Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
gp-pack.com-BSI-BPOL_Windows_10_Sicherheitsmodul_Bundespolizei
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Account Policies/Password Policy
PolicySetting
Enforce password history24 passwords remembered
Maximum password age42 days
Minimum password age1 days
Minimum password length14 characters
Password must meet complexity requirementsEnabled
Store passwords using reversible encryptionDisabled
Account Policies/Account Lockout Policy
PolicySetting
Account lockout duration15 minutes
Account lockout threshold10 invalid logon attempts
Reset account lockout counter after15 minutes
Local Policies/User Rights Assignment
PolicySetting
Access Credential Manager as a trusted caller
Access this computer from the networkVORDEFINIERT\Administratoren
Act as part of the operating system
Adjust memory quotas for a processNT-AUTORITÄT\Lokaler Dienst, NT-AUTORITÄT\Netzwerkdienst, VORDEFINIERT\Administratoren
Allow log on locallyVORDEFINIERT\Administratoren, VORDEFINIERT\Benutzer
Allow log on through Terminal ServicesVORDEFINIERT\Remotedesktopbenutzer
Back up files and directoriesVORDEFINIERT\Administratoren
Bypass traverse checkingJeder, NT-AUTORITÄT\Lokaler Dienst, NT-AUTORITÄT\Netzwerkdienst, VORDEFINIERT\Administratoren, VORDEFINIERT\Benutzer, VORDEFINIERT\Sicherungs-Operatoren
Change the system timeNT-AUTORITÄT\Lokaler Dienst, VORDEFINIERT\Administratoren
Change the time zoneVORDEFINIERT\Administratoren, NT-AUTORITÄT\Lokaler Dienst
Create a pagefileVORDEFINIERT\Administratoren
Create a token object
Create global objectsNT-AUTORITÄT\Lokaler Dienst, NT-AUTORITÄT\Netzwerkdienst, VORDEFINIERT\Administratoren, NT-AUTORITÄT\DIENST
Create permanent shared objects
Create symbolic linksVORDEFINIERT\Administratoren
Debug programsVORDEFINIERT\Administratoren
Deny access to this computer from the networkNT-AUTORITÄT\Lokales Konto
Deny log on as a batch jobGast
Deny log on as a serviceGast
Deny log on locallyGast
Deny log on through Terminal ServicesGast, NT-AUTORITÄT\Lokales Konto
Enable computer and user accounts to be trusted for delegation
Force shutdown from a remote systemVORDEFINIERT\Administratoren
Generate security auditsNT-AUTORITÄT\Lokaler Dienst, NT-AUTORITÄT\Netzwerkdienst
Impersonate a client after authenticationNT-AUTORITÄT\Lokaler Dienst, NT-AUTORITÄT\Netzwerkdienst, VORDEFINIERT\Administratoren, NT-AUTORITÄT\DIENST
Increase a process working setVORDEFINIERT\Benutzer
Increase scheduling priorityVORDEFINIERT\Administratoren
Load and unload device driversVORDEFINIERT\Administratoren
Lock pages in memory
Log on as a batch jobVORDEFINIERT\Administratoren
Log on as a serviceNo one (can cause serious problems!)
