Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
Group Policy Results
JDHLAB\rbiv on JDHLAB\CLIENT1
Data collected on: 5/17/2011 2:14:39 PM
Summary
Computer Configuration Summary
General
Computer nameJDHLAB\CLIENT1
Domainjdhlab.local
SiteDefault-First-Site-Name
Last time Group Policy was processed5/17/2011 12:59:49 PM
Group Policy Objects
Applied GPOs
NameLink LocationRevision
Local Group PolicyLocalAD (7), Sysvol (7)
PSRjdhlab.localAD (2), Sysvol (2)
TechEdjdhlab.localAD (18), Sysvol (18)
WinRM Configurationjdhlab.localAD (15), Sysvol (15)
Default Domain Policyjdhlab.localAD (13), Sysvol (13)
Corp Desktopjdhlab.local/DesktopsAD (15), Sysvol (15)
Remote Assistancejdhlab.local/DesktopsAD (4), Sysvol (4)
Denied GPOs
NameLink LocationReason Denied
Network Configjdhlab.local/Configuration/Sites/Default-First-Site-NameEmpty
{B93E1E03-3D1D-417F-A17A-493116236D90}jdhlab.localDisabled Link
Security Group Membership when Group Policy was applied
BUILTIN\Administrators
Everyone
BUILTIN\Users
NT AUTHORITY\NETWORK
NT AUTHORITY\Authenticated Users
NT AUTHORITY\This Organization
JDHLAB\CLIENT1$
JDHLAB\Domain Computers
JDHLAB\TechEd Computers
Mandatory Label\System Mandatory Level
WMI Filters
NameValueReference GPO(s)
None
Component Status
Component NameStatusLast Process Time
Group Policy InfrastructureSuccess5/17/2011 12:59:50 PM
Group Policy EnvironmentSuccess5/17/2011 12:59:50 PM
Group Policy ServicesSuccess5/17/2011 12:59:50 PM
Microsoft Offline FilesSuccess5/17/2011 12:59:50 PM
RegistrySuccess5/16/2011 11:09:49 AM
SecuritySuccess5/16/2011 11:09:50 AM
User Configuration Summary
General
User nameJDHLAB\rbiv
Domainjdhlab.local
Last time Group Policy was processed5/16/2011 10:32:58 AM
Group Policy Objects
Applied GPOs
NameLink LocationRevision
TechEdjdhlab.localAD (17), Sysvol (17)
Corp Desktopjdhlab.local/EmployeesAD (4), Sysvol (4)
Executive Usersjdhlab.local/Employees/ExecutiveAD (4), Sysvol (4)
Denied GPOs
NameLink LocationReason Denied
Local Group PolicyLocalEmpty
Network Configjdhlab.local/Configuration/Sites/Default-First-Site-NameEmpty
PSRjdhlab.localEmpty
{B93E1E03-3D1D-417F-A17A-493116236D90}jdhlab.localDisabled Link
WinRM Configurationjdhlab.localEmpty
Default Domain Policyjdhlab.localEmpty
Security Group Membership when Group Policy was applied
JDHLAB\Domain Users
Everyone
BUILTIN\Users
BUILTIN\Power Users
NT AUTHORITY\INTERACTIVE
CONSOLE LOGON
NT AUTHORITY\Authenticated Users
NT AUTHORITY\This Organization
LOCAL
JDHLAB\Promotions
JDHLAB\TechEd Users
JDHLAB\SalesUsers
JDHLAB\Art Department
JDHLAB\Test Rollup
JDHLAB\AlphaGroup
JDHLAB\Mobile Users
JDHLAB\Test Users
Mandatory Label\Medium Plus Mandatory Level
WMI Filters
NameValueReference GPO(s)
None
Component Status
Component NameStatusLast Process Time
Group Policy InfrastructureSuccess5/16/2011 10:33:03 AM
Group Policy Drive MapsSuccess5/16/2011 10:33:03 AM
Group Policy EnvironmentSuccess5/16/2011 10:29:03 AM
Group Policy Start Menu SettingsSuccess5/16/2011 9:35:54 AM
RegistrySuccess5/16/2011 10:33:03 AM
Computer Configuration
Policies
Windows Settings
Security Settings
Account Policies/Password Policy
PolicySettingWinning GPO
Enforce password history12 passwords rememberedDefault Domain Policy
Maximum password age45 daysDefault Domain Policy
Minimum password age1 daysDefault Domain Policy
Minimum password length7 charactersDefault Domain Policy
Password must meet complexity requirementsEnabledDefault Domain Policy
Store passwords using reversible encryptionDisabledDefault Domain Policy
Account Policies/Account Lockout Policy
PolicySettingWinning GPO
Account lockout duration30 minutesDefault Domain Policy
Account lockout threshold7 invalid logon attemptsDefault Domain Policy
Reset account lockout counter after30 minutesDefault Domain Policy
Local Policies/Security Options
Network Access
PolicySettingWinning GPO
Network access: Allow anonymous SID/Name translationDisabledDefault Domain Policy
Network Security
PolicySettingWinning GPO
Network security: Do not store LAN Manager hash value on next password changeEnabledDefault Domain Policy
Network security: Force logoff when logon hours expireDisabledDefault Domain Policy
Event Log
PolicySettingWinning GPO
Maximum application log size4096 kilobytesTechEd
Maximum security log size8192 kilobytesTechEd
Maximum system log size4096 kilobytesTechEd
Retention method for application logAs neededTechEd
Retention method for security logAs neededTechEd
Retention method for system logAs neededTechEd
Windows Firewall with Advanced Security
Global Settings
PolicySettingWinning GPO
Policy version2.10WinRM Configuration
Disable stateful FTPNot Configured
Disable stateful PPTPNot Configured
IPsec exemptNot Configured
IPsec through NATNot Configured
