Fact-checked by Grok 2 weeks ago

Group Policy

Group Policy is a feature of Windows operating systems introduced in that enables network administrators to centrally manage and configure user and computer settings across an Domain Services (AD DS) environment. It utilizes Group Policy Objects (GPOs), which are collections of policy settings, security permissions, and management scopes stored in the AD domain partition and SYSVOL folders. These GPOs allow for the enforcement of configurations such as , security protocols, and resource access controls on and client systems. GPOs are linked to containers, including sites, domains, and organizational units (OUs), enabling targeted application of policies to specific groups of users or computers. Policies are processed during computer startup for machine settings and user logon for user-specific configurations, with options for synchronous or asynchronous application to optimize performance. Administrators create and edit GPOs using tools like the Group Policy Management Console (GPMC) or the Local Group Policy Editor (gpedit.msc), which provide access to administrative templates defining available settings. Replication of GPOs occurs across domain controllers via replication mechanisms using Distributed File System Replication (DFSR), and previously File Replication Service (FRS) in legacy environments, ensuring consistent policy enforcement throughout the network. Key applications of Group Policy include enforcing security settings like password policies, firewall rules, and audit configurations; managing user environments through features such as Folder Redirection and roaming profiles; and optimizing computer performance with power management and device installation controls. It supports both computer-based policies, applied regardless of the user, and user-based policies, tailored to individual accounts, facilitating scalable administration in enterprise settings. Over time, Group Policy has evolved to integrate with modern Windows features, including advanced security auditing and cloud-hybrid management in environments like , though its core functionality remains rooted in on-premises .

Fundamentals

Definition and Purpose

Group Policy is a core feature of Microsoft Windows Server and Domain Services (AD DS) that allows administrators to define, manage, and enforce configuration settings for users and computers within an Active Directory environment. It operates through Group Policy Objects (GPOs), which are collections of settings applied to specific users, computers, or groups, enabling centralized control over operating system behaviors, applications, and security parameters. This functionality is integral to AD DS, where policies are linked to sites, domains, or organizational units (OUs) to target domain-joined devices effectively. The primary purposes of Group Policy are to standardize configurations across networked systems, enforce policies such as requirements and controls, automate routine administrative tasks like , and facilitate compliance with organizational standards in enterprise networks. By providing a policy-based , it shifts management from individual device configurations to scalable, group-oriented enforcement, particularly beneficial for IT environments with multiple users and machines. Unlike local policies on standalone systems, Group Policy's domain-centric scope ensures settings are dynamically updated and synchronized across the . Key benefits include reduced IT administrative overhead through centralized policy application, greater consistency in user and computer experiences to minimize support issues, and enhanced scalability for managing policies in large, distributed organizations. These advantages support efficient and risk mitigation by uniformly applying best practices without manual intervention on each . Historically, Group Policy evolved from the System Policy Editor in Windows NT 4.0, which offered limited per-machine configurations, to a more robust framework introduced with Windows 2000 and Active Directory for comprehensive, domain-wide management.

Components and Architecture

Group Policy is built around core components that enable the centralized management and application of policy settings in a Windows Active Directory environment. The primary component is the Group Policy Object (GPO), a virtual collection of policy settings that defines configurations for users and computers. Each GPO consists of two main parts: the Group Policy container (GPC), which stores metadata such as the GPO's version, status, and linking information in the Active Directory domain partition, and the Group Policy template (GPT), which holds the actual policy settings in files. GPOs are created and managed using administrative tools like the Group Policy Management Console (GPMC), which allows administrators to define settings and link GPOs to specific scopes. Another essential component is the Extension (CSE), which processes and applies specific types of policy settings on target computers. CSEs extend the core Group Policy engine by handling diverse configurations, such as registry modifications, security settings, or software installations, and they operate during events like computer startup or user logon. The Group Policy client on each managed device retrieves applicable GPOs and invokes the relevant CSEs to enforce the settings. The architecture of Group Policy mirrors the hierarchical structure of , with GPOs linked to sites, domains, or organizational units (OUs) to determine their scope of application. This linking creates a logical association stored in , allowing policies to propagate based on the object's location in the directory tree. GPOs are physically stored in the SYSVOL folder on domain controllers, where the GPT files reside, ensuring replication across the domain via mechanisms like Distributed File System Replication (DFSR). The SYSVOL structure organizes GPO files under a path like <domain>\SYSVOL\<domain>\Policies\<GPO-GUID>, with subfolders for machine and user policies, facilitating consistent access during policy retrieval. Policy settings within GPOs are categorized into two main nodes: , which applies machine-level settings such as operating system behaviors, security options, and device management regardless of the user logged in, and User Configuration, which targets user-specific settings like desktop environments, application preferences, and folder redirection. These categories allow for granular control, with Computer Configuration processed at startup and User Configuration at logon. Supporting elements enhance the precision and delegation of Group Policy. Windows Management Instrumentation (WMI) filters enable dynamic targeting by evaluating queries against the target computer's attributes, such as operating system version or hardware configuration, to apply GPOs selectively—one filter per GPO. Security groups facilitate delegation by allowing administrators to restrict GPO application to specific users, computers, or groups through security filtering, ensuring only authorized principals receive the policies. The logical flow of Group Policy architecture begins with GPO creation and linking in , followed by replication of metadata and files to domain controllers via SYSVOL. During application, the client queries for applicable GPOs based on its site, , and OU hierarchy, retrieves the settings from SYSVOL, and uses CSEs to enforce them locally—this process is detailed further in enforcement mechanisms.

