<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Group Policy Central</title>
	<atom:link href="https://www.grouppolicy.biz/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.grouppolicy.biz</link>
	<description>News, Tips and Tutorials for all your Group Policy needss</description>
	<lastBuildDate>Thu, 25 Jul 2019 01:17:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">11423827</site>	<item>
		<title>Edge Chromium IE Mode Now Works</title>
		<link>https://www.grouppolicy.biz/2019/07/edge-chromium-ie-mode-now-works/</link>
					<comments>https://www.grouppolicy.biz/2019/07/edge-chromium-ie-mode-now-works/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Thu, 25 Jul 2019 01:17:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tip]]></category>
		<category><![CDATA[Chromium]]></category>
		<category><![CDATA[Edge]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[IE Mode]]></category>
		<category><![CDATA[Internet Explorer 11]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=18928</guid>

					<description><![CDATA[In the past few weeks there has been a lot of post about the new Enterprise features coming with the new Edge Chromium version of the browser. Unfortunately the main feature that enterprises were waiting for did not work... until today. ]]></description>
										<content:encoded><![CDATA[
<p>In the past few weeks there has been a lot of post about the new Enterprise features coming with the new Edge Chromium version of the browser. Unfortunately the main feature that enterprises were waiting for did not work&#8230; until today. </p>



<p>One of the key new policy setting that came with the Edge 77 ADMX/ADML files is called &#8220;Configure Internet Explorer integration&#8221;. This setting can be found under &#8220;Administrative Settings\Microsoft Edge&#8221;. What this policy enabled, in conjunction with other settings, was the ability to enable IE mode for Edge. </p>



<p>While IE Mode for original Edge has always been a thing, this new version is designed to launch Internet Explorer in another tab of the current browser. Meaning users only had to go to another tab of Edge to see a site running in IE Mode. This was opposed to how the original IE Mode worked in Edge where it would launch a full copy of IE in another window. </p>



<figure class="wp-block-image"><img fetchpriority="high" decoding="async" width="800" height="742" src="http://www.grouppolicy.biz/wp-content/uploads/2019/07/Configure-Internet-Explore-intergration-800x742.png" alt="" class="wp-image-18929" srcset="https://www.grouppolicy.biz/wp-content/uploads/2019/07/Configure-Internet-Explore-intergration-800x742.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Configure-Internet-Explore-intergration-150x139.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Configure-Internet-Explore-intergration-300x278.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Configure-Internet-Explore-intergration-768x713.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Configure-Internet-Explore-intergration.png 1028w" sizes="(max-width: 800px) 100vw, 800px" /><figcaption>Configure Internet Explorer intergration</figcaption></figure>



<p>This new integrated IE tab in Edge Chromium is a far more pleasing user experience as the only visual difference now is a small IE logo in the address bar (see below).   </p>



<figure class="wp-block-image"><img decoding="async" width="800" height="566" src="http://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-800x566.png" alt="" class="wp-image-18930" srcset="https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-800x566.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-150x106.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-300x212.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-768x544.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode.png 815w" sizes="(max-width: 800px) 100vw, 800px" /></figure>



<p>So IT admins could finally allow users to give users both a compatible and modern experience without having to having to using a dual browser environment. While the combination of Traditional Edge / IE was something I talked about at Ignite 2017 (see  <a href="https://channel9.msdn.com/events/Ignite/Australia-2017/WIN342?term=burchill&amp;lang-en=true">https://</a><a href="https://channel9.msdn.com/events/Ignite/Australia-2017/WIN342">channel9.msdn.com</a><a href="https://channel9.msdn.com/events/Ignite/Australia-2017/WIN342?term=burchill&amp;lang-en=true">/events/Ignite/Australia-2017/WIN342</a> ) it still was a far from ideal solution. </p>



<p>The problem was, in first release of v77 of Edge Chromium this feature did not fully work. IE Mode would still open in a separate windows similar to how the original IE mode worked. </p>



<p>Since then I have had feedback from Microsoft and they have confirmed that it was being fixed. </p>



<p style="text-align:center">&#8221; We want to let you know that we fixed an issue thatâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s related to this feedback in an upcoming update to Microsoft&nbsp;Edge. &#8220;</p>



<p>Well, we did not have to wait long and as of today Edge Chromium Dev Channel version 77.0.223.0 has been fixed and IE Mode will now work as expected.   Now you can run all your old &#8220;important&#8221; work related web sites without having to run them in a different window (see below).</p>



<figure class="wp-block-image"><img decoding="async" width="800" height="621" src="http://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-SJ-800x621.png" alt="" class="wp-image-18931" srcset="https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-SJ-800x621.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-SJ-150x116.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-SJ-300x233.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-SJ-768x596.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2019/07/Chromium-IE-Mode-SJ.png 1065w" sizes="(max-width: 800px) 100vw, 800px" /><figcaption>Edge Chromium running IE Mode for the Space Jam web site</figcaption></figure>



<p>But serious, this is a fantastic feature that should remove a lot of barriers for most origination use Edge Chromium as a single browser strategy once it is released.  </p>



<p>See  <a href="https://docs.microsoft.com/en-us/DeployEdge/edge-ie-mode">https://docs.microsoft.com/en-us/DeployEdge/edge-ie-mode</a>  for more information on how to implement IE Mode for Edge Chromium. </p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2019/07/edge-chromium-ie-mode-now-works/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18928</post-id>	</item>
		<item>
		<title>Edge Chromium Group Policy Settings</title>
		<link>https://www.grouppolicy.biz/2019/06/edge-chromium-group-policy-settings/</link>
					<comments>https://www.grouppolicy.biz/2019/06/edge-chromium-group-policy-settings/#comments</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Wed, 19 Jun 2019 23:00:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tip]]></category>
		<category><![CDATA[ADMX]]></category>
		<category><![CDATA[Chromium]]></category>
		<category><![CDATA[Group Policy]]></category>
		<category><![CDATA[IE Enterprise Mode]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Windows 7]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=18790</guid>

					<description><![CDATA[Microsoft Edge Chromium Group Policy setting have been released for testing, take a look at how to download the new settings and what settings are still missing. ]]></description>
										<content:encoded><![CDATA[
<p>For all of its issues, Internet Explorer has been the most prolific Group Policy enabled applications ever released. Even the recent versions of Edge with Windows 10 still does not hold up to the old versions of IE when it comes to sheer number of supported settings. This rightly or wrongly gave Group Policy administrators a near infinite of ways to configure the browser. </p>



<p>However the far more popular browser Chrome from Google also has Group Policy support.  So when Microsoft replaced Edge with the Chromium browser a lot IT people started to ask if there would be any similar Group Policy support. As it turns out the answer to this question is YES!</p>



<p>Sean Lyndersay from Microsoft has just <a rel="noreferrer noopener" aria-label="recently posted (opens in a new tab)" href="ttps://techcommunity.microsoft.com/t5/Discussions/Early-preview-of-Microsoft-Edge-group-policies/m-p/693929" target="_blank">recently posted</a> about the new policies that are coming with Edge Chromium edition. In the post he also releases a ZIP file that has a ADM and ADMX templates that can be used to implement the new policy settings. To use the file simple download and unzip the file and copy the ADMX/ADML files into your local C:\Windows\PolicyDefinitions folder. Alternativly you could also copy the files into your Active Directory Central Store, however as these are early templates with limited language support you might want to hold off doing that for now.</p>



<p>Once you have done this open the Group Policy Editor on your computer and you will now see there are new setting under both User and Computer &#8220;Administrative Templates &gt; Microsoft Edge&#8221;. </p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="575" height="982" src="http://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeGPO.png" alt="" class="wp-image-18791" srcset="https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeGPO.png 575w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeGPO-88x150.png 88w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeGPO-176x300.png 176w" sizes="auto, (max-width: 575px) 100vw, 575px" /><figcaption>Microsoft Edge Chromium Group Policy Settings</figcaption></figure>



<p>Note: This is not to be confused with the existing Group Policy settings for the original version of Edge that can be found under &#8220;Administrative Templates &gt; Windows Components &gt; Microsoft Edge&#8221; </p>



<p>Thankfully most of the Group Policy setting that were previously in Chrome have been preserved. This give his new version of Edge a huge head start when provide policy support. Especially when compared to the original version of Edge that had <a href="https://www.grouppolicy.biz/2015/07/edge-group-policy-settings/">servery lacking policy support</a> with only 10 settings. </p>



<p>The ZIP file provided that has been release is only localized for English US and there are no policy settings to manage the update of browser. The update feature will be a very important addition as many organisation might not yet be used to the rapid 6 week release schedule of Chromium. </p>



<p>Also missing are polices to implement IE Enterprise Site Mode list. This is the feature that Edge currently use that can dictate if a web site is opened in the new Edge engine or using the old legacy IE render engine. Unlike previous version of IE Enterprise Site Mode list the new version will run IE in Edge like a normal tab.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="800" height="372" src="http://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeIEMode-800x372.png" alt="" class="wp-image-18798" srcset="https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeIEMode-800x372.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeIEMode-150x70.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeIEMode-300x140.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeIEMode-768x357.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeIEMode.png 1255w" sizes="auto, (max-width: 800px) 100vw, 800px" /><figcaption>Microsoft Edge Chromium IE Enterprise Mode</figcaption></figure>



<p>&#8220;IE mode does not run a separate window. It&#8217;s not even a separate tab. It&#8217;s fully integrated into Edge&#8221;</p>



<p>Once you configure a setting then you will notice that you will get a &#8220;Managed by&#8221; section appear at the bottom of your Managed tab. As you can see below it also shows the source of where the policy setting. In my example below it lists the domain name of the Microsoft Account I am signed into on my computer. </p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="481" height="456" src="http://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeGPO-1.png" alt="" class="wp-image-18794" srcset="https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeGPO-1.png 481w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeGPO-1-150x142.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/EdgeGPO-1-300x284.png 300w" sizes="auto, (max-width: 481px) 100vw, 481px" /><figcaption>How to tell if Edge Chromium is being managed by Group Policy</figcaption></figure>



<p>Then if you then click on this option it will take you to <a href="edge://management">edge://management</a> you then get e description of how the browser is being managed.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="800" height="469" src="http://www.grouppolicy.biz/wp-content/uploads/2019/06/image-2-800x469.png" alt="" class="wp-image-18795" srcset="https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-2-800x469.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-2-150x88.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-2-300x176.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-2-768x450.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-2.png 1024w" sizes="auto, (max-width: 800px) 100vw, 800px" /><figcaption>Microsoft Edge Management</figcaption></figure>



<p>Finally you can then open <a href="edge://policy">edge://policy</a> and actually see all the setting that have been applied to the browser (similar to Chrome). This will be a super handy feature for help desk users and they can easily and quickly see what policy setting are being applied.</p>



<p>In the example below I just have SmartScreenEnable set to true.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="800" height="475" src="http://www.grouppolicy.biz/wp-content/uploads/2019/06/image-3-800x475.png" alt="" class="wp-image-18796" srcset="https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-3-800x475.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-3-150x89.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-3-300x178.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-3-768x456.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2019/06/image-3.png 1152w" sizes="auto, (max-width: 800px) 100vw, 800px" /><figcaption>Microsoft Edge Chromium Policy Settings</figcaption></figure>



<p>I have been a die hard IE and Edge fan all my life. But the new Edge Chromium browser is certainly a great direction for Microsoft. Now with the inclusion of Group Policy Settings, and the future IE Enterprise Mode it certainly makes it compelling for any corporate to seriously look at making Edge the default corporate browser once it is released. </p>



<p>Its also not just for Windows 10 users as you can now download Edge Chromium for Mac, Windows 7, 8.0, and 8.1  <a href="https://blogs.windows.com/msedgedev/2019/06/19/introducing-microsoft-edge-preview-builds-for-windows-7-windows-8-and-windows-8-1/">https://blogs.windows.com/msedgedev/2019/06/19/introducing-microsoft-edge-preview-builds-for-windows-7-windows-8-and-windows-8-1/</a> </p>



<p>So if you want to give the new policy setting a try then download Edge Chromium from  <a href="https://www.microsoftedgeinsider.com/en-us/">https://www.microsoftedgeinsider.com/en-us/</a>  and get the zip file <a href="https://techcommunity.microsoft.com/t5/Discussions/Early-preview-of-Microsoft-Edge-group-policies/m-p/693929">https://techcommunity.microsoft.com/t5/Discussions/Early-preview-of-Microsoft-Edge-group-policies/m-p/693929</a> today.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2019/06/edge-chromium-group-policy-settings/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18790</post-id>	</item>
		<item>
		<title>Security Baseline template for Windows 1903</title>
		<link>https://www.grouppolicy.biz/2019/05/security-baseline-template-for-windows-1903/</link>
					<comments>https://www.grouppolicy.biz/2019/05/security-baseline-template-for-windows-1903/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Mon, 27 May 2019 00:40:18 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[1903]]></category>
		<category><![CDATA[Maximum Password Age]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Security Template]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows Server]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=18720</guid>