Preshared key encodingNot Configured
SA idle timeNot Configured
Strong CRL checkNot Configured
Domain Profile Settings
PolicySettingWinning GPO
Firewall stateOnCorp Desktop
Inbound connectionsNot Configured
Outbound connectionsNot Configured
Apply local firewall rulesNot Configured
Apply local connection security rulesNot Configured
Display notificationsYesCorp Desktop
Allow unicast responsesNoCorp Desktop
Log dropped packetsNot Configured
Log successful connectionsNot Configured
Log file pathNot Configured
Log file maximum size (KB)Not Configured
Inbound Rules
NameDescriptionWinning GPO
Windows Remote Management (HTTP-In)Inbound rule for Windows Remote Management via WS-Management. [TCP 5985]WinRM Configuration
This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port5985
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileDomain
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupWindows Remote Management
Windows Remote Management (HTTP-In)Inbound rule for Windows Remote Management via WS-Management. [TCP 5985]WinRM Configuration
This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
EnabledTrue
ProgramSystem
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port5985
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeLocal subnet
ProfilePrivate, Public
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
GroupWindows Remote Management
Connection Security Settings
Administrative Templates
Policy definitions (ADMX files) retrieved from the local machine.
Control Panel/User Accounts
PolicySettingWinning GPO
Apply the default user logon picture to all usersEnabledTechEd
Network/Network Connections/Windows Firewall/Domain Profile
PolicySettingWinning GPO
Windows Firewall: Allow ICMP exceptionsEnabledCorp Desktop
Allow outbound destination unreachableEnabled
Allow outbound source quenchEnabled
Allow redirectEnabled
Allow inbound echo requestEnabled
Allow inbound router requestEnabled
Allow outbound time exceededEnabled
Allow outbound parameter problemEnabled
Allow inbound timestamp requestEnabled
Allow inbound mask requestEnabled
Allow outbound packet too bigEnabled
PolicySettingWinning GPO
Windows Firewall: Allow inbound file and printer sharing exceptionEnabledCorp Desktop
Allow unsolicited incoming messages from these IP addresses:localsubnet
Syntax:
Type "*" to allow messages from any network, or
else type a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
Example: to allow messages from 10.0.0.1,
10.0.0.2, and from any system on the
local subnet or on the 10.3.4.x subnet,
type the following in the "Allow unsolicited"
incoming messages from these IP addresses":
10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24
PolicySettingWinning GPO
Windows Firewall: Allow inbound remote administration exception EnabledCorp Desktop
Allow unsolicited incoming messages from these IP addresses:localsubnet
Syntax:
Type "*" to allow messages from any network, or
else type a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
Example: to allow messages from 10.0.0.1,
10.0.0.2, and from any system on the
local subnet or on the 10.3.4.x subnet,
type the following in the "Allow unsolicited"
incoming messages from these IP addresses":
10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24
PolicySettingWinning GPO
Windows Firewall: Allow inbound Remote Desktop exceptionsEnabledCorp Desktop
Allow unsolicited incoming messages from these IP addresses:
Syntax:
Type "*" to allow messages from any network, or
else type a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
Example: to allow messages from 10.0.0.1,
10.0.0.2, and from any system on the
local subnet or on the 10.3.4.x subnet,
type the following in the "Allow unsolicited"
incoming messages from these IP addresses":
10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24
PolicySettingWinning GPO
Windows Firewall: Allow inbound UPnP framework exceptionsEnabledCorp Desktop
Allow unsolicited incoming messages from these IP addresses:localsubnet
Syntax:
Type "*" to allow messages from any network, or
else type a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
Example: to allow messages from 10.0.0.1,
10.0.0.2, and from any system on the
local subnet or on the 10.3.4.x subnet,
type the following in the "Allow unsolicited"
incoming messages from these IP addresses":
10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24
PolicySettingWinning GPO
Windows Firewall: Allow local port exceptionsDisabledCorp Desktop
Windows Firewall: Define inbound port exceptionsEnabledWinRM Configuration
Define port exceptions:Source GPO
5986:TCP:*:Enabled:WinRM-HTTPSWinRM Configuration
5985:TCP:*:Enabled:WinRM-HTTPWinRM Configuration
Specify the port to open or block.
