Anavem
Languagefr

Group Policy Reference

A comprehensive Microsoft Windows Group Policy reference — searchable database of GPO settings with registry paths, supported OS versions, configuration steps, security implications, and real-world use cases. Built for sysadmins managing Active Directory, Intune, and standalone Windows.

What is a Group Policy?

A Group Policy Object (GPO) is a configuration setting in Windows that defines how computers and user accounts behave. Each policy maps to one or more registry values, applies to a specific scope (Computer or User), and is bundled in an ADMX (Administrative Template) file. This reference indexes Microsoft's ADMX catalog with detailed explanations, registry mappings, and operational guidance you won't find on the official Microsoft Learn pages.

Admin TplComputer

Log event when quota threshold exceeded

Logs warning events when approaching quota. Enables MSP monitoring of disk usage patterns.

Computer Configuration > Administrative Templates > System > Disk Quotas

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Allow administrators to exceed quota limits

Exempts administrators from quota limits. Ensures MSP administrators can perform necessary operations.

Computer Configuration > Administrative Templates > System > Disk Quotas

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Network access: Let Everyone permissions apply to anonymous users

Controls whether anonymous users inherit Everyone permissions. Keep at 0 to deny anonymous access. Critical for MSPs preventing unauthenticated enumeration.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Deny disk space to users exceeding quota

Prevents writes when user exceeds quota. Strictly enforces storage limits for MSP-managed systems.

Computer Configuration > Administrative Templates > System > Disk Quotas

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

LDAP Signing: Negotiate signing

Enable LDAP clients to negotiate signing with servers. Setting to 1 enables negotiation, 2 requires it. Provides flexibility for gradual deployment across managed environments.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Domain Controller: LDAP server signing requirements

Enforce LDAP signing requirements on domain controllers to prevent man-in-the-middle attacks. Setting to 2 requires signing. Critical for MSPs securing client Active Directory environments from credential interception.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

LDAP client signing requirements

Configure client-side LDAP signing to negotiate signing with LDAP servers. Setting to 1 requires signing when available. Prevents credential theft in hybrid and cloud scenarios MSPs manage.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplUser

Disable changing desktop wallpaper

Prevents users from changing wallpaper. Setting to 1 enforces locked wallpaper. MSPs use for branding kiosk systems.

User Configuration > Administrative Templates > Desktop

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplUser

Enforce desktop wallpaper

Sets company wallpaper across all managed desktops. Enforces brand consistency and corporate identity in MSP environments.

User Configuration > Policies > Administrative Templates > Desktop > Desktop

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Task Scheduler: Disable task deletion

Prevents non-administrators from deleting scheduled tasks. Setting to 1 disables deletion. MSPs use this to prevent tampering with security tasks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Extended Protection for Authentication: Require channel binding

Enforce Extended Protection for Authentication on LDAP connections. Prevents attackers from stealing LDAP credentials through man-in-the-middle attacks. Critical for MSPs managing sensitive client networks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

LDAP: Maximum concurrent connections

Limits concurrent LDAP connections to domain controllers. Set to 0 for unlimited. MSPs use this to prevent DoS attacks on directory services during client migrations and queries.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

LDAP over SSL/TLS requirement

Enables LDAP over SSL/TLS on domain controllers. Standard port 636 encrypts all LDAP traffic. Essential for MSPs securing directory queries over untrusted networks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Network access: Restrict anonymous access to Named Pipes and Shares

Blocks NULL session access to named pipes and shares. Setting to 1 enforces authentication. Critical for MSPs preventing share enumeration attacks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

LDAP: Enable referral chasing

Controls LDAP referral chasing behavior. Setting to 0 disables automatic referral following. MSPs disable this to prevent information disclosure and credential exposure.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Network Access: UNC Hardened Access (domain systems)

Restricts anonymous NULL session access to UNC paths. Setting to 1 requires authentication. Essential for MSPs blocking WMIEXEC and similar attacks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Network access: Insecure guest logons

Allows insecure guest authentication to SMB servers. Setting to 0 requires secure authentication. Critical for MSPs preventing credential relay on legacy networks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Microsoft network server: Digitally sign communications (always)

Requires SMB signing on all connections. Setting to 1 enforces signing. Essential for MSPs preventing man-in-the-middle attacks on SMB shares.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Network security: SMB Encryption

Enforces SMB encryption. Value 3 requires encryption for all connections. Critical for MSPs protecting sensitive data in transit on SMB shares.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Network security: Disable SMBv1

Disables legacy SMBv1 protocol. Setting to 0 completely disables SMBv1. Critical for MSPs eliminating WannaCry/NotPetya attack vectors from client networks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Page 10 of 15 · 355 policies