					<description><![CDATA[Microsoft has released the latest security template for Windows version (Windows 10 and Windows Server) 1903. These templates contain updated guidance and recommendations as to what setting should or should not be configured to your domain joined PC. The security template is actually just a bunch of reports, documents, GPO backups and tools that are consolidated in a s single...]]></description>
										<content:encoded><![CDATA[
<p>Microsoft has released the latest security template for Windows version (Windows 10 and Windows Server) 1903. These templates contain updated guidance and recommendations as to what setting should or should not be configured to your domain joined PC.  The security template is actually just a bunch of reports, documents, GPO backups and tools that are consolidated in a s single ZIP file.  They are released with every new version of the OS, which ensure that they are also kept up to date with the latest guidance. If you are using Azure AD joined computer the templates are also published via the MDM admin portal. </p>



<p>One of the most notable changes this time is that Microsoft has now dropped the Maximum Password age all together. This means that by default passwords should never naturally expire. 10 years ago suggesting such a change would seem unthinkable but in the past few years many security experts such as Troy Hun have started to recommend this new approach ( <a href="https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/">https://www.troyhunt.com/passwords-evolved-authentication-guidance-for-the-modern-era/</a> ). Even the UK government has changed their recommendation to also not have users password expire ( <a href="https://www.ncsc.gov.uk/collection/passwords">https://www.ncsc.gov.uk/collection/passwords</a> ) . If you are wondering, the logic behind this change is that users that are force to change passwords regularly are by human nature pick something that only change slightly e or simple store the password  in secure like a piece of paper. This of course does not mean users will never have to change passwords, and it is important that you have tools in place for suspicious activity with accounts. So when bad activities are detected like a brute force attempt or when passwords match those on know compromised password lists then users should be prompted to change their password.  </p>



<p>There are also a number of other minor changes, these changes are summaries conveniently in a spreadsheet contained in the zip file.  </p>



<p>Even if you are not yet looking at rolling out Windows 1903 the new guidance and setting can still apply to your older computers and domain policy security settings. So this is a must have download of all security administrators in your organisation. </p>



<p>Download it via  <a href="https://www.microsoft.com/en-us/download/confirmation.aspx?id=55319">https://www.microsoft.com/en-us/download/confirmation.aspx?id=55319</a>   </p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2019/05/security-baseline-template-for-windows-1903/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18720</post-id>	</item>
		<item>
		<title>New and Fixed Group Policy Setting with Windows 10 KB4490481</title>
		<link>https://www.grouppolicy.biz/2019/04/new-and-fixed-group-policy-setting-with-windows-10-kb4490481/</link>
					<comments>https://www.grouppolicy.biz/2019/04/new-and-fixed-group-policy-setting-with-windows-10-kb4490481/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Tue, 02 Apr 2019 22:32:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[hotfix]]></category>
		<category><![CDATA[Soft-Disconnect]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=18447</guid>

					<description><![CDATA[New and fixed Group Policy Setting with Windows 10 KB4490481]]></description>
										<content:encoded><![CDATA[
<p>Microsoft has just released a new rollout KB hotfix for Windows 10 on the 1st April (not joking). What is notable about this update is there is a couple of Group Policy settings that have been fixed and added. </p>



<p>First one is only minor and they have resolved an issues with the policy setting â€œTurn off app notifications on the lock screen&#8221; which can be found under Computer Configuration > Administrative Templates > System > Logo.</p>



<p>The second Group Policy change is they have now added support to configure &#8220;Enable Windows to soft-disconnect a computer from a network&#8221;. What is &#8220;<a href="https://docs.microsoft.com/en-us/windows-hardware/drivers/mobilebroadband/understanding-and-configuring-windows-connection-manager">soft-disconnect&#8221;</a> you ask?  Put simple its a way for a computer to notify application to stop using a specific network interface. If there is an active TCP connection then it will not interrupt that connection. Then after 30 seconds if it still sees that someone or something is using the connection in a significant way (e.g. Skype Call) it will not close the connection. This is far better experience for users, however it can also lead to computer not swapping from wireless to wired connections. It is a default option for Windows 8 and later, so if you want to ensure that network connection are closed then you should disable this policy. </p>



<p>You can download the new update via Windows Update or via the Windows Update Catalog at <a href="https://www.catalog.update.microsoft.com/Search.aspx?q=KB4490481">https://www.catalog.update.microsoft.com/Search.aspx?q=KB4490481</a> . </p>



<p>You can read more about &#8220;soft-disconnect&#8221; at <a href="https://docs.microsoft.com/en-us/windows-hardware/drivers/mobilebroadband/understanding-and-configuring-windows-connection-manager">https://docs.microsoft.com/en-us/windows-hardware/drivers/mobilebroadband/understanding-and-configuring-windows-connection-manager </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2019/04/new-and-fixed-group-policy-setting-with-windows-10-kb4490481/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18447</post-id>	</item>
		<item>
		<title>Security Baseline Recommendation for Windows 10 1809</title>
		<link>https://www.grouppolicy.biz/2018/11/security-baseline-recommendation-for-windows-10-1809/</link>
					<comments>https://www.grouppolicy.biz/2018/11/security-baseline-recommendation-for-windows-10-1809/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Wed, 21 Nov 2018 02:55:04 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17675</guid>

					<description><![CDATA[After its initial release and then withdrawal of Windows 10 1809 update due to a number of potential data loss issues, Microsoft has now again released the OS to wide scale deployment. As a such a number of other release have now come from Microsoft, namely the Security Baseline templates GPO&#8217;s, documentation with recommended guidance and scripts to help secure...]]></description>
										<content:encoded><![CDATA[
<p>After its initial release and then withdrawal of Windows 10 1809 update due to a number of potential data loss issues, Microsoft has now again released the OS to wide scale deployment. As a such a number of other release have now come from Microsoft, namely the Security Baseline templates GPO&#8217;s, documentation with recommended guidance and scripts to help secure your OS.</p>
<p>With each version release of the OS there is always updated guidance. The differences for which can be found at this blog postÂ <a href="https://blogs.technet.microsoft.com/secguide/2018/11/20/security-baseline-final-for-windows-10-v1809-and-windows-server-/">https://blogs.technet.microsoft.com/secguide/2018/11/20/security-baseline-final-for-windows-10-v1809-and-windows-server-/</a> .</p>



<p>It&#8217;s a great resource to download and check if all you want to do is stay current with the latest Microsoft guidelines.Â </p>
<p>Download at:Â <a href="https://msdnshared.blob.core.windows.net/media/2018/11/Windows-10-1809-Security-Baseline-FINAL.zip">https://msdnshared.blob.core.windows.net/media/2018/11/Windows-10-1809-Security-Baseline-FINAL.zip</a></p>



<p>&nbsp;</p>



<p>&nbsp;</p>



<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/11/security-baseline-recommendation-for-windows-10-1809/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17675</post-id>	</item>
		<item>
		<title>New Microsoft Edge MDM and Group Policy Settings</title>
		<link>https://www.grouppolicy.biz/2018/07/new-microsoft-edge-mdm-and-group-policy-settings/</link>
					<comments>https://www.grouppolicy.biz/2018/07/new-microsoft-edge-mdm-and-group-policy-settings/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Thu, 19 Jul 2018 04:47:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Edge]]></category>
		<category><![CDATA[Group Policy]]></category>
		<category><![CDATA[MDM]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17379</guid>

					<description><![CDATA[Microsoft just documented the new policy setting for Microsoft Edge. These settings can be configured via both MDM and Group Policy. To get use the policy settings you need to be running at least Windows 10Â Preview build 17718. Then you can then install Group Policy management Console (now part of Core OS) and trial the new Policy settings. For a...]]></description>
										<content:encoded><![CDATA[<p>Microsoft just documented the new policy setting for Microsoft Edge. These settings can be configured via both MDM and Group Policy. To get use the policy settings you need to be running at least Windows 10Â Preview build 17718. Then you can then install Group Policy management Console (now part of Core OS) and trial the new Policy settings.</p>
<p>For a full list of policy settings and documentation check outÂ <a href="https://docs.microsoft.com/en-us/microsoft-edge/deploy/new-policies">https://docs.microsoft.com/en-us/microsoft-edge/deploy/new-policies</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/07/new-microsoft-edge-mdm-and-group-policy-settings/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17379</post-id>	</item>
		<item>
		<title>Microsoft releases V2 of the Windows 1803 Administrative Templates Pack</title>
		<link>https://www.grouppolicy.biz/2018/07/microsoft-releases-v2-of-the-windows-1803-administrative-templates-pack/</link>
					<comments>https://www.grouppolicy.biz/2018/07/microsoft-releases-v2-of-the-windows-1803-administrative-templates-pack/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Tue, 17 Jul 2018 03:07:11 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Administrative Templates]]></category>
		<category><![CDATA[ADMX]]></category>
		<category><![CDATA[RSAT]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17373</guid>

					<description><![CDATA[Back in May 2018 Microsoft released the Windows 1803 ADMX/ADML file pack . This was par for the course as with each release of Windows Microsoft would also release a new version of the ADMX/ADML Administrative Templates Pack.Â  However, the release in May could cause an error in GPMC if you had previously had an old version of the SerachOCR.ADMX...]]></description>
										<content:encoded><![CDATA[<p>Back in May 2018 Microsoft released the <a href="https://www.grouppolicy.biz/2018/05/administrative-template-for-windows-10-1803/">Windows 1803 ADMX/ADML file pack</a> . This was par for the course as with each release of Windows Microsoft would also release a new version of the ADMX/ADML Administrative Templates Pack.Â  However, the release in May <a href="https://www.grouppolicy.biz/2018/05/how-to-fix-searchocs-admx-error-after-upgrade-to-windows-1803-admx-files/">could cause an error</a> in GPMC if you had previously had an old version of the SerachOCR.ADMX file. This was due to the SearchOCR.ADMX file being missing from the pack. So the ADML (language) definition file would be updated but without the corresponding ADMX thus causing an error when editing Group Policy in GPMC.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-large wp-image-17250" src="http://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-800x587.png" alt="Resource '$(string.Win7Only)' referenced in attribute displayName could not be found. File \\corp.local\SysVol\corp.local\Policies\PolicyDefinitions\SearchOCR.admx, line 12, column 69" width="800" height="587" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-800x587.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-150x110.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-300x220.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-768x564.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-730x536.png 730w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1.png 910w" sizes="auto, (max-width: 800px) 100vw, 800px" /></p>
<p>Microsoft has now release a version 2 of the 1803 Admin Pack and while there is no change log, I can confirm that this pack does have the SearchOCR.ADMX file present, thus if you copy the files over top of the existing folder it will no longer cause the error. To update the ADMX/ADML files simply download and install the MSI file provided. Then copy the &#8220;Policy Definition&#8221; folder from the default &#8220;C:\Program Files (x86)\Microsoft Group Policy\Windows 10 April 2018 Update (1803) v2&#8221; folder into your companies SYSVOL Policy Definition folder (e.g.Â &#92;corp.local\sysvol\corp.local\Policies\PolicyDefinitions ).</p>
<p><strong>Note:</strong> Some people noted that the Microsoft-Windows-Geolocation-WLPAdm.admx and Microsoft-Windows-Messaging-GroupPolicy.admx were also not included and I can also confirm they are still not provided. However, I don&#8217;t believe these files being absent caused any errors.</p>
<p><strong>TIP:</strong> If you don&#8217;t have any custom ADMX/ADML file just rename the &#8220;PolicyDefinitions&#8221; folder to &#8220;PolicyDefinitions_old&#8221; and copy the new folder into the same directory. This way if you are missing any files from the folder then you still have a copy available that you can quickly copy back. If not, just copy the folder over top of the existing files as any custom ADMX/ADML will not be removed.</p>
<p>Download the V2 of the Administrative Templates for Windows 1803 fromÂ <a href="https://www.microsoft.com/en-us/download/details.aspx?id=56880">https://www.microsoft.com/en-us/download/details.aspx?id=56880</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/07/microsoft-releases-v2-of-the-windows-1803-administrative-templates-pack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17373</post-id>	</item>
		<item>
		<title>Group Policy Hotfix for Defender Mitigation Options Error</title>
		<link>https://www.grouppolicy.biz/2018/07/group-policy-hotfix-for-defender-mitigation-options-error/</link>
					<comments>https://www.grouppolicy.biz/2018/07/group-policy-hotfix-for-defender-mitigation-options-error/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Thu, 12 Jul 2018 07:54:00 +0000</pubDate>
				<category><![CDATA[KB Focus]]></category>
		<category><![CDATA[Defender]]></category>
		<category><![CDATA[hotfix]]></category>
		<category><![CDATA[KB4338819]]></category>
		<category><![CDATA[Mitigation Option]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17352</guid>