Syntax:
<Port>:<Transport>:<Scope>:<Status>:<Name>
<Port> is a decimal port number
<Transport> is either "TCP" or "UDP"
<Scope> is either "*" (for all networks) or
a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
<Status> is either "enabled" or "disabled"
<Name> is a text string
Example:
The following definition string adds TCP port 80
to the port exceptions list and allows it to
receive messages from 10.0.0.1, 10.0.0.2, or any
system on the 10.3.4.x subnet:
80:TCP:10.0.0.1,10.0.0.2,10.3.4.0/24:enabled:Web service
PolicySettingWinning GPO
Windows Firewall: Prohibit notificationsDisabledCorp Desktop
Windows Firewall: Prohibit unicast response to multicast or broadcast requestsEnabledCorp Desktop
Windows Firewall: Protect all network connectionsEnabledCorp Desktop
Network/Network Connections/Windows Firewall/Standard Profile
PolicySettingWinning GPO
Windows Firewall: Allow ICMP exceptionsDisabledCorp Desktop
Windows Firewall: Allow inbound file and printer sharing exceptionDisabledCorp Desktop
Windows Firewall: Allow inbound remote administration exception DisabledCorp Desktop
Windows Firewall: Allow inbound Remote Desktop exceptionsEnabledCorp Desktop
Allow unsolicited incoming messages from these IP addresses:
Syntax:
Type "*" to allow messages from any network, or
else type a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
Example: to allow messages from 10.0.0.1,
10.0.0.2, and from any system on the
local subnet or on the 10.3.4.x subnet,
type the following in the "Allow unsolicited"
incoming messages from these IP addresses":
10.0.0.1,10.0.0.2,localsubnet,10.3.4.0/24
PolicySettingWinning GPO
Windows Firewall: Allow inbound UPnP framework exceptionsDisabledCorp Desktop
Windows Firewall: Allow local port exceptionsDisabledCorp Desktop
Windows Firewall: Prohibit notificationsDisabledCorp Desktop
Windows Firewall: Prohibit unicast response to multicast or broadcast requestsEnabledCorp Desktop
Windows Firewall: Protect all network connectionsEnabledCorp Desktop
Network/Offline Files
PolicySettingWinning GPO
Allow or Disallow use of the Offline Files featureDisabledCorp Desktop
System/Group Policy
PolicySettingWinning GPO
Registry policy processingEnabledCorp Desktop
Do not apply during periodic background processingEnabled
Process even if the Group Policy objects have not changedEnabled
System/Internet Communication Management/Internet Communication settings
System/Logon
PolicySettingWinning GPO
Assign a default domain for logonEnabledLocal Group Policy
Default Logon domain:jdhlab
Enter the name of the domain
System/Remote Assistance
PolicySettingWinning GPO
Offer Remote AssistanceEnabledRemote Assistance
Permit remote control of this computer:Allow helpers to remotely control the computer
Helpers:
jdhlab\administrator
jdhlab\help desk
jdhlab\administrators
PolicySettingWinning GPO
Solicited Remote AssistanceEnabledRemote Assistance
Permit remote control of this computer:Allow helpers to remotely control the computer
Maximum ticket time (value):2
Maximum ticket time (units):Hours
Method for sending e-mail invitations:Simple MAPI
PolicySettingWinning GPO
Turn on bandwidth optimizationEnabledRemote Assistance
Optimize settings for reduced bandwidth:No full window drag
PolicySettingWinning GPO
Turn on session loggingEnabledRemote Assistance
System/Remote Procedure Call
PolicySettingWinning GPO
Restrictions for Unauthenticated RPC clientsEnabledCorp Desktop
RPC Runtime Unauthenticated Client Restriction to Apply:Authenticated
PolicySettingWinning GPO
RPC Endpoint Mapper Client AuthenticationDisabledCorp Desktop
Windows Components/Application Compatibility
PolicySettingWinning GPO
Turn off Problem Steps RecorderDisabledPSR
Windows Components/Desktop Gadgets
PolicySettingWinning GPO