Manage auditing and security logVORDEFINIERT\Administratoren
Modify an object label
Modify firmware environment valuesVORDEFINIERT\Administratoren
Perform volume maintenance tasksVORDEFINIERT\Administratoren
Profile single processVORDEFINIERT\Administratoren
Profile system performanceVORDEFINIERT\Administratoren, NT SERVICE\WdiServiceHost
Remove computer from docking stationVORDEFINIERT\Administratoren, VORDEFINIERT\Benutzer
Replace a process level tokenNT-AUTORITÄT\Lokaler Dienst, NT-AUTORITÄT\Netzwerkdienst
Restore files and directoriesVORDEFINIERT\Administratoren
Shut down the systemVORDEFINIERT\Administratoren, VORDEFINIERT\Benutzer
Take ownership of files or other objectsVORDEFINIERT\Administratoren
Local Policies/Security Options
Accounts
PolicySetting
Accounts: Administrator account statusDisabled
Accounts: Guest account statusDisabled
Accounts: Limit local account use of blank passwords to console logon onlyEnabled
Accounts: Rename administrator account"SetToNotEqualAdmin"
Accounts: Rename guest account"SetToNotEqualGuest"
Domain Member
PolicySetting
Domain member: Digitally encrypt or sign secure channel data (always)Enabled
Domain member: Digitally encrypt secure channel data (when possible)Enabled
Domain member: Digitally sign secure channel data (when possible)Enabled
Domain member: Disable machine account password changesDisabled
Domain member: Maximum machine account password age42 days
Domain member: Require strong (Windows 2000 or later) session keyEnabled
Interactive Logon
PolicySetting
Interactive logon: Do not display last user nameEnabled
Interactive logon: Do not require CTRL+ALT+DELDisabled
Interactive logon: Number of previous logons to cache (in case domain controller is not available)0 logons
Interactive logon: Prompt user to change password before expiration10 days
Interactive logon: Smart card removal behaviorLock Workstation
Microsoft Network Client
PolicySetting
Microsoft network client: Digitally sign communications (always)Enabled
Microsoft network client: Digitally sign communications (if server agrees)Enabled
Microsoft network client: Send unencrypted password to third-party SMB serversDisabled
Microsoft Network Server
PolicySetting
Microsoft network server: Amount of idle time required before suspending session15 minutes
Microsoft network server: Digitally sign communications (always)Enabled
Microsoft network server: Digitally sign communications (if client agrees)Enabled
Microsoft network server: Disconnect clients when logon hours expireEnabled
Network Access
PolicySetting
Network access: Allow anonymous SID/Name translationDisabled
Network access: Do not allow anonymous enumeration of SAM accountsEnabled
Network access: Do not allow anonymous enumeration of SAM accounts and sharesEnabled
Network access: Do not allow storage of passwords and credentials for network authenticationEnabled
Network access: Let Everyone permissions apply to anonymous usersDisabled
Network access: Named Pipes that can be accessed anonymously
Network access: Remotely accessible registry pathsSystem\CurrentControlSet\Control\ProductOptions, System\CurrentControlSet\Control\Server Applications, Software\Microsoft\Windows NT\CurrentVersion
Network access: Remotely accessible registry paths and sub-pathsSystem\CurrentControlSet\Control\Print\Printers, System\CurrentControlSet\Services\Eventlog, Software\Microsoft\OLAP Server, Software\Microsoft\Windows NT\CurrentVersion\Print, Software\Microsoft\Windows NT\CurrentVersion\Windows, System\CurrentControlSet\Control\ContentIndex, System\CurrentControlSet\Control\Terminal Server, System\CurrentControlSet\Control\Terminal Server\UserConfig, System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration, Software\Microsoft\Windows NT\CurrentVersion\Perflib, System\CurrentControlSet\Services\SysmonLog
Network access: Restrict anonymous access to Named Pipes and SharesEnabled
Network access: Shares that can be accessed anonymously