					<description><![CDATA[Just a quick note that Microsoft has recently release a hot fix KB4338819 that fixes and issue with the Mitigation option. This is a Windows Defender setting that can be found under the Administrative Templates&#62;Computers&#62;System&#62;Mitigation Options setting. The fix is described as: Addresses an issue that may cause the Mitigation Options Group Policy client-side extension to fail during GPO processing....]]></description>
										<content:encoded><![CDATA[<p>Just a quick note that Microsoft has recently release a hot fix KB4338819 that fixes and issue with the Mitigation option. This is a Windows Defender setting that can be found under the Administrative Templates&gt;Computers&gt;System&gt;Mitigation Options setting.</p>
<p>The fix is described as:</p>
<blockquote><p><span>Addresses an issue that may cause the Mitigation Options Group Policy client-side extension to fail during GPO processing. The error message is â€œWindows failed to apply the MitigationOptions settings. MitigationOptions settings might have its own log fileâ€ or â€œProcessGPOList: Extension MitigationOptions returned 0xea.â€ This issue occurs when Mitigation Options has been defined either manually or by Group Policy on a machine using Windows Defender Security Center or the PowerShell Set-ProcessMitigation cmdlet. </span></p></blockquote>
<p>Source: <a href="https://support.microsoft.com/en-us/help/4338819/windows-10-update-kb4338819">https://support.microsoft.com/en-us/help/4338819/windows-10-update-kb4338819</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/07/group-policy-hotfix-for-defender-mitigation-options-error/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17352</post-id>	</item>
		<item>
		<title>Remote Server Admin Tools Now provided in Windows 10</title>
		<link>https://www.grouppolicy.biz/2018/06/remote-server-admin-tools-now-provided-in-windows-10/</link>
					<comments>https://www.grouppolicy.biz/2018/06/remote-server-admin-tools-now-provided-in-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Thu, 31 May 2018 23:55:22 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Feature on Demand]]></category>
		<category><![CDATA[RSAT]]></category>
		<category><![CDATA[Window 10]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17273</guid>

					<description><![CDATA[If you have followed this blog you would know that the Remote Server Admin Tools are an essential set of tools for managed Group Policy, Active Directory and almost all other core components of Windows Server. These tools can be installed on demand if you are running Windows Server. But if you wanted to do the remote management from a...]]></description>
										<content:encoded><![CDATA[<p><span style="margin: 0px; color: #5f5e5e; font-family: '&amp;quot',serif; font-size: 14pt;">If you have followed this blog you would know that the Remote Server Admin Tools are an essential set of tools for managed Group Policy, Active Directory and almost all other core components of Windows Server. These tools can be installed on demand if you are running Windows Server. But if you wanted to do the remote management from a Windows Client OS then you needed to download and install the RSAT tool as a separate Windows Update package. </span></p>
<p><span style="margin: 0px; color: #5f5e5e; font-family: '&amp;quot',serif; font-size: 14pt;">But as of Windows 10 Insider Preview build 17682 this has now changed and you can now optional install on demand RSAT tools in your Windows client OS.</span></p>
<p><span style="color: #000000; font-family: Times New Roman;"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-17274" src="https://www.grouppolicy.biz/wp-content/uploads/2018/06/FOD-800x777.png" alt="Windows 10 Feature on demand RSAT" width="730" height="709" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/06/FOD-800x777.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2018/06/FOD-150x146.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/06/FOD-300x291.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2018/06/FOD-768x745.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2018/06/FOD-730x709.png 730w, https://www.grouppolicy.biz/wp-content/uploads/2018/06/FOD.png 1498w" sizes="auto, (max-width: 730px) 100vw, 730px" /></span></p>
<p><span style="margin: 0px; color: #5f5e5e; font-family: '&amp;quot',serif; font-size: 14pt;">The great thing about making it part of the Core OS is that it is now kept up to date whenever you receive a new OS version. This means you no longer have to seek out the latest and greatest GPMC version when managing Group Policy as you will always have the latest version installed. </span></p>
<p><span style="margin: 0px; color: #5f5e5e; font-family: '&amp;quot',serif; font-size: 14pt;">Microsoft is also asking feedback on having RSAT as part of the OS so if you think itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s a great idea then definitely put your feedback in via <a href="http://aka.ms/rsatfeedback">http://aka.ms/rsatfeedback</a> </span></p>
<p><span style="margin: 0px; color: #5f5e5e; font-family: '&amp;quot',serif; font-size: 14pt;">Source: <a href="https://blogs.windows.com/windowsexperience/2018/05/31/announcing-windows-10-insider-preview-build-17682/#sKM6Z3Q4CxWWoaCE.97">https://blogs.windows.com/windowsexperience/2018/05/31/announcing-windows-10-insider-preview-build-17682/#sKM6Z3Q4CxWWoaCE.97</a> </span><span style="margin: 0px; color: #5f5e5e; font-family: '&amp;quot',serif; font-size: 14pt;">Â </span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/06/remote-server-admin-tools-now-provided-in-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17273</post-id>	</item>
		<item>
		<title>Changes to how the Start Menu is Managed using Group Policy</title>
		<link>https://www.grouppolicy.biz/2018/05/changes-to-how-the-start-menu-is-managed-using-group-policy/</link>
					<comments>https://www.grouppolicy.biz/2018/05/changes-to-how-the-start-menu-is-managed-using-group-policy/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Tue, 29 May 2018 16:02:31 +0000</pubDate>
				<category><![CDATA[Tip]]></category>
		<category><![CDATA[1803]]></category>
		<category><![CDATA[Group Policy]]></category>
		<category><![CDATA[start menu]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17239</guid>

					<description><![CDATA[Matt Call from Microsoft has just blog the different with describes the impact of no longer being able to customise the Windows Start menu using the Default Users Profile. In case you did not know you could previously set a users start menu by baking the layout into the Windows OS image default users profile by using a CopyProfile process....]]></description>
										<content:encoded><![CDATA[<p><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">Matt Call from Microsoft has just blog the different with describes the impact of no longer being able to customise the Windows Start menu using the Default Users Profile. In case you did not know you could previously set a users start menu by baking the layout into the Windows OS image default users profile by using a CopyProfile process. This has now been removed and his article goes into how to deal with the way to order the process to avoid issues. So check out his post at <a href="https://blogs.technet.microsoft.com/mattcall/2018/05/11/copyprofile-and-the-start-menu-wheres-my-start-menu/">https://blogs.technet.microsoft.com/mattcall/2018/05/11/copyprofile-and-the-start-menu-wheres-my-start-menu/Â </a> . </span></p>
<p><span style="font-family: 'Georgia',serif;">I<span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">f you want to see how to manage the Start Menu via Group Policy normally you can check out my post at <a href="https://www.grouppolicy.biz/2013/06/customising-windows-8-1-start-screen-layout-with-group-policy/">https://www.grouppolicy.biz/2013/06/customising-windows-8-1-start-screen-layout-with-group-policy/</a></span></span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/05/changes-to-how-the-start-menu-is-managed-using-group-policy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17239</post-id>	</item>
		<item>
		<title>Windows 10 1803 Group Policy and Security Baseline Template</title>
		<link>https://www.grouppolicy.biz/2018/05/17238/</link>
					<comments>https://www.grouppolicy.biz/2018/05/17238/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Mon, 28 May 2018 16:00:45 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[1803]]></category>
		<category><![CDATA[Baseline]]></category>
		<category><![CDATA[Security Template]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17238</guid>

					<description><![CDATA[The latest version of the Windows 10 1803 security templates have been released to the public. These are the new Microsoft recommend guidance for securing Windows in an organisation. These settings are normally tighter than the Out of the Box settings, but are normally acceptable in a workplace environment. Historically these used to be available via the Microsoft Security Management...]]></description>
										<content:encoded><![CDATA[<p><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">The latest version of the Windows 10 1803 security templates have been released to the public. These are the new Microsoft recommend guidance for securing Windows in an organisation. These settings are normally tighter than the Out of the Box settings, but are normally acceptable in a workplace environment. Historically these used to be available via the Microsoft Security Management Tool, however this has now been depreciated and the new template are only being released via a ZIP file. That being said it is a very comprehensive list of documents, settings and tools that can be used to help with you security settings. </span></p>
<p><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">Documentation: This folder has a number of reference documents about the settings including the changes since the last version. This is very handy for keeping track of what guidance has changed</span></p>
<ul>
<li><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">GPO Reports: These are HTML version of the Group Policy Backups that are provided in the ZIP. They have a full list of all the setting that are applied.</span></li>
<li><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">GPOs: This is a backup of Group Policy Objects that you can import into your own environment that have all the security settings pre-configured. The is a real time saver as you donâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t have to transcribe the setting from the documentation. </span></li>
<li><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">Local Scripts: This contains some scripts that are used for undoing some security settings on computer that are non-domain joined. This is handy as non-domain joined computer sometimes need to be managed via local accounts and these scripts will remove these restrictions. </span></li>
<li><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">Templates: These contain a few Group Policy ADMX files that are additional security settings that can be applied. Some of these are not traditional (a.k.a. Managed) Group Policy settings so they are not provide with the Out of the Box ADMX files that come with Windows. These include the Local Admin Password Service (a.k.a. LAPS) policy settings, some of the few remaining MSS security settings or the Microsoft Security Guidance Mitigations (e.g. disabling SMB1) settings.</span></li>
<li><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">WMI Filters: This folder contains two WMI filters that can be imported in as GPO WMI Filter. These definitions are used for targeting Group Policy object explicitly to Internet Explore 11 and Windows 10. </span></li>
</ul>
<p><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">Download the Security Baseline now for Windows 10 1803 now via <a href="https://blogs.technet.microsoft.com/secguide/2018/04/30/security-baseline-for-windows-10-april-2018-update-v1803-final/">https://blogs.technet.microsoft.com/secguide/2018/04/30/security-baseline-for-windows-10-april-2018-update-v1803-final/</a> </span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/05/17238/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17238</post-id>	</item>
		<item>
		<title>Group Policy Updated to support 20 Character Minimum Password Length</title>
		<link>https://www.grouppolicy.biz/2018/05/group-policy-updated-to-support-20-character-minimum-password-length/</link>
					<comments>https://www.grouppolicy.biz/2018/05/group-policy-updated-to-support-20-character-minimum-password-length/#comments</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Mon, 28 May 2018 00:33:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Active Directory]]></category>
		<category><![CDATA[Minimum Password Length]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17259</guid>

