Anavem
Languageen

Référence GPO Windows

Une référence complète des stratégies de groupe Microsoft Windows — base de données interrogeable des paramètres GPO avec chemins de registre, versions Windows supportées, étapes de configuration, implications sécurité et cas d'usage concrets. Pensée pour les administrateurs gérant Active Directory, Intune et Windows en autonome.

Qu'est-ce qu'une stratégie de groupe ?

Un objet de stratégie de groupe (GPO) est un paramètre de configuration Windows qui définit le comportement des ordinateurs et des comptes utilisateurs. Chaque stratégie correspond à une ou plusieurs valeurs de registre, s'applique à une portée précise (Ordinateur ou Utilisateur) et est livrée dans un fichier ADMX (modèle administratif). Cette référence indexe le catalogue ADMX de Microsoft avec des explications détaillées, des correspondances de registre et des conseils opérationnels qu'on ne trouve pas sur les pages officielles Microsoft Learn.

SécuritéComputer

Domain Member: Digitally Sign Secure Channel Data (When Possible)

Signs secure channel traffic when chiffrement is not available.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Domain Member: Maximum Machine Account Password Age

How often domaine-joined ordinateur comptes rotate their mots de passe. Lower values reduce the window for machine credential attaques.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Domain Member: Disable Machine Account Password Changes

Keep disabled to allow automatic machine compte mot de passe rotation every 30 jours. Enabling this is a security risk.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Elevation Prompt for Administrators in Admin Approval Mode

Controls UAC elevation prompts for administrators. Value 1 shows secure desktop prompt. MSPs should appliquer this for security visibility on privileged actions.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Switch to Secure Desktop when Prompting for Elevation

UAC prompts appear on a secure desktop isolated from utilisateur applications. Empêche keyloggers and credential harvesting malware from intercepting prompts.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Require Administrator Password for Elevation

Specifies whether administrators must enter credentials to elevate. Value 1 applique mot de passe prompt on secure desktop. Critical for audit trails.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Enable Network Protection

Bloque malicious domains and IP addresses at the réseau level. Empêche connections to command-and-control servers and phishing sites.

Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Windows Defender Exploit Guard > Network Protection

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Behavior of Elevation Prompt for Standard Users

Controls standard utilisateur elevation: 0=Auto-deny without prompt, 1=Prompt for credentials. MSPs typically set to 0 to prevent privilege escalation.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Detect Application Installations and Prompt for Elevation

Shows UAC prompt on secure desktop when Windows detects installer packages being executed. Critical for preventing unauthorized software deployment.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Behavior of Elevation Prompt for Administrators

Controls elevation behavior: 2=Prompt on secure desktop, 5=Prompt without requiring mot de passe. MSPs should set to 2 for maximum security.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Restrict Delegation to Remote Servers Only

When enabled, applique Restreint Admin mode which empêche credential caching. Critical for preventing pass-the-hash and credential theft attaques.

Computer Configuration > Administrative Templates > System > Credentials Delegation

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Elevation Prompt for Standard Users

Determines UAC behavior for standard utilisateurs. Value 0 auto-denies elevation requests without prompting. Empêche utilisateurs from running elevated tasks without admin approval.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Run All Administrators in Admin Approval Mode

Active UAC for all administrators. When disabled, removes all UAC protections and elevation prompts. MSPs must keep this enabled for compliance.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Virtualize File and Registry Write Failures to Per-User Locations

Redirects legacy application write failures to utilisateur-writable locations instead of blocking them. Improves app compatibility while maintaining security.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Allow UIAccess Applications to Prompt for Elevation without Using Secure Desktop

Controls whether UIAccess applications can bypass secure desktop prompting. Should remain disabled to prevent malware from spoofing elevation prompts.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Only Elevate Signed Executables

Only autorise elevation of digitally signed executables. Empêche unsigned malware from elevating privileges. Essential for MSP security durcissement.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Allow Delegating Saved Credentials

Controls whether saved credentials can be delegated to other machines. Should remain disabled to prevent lateral movement attaques.

Computer Configuration > Administrative Templates > System > Credentials Delegation

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Require UEFI Firmware Lock

Locks UEFI firmware paramètres to prevent unauthorized modification. Exige physical accès and mots de passe to change security boot paramètres.

Computer Configuration > Administrative Templates > System > Device Guard

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Enable DMA Port Protection

Bloque DMA (Direct Memory Accès) attaques from Thunderbolt, USB, and FireWire devices. Empêche hardware-based privilege escalation.

Computer Configuration > Administrative Templates > System > Device Guard

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Block Office Applications from Creating Child Processes

Bloque Office applications (Word, Excel, PowerPoint, Outlook) from spawning child processes. Empêche macro-based malware and script execution.

Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Attack Surface Reduction

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Allow Delegating Fresh Credentials

Controls whether fresh credentials can be delegated for outbound connections. Disabling empêche credential caching for multi-hop scenarios.

Computer Configuration > Administrative Templates > System > Credentials Delegation

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
Page 4 sur 8 · 175 stratégies