Network access: Sharing and security model for local accountsClassic - local users authenticate as themselves
Network Security
PolicySetting
Network security: Do not store LAN Manager hash value on next password changeEnabled
Network security: Force logoff when logon hours expireEnabled
Network security: LAN Manager authentication levelSend NTLMv2 response only. Refuse LM & NTLM
Network security: LDAP client signing requirementsNegotiate signing
Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsEnabled
Require NTLMv2 session securityEnabled
Require 128-bit encryptionEnabled
Network security: Minimum session security for NTLM SSP based (including secure RPC) serversEnabled
Require NTLMv2 session securityEnabled
Require 128-bit encryptionEnabled
System Cryptography
PolicySetting
System cryptography: Force strong key protection for user keys stored on the computerUser must enter a password each time they use a key
System Objects
PolicySetting
System objects: Require case insensitivity for non-Windows subsystemsEnabled
System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)Enabled
User Account Control
PolicySetting
User Account Control: Admin Approval Mode for the Built-in Administrator accountEnabled
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktopDisabled
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval ModePrompt for consent on the secure desktop
User Account Control: Behavior of the elevation prompt for standard usersAutomatically deny elevation requests
User Account Control: Detect application installations and prompt for elevationEnabled
User Account Control: Only elevate UIAccess applications that are installed in secure locationsEnabled
User Account Control: Run all administrators in Admin Approval ModeEnabled
User Account Control: Switch to the secure desktop when prompting for elevationEnabled
User Account Control: Virtualize file and registry write failures to per-user locationsEnabled
Other
PolicySetting
Accounts: Block Microsoft accountsUsers can't add or log on with Microsoft accounts
Interactive logon: Machine account lockout threshold4 invalid logon attempts
Interactive logon: Machine inactivity limit900 seconds
Microsoft network server: Server SPN target name validation levelRequired from client
Network security: Allow Local System to use computer identity for NTLMEnabled
Network security: Allow LocalSystem NULL session fallbackDisabled
Network security: Allow PKU2U authentication requests to this computer to use online identities. Disabled
Network security: Configure encryption types allowed for KerberosEnabled
DES_CBC_CRCDisabled
DES_CBC_MD5Disabled
RC4_HMAC_MD5Enabled
AES128_HMAC_SHA1Enabled
AES256_HMAC_SHA1Enabled
Future encryption typesEnabled
Advanced Audit Configuration
Account Logon
PolicySetting
Audit Credential ValidationSuccess, Failure
Account Management
PolicySetting
Audit Application Group ManagementSuccess, Failure
Audit Computer Account ManagementSuccess, Failure
Audit Other Account Management EventsSuccess, Failure
Audit Security Group ManagementSuccess, Failure
Audit User Account ManagementSuccess, Failure
Detailed Tracking
PolicySetting
Audit PNP ActivitySuccess
Audit Process CreationSuccess
Logon/Logoff
PolicySetting
Audit Account LockoutSuccess
Audit LogoffSuccess
Audit LogonSuccess, Failure
Audit Other Logon/Logoff EventsSuccess, Failure
Audit Special LogonSuccess, Failure
Object Access
PolicySetting
Audit Removable StorageSuccess, Failure
Policy Change
PolicySetting
Audit Audit Policy ChangeSuccess, Failure
Privilege Use
PolicySetting
Audit Sensitive Privilege UseSuccess, Failure
System
PolicySetting
Audit IPsec DriverSuccess, Failure
Audit Other System EventsSuccess, Failure
Audit Security State ChangeSuccess, Failure
Audit System IntegritySuccess, Failure
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Control Panel/Personalization
PolicySettingComment
Prevent enabling lock screen cameraEnabled