					<description><![CDATA[Until recently it was not possible to set the default domain password length via GPMC to anything longer that 14 characters (see below). This limit was enforced via the UI but it was possible to set a password value longer manually if the user chose a longer password. Most likely the reason that this limit was enforced was that the...]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000; font-family: Calibri;">Until recently it was not possible to set the default domain password length via GPMC to anything longer that 14 characters (see below). This limit was enforced via the UI but it was possible to set a password value longer manually if the user chose a longer password. Most likely the reason that this limit was enforced was that the LM Password hash limit for Windows 98 and NT 4 was 14 characters.Â </span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-17263" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength1-2.png" alt="14 Character Password Length Active Directory" width="460" height="221" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength1-2.png 728w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength1-2-150x72.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength1-2-300x144.png 300w" sizes="auto, (max-width: 460px) 100vw, 460px" /></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-17264" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength2-1.png" alt="14 Character Password Length Active Directory Explain Text" width="460" height="560" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength2-1.png 728w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength2-1-123x150.png 123w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength2-1-246x300.png 246w" sizes="auto, (max-width: 460px) 100vw, 460px" /></p>
<p><span style="color: #000000; font-family: Calibri;">But good news, with the release of the latest version of </span><span style="font-family: Calibri;"><a href="https://www.grouppolicy.biz/2018/05/whats-new-with-group-policy-in-windows-10-1803/">GPMC for Windows 10 1803</a> Micr<span style="color: #000000;">osoft has now changed this UI limit value to 20 characters.Â </span></span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-17265 size-full" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength3-e1527466432191.png" alt="20 Character Minimum Password Length Active Directory" width="460" height="227" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength3-e1527466432191.png 460w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength3-e1527466432191-150x74.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength3-e1527466432191-300x148.png 300w" sizes="auto, (max-width: 460px) 100vw, 460px" /> <img loading="lazy" decoding="async" class="alignnone wp-image-17266 size-full" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/PasswordLength4-e1527466449561.png" alt="20 Character Minimum Password Length Active Directory Explain Text" width="460" height="560" /></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">However, </span><a href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/hh994560(v%3dws.10)">Microsoft still warns that</a></span><span style="color: #000000; font-family: Calibri;">:</span></p>
<p><span style="color: #000000; font-family: Calibri;">â€œ</span><span style="margin: 0px; color: black; font-family: 'Segoe UI',sans-serif;">Older versions of Windows (such as Windows 98 and Windows NT 4.0) do not support passwords that are longer than 14 characters. Computers that run these older operating systems are unable to authenticate with computers or domains that use accounts that require long passwords.â€.</span></p>
<p><span style="margin: 0px; color: black; font-family: 'Segoe UI',sans-serif;">So as always, test carefully before rolling out this setting and be sure that you do not have any legacy device still running on your domain before you set this option.</span><span style="color: #000000; font-family: Calibri;">Â </span></p>
<p><span style="color: #000000; font-family: Calibri;">Another thing to be cautious of is that if an admin attempts to change this setting via an older version of GPMC then it will force the minimum length back to 14 characters. But this is just another reason why you should always have the latest version of GPMC installed in your environment. </span></p>
<p><span style="color: #000000; font-family: Calibri;">So now you can go forth and force longer passwords for all&#8230; HORAA!!! But if you are going to increase the minimum password length consider also implementing some of the other current guidance and for the sake of the users sanity. For example it is now recommend by some that removing maximum password age and complexity (seeÂ <a href="https://www.ncsc.gov.uk/guidance/password-guidance-simplifying-your-approach">https://www.ncsc.gov.uk/guidance/password-guidance-simplifying-your-approach</a>Â  ) is actually more secure especially when you have a longer password that is more conducive to picking a phrase rather than just one word. In any case, the new raised minimum value as an option is welcome change&#8230;</span></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">Source: </span><a href="https://twitter.com/PyroTek3/status/1000565062501888001">https://twitter.com/PyroTek3/status/1000565062501888001</a></span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/05/group-policy-updated-to-support-20-character-minimum-password-length/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17259</post-id>	</item>
		<item>
		<title>Remote Server Admin Tools for Windows 10 1803</title>
		<link>https://www.grouppolicy.biz/2018/05/whats-new-with-group-policy-in-windows-10-1803/</link>
					<comments>https://www.grouppolicy.biz/2018/05/whats-new-with-group-policy-in-windows-10-1803/#comments</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Sun, 27 May 2018 22:42:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[1803]]></category>
		<category><![CDATA[Remote Server Admin Tool]]></category>
		<category><![CDATA[RSAT]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17234</guid>

					<description><![CDATA[Microsoft has now release the production version of the Remote Server Admin Tools. These are of course the essential tools that for managing Group Policy (and many other server functions). As I always remind you it is imperative that you always have the latest version of GPMC as this is the most current version of the Group Policy tools. You...]]></description>
										<content:encoded><![CDATA[<p><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">Microsoft has now release the production version of the Remote Server Admin Tools. These are of course the essential tools that for managing Group Policy (and many other server functions). As I always remind you it is imperative that you always have the latest version of GPMC as this is the most current version of the Group Policy tools.</span></p>
<p><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">You can now download them now from <a href="https://www.microsoft.com/en-us/download/details.aspx?id=45520">https://www.microsoft.com/en-us/download/details.aspx?id=45520</a></span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/05/whats-new-with-group-policy-in-windows-10-1803/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17234</post-id>	</item>
		<item>
		<title>How to fix SearchOCS.ADMX Error after upgrade to Windows 1803 ADMX files</title>
		<link>https://www.grouppolicy.biz/2018/05/how-to-fix-searchocs-admx-error-after-upgrade-to-windows-1803-admx-files/</link>
					<comments>https://www.grouppolicy.biz/2018/05/how-to-fix-searchocs-admx-error-after-upgrade-to-windows-1803-admx-files/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Mon, 21 May 2018 00:09:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tip]]></category>
		<category><![CDATA[ADML]]></category>
		<category><![CDATA[ADMX]]></category>
		<category><![CDATA[Error]]></category>
		<category><![CDATA[GPMC]]></category>
		<category><![CDATA[SearchOCR.ADMX]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17249</guid>

					<description><![CDATA[With the recent release of the Windows 10 1803 Microsoft also released a new version of the ADMX/ADML files that corresponds to the new Group Polices with the OS (see https://www.grouppolicy.biz/2018/05/administrative-template-for-windows-10-1803/ ) . Normally upgrading these policy files are as simple overwriting them into your â€œPolicyDefinitionsâ€ folder in your SYSVOL. However the SearchOCR.ADMX file that is not part of the...]]></description>
										<content:encoded><![CDATA[<p>With the recent release of the Windows 10 1803 Microsoft also released a new version of the ADMX/ADML files that corresponds to the new Group Polices with the OS (see <a href="https://www.grouppolicy.biz/2018/05/administrative-template-for-windows-10-1803/">https://www.grouppolicy.biz/2018/05/administrative-template-for-windows-10-1803/</a> ) . Normally upgrading these policy files are as simple overwriting them into your â€œPolicyDefinitionsâ€ folder in your SYSVOL. However the SearchOCR.ADMX file that is not part of the ADMX/ADML nor is it included by default in the local â€œC:\Windows\PoliciyDefinitionsâ€ folder. But the same PolicyDefinitions pack does have the corresponding SearchOCR.ADML files. This means even if you have extracted the ADMX/ADML files and overwritten them in the ADMX/ADML Central Store then the SearchOCR.ADMX file won&#8217;t updated but the SearchOCR.ADML file will be.</p>
<p>This version mismatch until lately this has not been an issues, but the latest version of the ADML has a line missing that does not working with older versions of the SearchOCR.ADMX (see below).</p>
<p><img loading="lazy" decoding="async" class="alignnone size-large wp-image-17250" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-800x587.png" alt="Resource '$(string.Win7Only)' referenced in attribute displayName could not be found. File \\corp.local\SysVol\corp.local\Policies\PolicyDefinitions\SearchOCR.admx, line 12, column 69" width="730" height="536" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-800x587.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-150x110.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-300x220.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-768x564.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1-730x536.png 730w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/SearchOCRError1.png 910w" sizes="auto, (max-width: 730px) 100vw, 730px" /></p>
<p>I can confirm with my testing that this is a problem if you still have a copy of the SearchOCR.ADMX file that is as old or older that Windows 10 1503.</p>
<p>So where does this SearchOCR.ADMX file come from if it does not come with Windows out of the box? Â The answer is that it&#8217;s installed if you have the â€œWindows TIFF Ifilterâ€ component installed. This then adds the SearchOCR.ADMX file to the local â€œC:\Windows\PolicyDefinitionsâ€ folder.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-17251" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/TIFFSearch1-300x267.png" alt="Install Windows TIFF IFilter" width="300" height="267" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/TIFFSearch1-300x267.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/TIFFSearch1-150x133.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/TIFFSearch1.png 725w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>If you then at some stage copied the â€œPolicyDefinitionsâ€ folder from a computer with the â€œWindows TIFF IFilterâ€ installed then you will have the â€œSearchOCR.ADMXâ€ file in your central store. But as the ADMX/ADML policy pack or new version of Windows does not have this ADMX included by default when you overwrite the store this SearchOCR.ADMX file is not updated.</p>
<p>So to fix this problem there are a number of choices:</p>
<ol>
<li>You can hand edit the relevant SearchOCR.ADML file and search for:</li>
</ol>
<blockquote><p>&lt;string id=&#8221;OCR&#8221;&gt;OCR&lt;/string&gt;</p>
<p>&lt;string id=&#8221;OCREveryPage&#8221;&gt;Force TIFF IFilter to perform OCR for every page in a TIFF document</p></blockquote>
<p>then add the line given below between them:</p>
<blockquote><p>&lt;string id=&#8221;OCR&#8221;&gt;OCR&lt;/string&gt;</p>
<p><strong>&lt;string id=&#8221;Win7Only&#8221;&gt;Microsoft Windows 7 or later&lt;/string&gt;</strong></p>
<p>&lt;string id=&#8221;OCREveryPage&#8221;&gt;Force TIFF IFilter to perform OCR for every page in a TIFF document</p></blockquote>
<p><strong>Note:</strong> I donâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t recommend this method as hand editing a file even as benign as an ADML file can have issues. To fix the problem properly you also have to change it for all language versions would take a lot of effort.</p>
<ol start="2">
<li>If you do not use the Windows TIFF Ifilter group policy setting you can simply delete the â€œSearchOCR.ADMXâ€ file. This of course means you will not longer have these relevant search settings listed in GPMC editor.</li>
<li>You can install the â€œWindows TIFF IFilterâ€ component on any version of Windows greater than Windows 10/Server 1603 and then manually copy the latest â€œSearchOCR.ADMXâ€ file to the â€œPolicyDefinitionsâ€ folder. This will give you a matching version of the ADMX and ADML file which will resolve the problem.</li>
</ol>
<p>So itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s a simple enough issue, just remove or replace the relevant â€œSearchOCR.ADMXâ€ file and the problem will be fixed.</p>
<p>Reference: <a href="https://social.technet.microsoft.com/Forums/en-US/cb97affb-9724-457b-a113-32cbd3d53331/searchocradmx-error-after-installing-win101803-admx-templates?forum=winserverGP">https://social.technet.microsoft.com/Forums/en-US/cb97affb-9724-457b-a113-32cbd3d53331/searchocradmx-error-after-installing-win101803-admx-templates?forum=winserverGP</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/05/how-to-fix-searchocs-admx-error-after-upgrade-to-windows-1803-admx-files/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17249</post-id>	</item>
		<item>
		<title>Administrative Template for Windows 10 1803</title>
		<link>https://www.grouppolicy.biz/2018/05/administrative-template-for-windows-10-1803/</link>
					<comments>https://www.grouppolicy.biz/2018/05/administrative-template-for-windows-10-1803/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Sun, 20 May 2018 13:58:05 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17236</guid>

					<description><![CDATA[With every new version of Windows Microsoft releases more Group Policy settings to support newer features. Ever since the release of Windows 7 all the new Group Policy settings have been exclusive released as Administrative Templates. These Administrative Templates (a.k.a. ADMX) files are text files that are used to define the Group Policy Administrative Template settings. There are always two...]]></description>
										<content:encoded><![CDATA[<p><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">With every new version of Windows Microsoft releases more Group Policy settings to support newer features. Ever since the release of Windows 7 all the new Group Policy settings have been exclusive released as Administrative Templates. These Administrative Templates (a.k.a. ADMX) files are text files that are used to define the Group Policy Administrative Template settings. There are always two way to get the latest version of these file you can either go to the C:\Windows\PolicyDefenitions folder on the latest version of Windows; or you can download the ADMX files directly from Microsoft. This second method is handy as you may want to ensure that you have the latest policy setting available for use before you add that newest version of the OS to your network. </span></p>
<p><span style="margin: 0px; color: #333333; font-family: 'Georgia',serif; font-size: 12pt;">You can grab the latest Windows 10 1803 Administrative ADMX templates from <a href="https://www.microsoft.com/en-us/download/details.aspx?id=56880">https://www.microsoft.com/en-us/download/details.aspx?id=56880</a> </span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/05/administrative-template-for-windows-10-1803/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17236</post-id>	</item>
		<item>
		<title>What is Windows Admin Center</title>
		<link>https://www.grouppolicy.biz/2018/05/17240/</link>
					<comments>https://www.grouppolicy.biz/2018/05/17240/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Wed, 16 May 2018 05:57:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Windows Admin Center]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17240</guid>

