment
Allow updates to be downloaded automatically over metered connectionsEnabled
Configure Automatic UpdatesEnabled
Configure automatic updating:4 - Auto download and schedule the install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenanceEnabled
Scheduled install day: 0 - Every day
Scheduled install time:12:00
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every weekEnabled
First week of the monthDisabled
Second week of the monthDisabled
Third week of the monthDisabled
Fourth week of the monthDisabled
Install updates for other Microsoft productsEnabled
PolicySettingComment
Remove access to "Pause updates" featureEnabled
Specify deadlines for automatic updates and restartsEnabled
Quality Updates
Deadline (days):1
Grace period (days):1
Feature Updates
Deadline (days):1
Grace Period (days):1
Don't auto-restart until end of grace periodEnabled
PolicySettingComment
Turn off auto-restart for updates during active hoursEnabled
Active Hours
Start: 8 AM
End:11 PM
Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
PolicySettingComment
Automatic Updates detection frequencyEnabled
Check for updates at the following
interval (hours): 3
PolicySettingComment
Specify intranet Microsoft update service locationEnabled
Set the intranet update service for detecting updates:http://robuhdeploy02.emea.tpg.ads:8530
Set the intranet statistics server:http://robuhdeploy02.emea.tpg.ads:8530
Set the alternate download server:
(example: https://IntranetUpd01)
Download files with no Url in the metadata if alternate download server is set.Disabled
Do not enforce TLS certificate pinning for Windows Update client for detecting updates.Disabled
Select the proxy behavior for Windows Update client for detecting updates:Only use system proxy for detecting updates (default)
User Configuration (Enabled)
No settings defined.