Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
RU-PO-ADM-C-WSUS Servers Auto
Data collected on: 2-9-2025 08:51:36
General
Details
Domainemea.tpg.ads
OwnerEMEA\efimov.6
Created11-9-2014 13:22:28
Modified30-10-2023 08:06:24
User Revisions1 (AD), 1 (SYSVOL)
Computer Revisions16 (AD), 16 (SYSVOL)
Unique ID{9076703a-e664-4269-a974-bb3c41d609b7}
GPO StatusUser settings disabled
Links
LocationEnforcedLink StatusPath
ServersNoEnabledemea.tpg.ads/RU/Systems/Servers

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\RU-L-SEC-WSUS Servers Auto
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\Domain ComputersReadNo
EMEA\efimov.6Edit settings, delete, modify securityNo
EMEA\RU-L-SEC-Delegation Group Policy Objects Modify AccessEdit settings, delete, modify securityNo
EMEA\RU-L-SEC-WSUS Servers AutoRead (from Security Filtering)No
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-203252ReadNo
Computer Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Windows Update/Legacy Policies
PolicySettingComment
Allow Automatic Updates immediate installationEnabled
Allow non-administrators to receive update notificationsDisabled
No auto-restart with logged on users for scheduled automatic updates installationsDisabled
Reschedule Automatic Updates scheduled installationsEnabled
Wait after system
startup (minutes): 1
PolicySettingComment
Turn on recommended updates via Automatic UpdatesEnabled
Turn on Software NotificationsEnabled
Windows Components/Windows Update/Manage end user experience
PolicySettingComment
Always automatically restart at the scheduled timeEnabled
The restart timer will give users this much time to save their
work (minutes): 15
PolicySettingComment
Configure Automatic UpdatesEnabled
Configure automatic updating:4 - Auto download and schedule the install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenanceDisabled
Scheduled install day: 0 - Every day
Scheduled install time:04:00
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every week 
First week of the month 
Second week of the month 
Third week of the month 
Fourth week of the month 
Install updates for other Microsoft products 
Windows Components/Windows Update/Manage updates offered from Windows Server Update Service
PolicySettingComment
Allow signed updates from an intranet Microsoft update service location Enabled
Automatic Updates detection frequencyEnabled
Check for updates at the following
interval (hours): 12
PolicySettingComment
Do not connect to any Windows Update Internet locationsEnabled
Enable client-side targetingEnabled
Target group name for this computerRU-SERVERS
PolicySettingComment
Specify intranet Microsoft update service locationEnabled
Set the intranet update service for detecting updates:http://rumosmsd03.emea.tpg.ads:8530
Set the intranet statistics server:http://rumosmsd03.emea.tpg.ads:8530
Set the alternate download server: 
(example: https://IntranetUpd01)
Download files with no Url in the metadata if alternate download server is set. 
Do not enforce TLS certificate pinning for Windows Update client for detecting updates. 
Select the proxy behavior for Windows Update client for detecting updates: 
Preferences
Windows Settings
Registry
EMEA-T1-Manual (Order: 1)
General
ActionCreate
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSOFTWARE\Wow6432Node\Tanium\Tanium Client\Sensor Data\Tags
Value nameEMEA-T1-Manual
Value typeREG_SZ
Value data
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
User Configuration (Disabled)
No settings defined.