Turn off desktop gadgetsEnabledTechEd
Windows Components/Internet Explorer
Windows Components/Internet Explorer/Internet Control Panel/Advanced Page
PolicySettingWinning GPO
Allow software to run or install even if the signature is invalidDisabledCorp Desktop
Windows Components/Internet Explorer/Security Features/Consistent Mime Handling
PolicySettingWinning GPO
Internet Explorer ProcessesEnabledCorp Desktop
Windows Components/Internet Explorer/Security Features/Mime Sniffing Safety Feature
PolicySettingWinning GPO
Internet Explorer ProcessesEnabledCorp Desktop
Windows Components/Internet Explorer/Security Features/MK Protocol Security Restriction
PolicySettingWinning GPO
Internet Explorer ProcessesEnabledCorp Desktop
Windows Components/Internet Explorer/Security Features/Protection From Zone Elevation
PolicySettingWinning GPO
Internet Explorer ProcessesEnabledCorp Desktop
Windows Components/Internet Explorer/Security Features/Restrict ActiveX Install
PolicySettingWinning GPO
Internet Explorer ProcessesEnabledCorp Desktop
Windows Components/Internet Explorer/Security Features/Restrict File Download
PolicySettingWinning GPO
Internet Explorer ProcessesEnabledCorp Desktop
Windows Components/Internet Explorer/Security Features/Scripted Window Security Restrictions
PolicySettingWinning GPO
Internet Explorer ProcessesEnabledCorp Desktop
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security
PolicySettingWinning GPO
Always prompt for password upon connectionEnabledCorp Desktop
Set client connection encryption levelEnabledCorp Desktop
Encryption LevelHigh Level
Choose the encryption level from the drop-down list.
Windows Components/Windows Messenger
PolicySettingWinning GPO
Do not allow Windows Messenger to be runEnabledCorp Desktop
Windows Components/Windows Remote Management (WinRM)/WinRM Client
PolicySettingWinning GPO
Trusted HostsEnabledWinRM Configuration
TrustedHostsList:*
Syntax:
Configure the trusted hosts by a comma separated list
of host names. You can use wildcards (*) but only
one wildcard is allowed in a host name pattern.
Use "<local>" (case insensitive) is used to indicate
all host names that do not contain a period (.).
The list can be empty to indicate that no host is trusted.
Use asterisk (*) to indicate that all hosts are trusted.
If you use *, then no other pattern can appear in the list.
Examples:
*.mydomain.com indicates that all computer in mydomain.com are trusted
2.0.* indicates that all IP addresses starting with 2.0. are trusted
Windows Components/Windows Remote Management (WinRM)/WinRM Service
PolicySettingWinning GPO
Allow automatic configuration of listenersEnabledWinRM Configuration
IPv4 filter:*
IPv6 filter:
Syntax:
Type "*" to allow messages from any IP address, or leave the
field empty to listen on no IP address. You can specify one
or more ranges of IP addresses.
Example IPv4 filters:
2.0.0.1-2.0.0.20, 24.0.0.1-24.0.0.22
*
Example IPv6 filters:
3FFE:FFFF:7654:FEDA:1245:BA98:0000:0000-3FFE:FFFF:7654:FEDA:1245:BA98:3210:4562
*
Windows Components/Windows Remote Shell
PolicySettingWinning GPO
Allow Remote Shell AccessEnabledWinRM Configuration
Specify maximum number of processes per ShellEnabledWinRM Configuration
MaxProcessesPerShell50
PolicySettingWinning GPO
Specify maximum number of remote shells per userEnabledWinRM Configuration
MaxShellsPerUser5
Windows Components/Windows Update
PolicySettingWinning GPO
Automatic Updates detection frequencyEnabledLocal Group Policy
Check for updates at the following
interval (hours): 22
PolicySettingWinning GPO
Configure Automatic UpdatesEnabledCorp Desktop
Configure automatic updating:3 - Auto download and notify for install
The following settings are only required
and applicable if 4 is selected.