Operation

Processing and Enforcement

Group Policy processing occurs through a structured sequence designed to ensure consistent application of settings across domain-joined Windows computers and users. The process begins when the Group Policy client service (gpsvc) initiates either a foreground or background refresh. Foreground processing happens synchronously or asynchronously during computer startup for machine policies and user logon for user policies, allowing immediate enforcement at key system events. Background refresh, which updates policies without interrupting user activity, occurs approximately every 90 minutes with a random offset of up to 30 minutes to distribute load across the network; this interval is configurable via registry settings but defaults to ensure timely updates without overwhelming domain controllers. The enforcement phases follow a defined to apply settings reliably. First, the client queries the over LDAP to retrieve the ordered list of applicable Group Policy Objects (GPOs) based on the site's, domain's, and organizational unit's (OU) hierarchy. Next, the client downloads the necessary GPO files, including policy definitions and templates, from the SYSVOL share on the using . These files are then parsed locally to extract settings, after which client-side extensions (CSEs)—DLLs responsible for implementing specific policy areas—are invoked in a fixed order determined by ascending alphabetical sorting of their globally unique identifiers (GUIDs). Core CSEs, such as the Registry extension (GUID: {35378EAC-683F-11D2-A89A-00C04FBBCFA2}) and extension (GUID: {827D319E-6EAC-11D2-A4EA-00C04F79F83A}), process early in this sequence to establish foundational configurations like registry keys and local security policies before later extensions, such as Scripts or Software , take effect. In scenarios involving shared computing environments, such as or terminal servers, loopback processing modifies policy application to align with the computer's location in . Enabled via the "Configure user Group Policy loopback processing mode" setting in , this feature operates in two modes: Merge, which combines the 's standard GPOs with those from the computer's (with computer policies taking precedence in conflicts), or Replace, which discards the 's GPOs entirely and applies only those linked to the computer's . This ensures environment-specific settings, such as restricted access on kiosks, without altering the user's primary assignments. Failure handling mechanisms prioritize system stability and diagnostics during processing. The entire refresh must complete within 60 minutes, but asynchronous foreground processing—enabled by default for faster logons—allows startup or logon to proceed before all CSEs finish, deferring non-critical applications via fast-logon optimization; this reduces boot times but may delay some settings until the next background refresh. If a CSE encounters an , such as invalid settings or resource unavailability, it logs the issue in the Windows under the or Applications and Services Logs > > Windows > GroupPolicy > Operational category, using event IDs like 4016 (processing start) or 5017 (failure). Processing continues with subsequent CSEs, but affected policies from the failed extension are not enforced unless reattempted manually with gpupdate /force; silent failures without auditing enabled can result in undetected non-application of settings, underscoring the need for regular monitoring.

Inheritance and Precedence

Group Policy operates on an model where settings from higher-level containers apply to lower-level ones unless explicitly modified or blocked. The hierarchy follows the order of local policies, site-linked Group Policy Objects (GPOs), domain-linked GPOs, and then Organizational Unit (OU)-linked GPOs from parent to child, making policies cumulative and inherited downward. Precedence determines how conflicting settings from multiple GPOs are resolved, with lower-level GPOs generally overriding those from higher levels due to the processing sequence. Within the same container, GPOs are applied in the order specified by their link order, where the lowest number (highest precedence) takes effect last, allowing it to supersede earlier settings—a known as "last writer wins." Enforced GPOs, marked with the "Enforced" option, cannot be overridden by child containers, ensuring their settings apply regardless of lower-level conflicts, while the "Block " option at an level prevents from parent containers except for enforced GPOs. In , explicit settings in a GPO override default or inherited values, but identical settings across GPOs result in no effective change since the last-applied one matches the prior. For instance, a -wide GPO enforcing a minimum password length of 8 characters can be overridden by an OU-specific GPO setting it to 12 characters for users in that OU, demonstrating how finer-grained policies take precedence unless the GPO is enforced. Administrators can view the effective policy combination, including inheritance and precedence effects, using the Resultant Set of Policy (RSoP) tool, which simulates or logs the applied settings for a user or computer. In planning mode, RSoP allows testing scenarios, such as verifying if an OU-level setting overrides a domain policy, without actual deployment.

Filtering and Targeting

Group Policy filtering and targeting mechanisms allow administrators to apply policies selectively to specific users, computers, or conditions, extending beyond the standard organizational unit (OU) hierarchy and inheritance rules. These features enable precise control over policy application without creating numerous duplicate Group Policy Objects (GPOs), reducing administrative overhead while ensuring compliance in diverse environments. Security filtering refines GPO scope by modifying the access control list (ACL) on the GPO itself, determining which security principals can read and apply its settings. By default, the Authenticated Users group has Read and Apply Group Policy permissions, allowing broad application; to target specific groups, administrators remove this default and grant Read and Apply Group Policy permissions to desired security groups, such as a department-specific group for finance users. To exclude entities, Deny Read permissions can be applied to particular groups or users, preventing policy processing even if linked to their OU. This method operates at the GPO level and integrates with the overall precedence model, where filtered GPOs are evaluated only for permitted principals during client-side processing. Windows Management Instrumentation (WMI) filtering provides query-based targeting, linking a single WMI filter to a GPO to apply it only when client conditions match the specified WMI query language (WQL) criteria. For example, a filter like SELECT * FROM Win32_OperatingSystem WHERE Version >= '10.0' targets Windows 10 or later, while hardware-focused queries such as SELECT * FROM Win32_Processor WHERE NumberOfCores > 4 can limit policies to multi-core systems. WMI filters execute on the client during GPO processing, evaluating attributes like OS version, installed software, or disk space before applying settings; however, each GPO supports only one filter, and mismatches result in the GPO being skipped entirely. This approach is particularly useful for dynamic environments where static OU structures fall short. Item-level targeting applies exclusively to Group Policy Preferences, allowing granular conditions within individual preference items to control application to subsets of users or computers without affecting the entire GPO. Administrators can define targeting collections using logical operators (AND/OR) and criteria such as ranges (e.g., applying a mapped drive only to 192.168.1.0/24), registry key values, security group membership, or file existence. For instance, a preference item might target users in the "Remote Workers" group with a specific VPN setting based on a registry entry indicating status. This feature processes on the client after GPO retrieval, enabling flexible, preference-only deployments without full GPO-level overhead. Loopback serves as a targeting mechanism for policies by overriding the standard user-site and user- linkage, instead applying computer-linked GPOs' configurations based on the computer's location. Enabled via the Configure user Group Policy policy (set to Merge or Replace), it ensures site-specific settings—such as restricted environments on kiosks or servers—regardless of the logging-on user's OU. In Merge mode, computer GPO settings combine with the user's own policies; in Replace mode, they supersede policies entirely. This is ideal for scenarios like , where uniform experiences are required across varying accounts. Best practices for filtering and targeting emphasize minimizing complexity to maintain performance and manageability. Security filtering should prioritize security groups over individual users for scalability, while WMI filters must be used judiciously due to their execution, which can delay logon or times—especially in large environments with frequent queries. Item-level targeting enhances preferences without GPO proliferation but requires testing to avoid unintended exclusions; similarly, should be confined to specific s like those for shared workstations. Over-filtering across multiple layers can compound processing overhead, so administrators are advised to audit filters regularly and prefer OU design for broad targeting where possible.

