Anavem
Languagefr

Group Policy Reference

A comprehensive Microsoft Windows Group Policy reference — searchable database of GPO settings with registry paths, supported OS versions, configuration steps, security implications, and real-world use cases. Built for sysadmins managing Active Directory, Intune, and standalone Windows.

What is a Group Policy?

A Group Policy Object (GPO) is a configuration setting in Windows that defines how computers and user accounts behave. Each policy maps to one or more registry values, applies to a specific scope (Computer or User), and is bundled in an ADMX (Administrative Template) file. This reference indexes Microsoft's ADMX catalog with detailed explanations, registry mappings, and operational guidance you won't find on the official Microsoft Learn pages.

SecurityComputer

Interactive Logon: Do Not Display Last User Name

Prevents the last logged-on username from being displayed at the logon screen.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Accounts: Rename Administrator Account

Rename the built-in Administrator account to reduce targeted attacks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

User Account Control: Behavior of the Elevation Prompt for Administrators

Controls UAC behavior for admin accounts. Value 2 requires credentials at each elevation.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Network Security: LAN Manager Authentication Level

Controls which challenge/response authentication protocol is used. Value 5 enforces NTLMv2 and rejects weaker protocols.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Maximum Security Log Size

Sets the maximum size of the Security event log. Small logs get overwritten during incidents.

Computer Configuration > Windows Settings > Security Settings > Event Log

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Turn On Real-Time Protection

Ensures real-time scanning is always active.

Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Real-Time Protection

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Accounts: Guest Account Status

The built-in Guest account should always remain disabled.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

User Account Control: Virtualize File and Registry Write Failures

Redirects legacy app write failures to per-user locations. Required for UAC compatibility.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Shutdown: Allow System to Be Shut Down Without Having to Log On

Controls whether the shutdown button appears on the logon screen.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Retention Method for Security Log

Controls what happens when the security log is full. Overwriting destroys forensic evidence.

Computer Configuration > Windows Settings > Security Settings > Event Log

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Configure Controlled Folder Access

Ransomware protection - prevents unauthorized apps from modifying protected folders.

Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled Folder Access

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Network Security: Restrict NTLM: Outgoing NTLM Traffic to Remote Servers

Prevents this machine from sending NTLM authentication to remote servers. Reduces NTLM relay attack exposure.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Admin TplComputer

Maximum Application Log Size

Sets the maximum size of the Application event log.

Computer Configuration > Windows Settings > Security Settings > Event Log

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Network Security: Restrict NTLM: NTLM Authentication in This Domain

Controls NTLM authentication within the domain. Moving to Deny blocks legacy NTLM entirely.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Turn Off Windows Defender Antivirus

If enabled, disables Defender entirely. Should be Disabled unless a third-party AV manages this.

Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Turn Off Routine Remediation

If enabled, prevents Defender from automatically remediating detected threats.

Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Hypervisor Protected Code Integrity (HVCI)

Enforces kernel code integrity using VBS. Prevents unsigned kernel drivers and code injection.

Computer Configuration > Administrative Templates > System > Device Guard

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Require Additional Authentication at Startup

Required to allow BitLocker without a compatible TPM, or to require a PIN in addition to TPM.

Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Configure Attack Surface Reduction Rules

ASR rules block common attack vectors like Office macros spawning processes, credential theft from LSASS, and ransomware behaviors.

Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Attack Surface Reduction

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Enable Network Protection

Blocks connections to known malicious IPs and domains via SmartScreen.

Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Network Protection

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
SecurityComputer

Deny Log On Locally

Explicitly prevents specified accounts from logging on interactively.

Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment

Supported on Windows 10, Windows 11, Windows Server 2016 and later

Read reference →
Page 3 of 26 · 623 policies