Scheduled install day: 0 - Every day
Scheduled install time:03:00
PolicySettingWinning GPO
Do not adjust default option to 'Install Updates and Shut Down' in Shut Down Windows dialog boxDisabledCorp Desktop
Do not display 'Install Updates and Shut Down' option in Shut Down Windows dialog boxDisabledCorp Desktop
Enable client-side targetingEnabledLocal Group Policy
Target group name for this computerSQLAPP
PolicySettingWinning GPO
No auto-restart with logged on users for scheduled automatic updates installationsDisabledCorp Desktop
Reschedule Automatic Updates scheduled installationsEnabledCorp Desktop
Wait after system
startup (minutes): 10
PolicySettingWinning GPO
Specify intranet Microsoft update service locationEnabledLocal Group Policy
Set the intranet update service for detecting updates:http://10.10.10.1
Set the intranet statistics server:http://10.10.10.1
(example: http://IntranetUpd01)
PolicySettingWinning GPO
Turn on recommended updates via Automatic UpdatesEnabledLocal Group Policy
Turn on Software NotificationsEnabledLocal Group Policy
Preferences
Windows Settings
Environment Variables
Environment Variable (Variable: Reporting)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.
Reporting
Winning GPOCorp Desktop
Result: Success
General
ActionCreate
Properties
ContextSystem
VariableReporting
Value\\RPT03
Control Panel Settings
Services
Service (Name: Browser)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.
Browser
Winning GPOCorp Desktop
Result: Success
General
Service nameBrowser
ActionStart service
Startup type:No change
Wait timeout if service is locked:30 seconds
Service Account
Log on service as:No change
Recovery
First failure:Restart the service
Second failure:Restart the service
Subsequent failures:Take no action
Reset fail count after:0 days
Restart service after:1 minute
Service (Name: AudioSrv)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.
AudioSrv
Winning GPOTechEd
Result: Success
General
Service nameAudioSrv
ActionStop service
Startup type:Disabled
Wait timeout if service is locked:30 seconds
Service Account
Log on service as:No change
Recovery
First failure:No change
Second failure:No change
Subsequent failures:No change
User Configuration
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the local machine.
Desktop
PolicySettingWinning GPO
Don't save settings at exitEnabledTechEd
Remove Recycle Bin icon from desktopEnabledTechEd
Desktop/Desktop
PolicySettingWinning GPO
Desktop WallpaperEnabledTechEd
Wallpaper Name:%PROGRAMDATA%\corporate.jpg
Example: Using a local path: C:\windows\web\wallpaper\home.jpg
Example: Using a UNC path: \\Server\Share\Corp.jpg
Wallpaper Style:Center
Start Menu and Taskbar
PolicySettingWinning GPO
Add Logoff to the Start MenuEnabledCorp Desktop
Add the Run command to the Start MenuEnabledCorp Desktop
System
PolicySettingWinning GPO
Prevent access to registry editing toolsEnabledCorp Desktop
Disable regedit from running silently?Yes
System/Ctrl+Alt+Del Options
PolicySettingWinning GPO
Remove Task ManagerEnabledExecutive Users
System/Power Management
PolicySettingWinning GPO
Prompt for password on resume from hibernate / suspendEnabledExecutive Users
Preferences
Windows Settings
Drive Maps
Drive Map (Drive: H)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.
H:
Winning GPOTechEd
Result: Success
General
ActionUpdate
Properties
LetterH
Location\\coredc01\helpdesk
ReconnectEnabled
Label asHelpDesk
Use first availableDisabled
Hide/Show this driveShow
Hide/Show all drivesShow
Environment Variables
Environment Variable (Variable: Company)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.
Company
Winning GPOTechEd
Result: Success
General
ActionUpdate
Properties
ContextUser
VariableCompany
ValueJDH Lab
Environment Variable (Variable: TechEd)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.
TechEd
Winning GPOTechEd
Result: Success
General
ActionUpdate
Properties
ContextUser
VariableTechEd
ValueAtlanta
Control Panel Settings
Start Menu
Start Menu (Windows Vista)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.
Start Menu (Windows Vista and later)
Winning GPOExecutive Users
Result: Success
General
General
Number of programs on the Start menu9
Advanced settings
ComputerDisplay as a link
Connect toNo
Control PanelDo not display this item
Default ProgramsDo not display this item
DocumentsDisplay as a menu
Enable context menus and dragging and droppingYes
FavoritesDo not display this item
GamesDo not display this item
HelpDisplay this item
Highlight newly installed programsNo
MusicDo not display this item
NetworkDo not display this item
Open submenus when I pause on them with the mouse pointerNo
Personal FolderDisplay as a link
PicturesDisplay as a link
PrintersDo not display this item
Run commandDo not display this item
SearchYes
Search CommunicationsNo
Search Favorites and historyNo
Search filesSearch the user's files
Search programsYes
Sort All Programs menu by nameYes
System administrative toolsDo not display this item
Use Large IconsYes
List most recently used documentsYes
Clear recent documents listNo