Prevent enabling lock screen slide showEnabled
Control Panel/Regional and Language Options
PolicySettingComment
Allow input personalizationDisabled
LAPS
PolicySettingComment
Do not allow password expiration time longer than required by policyEnabled
Enable local admin password managementEnabled
Password SettingsEnabled
Password ComplexityLarge letters + small letters + numbers + specials
Password Length15
Password Age (Days)42
Network/IPv6 Configuration
PolicySettingComment
IPv6 Configuration PolicyEnabled08202-0125: The recommended state for this setting is: DisabledComponents - 0xff (255)
IPv6 ConfigurationDisable all IPv6 components
Network/Lanman Workstation
PolicySettingComment
Enable insecure guest logonsDisabled
Network/Link-Layer Topology Discovery
PolicySettingComment
Turn on Mapper I/O (LLTDIO) driverDisabled
Turn on Responder (RSPNDR) driverDisabled
Network/Microsoft Peer-to-Peer Networking Services
PolicySettingComment
Turn off Microsoft Peer-to-Peer Networking ServicesEnabled
Network/Network Connections
PolicySettingComment
Prohibit installation and configuration of Network Bridge on your DNS domain networkEnabled
Require domain users to elevate when setting a network's locationEnabled
Network/Windows Connect Now
PolicySettingComment
Configuration of wireless settings using Windows Connect NowDisabled
Prohibit access of the Windows Connect Now wizardsEnabled
Network/Windows Connection Manager
PolicySettingComment
Minimize the number of simultaneous connections to the Internet or a Windows DomainEnabled
Prohibit connection to non-domain networks when connected to domain authenticated networkEnabled
SCM: Pass the Hash Mitigations
PolicySettingComment
Apply UAC restrictions to local accounts on network logonsEnabled
WDigest Authentication (disabling may require KB2871997)Enabled
SCM: Wi-Fi Sense
PolicySettingComment
Disable Wi-Fi SenseEnabled
System/Audit Process Creation
PolicySettingComment
Include command line in process creation eventsDisabled
System/Device Guard
PolicySettingComment
Turn On Virtualization Based SecurityEnabled
Select Platform Security Level:Secure Boot and DMA Protection
Virtualization Based Protection of Code Integrity:Enabled without lock
Require UEFI Memory Attributes TableDisabled
Credential Guard Configuration:Enabled with UEFI lock
System/Device Installation/Device Installation Restrictions
PolicySettingComment
Prevent installation of devices that match any of these device IDsEnabled
Prevent installation of devices that match any of these Device IDs:
PCI\CC_0C0A
To create a list of devices, click Show. In the Show Contents dialog box, in the Value column,
type a Plug and Play hardware ID or compatible ID
(for example, gendisk, USB\COMPOSITE, USB\Class_ff).
Also apply to matching devices that are already installed.Enabled
PolicySettingComment
Prevent installation of devices using drivers that match these device setup classesEnabled
Prevent installation of devices using drivers for these device setup classes:
\d48179be-ec20-1 1d1-b6b8-00c04fa3 72a7\
To create a list of device classes, click Show. In the Show Contents dialog box, in the Value column,
type a GUID that represents a device setup class
(for example, {25DBCE51-6C8F-4A72-8A6D-B54C2B4FC835}).
Also apply to matching devices that are already installed.Enabled
System/Early Launch Antimalware
PolicySettingComment
Boot-Start Driver Initialization PolicyEnabled
Choose the boot-start drivers that can be initialized:Good only
System/Group Policy
PolicySettingComment
Configure registry policy processingEnableda) Disable CSE Regsitry run during session (manually gpupdate aswell!)
b) as long there are no Admins, there can not be changes.

Do not apply during periodic background processingEnabled
Process even if the Group Policy objects have not changedEnabled
PolicySettingComment
Turn off background refresh of Group PolicyDisabled08202-0145 disables Background processing for CSE Registry(!)
