Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
Default Domain Policy
Data collected on: 11/28/2007 10:15:09 AM
General
Details
Domaindomain.lan
OwnerDOMAIN\Domain Admins
Created2/19/2007 12:13:20 AM
Modified11/12/2007 2:15:08 PM
User Revisions1 (AD), 1 (sysvol)
Computer Revisions4 (AD), 4 (sysvol)
Unique ID{31B2F340-016D-11D2-945F-00C04FB984F9}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
DOMAINNoEnableddomain.lan

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
WMI Filtering
WMI Filter NameNone
DescriptionNot applicable
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
NT AUTHORITY\Authenticated UsersRead (from Security Filtering)No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
DOMAIN\Domain AdminsEdit settings, delete, modify securityNo
DOMAIN\Enterprise AdminsEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Windows Settings
Security Settings
Account Policies/Password Policy
PolicySetting
Enforce password history24 passwords remembered
Maximum password age42 days
Minimum password age1 days
Minimum password length0 characters
Password must meet complexity requirementsDisabled
Store passwords using reversible encryptionDisabled
Account Policies/Account Lockout Policy
PolicySetting
Account lockout threshold0 invalid logon attempts
Account Policies/Kerberos Policy
PolicySetting
Enforce user logon restrictionsEnabled
Maximum lifetime for service ticket600 minutes
Maximum lifetime for user ticket10 hours
Maximum lifetime for user ticket renewal7 days
Maximum tolerance for computer clock synchronization5 minutes
Local Policies/Security Options
Network Security
PolicySetting
Network security: Force logoff when logon hours expireDisabled
Public Key Policies/Autoenrollment Settings
PolicySetting
Enroll certificates automaticallyEnabled
Renew expired certificates, update pending certificates, and remove revoked certificatesDisabled
Update certificates that use certificate templatesDisabled
Public Key Policies/Encrypting File System
Properties
PolicySetting
Allow users to encrypt files using Encrypting File System (EFS)Enabled
Certificates
Issued ToIssued ByExpiration DateIntended Purposes
AdministratorAdministrator2/18/2010 12:20:41 AMFile Recovery

For additional information about individual settings, launch Group Policy Object Editor.
Public Key Policies/Trusted Root Certification Authorities
Properties
PolicySetting
Allow users to select new root certification authorities (CAs) to trustEnabled
Client computers can trust the following certificate storesThird-Party Root Certification Authorities and Enterprise Root Certification Authorities
To perform certificate-based authentication of users and computers, CAs must meet the following criteriaRegistered in Active Directory only
User Configuration (Enabled)
Windows Settings
Remote Installation Services
Client Installation Wizard options
PolicySetting
Custom SetupDisabled
Restart SetupDisabled
ToolsDisabled