Management Tools

Local Group Policy Editor

The Local Group Policy Editor is a (MMC) snap-in designed for configuring and modifying Group Policy settings on individual Windows computers, specifically targeting the local Group Policy Object (GPO) that affects only the machine or its users. It is invoked via the command gpedit.msc, which can be entered in the Run dialog (accessible by pressing + R) or through the search, and requires administrative privileges to open and edit policies. This tool has been available since Professional and is included in subsequent professional editions such as Professional, Business/Ultimate, and Windows 10/11 Pro, , and Education; it is absent from Home editions to limit advanced administrative features in consumer variants. The editor provides a hierarchical interface divided into Computer Configuration and User Configuration nodes, allowing administrators to set policies for system-wide computer behaviors (e.g., security options, software restrictions) or user-specific settings (e.g., desktop environments, application controls) that apply locally without network dependencies. These configurations are stored in the local GPO and can include administrative templates for fine-tuning features like password policies or Windows Firewall rules, enabling standalone management on non-domain-joined machines such as laptops or isolated workstations. Despite its utility for local administration, the Local Group Policy Editor has notable limitations compared to domain-based tools, as it operates solely on a single machine and does not support linking to (AD) or inheriting policies from higher-level GPOs. This restricts its scope to isolated environments, lacking advanced features like policy modeling, backup/restore of multiple GPOs, or centralized reporting available in enterprise management consoles. Consequently, it is best suited for simple, non-scaled deployments where domain is unnecessary. To apply changes made in the editor, users can initiate a manual refresh using the gpupdate /force command in the Command Prompt, which enforces policy updates immediately for both computer and user settings, or rely on the default background refresh interval of every 90 minutes with a random offset of up to 30 minutes. Edits take effect after the refresh or logoff/restart as required by specific policies, providing quick local enforcement without rebooting the system in most cases.

Group Policy Management Console

The Group Policy Management Console (GPMC), invoked via the gpmc.msc executable, serves as the central (MMC) snap-in for administering Group Policy Objects (GPOs) in Domain Services (AD DS) environments. It offers a consolidated interface for tasks that previously required multiple tools, such as Users and Computers (ADUC), thereby streamlining policy creation, editing, and deployment across domains and organizational units (OUs). Integrated directly into starting with the 2008 release, GPMC superseded the rudimentary policy handling in ADUC, providing enhanced capabilities for enterprise-scale management. Core functions of GPMC encompass creating new unlinked GPOs, editing existing ones through the integrated Group Policy Management Editor, and linking GPOs to sites, domains, or OUs to enforce settings on targeted users and computers. Administrators can configure link order to establish precedence among multiple linked GPOs and perform operations to safeguard policy configurations against loss or corruption. Additionally, GPMC facilitates the generation of Resultant Set of Policy (RSoP) reports in both (modeling) and (results) modes, aiding in the of policy application and the of enforcement issues. Among its standout features, GPMC supports reporting, which produces detailed, navigable outputs of GPO contents, , and RSoP data that can be exported for or auditing purposes. Permission is managed granularly, allowing roles such as "Edit settings, delete, and modify " for non-privileged users, while Domain Admins and Enterprise Admins receive full access by default. The console includes a search functionality to locate specific GPOs or settings across the entire forest, enhancing efficiency in large deployments. Unlike the Local Group Policy Editor, which is limited to standalone or local machine configurations, GPMC enables domain-wide policy operations. GPMC is installed by default on editions and can be added to Windows client operating systems via the Remote Server Administration Tools (RSAT), which bundles it with related components like the Group Policy Management Editor and Starter GPO Editor. On servers, it requires no additional setup beyond AD DS roles, while RSAT deployment on clients supports remote administration without full server installation. Windows Server 2012 introduced the Scope tab within GPMC, offering a dedicated pane for viewing and modifying GPO links, security filtering, and (WMI) filtering in one location, which simplifies the oversight of policy scope and reduces misconfigurations in complex hierarchies.

Advanced Group Policy Management

Advanced Group Policy Management (AGPM) is an enterprise tool that extends the Group Policy Management Console (GPMC) by providing controlled editing, versioning, and auditing for Group Policy Objects (GPOs) in environments. As part of the (MDOP), available to customers with Software Assurance, AGPM operates as a client-server application where the AGPM Server service manages an offline archive of GPOs, allowing administrators to edit them without directly impacting the production . The tool requires installation on or later for the server component, with the archive stored in the rather than a database, and supports through roles such as AGPM Administrator, Approver, Editor, and Reviewer. The last update was version 4.0 SP3 in 2016, with compatibility for and earlier; it is not officially supported on or 2022. Core features of AGPM include a /check-out workflow that prevents concurrent editing of GPOs, enabling exclusive access during modifications while maintaining the original production version intact until changes are approved and deployed. It provides comprehensive version history for each GPO, allowing users to view differences between versions via reports and to prior states if needed, which helps mitigate errors in policy deployment. Auditing capabilities track all changes, including who made edits, approvers involved, and deployment history, with features like a Recycle Bin for restoring deleted GPOs and configurable limits on archived versions to manage storage. AGPM integrates seamlessly with the GPMC by adding a dedicated node and tabs for managing the workflow, search, and history directly within the familiar interface. It also supports notifications configured via an SMTP to alert approvers and administrators about events such as GPO creation requests, edit approvals, or deployment actions. Introduced with support for in version 3.0, AGPM has been deprecated, with extended support for MDOP ending on April 14, 2026.

Core Features

Group Policy Preferences

Group Policy Preferences provide an extension to traditional Group Policy functionality, enabling administrators to deploy a wide range of configurable settings that end users can modify after application. Introduced in , these preferences allow for the management of items such as drive mappings, shortcuts, and registry entries without the permanent "tattooing" effect seen in standard policies, where changes are enforced indelibly in the registry. Instead, preferences are applied dynamically during Group Policy refresh cycles and can be reversed or altered by users, reverting to the configured state on subsequent updates. Preferences operate through 20 dedicated client-side extensions (CSEs), which handle the processing and application of settings stored in Group Policy Objects (GPOs). Common types include Registry for modifying registry keys and values, Printers for deploying printer connections, Drive Maps for network drive assignments, Shortcuts for creating desktop or icons, INI Files for editing files, Environment Variables for system or user variables, Local Users and Groups for account management, Network Shares for share creation, Power Options for energy settings, and Scheduled Tasks for . These extensions integrate seamlessly with the Group Policy infrastructure, applying changes during background refresh intervals without requiring a full policy enforcement cycle. A key feature of Group Policy Preferences is item-level targeting, which applies conditions to individual preference items for dynamic and context-aware deployment. Administrators can define targeting rules using logical operators () based on criteria such as security group membership, computer name, CPU speed, domain affiliation, WMI queries, battery presence, or range, ensuring settings are applied only to relevant users or devices. This granular control allows for flexible scenarios, such as mapping a drive exclusively for members of a specific group during logon. Unlike standard Group Policy settings, which enforce configurations and prevent user modifications to maintain , preferences prioritize and are inherently reversible—users can change them post-application, but the preferences will reapply during the next Group Policy refresh unless secured otherwise through additional measures like permissions. This distinction makes preferences ideal for non-critical, user-centric customizations while avoiding the rigidity of mandatory policies.