System/Internet Communication Management/Internet Communication settings
PolicySettingComment
Turn off access to the StoreEnabled
Turn off downloading of print drivers over HTTPEnabled
Turn off handwriting personalization data sharingEnabled
Turn off handwriting recognition error reportingEnabled
Turn off Internet Connection Wizard if URL connection is referring to Microsoft.comEnabled
Turn off Internet download for Web publishing and online ordering wizardsEnabled
Turn off printing over HTTPEnabled
Turn off Registration if URL connection is referring to Microsoft.comEnabled
Turn off Search Companion content file updatesEnabled
Turn off the "Order Prints" picture taskEnabled
Turn off the "Publish to Web" task for files and foldersEnabled
Turn off the Windows Messenger Customer Experience Improvement ProgramEnabled08202-0116 (Messenger does not exist in Windows 10)
Turn off Windows Customer Experience Improvement ProgramEnabled
Turn off Windows Error ReportingEnabled
System/Locale Services
PolicySettingComment
Disallow copying of user input methods to the system account for sign-inEnabled
System/Logon
PolicySettingComment
Do not display network selection UIEnabled
Do not enumerate connected users on domain-joined computersEnabled
Enumerate local users on domain-joined computersDisabled
Turn off app notifications on the lock screenEnabled
Turn off picture password sign-inEnabled
Turn on convenience PIN sign-inDisabled
System/Mitigation Options
PolicySettingComment
Untrusted Font BlockingEnabled
Mitigation OptionsBlock untrusted fonts and log events
System/Power Management/Sleep Settings
PolicySettingComment
Allow standby states (S1-S3) when sleeping (on battery)Disabled
Allow standby states (S1-S3) when sleeping (plugged in)Disabled
Require a password when a computer wakes (on battery)Enabled
Require a password when a computer wakes (plugged in)Enabled
System/Remote Assistance
PolicySettingComment
Configure Offer Remote AssistanceDisabled
Configure Solicited Remote AssistanceDisabled
System/Remote Procedure Call
PolicySettingComment
Enable RPC Endpoint Mapper Client AuthenticationEnabled
Restrict Unauthenticated RPC clientsEnabled
RPC Runtime Unauthenticated Client Restriction to Apply:Authenticated
System/Troubleshooting and Diagnostics/Microsoft Support Diagnostic Tool
PolicySettingComment
Microsoft Support Diagnostic Tool: Turn on MSDT interactive communication with support providerDisabled
System/Troubleshooting and Diagnostics/Windows Performance PerfTrack
PolicySettingComment
Enable/Disable PerfTrackDisabled
System/Windows Time Service/Time Providers
PolicySettingComment
Enable Windows NTP ClientEnabled
Enable Windows NTP ServerDisabled
Windows Components/App Package Deployment
PolicySettingComment
Allow a Windows app to share application data between usersDisabled
Windows Components/App Privacy
PolicySettingComment
Let Windows apps access account informationEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access call historyEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access contactsEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access emailEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access locationEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access messagingEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access motionEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access notificationsEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access the calendarEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access the cameraEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access the microphoneEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps access trusted devicesEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps control radiosEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
PolicySettingComment
Let Windows apps make phone callsEnabled
Default for all apps:Force Deny
Put user in control of these specific apps (use Package Family Names):
Force allow these specific apps (use Package Family Names):
Force deny these specific apps (use Package Family Names):
Windows Components/App runtime
PolicySettingComment
Allow Microsoft accounts to be optionalEnabled
Block launching Windows Store apps with Windows Runtime API access from hosted content.Enabled
Windows Components/AutoPlay Policies
PolicySettingComment
Disallow Autoplay for non-volume devicesEnabled
Set the default behavior for AutoRunEnabled
Default AutoRun BehaviorDo not execute any autorun commands
