Anavem
Languagefr

Group Policy Reference

A comprehensive Microsoft Windows Group Policy reference — searchable database of GPO settings with registry paths, supported OS versions, configuration steps, security implications, and real-world use cases. Built for sysadmins managing Active Directory, Intune, and standalone Windows.

What is a Group Policy?

A Group Policy Object (GPO) is a configuration setting in Windows that defines how computers and user accounts behave. Each policy maps to one or more registry values, applies to a specific scope (Computer or User), and is bundled in an ADMX (Administrative Template) file. This reference indexes Microsoft's ADMX catalog with detailed explanations, registry mappings, and operational guidance you won't find on the official Microsoft Learn pages.

SecurityComputer

Domain Member: Digitally Sign Secure Channel Data (When Possible)

Signs secure channel traffic when encryption is not available.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Domain Member: Maximum Machine Account Password Age

How often domain-joined computer accounts rotate their passwords. Lower values reduce the window for machine credential attacks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Elevation Prompt for Administrators in Admin Approval Mode

Controls UAC elevation prompts for administrators. Value 1 shows secure desktop prompt. MSPs should enforce this for security visibility on privileged actions.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Allow UIAccess Applications to Prompt for Elevation without Using Secure Desktop

Controls whether UIAccess applications can bypass secure desktop prompting. Should remain disabled to prevent malware from spoofing elevation prompts.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Allow Delegating Default Credentials

Prevents credential caching for delegation to remote servers. Disabling blocks credential theft from cached credentials on compromised systems.

Computer Configuration > Administrative Templates > System > Credentials Delegation

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Switch to Secure Desktop when Prompting for Elevation

UAC prompts appear on a secure desktop isolated from user applications. Prevents keyloggers and credential harvesting malware from intercepting prompts.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Allow Delegating Fresh Credentials with NTLM-only Server Authentication

Limits credential delegation to specific servers when NTLM authentication is used. MSPs should configure allowed servers list for Remote Desktop access.

Computer Configuration > Administrative Templates > System > Credentials Delegation

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Elevation Prompt for Standard Users

Determines UAC behavior for standard users. Value 0 auto-denies elevation requests without prompting. Prevents users from running elevated tasks without admin approval.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Behavior of Elevation Prompt for Administrators

Controls elevation behavior: 2=Prompt on secure desktop, 5=Prompt without requiring password. MSPs should set to 2 for maximum security.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Require Administrator Password for Elevation

Specifies whether administrators must enter credentials to elevate. Value 1 enforces password prompt on secure desktop. Critical for audit trails.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Only Elevate Signed Executables

Only allows elevation of digitally signed executables. Prevents unsigned malware from elevating privileges. Essential for MSP security hardening.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Run All Administrators in Admin Approval Mode

Enables UAC for all administrators. When disabled, removes all UAC protections and elevation prompts. MSPs must keep this enabled for compliance.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Detect Application Installations and Prompt for Elevation

Shows UAC prompt on secure desktop when Windows detects installer packages being executed. Critical for preventing unauthorized software deployment.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Allow Delegating Saved Credentials

Controls whether saved credentials can be delegated to other machines. Should remain disabled to prevent lateral movement attacks.

Computer Configuration > Administrative Templates > System > Credentials Delegation

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

CredSSP Encryption Oracle Remediation

Prevents CVE-2018-0886 exploitation by blocking encryption oracle attacks during credential delegation. Should remain at 0 (Vulnerable) only for legacy systems.

Computer Configuration > Administrative Templates > System > Credentials Delegation

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Virtualize File and Registry Write Failures to Per-User Locations

Redirects legacy application write failures to user-writable locations instead of blocking them. Improves app compatibility while maintaining security.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Enable Virtualization Based Security

Enables Virtualization Based Security which isolates code execution in a virtual machine. Prevents kernel attacks from accessing system memory.

Computer Configuration > Administrative Templates > System > Device Guard

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Enable DMA Port Protection

Blocks DMA (Direct Memory Access) attacks from Thunderbolt, USB, and FireWire devices. Prevents hardware-based privilege escalation.

Computer Configuration > Administrative Templates > System > Device Guard

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Behavior of Elevation Prompt for Standard Users

Controls standard user elevation: 0=Auto-deny without prompt, 1=Prompt for credentials. MSPs typically set to 0 to prevent privilege escalation.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Require Kerberos Authentication for Credential Delegation

Enforces Kerberos protocol for credential delegation instead of NTLM. Improves security by using modern authentication mechanisms.

Computer Configuration > Administrative Templates > System > Credentials Delegation

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Restrict Delegation to Remote Servers Only

When enabled, enforces Restricted Admin mode which prevents credential caching. Critical for preventing pass-the-hash and credential theft attacks.

Computer Configuration > Administrative Templates > System > Credentials Delegation

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Page 4 of 8 · 175 policies