Anavem
Languageen

Référence GPO Windows

Une référence complète des stratégies de groupe Microsoft Windows — base de données interrogeable des paramètres GPO avec chemins de registre, versions Windows supportées, étapes de configuration, implications sécurité et cas d'usage concrets. Pensée pour les administrateurs gérant Active Directory, Intune et Windows en autonome.

Qu'est-ce qu'une stratégie de groupe ?

Un objet de stratégie de groupe (GPO) est un paramètre de configuration Windows qui définit le comportement des ordinateurs et des comptes utilisateurs. Chaque stratégie correspond à une ou plusieurs valeurs de registre, s'applique à une portée précise (Ordinateur ou Utilisateur) et est livrée dans un fichier ADMX (modèle administratif). Cette référence indexe le catalogue ADMX de Microsoft avec des explications détaillées, des correspondances de registre et des conseils opérationnels qu'on ne trouve pas sur les pages officielles Microsoft Learn.

Modèle adminComputer

LDAP: Enable referral chasing

Controls LDAP referral chasing behavior. Paramètre to 0 désactive automatic referral following. MSPs disable this to prevent information disclosure and credential exposure.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Network security: Minimum password length

Sets minimum mot de passe length to prevent weak NTLM/NTLMv2 hashes. MSPs appliquer 14+ caractères to mitigate mot de passe cracking against hashed credentials.

Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Network security: LAN Manager authentication level

Sets minimum NTLM authentification level. Level 5 exige NTLMv2/Kerberos. MSPs set this to eliminate LM hash weaknesses and legacy protocol support.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Network security: Configure encryption types allowed for Kerberos

Specifies chiffrement types for Kerberos. Value 2147483644 active strong ciphers only (AES). MSPs use this to eliminate DES/RC4 weak chiffrement.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Network security: NTLM SSP Security: Minimum session security

Applique 128-bit chiffrement and NTLMv2 session security. Value 537133056 active both requirements. MSPs use this to prevent downgrade attaques on client authentification.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Network security: NTLM SSP Security: Require NTLMv2 session security

Forces servers to require NTLMv2 session security. Value 537133056 exige both NTLMv2 and chiffrement. Critical for MSPs enforcing authentification baseline across client networks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

RPC: Restrict Unauthenticated RPC clients

Empêche unauthenticated RPC clients from connecting to the ordinateur. Paramètre to 1 denies NULL sessions. Essential for MSPs blocking anonymous RPC exploitation.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

DCOM: Authentication Level

Sets DCOM authentification level to Packet Privacy (6). Exige chiffrement of all DCOM traffic. Critical for MSPs protecting sensitive RPC/DCOM communications.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Network security: Allow LocalSystem NULL session fallback

Controls whether LocalSystem can fallback to NULL sessions. Paramètre to 0 désactive fallback. MSPs use this to force authenticated sessions throughout infrastructure.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

DCOM: Machine Launch Restrictions (Security Descriptor)

Controls who can launch DCOM applications. Restreindre empêche attackers from launching DCOM objects for privilege escalation or persistence.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

RPC: Enable RPC over named pipes

Controls RPC over named pipes support. Keep enabled for compatibility but combine with authentification paramètres. MSPs monitor this for security posture.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Audit: Audit Other Account Logon Events

Audite NTLM-based authentications and other compte connexion tentatives. Paramètre to 3 logs both success and failure. Essential for MSPs detecting compromised credentials in client environments.

Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > System Audit Policies

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

RPC Endpoint Mapper: Authentication level for unauthenticated connections

Exige authentification for RPC endpoint mapper queries. Paramètre to 1 applique authentification. Critical for MSPs preventing RPC enumeration attaques on client systems.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Domain Controller: Restrict NTLM: NTLM authentication in this domain

Restreint NTLM usage in the domaine at DC level. Paramètre to 4 denies NTLM and logs tentatives. Critical for MSPs enforcing domaine-wide Kerberos migration.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

DCOM: Machine Access Restrictions (Security Descriptor)

Controls DCOM accès permissions at machine level. MSPs restrict this to prevent lateral movement via DCOM exploitation on client workstations.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Disable RPC Connection Pooling

Désactive RPC connection pooling. Paramètre to 1 exige new connections per request, reducing session hijacking. MSPs use this to harden RPC security.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
Modèle adminComputer

Network access: Shares that can be accessed anonymously

Lists shares accessible via NULL sessions. MSPs keep this empty to prevent anonymous share enumeration and data exposure.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Audit: Audit Kerberos Authentication Service

Tracks Kerberos authentification événements on domaine computers. Paramètre to 3 logs successes and failures. Helps MSPs monitor NTLM deprecation progress.

Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > System Audit Policies

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

Network security: Do not store LAN Manager hash on next password change

Empêche storage of LM hashes on mot de passe change. Paramètre to 1 désactive LM storage. Essential for MSPs eliminating weak authentification material.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
SécuritéComputer

DCOM: Default Impersonation Level

Sets DCOM impersonation level to Identify (3). Empêche DCOM clients from impersonating callers. MSPs use this to limit privilege escalation via DCOM.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
Modèle adminComputer

Network security: Disable SMBv1

Désactive legacy SMBv1 protocol. Paramètre to 0 completely désactive SMBv1. Critical for MSPs eliminating WannaCry/NotPetya attaque vectors from client networks.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
Modèle adminComputer

Microsoft network server: Digitally sign communications (always)

Exige SMB signing on all connections. Paramètre to 1 applique signing. Essential for MSPs preventing man-in-the-middle attaques on SMB shares.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
Modèle adminComputer

Network access: Let Everyone permissions apply to anonymous users

Controls whether anonymous utilisateurs inherit Everyone permissions. Keep at 0 to deny anonymous accès. Critical for MSPs preventing unauthenticated enumeration.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
Modèle adminComputer

Network Access: UNC Hardened Access (domain systems)

Restreint anonymous NULL session accès to UNC paths. Paramètre to 1 exige authentification. Essential for MSPs blocking WMIEXEC and similar attaques.

Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options

Supporté sur Windows 10, Windows 11, Windows Server 2016 and later

Voir la référence →
Page 20 sur 26 · 623 stratégies