Administrative Templates

Administrative Templates provide an extensible framework for defining and managing registry-based policy settings in Group Policy, enabling administrators to configure operating system and application behaviors through a standardized interface. These templates utilize ADMX files, which are XML-based and language-neutral, along with ADML files for language-specific resources, replacing the older ADM files introduced in Windows 2000. This shift to ADMX/ADML, beginning with Windows Vista SP1, improves manageability by supporting multi-language environments and reducing file duplication across domain controllers. The Central Store enhances this framework by centralizing ADMX and ADML files in the SYSVOL folder on domain controllers, typically at \\[domain.com](/page/Domain.com)\SYSVOL\[domain.com](/page/Domain.com)\Policies\PolicyDefinitions, allowing automatic replication across the domain for consistent policy editing. This setup supports multi-language configurations by organizing ADML files into subfolders by , such as en-US or fr-FR, ensuring that Group Policy editors display settings in the user's preferred without local file copies on each machine. Administrators these templates into the Group Policy Management Console (GPMC) to edit policies, where settings map directly to registry keys and values for enforcement during Group Policy processing. In and later, extensions like versioned Central Store folders (e.g., PolicyDefinitions-v2 or build-specific directories) facilitate domain-wide updates and rollback capabilities, preventing conflicts from mismatched template versions across environments. For instance, the ADMX templates for version 23H2 introduce new settings under categories like Windows Components, including policies to manage features such as Windows Copilot, such as "Turn off Windows Copilot" to disable the AI assistant. Organizations can further extend functionality by creating custom ADMX files for third-party applications or internal software, following the ADMX schema to define registry paths, options, and UI elements for integration into GPMC.

Security Configuration

Group Policy enables administrators to enforce security settings across domains, focusing on account policies, user rights, and auditing to mitigate risks such as unauthorized access and . These configurations are applied through Group Policy Objects (GPOs) linked to organizational units (OUs), sites, or the domain, ensuring consistent security posture for Windows-based systems. Security settings take precedence over local configurations in domain-joined environments, promoting centralized management while allowing for granular control via fine-grained policies. Password policies in Group Policy define requirements for password , length, , and to prevent weak credentials. Configured under Computer Configuration\Windows Settings\Security Settings\Account Policies[Password Policy](/page/Password_policy), these include settings like minimum password length (e.g., at least 14 characters recommended) and enforcement of uppercase, lowercase, numeric, and special characters. The Enforce password option prevents reuse of recent passwords, typically set to 24 previous passwords, while Maximum password limits validity to 42 days by default. Fine-grained password policies (FGPP), introduced in Windows Server 2008, allow domain administrators to apply distinct password rules to specific users or groups within the same domain, overriding the default domain without requiring child domains. For example, privileged accounts like service administrators can enforce stricter than standard users. FGPPs are managed via the Active Directory Administrative Center and include all standard password attributes except Kerberos policies. Account lockout policies complement password controls by locking user accounts after repeated failed logon attempts, deterring brute-force attacks. Located under Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy, key settings include Account lockout threshold (e.g., 5 invalid attempts), Account lockout duration (e.g., 15 minutes before automatic unlock), and Reset account lockout counter after (e.g., 15 minutes). These policies apply domain-wide unless overridden by FGPPs, which can specify unique lockout thresholds for sensitive groups. For instance, a threshold of 10 attempts with a 30-minute duration balances security and usability for general users. In conjunction with password policies, lockout settings ensure that excessive failed logons trigger temporary restrictions, enhancing protection against credential stuffing. User rights assignment via GPOs controls what actions users or groups can perform on systems, such as logging on locally or accessing the network. Managed under Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment, these rights include privileges like "Access this computer from the network" (assigned to Authenticated Users by default) and "Log on as a service" (restricted to specific accounts). Administrators can delegate rights to security groups, ensuring least-privilege access; for example, denying "Deny log on locally" to non-administrators prevents unauthorized console access. Changes take effect at the next logon, and conflicts are resolved by the most recent or highest-precedence GPO. This mechanism is critical for hardening servers, where rights like "Create global objects" are limited to administrators to reduce attack surface. Auditing of Group Policy changes is essential for detecting unauthorized modifications, enabled through Directory Service Changes auditing under Advanced Audit Policy Configuration. This logs events in the Security log, including Event ID 5136 (directory service object modified, such as GPO edits), 5137 (object created), 5138 (object deleted), 5139 (object moved), 5141 (permissions modified), and related IDs for comprehensive tracking. To enable, configure auditing on the domain root for Everyone: and , ensuring SACLs on GPOs capture changes like permission alterations. Monitoring these events via tools like helps identify suspicious activity, such as unexpected GPO deletions. A key risk in security configuration is the "tattoo" effect, where GPO-applied registry settings persist in the local registry even after the GPO is unlinked or disabled, requiring explicit deletion or reapplication to revert. This occurs because security policies write directly to registry keys under HKLM\SECURITY\Policy, maintaining values until overridden, which can lead to unintended compliance gaps if not monitored. Circumvention risks include local policy overrides in non-domain scenarios or booting into Safe Mode, where minimal services load and GPO enforcement may be bypassed, allowing temporary evasion of restrictions like user rights. For instance, Safe Mode prioritizes local settings, potentially permitting actions denied by domain GPOs. Best practices for managing security configurations emphasize using FGPPs for tailored enforcement, testing GPOs in isolated lab environments before deployment to avoid disruptions, and restricting delegation to prevent over-permissive access. Administrators should apply the principle of least privilege in user rights assignments, regularly audit GPO changes via the specified Event IDs, and use security baselines from to align with recommended settings. Avoid linking multiple conflicting GPOs to the same , and implement for privileged accounts interacting with GPOs to enhance overall resilience.

History and Evolution

Origins in Windows NT

The origins of Group Policy trace back to the System Policies feature introduced in Windows NT 4.0 in 1996, which provided the foundational mechanism for centralized configuration management in Windows domains. This feature allowed administrators to define and enforce registry-based settings for users and computers across a domain, marking a shift from manual, decentralized desktop management to a more structured approach. The System Policy Editor (POLEDIT.EXE), a graphical tool included with Windows NT 4.0 Server, enabled the creation of policy files that tweaked registry values to control aspects such as desktop appearance, application restrictions, and basic security options. These policies were stored in .pol files—ntconfig.pol for computer settings and config.pol for user settings—and placed in the NETLOGON share on domain controllers for distribution. In , system policies were inherently domain-specific, applying to users or computers based on their membership in groups defined within the . Administrators could configure policies to enforce registry modifications that altered environments, such as prohibiting access to certain Panel applets or setting default folder views, while also supporting limited security configurations like password policies and account lockout thresholds. However, the scope was narrowly focused on registry changes and did not extend to , , or advanced scripting. Policies were applied dynamically during logon or computer startup, overriding local settings where applicable, but required manual intervention to propagate changes across backup domain controllers, often via scripting or file replication services. Despite these capabilities, system policies in had significant limitations that highlighted their role as a precursor rather than a complete solution. There was no support for policy inheritance, meaning each policy file operated independently without hierarchical application from higher-level containers, leading to redundancy in multi-group environments. Replication was not automatic, relying on administrators to synchronize files manually, which could result in inconsistencies across domain controllers. Additionally, policies primarily hid or restricted elements rather than providing robust enforcement, offering limited protection against deliberate circumvention. These constraints underscored the need for a more scalable framework, setting the stage for the evolution into Group Policy Objects (GPOs) with the introduction of in Windows 2000.