Windows Components/Biometrics/Facial Features
PolicySettingComment
Configure enhanced anti-spoofingEnabled
Windows Components/BitLocker Drive Encryption
PolicySettingComment
Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)Enabled
Select the encryption method for operating system drives:XTS-AES 256-bit
Select the encryption method for fixed data drives:XTS-AES 256-bit
Select the encryption method for removable data drives:XTS-AES 256-bit
Windows Components/BitLocker Drive Encryption/Fixed Data Drives
PolicySettingComment
Allow access to BitLocker-protected fixed data drives from earlier versions of WindowsDisabled
Choose how BitLocker-protected fixed drives can be recoveredEnabled
Allow data recovery agentEnabled
Configure user storage of BitLocker recovery information:
Allow 48-digit recovery password
Allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizardEnabled
Save BitLocker recovery information to AD DS for fixed data drivesEnabled
Configure storage of BitLocker recovery information to AD DS:Backup recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for fixed data drivesEnabled
PolicySettingComment
Configure use of hardware-based encryption for fixed data drivesEnabled
Use BitLocker software-based encryption when hardware encryption is not availableEnabled
Restrict encryption algorithms and cipher suites allowed for hardware-based encryptionDisabled
Restrict crypto algorithms or cipher suites to the following:2.16.840.1.101.3.4.1.2;2.16.840.1.101.3.4.1.42
PolicySettingComment
Configure use of passwords for fixed data drivesDisabled
Configure use of smart cards on fixed data drivesEnabled
Require use of smart cards on fixed data drivesDisabled
Windows Components/BitLocker Drive Encryption/Operating System Drives
PolicySettingComment
Allow enhanced PINs for startupEnabled
Allow Secure Boot for integrity validationEnabled
Choose how BitLocker-protected operating system drives can be recoveredEnabled
Allow data recovery agentEnabled
Configure user storage of BitLocker recovery information:
Require 48-digit recovery password
Do not allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizardEnabled
Save BitLocker recovery information to AD DS for operating system drivesEnabled
Configure storage of BitLocker recovery information to AD DS:Store recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for operating system drivesEnabled
PolicySettingComment
Configure minimum PIN length for startupEnabled
Minimum characters:10
PolicySettingComment
Configure use of hardware-based encryption for operating system drivesEnabled
Use BitLocker software-based encryption when hardware encryption is not availableEnabled
Restrict encryption algorithms and cipher suites allowed for hardware-based encryptionDisabled
Restrict crypto algorithms or cipher suites to the following:2.16.840.1.101.3.4.1.2;2.16.840.1.101.3.4.1.42
PolicySettingComment
Configure use of passwords for operating system drivesDisabled
Require additional authentication at startupEnabled
Allow BitLocker without a compatible TPM (requires a password or a startup key on a USB flash drive)Disabled
Settings for computers with a TPM:
Configure TPM startup:Do not allow TPM
Configure TPM startup PIN:Require startup PIN with TPM
Configure TPM startup key:Do not allow startup key with TPM
Configure TPM startup key and PIN:Allow startup key and PIN with TPM
Windows Components/BitLocker Drive Encryption/Removable Data Drives
PolicySettingComment
Allow access to BitLocker-protected removable data drives from earlier versions of WindowsDisabled
Choose how BitLocker-protected removable drives can be recoveredEnabled
Allow data recovery agentEnabled
Configure user storage of BitLocker recovery information:
Do not allow 48-digit recovery password
Do not allow 256-bit recovery key
Omit recovery options from the BitLocker setup wizardEnabled
Save BitLocker recovery information to AD DS for removable data drivesEnabled
Configure storage of BitLocker recovery information to AD DS:Backup recovery passwords and key packages
Do not enable BitLocker until recovery information is stored to AD DS for removable data drivesEnabled
PolicySettingComment
Configure use of hardware-based encryption for removable data drivesEnabled
Use BitLocker software-based encryption when hardware encryption is not availableEnabled
Restrict encryption algorithms and cipher suites allowed for hardware-based encryptionDisabled
Restrict crypto algorithms or cipher suites to the following:2.16.840.1.101.3.4.1.2;2.16.840.1.101.3.4.1.42