					<description><![CDATA[Have you ever found it hard to figure out what tool you need to manage Windows, sometime itâ€™s an MMC other times you need to go via Control Panel or you need to launch Server Manager? To help with this Microsoft has now released Windows Admin Center so that IT admin can now use a single UI pane to manage...]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000; font-family: Calibri;">Have you ever found it hard to figure out what tool you need to manage Windows, sometime itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s an MMC other times you need to go via Control Panel or you need to launch Server Manager? To help with this Microsoft has now released Windows Admin Center so that IT admin can now use a single UI pane to manage the most common admin tasks. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17241" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC1.png" alt="" width="1609" height="478" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC1.png 1609w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC1-150x45.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC1-300x89.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC1-768x228.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC1-800x238.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC1-730x217.png 730w" sizes="auto, (max-width: 1609px) 100vw, 1609px" /></p>
<p><span style="color: #000000; font-family: Calibri;">This tool is a web-based system that works with either Chrome or Edge (sorry IE). </span></p>
<p><span style="color: #000000; font-family: Times New Roman;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17242" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC2.png" alt="" width="1377" height="603" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC2.png 1377w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC2-150x66.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC2-300x131.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC2-768x336.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC2-800x350.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC2-730x320.png 730w" sizes="auto, (max-width: 1377px) 100vw, 1377px" /><img loading="lazy" decoding="async" src="file:///C:/Users/ALAN~1.BUR/AppData/Local/Temp/msohtmlclip1/01/clip_image004.jpg" width="601" height="263" /></span></p>
<p><span style="color: #000000; font-family: Calibri;">As you can see on the left of the image above there is a wide range of tasks that you can do using this tool, but my most favourite one is the Remote Desktop option that allows you to open a Remote Desktop connection to the server with nothing more than a web browser.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17243" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC3.png" alt="" width="2087" height="1042" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC3.png 2087w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC3-150x75.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC3-300x150.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC3-768x383.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC3-800x399.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC3-730x364.png 730w" sizes="auto, (max-width: 2087px) 100vw, 2087px" /></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">The architecture allows this tool be installed on a single Windows Server OS that publishes the management web page. This computer hosting the web site then acts as a proxy for the management task remotely to multiple computers.</span></span></p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17244" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC4.png" alt="" width="444" height="387" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC4.png 444w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC4-150x131.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC4-300x261.png 300w" sizes="auto, (max-width: 444px) 100vw, 444px" /></p>
<p>&nbsp;</p>
<p><span style="color: #000000;"><span style="font-family: Calibri;">Â The good thing about this is that you do <em>not</em> need to install Windows Admin Center on all your computers to be able to management them. But if you are not running Windows Server 2016 or Windows 10 then you will need to </span><span style="margin: 0px; font-family: 'Segoe UI',sans-serif;">download and install </span></span><span style="font-family: Calibri;"><span style="color: #000000;">the Windows Management Framework v5.1 ( </span><a href="https://www.microsoft.com/en-us/download/details.aspx?id=54616">https://www.microsoft.com/en-us/download/details.aspx?id=54616</a></span><span style="color: #000000; font-family: Calibri;"> ). Â Another feature of the product is that it integrates with Windows Azure so you can publish you Admin Centre web page online via Azure authentication that allow extra features such as 2FA and conditional access. Once this is done you can have a web page that is accessible anywhere in the world from almost any computer in the world and be able to manage your servers using 2FA authentication. </span></p>
<p><span style="color: #000000; font-family: Calibri;">Alternatively, if you just want to check out the product on a isolated Windows 10 computer is â€œDesktop Modeâ€. This version only allows you to access the management web page from the local computer running the service.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-17245" src="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC-Desktop.png" alt="" width="135" height="260" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC-Desktop.png 135w, https://www.grouppolicy.biz/wp-content/uploads/2018/05/WAC-Desktop-78x150.png 78w" sizes="auto, (max-width: 135px) 100vw, 135px" /></p>
<p><span style="color: #000000; font-family: Calibri;">On top of the out of the box feature that Admin Center offers it also excellent support for additional add-on meaning that we are likely to see many other first part and third-party product integrates as well. One example of this is the new Storage Migration Tool that is fully manageable using Admin Center. Also, third parties like DataOn, Fujitsu and Squared Up already have third party integrates in the works or available. </span></p>
<p><span style="color: #000000; font-family: Calibri;">Having played with this product for a while now it is great to see that Microsoft is still supporting a first class management experience that can be perform via the UI. While PowerShell is still a important management tool to learn this certainly makes an IT admins life a lot easier by giving them a point and click UI that is easy to use. </span></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">For more information and to download the release version of Windows Admin Center go to </span><a href="https://docs.microsoft.com/en-us/windows-server/manage/windows-admin-center/understand/windows-admin-center">https://docs.microsoft.com/en-us/windows-server/manage/windows-admin-center/understand/windows-admin-center</a></span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/05/17240/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17240</post-id>	</item>
		<item>
		<title>How to implement the ASD Essential 8 via Group Policy</title>
		<link>https://www.grouppolicy.biz/2018/03/how-to-implement-the-asd-essential-8-via-group-policy/</link>
					<comments>https://www.grouppolicy.biz/2018/03/how-to-implement-the-asd-essential-8-via-group-policy/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 00:28:10 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[ADS]]></category>
		<category><![CDATA[AppLocker]]></category>
		<category><![CDATA[Australian Security Directorate]]></category>
		<category><![CDATA[Essential 8]]></category>
		<category><![CDATA[Group Policy]]></category>
		<category><![CDATA[Jave]]></category>
		<category><![CDATA[Office 2013]]></category>
		<category><![CDATA[Office 2016]]></category>
		<category><![CDATA[wsus]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17138</guid>

					<description><![CDATA[The Australian Government Department called the Australian Signals Directorate has a list of mitigation strategies that is used to help protect IT system against security risks. This list is called the &#8220;ASD Essential 8&#8220;. While this its generated by the Australian Government department it is an excellent starting point for securing any organisation or government IT Assets. The really great...]]></description>
										<content:encoded><![CDATA[<p>The Australian Government Department called the <a href="https://www.asd.gov.au/">Australian Signals Directorate</a> has a list of mitigation strategies that is used to help protect IT system against security risks. This list is called the &#8220;<a href="https://www.asd.gov.au/publications/protect/essential-eight-explained.htm">ASD Essential 8</a>&#8220;. While this its generated by the Australian Government department it is an excellent starting point for securing any organisation or government IT Assets. The really great thing about this list is all of the items on the list can at least be partially implemented via Group Policy and the documentations they provide give explicit examples of policy setting that should be implemented.</p>
<p>It also happens that over the years I have published a number of articles that go into detail as to hope to actually implement some of the items via Group Policy. So below I go though as summary of the essential 8 and link to mine and other post as to how to actually implemented these configurations.</p>
<p><a href="https://www.asd.gov.au/publications/protect/application_whitelisting.htm"><b>Application whitelisting</b></a><b></b></p>
<p>Since Windows 7 AppLocker has been the main way that admins can black/white list application. This software is provided out of the box and there is a relatively simple UI in GPMC that allows you to configure what programs are required. Specifically the guidelines calls out â€œthe use of cryptographic hashes, publisher certificates (combining both publisher names and product names), absolute paths and parent folders are all considered suitable if implemented correctly.â€ which is exactly how AppLocker configures what application to run.</p>
<p><span style="font-family: Calibri;">On my site I have two main article about AppLocker, First is the a <a href="https://www.grouppolicy.biz/2010/04/how-to-configure-applocker-group-policy-in-windows-7-to-block-third-party-browsers/">How to Disable Application using AppLocker</a> post that show you how to block an example application (Chrome) and the other is my <a href="https://www.grouppolicy.biz/2013/04/how-to-troubleshoot-applocker/">AppLocker Troubleshooting</a> guide that helps with common reason as to why AppLocker does not work.</span></p>
<p>In this case AppLocker is probably the system of choice to implement this, itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s free, out of the box and has a wide range of options for blocking applications.</p>
<p><a href="https://www.asd.gov.au/publications/protect/assessing_security_vulnerabilities_and_patches.htm"><b>Patch applications</b></a><b></b></p>
<p>For a Microsoft environment WSUS has long been the go to product for patching Microsoft products (not just the OSâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s) . It supports patching for a very a wide range of Microsoft Application but give IT Admins control over exactly when and what will be deployed.</p>
<p>The guidance in the ASD article also talks about establishing a priority for deploying patches based on the criticality of the patch.</p>
<p>For example they recommend:</p>
<p><em><span style="font-family: Calibri;">a.</span><span style="margin: 0px; line-height: normal; font-family: 'Times New Roman'; font-size: 7pt; font-variant: normal; font-weight: normal; font-size-adjust: none; font-stretch: normal;">Â Â Â Â Â  </span><span style="font-family: Calibri;"><b>extreme risk:</b> within 48 hours of a patch being released </span></em></p>
<p><em><span style="font-family: Calibri;">b.</span><span style="margin: 0px; line-height: normal; font-family: 'Times New Roman'; font-size: 7pt; font-variant: normal; font-weight: normal; font-size-adjust: none; font-stretch: normal;">Â Â Â Â Â  </span><span style="font-family: Calibri;"><b>high risk:</b> within two weeks of a patch being released</span></em></p>
<p><em><span style="font-family: Calibri;">c.</span><span style="margin: 0px; line-height: normal; font-family: 'Times New Roman'; font-size: 7pt; font-variant: normal; font-weight: normal; font-size-adjust: none; font-stretch: normal;">Â Â Â Â Â Â  </span></em><span style="font-family: Calibri;"><em><b>moderate or low risk:</b> within one month of a patch being released.</em> </span></p>
<p><span style="display: inline !important; float: none; background-color: transparent; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;">Back in 2011 I wrote a comprehensive post about how to use WSUS to deploy a patching strategy for your organisation </span><a href="https://www.grouppolicy.biz/2011/06/best-practices-group-policy-for-wsus/">https://www.grouppolicy.biz/2011/06/best-practices-group-policy-for-wsus/</a><span style="display: inline !important; float: none; background-color: transparent; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"> . </span></p>
<p>There are certainly other applications such as SCCM (which leverages WSUS), Altiris and many other systems that can be used to patch your environment. What is important is that you have a method of patching all your third party applications and not just you Microsoft software. As not a lot of vendors have dedicate patching tools this may mean that you have a way to rapidly deploy newer version of the apps when they are release. Either way, make sure you have a way to path <em>ALL</em> you applications (especially Java).</p>
<p><b>User application hardening</b></p>
<p>In this case the A.S.D. talk about ways to harden <a href="https://www.asd.gov.au/publications/protect/hardening-ms-office-2013.htm">Microsoft Office 2013</a>, <a href="https://www.asd.gov.au/publications/protect/hardening-ms-office-2016.htm">2016</a> and <a href="https://www.asd.gov.au/publications/protect/minimising_java_threats.htm">Java</a>. However, this just talks about common application that you might have installed and should not be treated as an exhaustive list of application to secure. For example if you have Chrome deployed then this can also be secured using <a href="https://support.google.com/chrome/a/answer/187202?hl=en">Chrome Group Policy settings</a>.</p>
<p>But if you donâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t have applications that are Group Policy aware then you might want to consider using third party GPO tools such as Policy Pack <a href="https://www.policypak.com/">https://www.policypak.com/</a> to mange all your legacy applications. One added advantage of Policy Pak is that it allows you to easily manage installed version Java on your computers.</p>
<p><b>Restrict administrative privileges</b></p>
<p>Local administration access to computer used to be something that admin gave out like candy to their users. However, for some time now it has been strongly recommended that users are never give local admin permissions or at the very least they should be using separate admin and normal user accounts on their computers.</p>
<p>For a comprehensive artical as to how to security the local admin group on your comptuers see my postÂ <a href="https://www.grouppolicy.biz/2010/01/how-to-use-group-policy-preferences-to-secure-local-administrator-groups/">https://www.grouppolicy.biz/2010/01/how-to-use-group-policy-preferences-to-secure-local-administrator-groups/</a></p>
<p>For managing the local admin account on all your computers then also look at another Microsoft tool called Local Admin Password Service (a.k.a LAPS) this allow you to automatically set a random local admin account password on all your comptuers and store it in AD similar to how BitLocker Recovery keys are stored. See Â <a href="https://technet.microsoft.com/en-us/mt227395.aspx">https://technet.microsoft.com/en-us/mt227395.aspx</a><u></u></p>
<p><b>Patch operating systems</b></p>
<p>This is pretty much the same as the Application Patching topic as mentioned above. Weather you use WSUS, SCCM, InTune or Windows Update it does not really matter so long as you patch your computers.</p>
<p>If you are using Windows Update natively from Microsoft you can still control the rollout scheduled of new version of patches and OS update via the Windows Update for Business Group Policy setting. See <a href="https://www.grouppolicy.biz/2015/11/windows-10-1512-admx-out-now/">https://www.grouppolicy.biz/2015/11/windows-10-1512-admx-out-now/</a></p>
<p>What is also very important is that if you are implements a rollout schedule to all your computer based on the importance of the patch is that you should also have a pre-defined test strategy. I also go into how to do this in my article <a href="https://www.grouppolicy.biz/2011/06/best-practices-group-policy-for-wsus/">https://www.grouppolicy.biz/2011/06/best-practices-group-policy-for-wsus/</a> .</p>
<p><b><a href="https://www.asd.gov.au/publications/protect/multi_factor_authentication.htm">Multi-factor authentication</a></b></p>
<p>Mult-Factor Authentication also commonly now as Two Factor Authentication is common place for external access to organisation. While Group Policy is not typically used to implement Multi-Factor auth. It still can be used to help with this such as using Group Policy to automatically deploy certificate to all your workstations. These computer certificates can then be used authenticate devices connecting in via IPSec. Â For a guide on how to setup automatic computer and users certificate enrolment see <a href="https://docs.microsoft.com/en-us/windows-server/networking/core-network-guide/cncg/server-certs/configure-server-certificate-autoenrollment">https://docs.microsoft.com/en-us/windows-server/networking/core-network-guide/cncg/server-certs/configure-server-certificate-autoenrollment</a></p>
<p>While not group policy relate you might also want to consider having Multi-Factor authentication implemented in conjunction with tool like <a href="https://www.cyberark.com/">CyberArk</a> so that your internal highly privileged accounts are also kept secure. This helps prevents anyone internally from escalating their privileges by resetting a higher level admins password on their accounts.</p>
<p><b>Daily backups</b></p>
<p>While you canâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t directly implement daily backups via Group Policy there are a number of Group Policy settings that you can use to make sure that end-user data that is stored on the local computer is save to the network servers. This then enables you to back the network servers on a daily basis thus achieving the goal of daily backups.</p>
<p>The most common way that this can be done is to use Windows Folder redirection and Roaming Profiles to make sure that all the user data is backed up. See <a href="https://www.grouppolicy.biz/2010/08/best-practice-roaming-profiles-and-folder-redirection-a-k-a-user-virtualization/">https://www.grouppolicy.biz/2010/08/best-practice-roaming-profiles-and-folder-redirection-a-k-a-user-virtualization/</a></p>
<p>But also out of the Box with Windows 10 and available in Windows 7 you can use WorkFolders as a way to make sure that the users work files are synchronised with the back-end file server. See <a href="https://www.grouppolicy.biz/2013/07/how-to-setup-work-folder-using-group-policy/">https://www.grouppolicy.biz/2013/07/how-to-setup-work-folder-using-group-policy/</a></p>
<p><b>Summary</b></p>
<p>In summary the ASD Essential 8 is a great guide that should be used in your organisation, you may already have implemented some of the points or you might have your own reasons not to carry out some of these items. Either way itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s a great starting point to compare agains what you do in your environment to make sure you are secure and stays secure going into the futureâ€¦</p>
<p>Reference <a href="https://www.asd.gov.au/publications/protect/essential-eight-explained.htm">https://www.asd.gov.au/publications/protect/essential-eight-explained.htm</a><span style="color: #000000; font-family: Calibri;">Â </span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/03/how-to-implement-the-asd-essential-8-via-group-policy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17138</post-id>	</item>
		<item>
		<title>Remote Server Admin Tools (a.k.a RSAT) for Windows 10 v1803 Redstone 4</title>
		<link>https://www.grouppolicy.biz/2018/03/remote-server-admin-tools-a-k-a-rsat-for-windows-10-v1803-redstone-4/</link>
					<comments>https://www.grouppolicy.biz/2018/03/remote-server-admin-tools-a-k-a-rsat-for-windows-10-v1803-redstone-4/#comments</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Tue, 27 Mar 2018 23:11:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[1803]]></category>
		<category><![CDATA[Honolulu]]></category>
		<category><![CDATA[Redstone 4]]></category>
		<category><![CDATA[Remote Server Admin Tools]]></category>
		<category><![CDATA[RSAT]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17135</guid>