Key Developments in Windows 2000 and Later

Group Policy was introduced with as a core feature integrated with , enabling administrators to define and enforce configurations for users and computers across a domain. Group Policy Objects (GPOs) serve as the fundamental units, storing settings that can be linked to Active Directory containers including sites, domains, and organizational units (OUs). This linking mechanism allows a single GPO to apply to multiple containers, while multiple GPOs can target one container, facilitating granular control. debuted in this version, following the LSDOU processing order—Local policies first, then Site, Domain, and OU levels—with child OUs automatically inheriting settings from parent containers unless explicitly blocked. Windows Server 2003 brought significant management enhancements, including the Group Policy Management Console (GPMC), a unified snap-in that consolidated scattered tools from into a single interface for creating, editing, and delegating GPO tasks across forests and domains. The GPMC introduced the Resultant Set of Policy (RSoP) wizard, supporting both logging mode to view applied policies on live systems and planning mode to simulate policy effects without deployment, aiding troubleshooting and design. Replication improvements came via GPMC's built-in monitoring of SYSVOL folder synchronization across domain controllers using File Replication Service (FRS), reducing administrative overhead in multi-site environments. In , Group Policy Preferences expanded configuration options beyond traditional settings, allowing dynamic management of items like registry entries, shortcuts, printers, and drive mappings without requiring custom scripts or full GPO overwrites. Fine-grained password policies were added, permitting different password and account lockout requirements for specific users or groups within the same domain via Password Settings Objects (PSOs), overcoming the single-domain-policy limitation of prior versions. Advanced Group Policy Management (AGPM), part of the , introduced , check-in/check-out workflows, and rollback capabilities for GPOs, enhancing in enterprise settings. Subsequent releases from onward incorporated security-focused evolutions, such as controlled folder access policies in , which integrate with Windows Defender to block unauthorized changes to protected directories, providing a defense against by whitelisting trusted applications. Just-in-time activation for privileged groups, supported through time-bound membership in using tools like Identity Manager's Privileged Access Management (introduced in 2016), allows temporary elevation of user rights, minimizing standing privileges in high-security scenarios. Introduced in , Group Policy enables automatic enrollment of domain-joined devices into (MDM) solutions like Intune for hybrid management and co-management transitions. made Distributed File System Replication (DFSR) the default for SYSVOL, deprecating the older File Replication Service (FRS) to enhance GPO consistency and scalability in large environments.

Modern Enhancements

Integration with Active Directory and Azure AD

Group Policy is fundamentally integrated with Domain Services (AD DS), where Group Policy Objects (GPOs) are stored as a combination of a Group Policy Container in the partition and a Group Policy Template in the SYSVOL shared folder on each . This structure ensures that GPOs are replicated across all domain controllers in a using Active Directory replication protocols, such as Distributed File System Replication (DFSR), to maintain consistency and availability for client processing. are essential for this integration, as they host the SYSVOL folder and facilitate the model that distributes policy data throughout the . Delegation of administrative tasks for Group Policy management is handled through within AD DS, leveraging security groups to assign permissions via Lists (DACLs) on GPOs, organizational units (OUs), and other objects. Administrators can use the Group Policy Management Console (GPMC) to grant specific rights, such as editing GPO settings or linking GPOs to sites, s, or OUs, to designated groups without providing full domain admin privileges; for instance, the "Edit settings, delete, modify permissions" permission bundle allows targeted control over GPO modifications. This approach supports the principle of least privilege by enabling fine-grained delegation, where permissions are inherited or explicitly set at the object level to streamline administration in large environments. In hybrid environments combining on-premises AD DS with (formerly Azure AD), Group Policy extends its reach through hybrid device join configurations, allowing domain-joined devices to register with Entra ID for seamless policy application across cloud and on-premises resources. Microsoft Entra Connect synchronizes critical objects, including user accounts, computer objects, and attributes like device identifiers, from AD DS to Entra ID, ensuring that GPOs linked to on-premises OUs can influence hybrid-joined devices during policy refresh cycles. This synchronization, which requires Entra Connect version 1.1.819.0 or later and supports OU-based filtering to target specific devices, enables organizations to apply traditional GPOs for settings like security configurations while transitioning to cloud identity management. However, pure cloud-only Entra ID environments without an on-premises AD DS deployment do not support native GPOs, as there is no infrastructure for storage, replication, or processing; instead, device and user management relies on (MDM) solutions, such as , which use Configuration Service Providers (CSPs) to enforce equivalent policies. This limitation necessitates a shift to MDM for Entra-joined devices, where tools like Group Policy in Intune can assess and migrate existing GPO configurations to MDM profiles for parity. Windows Server 2022 further bolsters Group Policy resilience through support for the Recycle Bin feature, which allows recovery of deleted GPO containers and associated AD objects with preserved attributes and links; however, the SYSVOL template files may require additional restoration from backups to fully prevent data loss.

Hybrid and Cloud Management with Intune

Microsoft Intune serves as a cloud-based endpoint management solution within the Microsoft Endpoint Manager suite, enabling the deployment and enforcement of policies across devices without relying on on-premises infrastructure. As the primary cloud component of Endpoint Manager, Intune has evolved to manage user access, applications, and device compliance in hybrid and fully cloud environments, succeeding traditional on-premises tools by providing scalable, subscription-based services. In hybrid scenarios, Intune supports co-management alongside Microsoft Configuration Manager (ConfigMgr), allowing organizations to manage Windows devices concurrently using both tools to balance legacy on-premises capabilities with cloud agility. This approach facilitates a gradual transition, where workloads such as compliance policies or application deployment can be shifted from ConfigMgr to Intune as needed. For migrating to Intune, administrators can use Group Policy analytics to import on-premises GPOs, assess compatibility, and convert supported settings into Intune configuration profiles, reducing duplication and enabling cloud-native enforcement. Key features of Intune include the Settings Catalog, which mirrors the functionality of GPO Administrative Template (ADMX) files by offering thousands of configurable settings for Windows and other platforms directly through a unified interface. Additionally, Intune integrates with Microsoft Entra ID Conditional Access to enforce security policies based on device compliance, user risk, and location, ensuring that only approved devices and users access corporate resources. Intune provides advantages over traditional Group Policy by being device-agnostic, supporting management of /, , macOS, and devices alongside Windows, which extends policy enforcement beyond domain-joined environments. Its cloud architecture enables real-time policy updates and over-the-air delivery, allowing immediate changes without requiring device reboots or scheduled replications. In 2024, Intune introduced support for version 24H2 policies, including configurations for new AI-enhanced features like Copilot+ PC requirements and improved settings, ensuring seamless management of the latest OS updates. Unlike traditional , which supports native GPOs, pure (formerly Azure AD) environments lack built-in GPO functionality; instead, Intune handles policy management, with custom configurations achieved via Uniform Resource Identifiers (OMA-URIs) targeting Configuration Service Providers (CSPs) for granular control.