PolicySettingComment
Configure use of passwords for removable data drivesDisabled
Configure use of smart cards on removable data drivesEnabled
Require use of smart cards on removable data drivesDisabled
PolicySettingComment
Deny write access to removable drives not protected by BitLockerEnabled
Do not allow write access to devices configured in another organizationDisabled
Windows Components/Cloud Content
PolicySettingComment
Turn off Microsoft consumer experiencesEnabled
Windows Components/Credential User Interface
PolicySettingComment
Do not display the password reveal buttonEnabled
Enumerate administrator accounts on elevationDisabled
Windows Components/Data Collection and Preview Builds
PolicySettingComment
Allow TelemetryEnabled
0 - Security [Enterprise Only]
PolicySettingComment
Disable pre-release features or settingsDisabled
Do not show feedback notificationsEnabled
Toggle user control over Insider buildsDisabled
Windows Components/Delivery Optimization
PolicySettingComment
Download ModeDisabled
Windows Components/EMET
PolicySettingComment
Default Action and Mitigation SettingsEnabled
Deep Hooks:Enabled
Anti Detours:Enabled
Banned Functions:Enabled
Exploit Action:User Configured
PolicySettingComment
System ASLREnabled
ASLR Setting:Application Opt-In
PolicySettingComment
System DEPEnabled
DEP Setting:Application Opt-Out
PolicySettingComment
System SEHOPEnabled
SEHOP Setting:Application Opt-Out
Windows Components/Event Log Service/Application
PolicySettingComment
Control Event Log behavior when the log file reaches its maximum sizeDisabled
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)32768
Windows Components/Event Log Service/Security
PolicySettingComment
Control Event Log behavior when the log file reaches its maximum sizeDisabled
Windows Components/Event Log Service/Setup
PolicySettingComment
Control Event Log behavior when the log file reaches its maximum sizeDisabled
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)32768
Windows Components/Event Log Service/System
PolicySettingComment
Control Event Log behavior when the log file reaches its maximum sizeDisabled
Specify the maximum log file size (KB)Enabled
Maximum Log Size (KB)196608
Windows Components/File Explorer
PolicySettingComment
Turn off Data Execution Prevention for ExplorerDisabled
Turn off heap termination on corruptionEnabled
Turn off shell protocol protected modeDisabled
Windows Components/HomeGroup
PolicySettingComment
Prevent the computer from joining a homegroupEnabledHomegroup Feature removed in 1803
Windows Components/Internet Explorer
PolicySettingComment
Prevent bypassing SmartScreen Filter warningsEnabled
Prevent managing SmartScreen FilterEnabled
Select SmartScreen Filter modeOn
Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone
PolicySettingComment
Turn on SmartScreen Filter scanEnabled
Use SmartScreen FilterEnable
Windows Components/Location and Sensors
PolicySettingComment
Turn off locationEnabled
Windows Components/Microsoft Edge
PolicySettingComment
Allow InPrivate browsingDisabled
Configure cookiesEnabled
Configure Cookies Block only 3rd-party cookies
PolicySettingComment
Configure Password ManagerDisabled
Configure Pop-up BlockerEnabled
Configure search suggestions in Address barDisabled
Prevent bypassing Windows Defender SmartScreen prompts for filesEnabledPrior 1607, name was: Don't allow SmartScreen Filter warning overrides for unverified files
Prevent using Localhost IP address for WebRTCEnabled
Windows Components/OneDrive
PolicySettingComment
Prevent the usage of OneDrive for file storageEnabled
Windows Components/Remote Desktop Services/Remote Desktop Connection Client
PolicySettingComment
Do not allow passwords to be savedEnabled
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Connections
PolicySettingComment
Allow users to connect remotely by using Remote Desktop ServicesDisabled
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Device and Resource Redirection
PolicySettingComment
Do not allow COM port redirectionEnabled
Do not allow drive redirectionEnabled
Do not allow LPT port redirectionEnabled
Do not allow supported Plug and Play device redirectionEnabled
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security
PolicySettingComment
Always prompt for password upon connectionEnabled
Require secure RPC communicationEnabled
Set client connection encryption levelEnabled
Encryption LevelHigh Level
Choose the encryption level from the drop-down list.