					<description><![CDATA[Microsoft has release a new version of the Windows 10 Remote Server Admin Tools for builds of Windows 10 17110 or higher. While it was normally practice for Microsoft to release a new RSAT version with every release of a Windows client OS in recent years they have been releasing these tools less frequently (see https://www.grouppolicy.biz/2017/04/microsoft-will-not-be-releasing-remote-server-admin-tools-rsat-for-windows-10-redstone-2/ ) While it does...]]></description>
										<content:encoded><![CDATA[<p>Microsoft has release a new version of the Windows 10 Remote Server Admin Tools for builds of Windows 10 17110 or higher. While it was normally practice for Microsoft to release a new RSAT version with every release of a Windows client OS in recent years they have been releasing these tools less frequently (see <a href="https://www.grouppolicy.biz/2017/04/microsoft-will-not-be-releasing-remote-server-admin-tools-rsat-for-windows-10-redstone-2/">https://www.grouppolicy.biz/2017/04/microsoft-will-not-be-releasing-remote-server-admin-tools-rsat-for-windows-10-redstone-2/</a> )</p>
<p>While it does not seem like there is much in this new version I still always recommend that admin run the latest version of RSAT on their computer to ensure the least amount of problem, especially with Group Policy Management Console.</p>
<p>Whatâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s new:</p>
<ul>
<li><em>FIXED: DNS server tools are now correctly installed as part of the RSAT package.</em></li>
<li><em>FIXED: Shielding data files and template disks can now be created by their respective wizards in the RSAT package.</em></li>
<li><em>KNOWN ISSUE: The x86 RSAT package may fail during installation on Windows 10 builds older than 17110, and on builds other than the 171xx series.</em></li>
</ul>
<p>Also note that Microsoft is already moving away from using RSAT tools for management and with a new tool called codename â€œHonoluluâ€. This tool currently only comes with Windows Server 2016 and is a replacement for Windows Server Manage. Its an extensible PowerShell based single management pane tool that can be used to perform many of the admin tasks across multiple servers. For an overview of the tool check out the video belowâ€¦</p>
<p><iframe loading="lazy" src="https://channel9.msdn.com/Blogs/windowsserver/Project-Honolulu-overview/player" width="640" height="360" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/03/remote-server-admin-tools-a-k-a-rsat-for-windows-10-v1803-redstone-4/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17135</post-id>	</item>
		<item>
		<title>Security Baseline Teamplate for Windows 10 v1803 Redstone 4 &#8220;Draft&#8221;</title>
		<link>https://www.grouppolicy.biz/2018/03/security-baseline-teamplate-for-windows-10-v1803-redstone-4-draft/</link>
					<comments>https://www.grouppolicy.biz/2018/03/security-baseline-teamplate-for-windows-10-v1803-redstone-4-draft/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Tue, 27 Mar 2018 22:47:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[1803]]></category>
		<category><![CDATA[Redstone 4]]></category>
		<category><![CDATA[Security Template]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17133</guid>

					<description><![CDATA[Microsoft has just release a draft version of the WIndows 10 1803 Security Baseline Template]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: Calibri;"><span style="color: #000000;">Microsoft is hurtling toward the end of development of the latest version of Windows 10 v1803 (which ironically will be released in April) and as such they have now release the near final version to the </span><a href="https://blogs.windows.com/windowsexperience/2018/03/27/announcing-windows-10-insider-preview-build-17133-for-fast/#WzpedodEKm9e8pPM.97">Windows Insider Fast Ring</a></span><span style="color: #000000; font-family: Calibri;">. </span></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">In conjunction with this they have also released a </span><a href="https://blogs.technet.microsoft.com/secguide/2018/03/27/security-baseline-for-windows-10-v1803-redstone-4-draft/">new draft security baseline configuration</a></span><span style="color: #000000; font-family: Calibri;"> to be used for securing the OS with recommended settings. </span></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">In case you missed it Microsoft is </span><a href="https://blogs.technet.microsoft.com/secguide/2017/06/15/security-compliance-manager-scm-retired-new-tools-and-procedures/">no longer support the Security Compliance Manager</a></span><span style="color: #000000; font-family: Calibri;"> tool and now only release a Security Templates via individual ZIP files. As such similar information is contained in this tool such as relevant documentation, GPO templates, scripts and even relevant WMI filters. </span></p>
<p><span style="color: #000000; font-family: Calibri;">Notably this version also has a new script that allows you to remove the local admin account restrictions from non-domain joined computers. This is very handy as normally domain joined computers prevent network access for the local admin account, but for non-domain joined it makes managing these devices a lot harder as there is no other way to remotely access these devices. </span></p>
<p><span style="color: #000000; font-family: Calibri;">So if you are using Windows 10 in your organisation then your more than likely be upgrading to this version over the new few month. Therefore it would definitely be good to download and start testing with this template now.</span></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">Source: </span><a href="https://blogs.technet.microsoft.com/secguide/2018/03/27/security-baseline-for-windows-10-v1803-redstone-4-draft/">https://blogs.technet.microsoft.com/secguide/2018/03/27/security-baseline-for-windows-10-v1803-redstone-4-draft/</a></span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/03/security-baseline-teamplate-for-windows-10-v1803-redstone-4-draft/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17133</post-id>	</item>
		<item>
		<title>Blocked Site Based GPO due to Blocked SOM</title>
		<link>https://www.grouppolicy.biz/2018/01/blocked-site-based-gpo-due-blocked-som/</link>
					<comments>https://www.grouppolicy.biz/2018/01/blocked-site-based-gpo-due-blocked-som/#respond</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Fri, 19 Jan 2018 03:58:51 +0000</pubDate>
				<category><![CDATA[Tip]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Intermediate]]></category>
		<category><![CDATA[sites]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=17000</guid>

					<description><![CDATA[I recently came across a problem with applying a site linked GPO to some Citrix servers that were giving Blocked SOM (see below) as the reason for being denied. For the longest time I could not figure out why the GPO was being blocked. It was then with some help that I found out that the computer was in an...]]></description>
										<content:encoded><![CDATA[<p>I recently came across a problem with applying a site linked GPO to some Citrix servers that were giving Blocked SOM (see below) as the reason for being denied. For the longest time I could not figure out why the GPO was being blocked. It was then with some help that I found out that the computer was in an OU that had blocked Inheritance enabled. This meant that Windows also blocked site link GPO if the computer is in an OU with inheritance blocked.</p>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-17001" style="outline: #72777c solid 1px; height: 341px; text-align: left; color: #333333; text-transform: none; text-indent: 0px; letter-spacing: normal; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; word-spacing: 0px; white-space: normal; max-width: 1162.84px; orphans: 2; -webkit-text-stroke-width: 0px; background-color: transparent;" src="https://www.grouppolicy.biz/wp-content/uploads/2018/01/BlockedSOM-800x424.png" alt="" width="643" height="387" /><b></b><i></i><u></u></p>
<p>This behaviour was confusing to me as Site Based GPO on the surface seem to have nothing to do with OU&#8217;s. But this behaviour is exactly as designed due to the order or precedents that GPO are applied (Local, Site, Domain then OU). As the OU based policy settings take precedence over the Site this also means that OU based blocking will take precedence over Site based GPO as well.</p>
<p>So if you come across this same problem there a number of way that you can work around this problem:</p>
<ol>
<li>The obvious, and remove the the Blocked Inheritance on the OU that the computer object is located.</li>
<li>Link the Site based GPO to an OU below the Blocked Inheritance. If you do this you lose the ability to dynamically apply the setting based on the site that the computer is located which then defeats the purpose of having the GPO linked at the site. But if it is something like a Citrix server, then you&#8217;ll be able to create a Site based OU (e.g. PAW\<em>SiteNameÂ </em>) and then you can link the GPO to the <em>SiteName</em> OU.</li>
<li>You can enabled the &#8220;Enforced&#8221; option to ignore the &#8220;Blocked Inheritance&#8221; option.</li>
<li>If it is a Group Policy Preference then you can also use the Item Level Targeting to apply the policy only when the computer is in the correct IP address range and/or Site (see below).</li>
</ol>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-17003" src="https://www.grouppolicy.biz/wp-content/uploads/2018/01/SiteBasedGPO-1.png" alt="" width="593" height="412" srcset="https://www.grouppolicy.biz/wp-content/uploads/2018/01/SiteBasedGPO-1.png 1047w, https://www.grouppolicy.biz/wp-content/uploads/2018/01/SiteBasedGPO-1-150x104.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2018/01/SiteBasedGPO-1-300x208.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2018/01/SiteBasedGPO-1-768x533.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2018/01/SiteBasedGPO-1-800x555.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2018/01/SiteBasedGPO-1-730x507.png 730w" sizes="auto, (max-width: 593px) 100vw, 593px" /><b></b><i></i><u></u></p>
<p>Reference for Order of Precedence:Â <a href="https://blogs.technet.microsoft.com/musings_of_a_technical_tam/2012/02/15/group-policy-basics-part-2-understanding-which-gpos-to-apply/">https://blogs.technet.microsoft.com/musings_of_a_technical_tam/2012/02/15/group-policy-basics-part-2-understanding-which-gpos-to-apply/</a></p>
<p>Thanks toÂ <a class="ProfileHeaderCard-nameLink u-textInheritColor js-nav" href="https://twitter.com/grouppolicyguy">Darren Mar-Elia</a> for helping me figure this one out&#8230;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2018/01/blocked-site-based-gpo-due-blocked-som/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17000</post-id>	</item>
		<item>
		<title>Group Policy Resources for Windows 10 build 1709</title>
		<link>https://www.grouppolicy.biz/2017/10/group-policy-resources-windows-10-build-1709/</link>
					<comments>https://www.grouppolicy.biz/2017/10/group-policy-resources-windows-10-build-1709/#comments</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Tue, 24 Oct 2017 05:53:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[1709]]></category>
		<category><![CDATA[GPMC]]></category>
		<category><![CDATA[Remote Server Admin Tools]]></category>
		<category><![CDATA[Security Baseline]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=16831</guid>