Recent Updates for Windows 11

Windows 11 version 21H2 and 22H2 introduced enhanced Group Policy support for virtualization-based (VBS) features, including memory integrity, which leverages hardware isolation to protect against kernel-mode . Administrators can enable or disable memory integrity through Group Policy settings under > Administrative Templates > System > Device Guard, requiring a for changes to take effect. These updates also expanded Administrative Template (.admx) files to include policies for (TPM) configurations, ensuring compliance with Windows 11's hardware requirements for secure boot and encryption. In versions 23H2 and 24H2, Group Policy received updates to manage emerging and productivity features, such as policies for integration in the and , allowing IT administrators to control access and visibility. Additional settings were added for Snap layouts, enabling customization of window snapping behaviors under User Configuration > Administrative Templates > Windows Components > Windows Explorer. Concurrently, the settings catalog incorporated over 30 new policies for , including those for Copilot and enhanced multitasking, facilitating hybrid management environments. Windows 11 version 25H2 became generally available on September 30, 2025, following previews earlier in the year, and brought refinements to policies via .1 These enhancements allow organizations to stagger deployments while maintaining security, building on existing deferral mechanisms for quality updates up to 30 days and feature updates up to 365 days under > Administrative Templates > Windows Components > . Several deprecations in recent updates reflect a shift toward modern management tools; for instance, Software Restriction Policies were fully deprecated in favor of and Windows Defender Application Control, with Group Policy templates updated accordingly. Advanced Group Policy Management (AGPM) has seen a lighter implementation in environments, while increasingly relies on Intune for policy enforcement, reducing dependency on traditional GPOs for non-domain-joined devices. The November 2025 security update introduced Group Policy configurations for Known Issue Rollback (KIR), enabling IT-managed devices to automatically revert problematic updates, with integration supporting (EDR) workflows through Defender for Endpoint onboarding policies. Windows 11 now provides full Group Policy support for ARM64 architectures, including policy deployment via Configuration Manager and Intune for devices like models, ensuring consistent management across processor types. For AI workloads, version 25H2 added policies in the settings for configuring AI marketplace apps and features like Copilot+, accessible through Administrative Templates for resource allocation and privacy controls.

Footnotes

  1. https://www.windowscentral.com/software-apps/windows-11/windows-11-version-25h2-faq