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Session Time Limits
PolicySettingComment
Set time limit for active but idle Remote Desktop Services sessionsEnabled
Idle session limit:5 minutes
PolicySettingComment
Set time limit for disconnected sessionsEnabled
End a disconnected session1 minute
Windows Components/Remote Desktop Services/Remote Desktop Session Host/Temporary folders
PolicySettingComment
Do not delete temp folders upon exitEnabled
Do not use temporary folders per sessionDisabled
Windows Components/RSS Feeds
PolicySettingComment
Prevent downloading of enclosuresEnabled
Windows Components/Search
PolicySettingComment
Allow CortanaDisabled
Allow indexing of encrypted filesDisabled
Allow search and Cortana to use locationDisabled
Windows Components/Software Protection Platform
PolicySettingComment
Turn off KMS Client Online AVS ValidationEnabled
Windows Components/Store
PolicySettingComment
Disable all apps from Windows Store Enabled
Turn off Automatic Download and Install of updatesEnabled
Turn off the offer to update to the latest version of WindowsEnabled
Turn off the Store applicationEnabled
Windows Components/Windows Defender Antivirus/MAPS
PolicySettingComment
Join Microsoft MAPSEnabled
Join Microsoft MAPSDisabled
Windows Components/Windows Defender SmartScreen/Explorer
PolicySettingComment
Configure Windows Defender SmartScreenEnabled
Pick one of the following settings:Warn and prevent bypass
Windows Components/Windows Defender SmartScreen/Microsoft Edge
PolicySettingComment
Configure Windows Defender SmartScreenEnabled
Windows Components/Windows Error Reporting
PolicySettingComment
Disable Windows Error ReportingEnabled
Windows Components/Windows Game Recording and Broadcasting
PolicySettingComment
Enables or disables Windows Game Recording and BroadcastingDisabled
Windows Components/Windows Installer
PolicySettingComment
Allow user control over installsDisabled
Always install with elevated privilegesDisabled
Prevent Internet Explorer security prompt for Windows Installer scriptsDisabled
Windows Components/Windows Logon Options
PolicySettingComment
Sign-in last interactive user automatically after a system-initiated restartDisabled
Windows Components/Windows PowerShell
PolicySettingComment
Turn on PowerShell Script Block LoggingEnabled
Log script block invocation start / stop events:Disabled
PolicySettingComment
Turn on PowerShell TranscriptionDisabled
Windows Components/Windows Remote Management (WinRM)/WinRM Client
PolicySettingComment
Allow Basic authenticationDisabled
Allow unencrypted trafficDisabled
Disallow Digest authenticationEnabled
Windows Components/Windows Remote Management (WinRM)/WinRM Service
PolicySettingComment
Allow Basic authenticationDisabled
Allow unencrypted trafficDisabled
Disallow WinRM from storing RunAs credentialsEnabled
Windows Components/Windows Remote Shell
PolicySettingComment
Allow Remote Shell AccessDisabled
Windows Components/Windows Update
PolicySettingComment
Configure Automatic UpdatesEnabled
Configure automatic updating:4 - Auto download and schedule the install
The following settings are only required and applicable if 4 is selected.
Install during automatic maintenanceDisabled
Scheduled install day: 0 - Every day
Scheduled install time:03:00
If you have selected “4 – Auto download and schedule the install” for your scheduled install day and specified a schedule, you also have the option to limit updating to a weekly, bi-weekly or monthly occurrence, using the options below:
Every weekEnabled
First week of the monthDisabled
Second week of the monthDisabled
Third week of the monthDisabled
Fourth week of the monthDisabled
Install updates for other Microsoft productsDisabled
PolicySettingComment
No auto-restart with logged on users for scheduled automatic updates installationsDisabled
Windows Components/Windows Update/Windows Update for Business
PolicySettingComment
Select when Preview Builds and Feature Updates are receivedEnabled08202-0039: Is ’Defer Upgrades and Updates’ set to ’Enabled: 1 months, 0 weeks
Select the Windows readiness level for the updates you want to receive:Semi-Annual Channel (Targeted)
After a Preview Build or Feature Update is released, defer receiving it for this many days:31
Pause Preview Builds or Feature Updates starting:
(format yyyy-mm-dd example: 2016-10-30)
User Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Control Panel/Personalization
PolicySettingComment
Enable screen saverEnabled