					<description><![CDATA[Windows 10 a.k.a. Redstone 3, a.k.a. 1709 a.k.a. Fall Creators Update has now been released to the public for download. If you would like to get a copy of the new version early to start testing you can download the PRO version using the Windows 10 ISO/USB download tool at https://www.microsoft.com/en-au/software-download/windows10 . Alternatively, you can download the images from your...]]></description>
										<content:encoded><![CDATA[<p>Windows 10 a.k.a. Redstone 3, a.k.a. 1709 a.k.a. Fall Creators Update has now been released to the public for download. If you would like to get a copy of the new version early to start testing you can download the PRO version using the Windows 10 ISO/USB download tool at <a href="https://www.microsoft.com/en-au/software-download/windows10">https://www.microsoft.com/en-au/software-download/windows10</a> . Alternatively, you can download the images from your MSDN or Volume licencing web site.</p>
<p>Now normally, with any release of Windows 10 I would go though the new list of Group Policy features. But in this new version of Windows 10 there is no new major (or minor) Group Policy engine changes. This meaning that the delivery mechanism of Group Policy has not changed.</p>
<p>But of course, there are many new settings that come with every new version of Windows. So for your easy reference, below is a list of essential reference for any Group Policy Administrator:</p>
<ul>
<li>Group Policy Settings Reference for Windows and Windows Server &#8211; This is a spreadsheet with that list all the new, updated or replaced Group Policy setting in the 1709 build. Just for the record, there is 55 new Group Policy setting in 1709 which you can find easily in this spreadsheet. You can download this spreadsheet hereÂ <a href="https://www.microsoft.com/en-us/download/details.aspx?id=25250&amp;751be11f-ede8-5a0c-058c-2ee190a24fa6=True">https://www.microsoft.com/en-us/download/details.aspx?id=25250&amp;751be11f-ede8-5a0c-058c-2ee190a24fa6=True</a><span style="display: inline !important; float: none; background-color: transparent; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; line-height: 24px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;"> . </span></li>
<li>Administrative Templates (.admx) for Windows 10 Fall Creators Update (1709) &#8211; This is a downloadable version of the updated ADMX and ADML files that are used to define the new Group Policy settings (See above point). If you already have a copy of Windows 10 1709 installed then you can find these files in the C:\Windows\PolicyDefenitions folder. In the past, you could blindly copy the ADMX/ADML files of the new version of the OS with the old version of the OS but since Windows 10 1703 some of the old policy settings have been removed. This would not cause anything to break, but it might show up as undefined setting the Group Policy Management Console when viewing GPO reports. You can get these files fromÂ <a href="https://www.microsoft.com/en-gb/download/details.aspx?id=56121">https://www.microsoft.com/en-gb/download/details.aspx?id=56121</a></li>
<li>Remote Server Admin Tools &#8211; Yes&#8230; Yet another new version of the Remote Server Admin Tools (a.k.a. RSAT) has been released for the Windows 10 1709. These tools are essential for anyone performing admin work with a new version of Windows 10 or Windows Server 2016 in their environment. Generally, I always recommend that any Group Policy Administrator upgrade their RSAT tools to the latest version ASAP. However, I would note that the Windows Server 2016 1709 release of Windows it is *ONLY* available as a Server Core image (seeÂ <a href="https://docs.microsoft.com/en-us/windows-server/windows-server">https://docs.microsoft.com/en-us/windows-server/windows-server</a>) . This means that if you are going to install the latest version of Windows Server 2016 then these new admin tools are essential as there is no GUI option to install on the server.</li>
<li>Security baseline for Windows 10 â€œFall Creators Updateâ€ &#8211; The new 1709 security templates have been added to the <a href="https://www.microsoft.com/en-us/download/details.aspx?id=55319" target="_blank" rel="noopener noreferrer">Microsoft Security Compliance Toolkit</a> . These provide updated guidance and group policy settings that Microsoft recommends are applied to all new Windows 10 computers. The new settings in this security template all revolve around new 1709 features and details of these changed can be viewed here <a href="https://blogs.technet.microsoft.com/secguide/2017/10/18/security-baseline-for-windows-10-fall-creators-update-v1709-final/">Security baseline for Windows 10 â€œFall Creators Updateâ€ (v1709) â€“ FINA</a></li>
<li>SMB1 Off by Default &#8211; While not a Group Policy specific change I think it is important to note that there are new ADMX setting (see above) that do have have a way to SMB1 client and server protocols. These are especially important as SMB1 isÂ https://support.microsoft.com/en-us/help/4034314/smbv1-is-not-installed-windows-10-and-windows-server-version-1709 disabled in 1709 by default (in some circumstances). If you have not already disabled SMB1 then definitely something to look at ASAP and Microsoft has also published an SMB1 Clearing House list (a.k.a. name and shame list) of vendors that still required SMB1 see <a href="https://blogs.technet.microsoft.com/filecab/2017/06/01/smb1-product-clearinghouse/">SMB1 Product Clearinghouse</a></li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2017/10/group-policy-resources-windows-10-build-1709/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16831</post-id>	</item>
		<item>
		<title>Why you should never use a Preshared Key with IPSEC</title>
		<link>https://www.grouppolicy.biz/2017/08/why-you-should-never-use-preshared-key-with-ipsec/</link>
					<comments>https://www.grouppolicy.biz/2017/08/why-you-should-never-use-preshared-key-with-ipsec/#comments</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Mon, 07 Aug 2017 00:28:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Group Policy]]></category>
		<category><![CDATA[IPSEC]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[Preshared]]></category>
		<category><![CDATA[PSK]]></category>
		<category><![CDATA[System Volume]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=16613</guid>

					<description><![CDATA[How secure the way a preshared key saved in Active Directory for authetnication with IPSEC secure?]]></description>
										<content:encoded><![CDATA[<p><span style="color: #000000; font-family: Calibri;">IPSEC is an amazing, but not often used technology that allows you to authenticate, allow, deny, protect and/or encrypt network traffic between windows and non-window computers. It has been around since at least Windows 2000 days but it is some time difficult to set up. </span><span style="color: #000000; font-family: Calibri;">Â </span></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">Recently, Microsoft has released a how to article explaining how you can use it to restrict network connections to your domain controllers so that only your Privileged Access Workstations can make RDP connection to your domain controllers (see </span><a href="https://blogs.technet.microsoft.com/askpfeplat/2017/07/24/securing-rdp-with-ipsec/">https://blogs.technet.microsoft.com/askpfeplat/2017/07/24/securing-rdp-with-ipsec/</a></span><span style="color: #000000; font-family: Calibri;"> ). Itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s a great article that got me to test out the feature myself and I highly recommend that you look at it this article yourself especially if you are setting a dedicated Admin Workstations for your Domain Admins. </span><span style="color: #000000; font-family: Calibri;">Â </span></p>
<p><span style="color: #000000; font-family: Calibri;">One of the first things that IPSEC needs to do when negotiating the protocol is to authenticate the users and/or the computer. IPSEC can do this is via many ways (see below):</span><span style="color: #000000; font-family: Calibri;">Â </span></p>
<ol>
<li><span style="color: #000000;"><span style="font-family: Calibri;">Kerberos â€“ This is on by default way to authenticate any Windows user and computers and is a relatively easy and reliable way of authenticatio</span></span></li>
<li><span style="color: #000000;"><span style="font-family: Calibri;">NTLM â€“ This is of course the old method of authenticating Windows users and computers and while it is easy to use, it is in no way as strong as Kerberos method.</span></span></li>
<li><span style="color: #000000;"><span style="font-family: Calibri;">Certificate â€“ This is the uses industry standard PKI certificates again for the computers and/or users. It strength is based on the type of certificate you have deployed, but generally it&#8217;s considered very strong authentication. It can however take a lot of setting up as you have to deploy a full PKI environment first and issues the computers and users certificates</span></span></li>
<li><span style="color: #000000;"><span style="font-family: Calibri;">Preshared key &#8211; This option allows you to select a preshred key that you specify as the authentication for IPSEC. As it clearly says (Below) this is a â€œnot recommendedâ€ way of setting up authentication for IPSEC. Its only described as being â€œless secureâ€ than the other authentication methods. This method is really used if you are not communicated with other non-windows computers via IPSEC and you have no other way to authenticate.</span></span></li>
</ol>
<p><img loading="lazy" decoding="async" class="wp-image-16620 alignnone" src="https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC4.png" alt="" width="346" height="415" srcset="https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC4.png 527w, https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC4-125x150.png 125w, https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC4-250x300.png 250w" sizes="auto, (max-width: 346px) 100vw, 346px" /></p>
<p>(Yes my <a href="https://haveibeenpwned.com/Passwords">super-secure password</a> highlighted below â€˜ABC123â€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />)</p>
<p><span style="color: #000000; font-family: Calibri;">Â </span><span style="font-family: Calibri;"><span style="color: #000000;">Now is also a good time to explain that a few years ago Microsoft released a patch MS14-025 to address how it stored password in AD. In short, the Group Policy Preferences passwords were saved using a 32 bit AES encrypted value. Previous to this hotfix when you set the value in Group Policy you were warned that the password was being only â€œlightly encryptedâ€. Microsoft went out if its way to warn you in a blog post about this in 2009 (see </span><a href="https://blogs.technet.microsoft.com/grouppolicy/2009/04/22/passwords-in-group-policy-preferences-updated/">https://blogs.technet.microsoft.com/grouppolicy/2009/04/22/passwords-in-group-policy-preferences-updated/</a><span style="color: #000000;">) and I also did a post in 2013 (see </span><a href="https://www.grouppolicy.biz/2013/11/why-passwords-in-group-policy-preference-are-very-bad/">https://www.grouppolicy.biz/2013/11/why-passwords-in-group-policy-preference-are-very-bad/</a></span><span style="color: #000000; font-family: Calibri;">) explaining how bad it was to use these Preferences password option. </span><span style="color: #000000; font-family: Calibri;">Â </span></p>
<p><span style="color: #000000; font-family: Calibri;">Then, Metasploit released a module for their toolkit to scan for scanning and decrypting these password value saved in the AD System Volume. So Microsoft released a patch that blocked the UI from being able to make changes to any Group Policy Passwords. Put simply Microsoft drew the line in the sand and prevented anyone from saving Preferences password in the AD SYSVOL.Â </span></p>
<p><span style="color: #000000; font-family: Calibri;">So, with the knowledge and Microsoft deliberate attempts to block any sort of â€œsecretâ€ values in AD. So when I then stumbled across this dialogue box that specifically mentioned a preshared Key. This got me thinking about how this key is stored in AD and how Microsoft addressed the same issues of saving the preshared key for IPSEC.Â </span></p>
<p><span style="color: #000000; font-family: Calibri;">Firstly you can see (image above) that after you set the value you can still clearly see it in the Group Policy UI. This told me at the very least however they key was stored using encryption and not hashsed. This at the very least told be the valued could in theory be reversed engineered and did get me a bit worried.</span></p>
<p>&nbsp;</p>
<p><span style="color: #000000; font-family: Calibri;">Â </span><span style="color: #000000; font-family: Calibri;">So kept digging into the SYSVOL of the Group Policy Object and almost immediately opened up the â€œRegistry.polâ€ file to see if it gave any clues to the storage of the key.</span></p>
<p><span style="color: #000000; font-family: Calibri;">Â </span><span style="color: #000000; font-family: Calibri;">I did a quick â€œfindâ€ in the file for the string â€˜ABC123â€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> but could not find it, so I did a quick visual scan for anything that looked like an obfuscated field and to my surprise the key was there in plain text as â€˜A B C 1 2 3â€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-16619" src="https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC3.png" alt="" width="639" height="297" srcset="https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC3.png 1231w, https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC3-150x70.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC3-300x139.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC3-768x357.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC3-800x372.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2017/08/IPSEC3-730x339.png 730w" sizes="auto, (max-width: 639px) 100vw, 639px" /></p>
<p><del><span style="color: #000000; font-family: Calibri;">Â </span><span style="color: #000000; font-family: Calibri;">Thatâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s right, the method of storage of the preshared key for IPSEC is to simply add a space between each character and then just save is in the SYSVOL as clear text. So as far as algorithms go, I think this one could be cracked by my 5 year old&#8230;</span></del></p>
<p><span style="color: #000000; font-family: Calibri;">Update: Thanks to the comment from SODER to my article he explains that the spaces are actually just the way the text is displayed in notepad. Other text editors that display unicode will actually not have any spaces at all.</span></p>
<p><span style="color: #000000; font-family: Calibri;">So the warning message is certinly correct, the preshared key is stored â€œless secureâ€. More accurately you could describe it as being not secure at all.</span></p>
<p><span style="font-family: Calibri;"><span style="color: #000000;">Then, if you have read the blog post by fellow MVP Darren Mar-Elia at </span><a href="https://sdmsoftware.com/group-policy-blog/security-policy/a-new-old-threat-dealing-with-ad-and-group-policy-information-exposure/">https://sdmsoftware.com/group-policy-blog/security-policy/a-new-old-threat-dealing-with-ad-and-group-policy-information-exposure/</a></span><span style="color: #000000; font-family: Calibri;"> you will realise that the System Volume is an open book readable by all computers (and most users) in your Active Directory domain. So, the permission to read the Group Policy Object information that has this preshared key is by default â€œAuthenticated Usersâ€ or maybe only â€œDomain Computersâ€ if you have locked it down. Put simply, assume everyone on your domain can read this value. It must, otherwise how else can your computer read the information required to setup a preshared key authentication in the first place.</span></p>
<p><span style="color: #000000; font-family: Calibri;">Â </span><span style="color: #000000; font-family: Calibri;">So, to summaries we have a pre-shared key, saved in a place that is readable by all users and computer in the domain and is saved in clear text unicode. </span></p>
<p><span style="color: #000000; font-family: Calibri;">But why is this an issues? Microsoft is clearly warning people that it is â€œless secureâ€ so let them make the decision about whether to use this option or not. Well, if you remember earlier Microsoft has already gone to the effort of disabling featured that save password values in AD SYSVOL using just light encryption. What I fail to see here in this case why this is really any different. </span></p>
<p><span style="color: #000000; font-family: Calibri;">If I had to guess, this is just a legacy setting that has been around for many years that is used mainly used for testing and/or IPSEC with non-Windows based computers. I am sure the usage rate of such an option if very low. But this does not mean that it is not likely that there are some people out there that are using IPSEC thinking that it gives them some level of protections.Â </span></p>
<p><span style="color: #000000; font-family: Calibri;">So let me be clear, in my opinion IPSEC with preshared key should not be considered secure at all. If you have deployed IPSEC using this method of authentication then you really need to look at moving to PKI, Kerberos or event NTLM. Also, at the very least I think Microsoft should address this issues in a similar way to how it prevented people using Group Policy Preferences Passwords. </span></p>
<p><span style="color: #000000; font-family: Calibri;">But donâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t get me wrong I am not saying IPSEC is not secure, itâ€<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />s just that one of the available method of authentication is not secure. So, if you are going to use IPSEC then for goodness sake NEVER USE PRESHARED KEYS.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2017/08/why-you-should-never-use-preshared-key-with-ipsec/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16613</post-id>	</item>
		<item>
		<title>How to Disable SMB1 using Group Policy Administrative Templates</title>
		<link>https://www.grouppolicy.biz/2017/06/disable-smb1-using-group-policy-administrative-templates/</link>
					<comments>https://www.grouppolicy.biz/2017/06/disable-smb1-using-group-policy-administrative-templates/#comments</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Fri, 16 Jun 2017 04:51:21 +0000</pubDate>
				<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Administrative Template]]></category>
		<category><![CDATA[ADML]]></category>
		<category><![CDATA[ADMX]]></category>
		<category><![CDATA[Disable]]></category>
		<category><![CDATA[Group Policy]]></category>
		<category><![CDATA[SMB]]></category>
		<category><![CDATA[SMB v1]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=16454</guid>