References

  1. [1]
    Microsoft Security Bulletin MS02-016 - Moderate
    Group Policy is a technology introduced in Windows 2000, that enables network administrators to configure many of the options available to users. Through Group ...
  2. [2]
    Group Policy overview for Windows Server | Microsoft Learn
    Jun 16, 2025 · Group Policy manages user and computer settings on Windows Server and Client systems, using Group Policy Objects (GPOs) in Active Directory.
  3. [3]
    What is Group Policy? | Definition from TechTarget
    Jun 18, 2024 · Group Policy is a management feature in Microsoft's Active Directory (AD) that enables network and system administrators to configure and assign user and ...
  4. [4]
    The Evolution of Microsoft Active Directory Group Policy Objects and ...
    Sep 27, 2024 · Introduced with Windows 2000, Group Policy Objects (GPOs) revolutionized IT administration by providing centralized management for users and computers within a ...
  5. [5]
    [MS-GPOD]: Group Policy Components - Microsoft Learn
    Oct 30, 2024 · The main components of the Group Policy protocols are described as follows: Administrative tool: An implementation-specific management entity, such as the GPMC.
  6. [6]
    [MS-GPOD]: Group Policy Structure - Microsoft Learn
    Feb 14, 2019 · Group Policy structure is modeled after the Active Directory structure, in that it has both physical and logical components.
  7. [7]
    Group Policy processing for Windows | Microsoft Learn
    Jun 16, 2025 · Learn about how Group Policy processing works in Active Directory Domain Services on Windows Server and Windows client computers.
  8. [8]
    [MS-GPOL]: Extension List - Microsoft Learn
    Feb 14, 2019 · The list of Group Policy client-side extensions present in the local machine. The Extension List is in ascending order by CSE GUID. The ...
  9. [9]
    GUID List of Group Policy Client Extensions - InfrastructureHeroes.org
    Oct 29, 2019 · Microsoft uses GUIDs in the error messages for the GPO Client Side Extension (CSE). If you have to analyze group policies regularly and find ...
  10. [10]
    Loopback processing of Group Policy - Windows - Microsoft Learn
    Jan 15, 2025 · This article helps you resolve the problem of applying the Group Policy loopback function when a user signs in to a computer in a specific organizational unit.Missing: enforcement | Show results with:enforcement
  11. [11]
    Applying Group Policy troubleshooting guidance - Windows Server
    Jan 15, 2025 · This guide provides you with the fundamental concepts used to troubleshoot Group Policy. You'll learn: Troubleshooting checklist Start by reading Group Policy ...
  12. [12]
    Group Policy Hierarchy | Microsoft Learn
    May 31, 2018 · GPOs are applied in this order: local, site, domain, and organizational units (parent before child). Computer policies override user policies.
  13. [13]
    Overriding and Blocking Group Policy | Microsoft Learn
    May 31, 2018 · Be aware that the No Override option always takes precedence over the Block inheritance option. A local GPO cannot specify the No Override or ...
  14. [14]
    Resultant Set of Policy
    ### Summary: RSoP for Viewing Inheritance and Precedence in Group Policy
  15. [15]
    Group Policy scope in Windows | Microsoft Learn
    Jun 16, 2025 · You change the scope of Group Policy using processing order, filtering, and link options. To determine the scope for a specific user or ...Missing: CSE | Show results with:CSE
  16. [16]
    Filtering the Scope of a GPO - Microsoft Learn
    May 31, 2018 · The administrator can specify which security groups are affected by the GPO by using the Access Control List (ACL) editor.
  17. [17]
    Create WMI Filters for the GPO - Microsoft Learn
    Sep 5, 2016 · In the navigation pane, find and then click the GPO that you want to modify. Under WMI Filtering, select the correct WMI filter from the list. ...
  18. [18]
    Group Policy preferences in Windows | Microsoft Learn
    Jun 16, 2025 · Unlike enforced Group Policy settings, preferences are applied through client-side extensions and are refreshed each time Group Policy updates.
  19. [19]
    Preference Item-Level Targeting Using the GPMC | Microsoft Learn
    Jul 26, 2020 · You can use item-level targeting to change the scope of individual preference items, so they apply only to selected users or computers.Introduction · Targeting collection
  20. [20]
    Group policy with WMI filters can be denied or cause slow logon/boot
    This article provides a resolution to an issue where Group policy with WMI filters can be denied or cause slow logon/boot.Symptoms · Cause
  21. [21]
    JSI Tip 4489. Group Policy Editor Security Zone setting changes do ...
    JSI Tip 4489. Group Policy Editor Security Zone setting changes do NOT appear on Windows 2000 Clients ... If the computer that is running gpedit.msc has the ...
  22. [22]
    System Configuration Tools in Windows - Microsoft Support
    However, for local policies, the Local Group Policy Editor is the go-to tool. It allows administrators to enforce specific configurations that are not available ...
  23. [23]
    Group Policy Management Console in Windows | Microsoft Learn
    May 14, 2025 · Group Policy Modeling. Allows you to simulate Resultant Set of Policy (RsoP) data for planning Group Policy deployments before implementing ...
  24. [24]
    Group Policy Management Console | Microsoft Learn
    May 31, 2018 · The Group Policy Management Console (GPMC) unifies Group Policy management across an enterprise. Before the GPMC, administrators had to use several tools to ...
  25. [25]
    Remote Server Administration Tools (RSAT) for Windows
    Jan 15, 2025 · Group Policy Management tools include Group Policy Management Console, Group Policy Management Editor, and Group Policy Starter GPO Editor.
  26. [26]
    Advanced Group Policy Management - Microsoft Learn
    Nov 23, 2017 · AGPM extends the capabilities of the Group Policy Management Console (GPMC) to provide comprehensive change control and improved management for Group Policy ...Step-by-Step Guide for... · What's new in AGPM 4.0 SP3 · Microsoft Ignite
  27. [27]
    Technical overview of AGPM - Microsoft Desktop Optimization Pack
    Aug 30, 2016 · This history includes all previous controlled versions of each GPO. An archive consists of an archive index file and associated archive data ...Missing: introduction | Show results with:introduction
  28. [28]
    Step-by-Step Guide for Microsoft Advanced Group Policy ...
    Aug 29, 2016 · This step-by-step guide demonstrates advanced techniques for Group Policy management that use the Group Policy Management Console (GPMC) and Microsoft Advanced ...
  29. [29]
    What's New in AGPM 3.0 - Microsoft Learn
    Jun 15, 2016 · AGPM 3.0 supports Windows Server 2008 and Windows Vista with SP1. It does not support Windows Server 2003 or Windows Vista with no service packs ...
  30. [30]
    Understanding ADMX policies | Microsoft Learn
    Aug 4, 2025 · In an ADMX policy, an administrative template contains the metadata of a Windows Group Policy and can be edited in the Local Group Policy Editor on a PC.
  31. [31]
    Create and manage Central Store - Windows Client | Microsoft Learn
    This article describes how to use the new .admx and .adml files to create and administer registry-based policy settings in Windows.Missing: documentation | Show results with:documentation
  32. [32]
    administrative Templates (.admx) for Windows 11 2023 Update (23H2)
    Jul 15, 2024 · Download the .msi file containing .admx templates for Windows 11 2023 Update (23H2) by clicking the download button and saving the file.
  33. [33]
    Password Policy - Windows 10 | Microsoft Learn
    Apr 19, 2017 · An overview of password policies for Windows and links to information for each policy setting.
  34. [34]
    Configure fine grained password policies for Active Directory ...
    Jun 16, 2025 · Fine Grained Password Policies provide you with a way to define different password and account lockout policies for different sets of users in a domain.Prerequisites · Create a fine grained...
  35. [35]
    Password Policy - Microsoft Learn
    Aug 31, 2016 · This security policy reference topic for the IT professional provides an overview of password policies for Windows and links to information for each policy ...
  36. [36]
    Account Lockout Policy - Windows 10 | Microsoft Learn
    Oct 11, 2018 · The Account Lockout Policy settings can be configured in the following location in the Group Policy Management Console: Computer Configuration\ ...
  37. [37]
    Account lockout threshold - Windows 10 | Microsoft Learn
    Nov 2, 2018 · The Account lockout threshold policy setting determines the number of failed sign-in attempts that will cause a user account to be locked.
  38. [38]
    User Rights Assignment - Windows 10 | Microsoft Learn
    Dec 15, 2021 · User rights are managed in Group Policy under the User Rights Assignment item. Each user right has a constant name and a Group Policy name ...
  39. [39]
    Active Directory Security Groups | Microsoft Learn
    Sep 22, 2025 · Security groups are a way to collect user accounts, computer accounts, and other groups into manageable units.
  40. [40]
    Create global objects - Windows 10 | Microsoft Learn
    Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. Group Policy. Settings are applied ...
  41. [41]
    5136(S) A directory service object was modified. - Windows 10
    Sep 7, 2021 · This event generates every time an Active Directory object is modified. To generate this event, the modified object must have an appropriate entry in SACL.
  42. [42]
