Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
TPS-PO-WIN-C-Settings Azure Server Hardening
Data collected on: 2-9-2025 10:49:29
General
Details
Domainemea.tpg.ads
OwnerEMEA\Domain Admins
Created6-10-2022 10:36:46
Modified9-2-2023 16:11:56
User Revisions0 (AD), 0 (SYSVOL)
Computer Revisions50 (AD), 50 (SYSVOL)
Unique ID{8b55af0c-14c4-4b21-bdf7-aeb1573ab6cf}
GPO StatusUser settings disabled
Links
LocationEnforcedLink StatusPath
AZRYesEnabledemea.tpg.ads/TPS/Systems/Servers/AZR

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
EMEA\AZCDEOBSERVER01$
EMEA\AZCDETPC01$
EMEA\AZCDETPC02$
EMEA\AZCDETPC03$
EMEA\AZCDETPC04$
EMEA\THINSCALE01$
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
EMEA\AZCDEOBSERVER01$Read (from Security Filtering)No
EMEA\AZCDETPC01$Read (from Security Filtering)No
EMEA\AZCDETPC02$Read (from Security Filtering)No
EMEA\AZCDETPC03$Read (from Security Filtering)No
EMEA\AZCDETPC04$Read (from Security Filtering)No
EMEA\Domain AdminsEdit settings, delete, modify securityNo
EMEA\Domain ComputersReadNo
EMEA\THINSCALE01$Read (from Security Filtering)No
EMEA\zonja.5-admEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersReadNo
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
ROOT\Enterprise AdminsEdit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-569437Edit settings, delete, modify securityNo
S-1-5-21-513466819-3096973226-347852806-613853Edit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Account Policies/Password Policy
PolicySetting
Minimum password length14 characters
Local Policies/User Rights Assignment
PolicySetting
Access this computer from the networkNT AUTHORITY\Authenticated Users, BUILTIN\Administrators
Allow log on locallyBUILTIN\Administrators
Bypass traverse checkingNT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, BUILTIN\Backup Operators, NT AUTHORITY\Authenticated Users, BUILTIN\Administrators
Deny access to this computer from the networkBUILTIN\Guests
Deny log on as a batch jobBUILTIN\Guests
Deny log on as a serviceBUILTIN\Guests
Deny log on locallyBUILTIN\Guests
Deny log on through Terminal ServicesBUILTIN\Guests
Local Policies/Security Options
User Account Control
PolicySetting
User Account Control: Admin Approval Mode for the Built-in Administrator accountEnabled
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval ModePrompt for consent on the secure desktop
User Account Control: Behavior of the elevation prompt for standard usersAutomatically deny elevation requests
User Account Control: Run all administrators in Admin Approval ModeEnabled
Other
PolicySetting
Network security: Allow Local System to use computer identity for NTLMEnabled
Advanced Audit Configuration
Privilege Use
PolicySetting
Audit Sensitive Privilege UseSuccess, Failure
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Network/Lanman Workstation
PolicySettingComment
Enable insecure guest logonsDisabled
System/Remote Assistance
PolicySettingComment
Configure Solicited Remote AssistanceDisabled
System/Remote Procedure Call
PolicySettingComment
Enable RPC Endpoint Mapper Client AuthenticationEnabled
Windows Components/AutoPlay Policies
PolicySettingComment
Disallow Autoplay for non-volume devicesEnabled
Set the default behavior for AutoRunEnabled
Default AutoRun BehaviorDo not execute any autorun commands
Windows Components/Data Collection and Preview Builds
PolicySettingComment
Do not show feedback notificationsEnabled
Windows Components/Event Log Service/Application
PolicySettingComment
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)32769
Windows Components/Event Log Service/Security
PolicySettingComment
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)196609
Windows Components/Event Log Service/Setup
PolicySettingComment
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)32769
Windows Components/Event Log Service/System
PolicySettingComment
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)32769
Windows Components/Remote Desktop Services/Remote Desktop Connection Client
PolicySettingComment
Do not allow passwords to be savedEnabled
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security
PolicySettingComment
Always prompt for password upon connectionEnabled
Require secure RPC communicationEnabled
Windows Components/Windows Remote Management (WinRM)/WinRM Client
PolicySettingComment
Disallow Digest authenticationEnabled
Windows Components/Windows Remote Management (WinRM)/WinRM Service
PolicySettingComment
Disallow WinRM from storing RunAs credentialsEnabled
User Configuration (Disabled)
No settings defined.