					<description><![CDATA[How to disable SMB1 on Windows using the ADMX/ADML files released by Microsoft. ]]></description>
										<content:encoded><![CDATA[<p>So, incase you have not heard, SMB1 is Bad&#8230; Really BAD. Not only is it woefully old and inefficient protocol it&#8217;s also now widely known to be the attack vector for the recent WannaCry virus. By now you probably have seen my very popular previous blog post called <a title="Permanent Link to How to disable SMB 1 on Windows 7 via Group Policy to Prevent WannaCry" href="https://www.grouppolicy.biz/2017/03/how-to-disable-smb-1-on-windows-7-via-group-policy/" rel="bookmark">How to disable SMB 1 on Windows 7 via Group Policy to Prevent WannaCry</a> . This article explains how to disable SMB1 Server and Client protocols by setting custom registry keys by configuring Group Policy Preferences Registry key option. But as with any thing you do with Group Policy configured the exact registry key can be a bit tricky and is of course prone to typos and errors that could cause all sorts of issues.</p>
<p>To make it easier to disable SMB1 in your environment Microsoft has now release an ADMX/ADML file that adds defines the required registry keys so they can be configured as Administrative Template setting.</p>
<p>To get the SMB1 policy setting visitÂ <a href="https://blogs.technet.microsoft.com/secguide/2017/06/15/security-baseline-for-windows-10-creators-update-v1703-draft/">https://blogs.technet.microsoft.com/secguide/2017/06/15/security-baseline-for-windows-10-creators-update-v1703-draft/</a> and download theÂ <a href="https://msdnshared.blob.core.windows.net/media/2017/06/Windows-10-RS2-Security-Baseline.zip" target="_blank" rel="nofollow noopener">Windows-10-RS2-Security-Baseline</a> ZIP file.</p>
<p>Open the ZIP file and navigate to the &#8220;Templates&#8221; folder where you then need to extract the SecGuide.adml and SecGuide.ADMX files.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-16457" src="https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1ADMX.png" alt="" width="717" height="315" srcset="https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1ADMX.png 1154w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1ADMX-150x66.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1ADMX-300x132.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1ADMX-768x337.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1ADMX-800x351.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1ADMX-730x321.png 730w" sizes="auto, (max-width: 717px) 100vw, 717px" /></p>
<p>Then copy the two files you extracted ro your &#8220;PolicyDefinitions&#8221; folder in your SYSVOL. Once you copy these files as with adding any ADMX/ADML file to the Policy Definitions folder you will then see your Group Policies get the new &#8220;MS Security Guide&#8221; under Computer Administrative templates.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-16456" src="https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1-1.png" alt="" width="748" height="268" srcset="https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1-1.png 1035w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1-1-150x54.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1-1-300x108.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1-1-768x275.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1-1-800x287.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/DisableSMB1-1-730x262.png 730w" sizes="auto, (max-width: 748px) 100vw, 748px" /></p>
<p>Now, as per the guidance text of the policy you need to do the following and you will have disabled SMB1 on all your Windows computers.</p>
<blockquote><p>APPLIES ONLY TO: Windows 7 and Windows Servers 2008, 2008R2 and 2012 (NOT 2012R2):</p>
<p>To disable client-side processing of the SMBv1 protocol (recommended), do ALL of the following:<br />
* Set the SMBv1 client driver to &#8220;Disable driver&#8221; using the &#8220;Configure SMB v1 client driver&#8221; setting;<br />
* Enable this setting;<br />
* In the &#8220;Configure LanmanWorkstation dependencies&#8221; text box, enter the following three lines of text:<br />
Bowser<br />
MRxSmb20<br />
NSI</p></blockquote>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2017/06/disable-smb1-using-group-policy-administrative-templates/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16454</post-id>	</item>
		<item>
		<title>Does Windows 10 S Support Group Policy?</title>
		<link>https://www.grouppolicy.biz/2017/06/windows-10-s-support-group-policy/</link>
					<comments>https://www.grouppolicy.biz/2017/06/windows-10-s-support-group-policy/#comments</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Tue, 06 Jun 2017 03:55:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Group Policy]]></category>
		<category><![CDATA[Windows 10 S]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=16424</guid>

					<description><![CDATA[Does Windows 10 S support Group Policy? Lets take a look a the FAQ release by Microsoft to see if it is possible. ]]></description>
										<content:encoded><![CDATA[<p>Recently Microsoft has revealed there will be a new SKU of Windows 10 that will only run signed Apps from the Windows App Store. This new version of the OS will be called Windows 10 S. This version of the OS is specifically designed to only be able to run Universal Windows Platform (a.k.a. UWP) or Centennial packaged apps. This give the OS the advantage of being able to run only application that have been explicitly reviewed and signed by Microsoft to ensure they are of high quality in terms of security, performance and easy of install/uninstall.</p>
<p>However, as you can see from the chart below that was provided in the FAQ atÂ <a href="https://support.microsoft.com/en-us/help/4020089/windows-10-s-faq">https://support.microsoft.com/en-us/help/4020089/windows-10-s-faqÂ </a> the Windows 10 S does not support domain joining much like Windows RT did not and therefore you will not be able to deliver Domain Based Group Policy settings to the OS.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-16425" src="https://www.grouppolicy.biz/wp-content/uploads/2017/06/Windows10S.png" alt="" width="1026" height="330" srcset="https://www.grouppolicy.biz/wp-content/uploads/2017/06/Windows10S.png 1026w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/Windows10S-150x48.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/Windows10S-300x96.png 300w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/Windows10S-768x247.png 768w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/Windows10S-800x257.png 800w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/Windows10S-730x235.png 730w" sizes="auto, (max-width: 1026px) 100vw, 1026px" /></p>
<p>It is however easy to upgrade a Windows 10 S to the PRO version via the Windows Store so if you do purchase a Windows 10 S device you will be able to upgrade it to support Domain Joining and Group Policy if needed.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2017/06/windows-10-s-support-group-policy/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16424</post-id>	</item>
		<item>
		<title>Windows 10 on ARM Group Policy Support</title>
		<link>https://www.grouppolicy.biz/2017/06/windows-10-arm-group-policy-support/</link>
					<comments>https://www.grouppolicy.biz/2017/06/windows-10-arm-group-policy-support/#comments</comments>
		
		<dc:creator><![CDATA[Alan Burchill]]></dc:creator>
		<pubDate>Fri, 02 Jun 2017 03:50:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[ARM]]></category>
		<category><![CDATA[Group Policy]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.grouppolicy.biz/?p=16420</guid>

					<description><![CDATA[Microsoft has release a video on Channel 9 called Windows 10 on ARM which mostly answers the question, does Windows 10 on ARM support Group Policy. This is of course an important question as the earlier version of Windows that ran on an ARM processor was Windows RT and it only have very limited local group policy support (see How...]]></description>
										<content:encoded><![CDATA[<p>Microsoft has release a video on Channel 9 called <a href="https://channel9.msdn.com/events/Build/2017/P4171">Windows 10 on ARM</a> which mostly answers the question, does Windows 10 on ARM support Group Policy. This is of course an important question as the earlier version of Windows that ran on an ARM processor was Windows RT and it only have very limited local group policy support (see <a href="https://www.grouppolicy.biz/2012/12/how-to-enable-and-configure-group-policy-settings-in-windows-rt/">How to enable and configure Group Policy settings in Windows RT</a> ).</p>
<p>So does Windows on ARM support Group Policy? Yes, well, almost certainly yes.</p>
<p>As you can see from the two screen shots below from the video Windows 10 on ARM come in a &#8220;Pro&#8221; SKU which does support Domain Joining as an option. This would almost certainly imply that Windows 10 on ARM will also support the Group Policy settings as all other Windows SKU&#8217;s that support domain joining also support Group Policy settings.</p>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-16421" src="https://www.grouppolicy.biz/wp-content/uploads/2017/06/2017-06-02-1.png" alt="" width="551" height="444" srcset="https://www.grouppolicy.biz/wp-content/uploads/2017/06/2017-06-02-1.png 689w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/2017-06-02-1-150x121.png 150w, https://www.grouppolicy.biz/wp-content/uploads/2017/06/2017-06-02-1-300x242.png 300w" sizes="auto, (max-width: 551px) 100vw, 551px" /></p>
<p>So this is great news as it looks like consumers and business will be able to help from Microsoft&#8217;s upcoming Windows 10 on ARM Operating System that will have always on and always connected functionality.</p>
<p>Reference <a href="https://channel9.msdn.com/events/Build/2017/P4171">https://channel9.msdn.com/events/Build/2017/P4171</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.grouppolicy.biz/2017/06/windows-10-arm-group-policy-support/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16420</post-id>	</item>
	</channel>
</rss>