    Appendix L - Events to Monitor | Microsoft Learn
    May 30, 2025 · The following table lists events that you should monitor in your environment, according to the recommendations provided in Monitoring Active Directory for ...Missing: enhanced | Show results with:enhanced
  43. [43]
    Set event log security locally or via Group Policy - Windows Server
    May 6, 2025 · You can customize security access rights to their event logs in Windows. These settings can be configured locally or through Group Policy.
  44. [44]
    Security policy settings - Windows 10 | Microsoft Learn
    Apr 18, 2017 · The Group Policy container is an Active Directory container that contains GPO properties, such as version information, GPO status, plus a list ...
  45. [45]
    Administer security policy settings - Windows 10 | Microsoft Learn
    Apr 18, 2017 · This behavior is sometimes called "tattooing." Registry and file settings will maintain the values applied through policy until that setting is ...
  46. [46]
    Best practices for securing Active Directory | Microsoft Learn
    May 21, 2025 · Never administer a trusted system from a less-trusted host. · Require multifactor authentication when using privileged accounts or doing ...
  47. [47]
    Security baselines guide | Microsoft Learn
    Aug 18, 2025 · A security baseline is a group of Microsoft-recommended configuration settings that explains their security implication.Using security baselines in... · What are security baselines?
  48. [48]
    NT 4.0 System Policies VS. Win2k Group Policies | ServerWatch
    Nov 28, 2000 · Microsoft introduced system policies in NT 4.0. The System Policy Editor allowed you to configure user and computer configurations that were a ...Missing: origins | Show results with:origins
  49. [49]
    Windows NT System Policies - ITPro Today
    NT system policies let you deliver user- and machine-specific Registry changes each time a user logs on. You can use the System Policy Editor (SPE) and ...Missing: 3.1 | Show results with:3.1
  50. [50]
    System Policies and the Windows NT Registry - Redmondmag.com
    Mar 1, 1999 · This means using the System Policy Editor, an often-ignored tool that sits under the Administrative Tools menu. This tool will become ...Missing: origins | Show results with:origins
  51. [51]
    [PDF] Guide to Securing Microsoft Windows 2000 Group Policy - DTIC
    GPOs are linked to containers (sites, domains, and Organizational Units – OUs) within the Active Directory structure.
  52. [52]
    Group Policy Management Console with Service Pack 1 - Microsoft
    Jul 15, 2024 · GPMC runs on Windows XP Professional SP1 and Windows Server 2003 computers and can manage Group Policy in either Windows 2000 or Windows Server ...
  53. [53]
    [DOC] 06_CHAPTER 4_Deploying Security Policy
    By using Group Policy, you can create and apply security policies to simplify and centralize the process for configuring and managing security for servers ...Missing: introduction | Show results with:introduction<|control11|><|separator|>
  54. [54]
    Working with Group Policy Preference Items Using the GPMC
    Aug 31, 2016 · Item-level targeting allows you to control if a preference item applies to a group of users or computers. For more information, see Preference ...
  55. [55]
    Passwords technical overview | Microsoft Learn
    Jul 29, 2021 · Beginning with Windows Server 2008, you can use fine-grained password policies to specify multiple password policies and apply different ...
  56. [56]
    Protect important folders with controlled folder access - Microsoft Learn
    Oct 20, 2025 · Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access ...
  57. [57]
    Group Policy Modeling and Results in Windows | Microsoft Learn
    Apr 22, 2024 · The Advance View opens Resultant Set of Policy snap-in opens. Each policy setting has a Precedence tab when viewing the properties for policy ...
  58. [58]
    Privileged Access Management for Active Directory Domain Services
    Apr 8, 2025 · With Windows Server 2016 or later, that membership is associated in Active Directory with a time limit. When you add a new member to a group, ...
  59. [59]
    Enroll a Windows device automatically using Group Policy
    Aug 4, 2025 · Learn how to use a Group Policy to trigger autoenrollment to MDM for Active Directory (AD) domain-joined devices.Automatic MDM enrollment in... · Domain Controller Central Store
  60. [60]
    Delegate Permissions for Group Policy
    ### Summary: Delegation of Permissions for Group Policy Using Active Directory Groups and DACLs
  61. [61]
    Configure Microsoft Entra hybrid join
    Jun 27, 2025 · Open Microsoft Entra Connect, and then select Configure. · In Additional tasks, select Configure device options, and then select Next. · In ...Targeted deployments of · Verify registration · Troubleshoot Microsoft Entra...
  62. [62]
    Plan your Microsoft Entra join deployment
    Jun 27, 2025 · Review supported and unsupported policies to determine whether you can use an MDM solution instead of Group policies. For unsupported policies, ...Review Your Identity... · Assess Your Device... · Management PlatformMissing: Limitations | Show results with:Limitations
  63. [63]
    Advanced AD DS Management Using Active Directory ...
    Jul 8, 2025 · The Active Directory Administrative Center enables you to create and manage fine-grained password policy (FGPP) objects. Windows Server 2008 ...
  64. [64]
    What is Microsoft Intune - Microsoft Intune - Microsoft Learn
    Apr 30, 2025 · Microsoft Intune is a cloud-based endpoint management solution. It manages user access to organizational resources and simplifies app and device management.Microsoft Ignite · Intune licenses · Intune Admin Center · Zero Trust
  65. [65]
    Endpoint management services and solutions at Microsoft
    Aug 21, 2024 · Microsoft Intune is a family of on-premises products and cloud services. It includes Intune, Configuration Manager, co-management, Endpoint ...Microsoft Intune · Configuration Manager and co...
  66. [66]
    Co-management for Windows devices - Microsoft Learn
    Dec 4, 2024 · When you manage devices with Configuration Manager and enroll to a third-party MDM service, this configuration is called coexistence.Benefits · Prerequisites · Microsoft Entra IdMissing: pure | Show results with:pure
  67. [67]
    Use Microsoft Intune to import and analyze group policies
    Mar 3, 2025 · This article shows you how to export your on-premises GPOs, import the GPOs into Intune, and review the analysis and results.Missing: 2016 | Show results with:2016
  68. [68]
    Create a policy using settings catalog in Microsoft Intune
    Sep 25, 2025 · Use settings catalog in Microsoft Intune to configure thousands of settings for Windows 10/11, iOS/iPadOS, macOS, and Android client devices ...
  69. [69]
    Use Conditional Access with Microsoft Intune compliance policies
    Mar 3, 2025 · Use Conditional Access with Microsoft Intune compliance policies to control the devices and apps that can connect to your email and company resources.
  70. [70]
    Understanding how GPOs and Intune interact - TechTarget
    Jul 11, 2024 · Microsoft Intune is a cloud-based device management platform, and the primary advantage to using Intune is that it is not Windows-specific. ...Group Policy And Microsoft... · What Is Group Policy And How... · What Is Microsoft Intune And...<|separator|>
  71. [71]
    What's new in Windows 11, version 24H2 for IT pros | Microsoft Learn
    May 23, 2025 · See Windows 11 2024 update. Windows 11, version 24H2 ... Personal Data Encryption for folders can be enabled from a policy in Intune.Features no longer under... · Checkpoint cumulative updates
  72. [72]
    Enable virtualization-based protection of code integrity
    Aug 15, 2025 · Memory integrity can be turned on in Windows Security settings and found at Windows Security > Device security > Core isolation details > Memory integrity.Missing: TPM | Show results with:TPM
  73. [73]
    Administrative Templates (.admx) for Windows 10 2022 Update (22H2)
    Jul 15, 2024 · This page provides complete set of Administrative Templates (.admx) for Windows 10 2022 Update (22H2)Missing: virtualization- TPM
  74. [74]
  75. [75]
    What's new in Microsoft Intune
    Settings catalog supports Windows 11 25H2 settings. The release of Windows 11 25H2 includes new policy configuration service providers (CSPs). These settings ...
  76. [76]
    Configure Windows Update client policies via Group Policy
    Sep 26, 2025 · You can use Group Policy through the Group Policy Management Console (GPMC) to control how Windows Update client policies work.
  77. [77]
    Deprecated features in the Windows client - Microsoft Learn
    This article provides details about the features and functionalities that are no longer being developed in Windows client.Missing: nt | Show results with:nt
  78. [78]
    Windows message center | Microsoft Learn
    Sep 29, 2025 · Highlights for the Windows 11, version 23H2 update:​​ This update addresses an issue that caused the Windows sign-in screen to stop responding ...Missing: Snap | Show results with:Snap
  79. [79]
    Support for Windows 11 - Configuration Manager - Microsoft Learn
    Jul 31, 2025 · Windows 11 on ARM64​​ Configuration Manager version 2107 with the update rollup supports the client on Windows 11 ARM64 devices. The All Windows ...Missing: Group | Show results with:Group
  80. [80]
    Windows 11, version 25H2 update history - Microsoft Support
    Support for AI marketplace apps ... The special Group Policy can be found in: Computer Configuration > Administrative Templates > Group Policy name.<|separator|>