Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
Group Policy Results
TRC1\administrator on TRC1\DC01
Data collected on: 1/1/2019 4:12:33 PM
Summary
 During last computer policy refresh on 1/1/2019 4:10:11 PM
 
No Errors Detected
A fast link was detected More information...
The following GPOs have special alerts
 
GPO NameAlert
Default Domain PolicyEnforced
Disable Offline FileEnforced
NAP Client SettingsEnforced
USBBlockEnforced
SNMP ConfigurationEnforced
 During last user policy refresh on 1/1/2019 4:05:18 PM
 
No Errors Detected
A fast link was detected More information...
The following GPOs have special alerts
 
GPO NameAlert
ManageEngineAssetExplorerAgentEnforced
Default Domain PolicyEnforced
SNMP ConfigurationEnforced
USBBlockEnforced
Computer Details
General
Computer nameTRC1\DC01
Domaintrc.int
SiteDefault-First-Site-Name
Organizational Unittrc.int/Domain Controllers
Security Group Membership
show
Component Status
Component NameStatusTime TakenLast Process TimeEvent Log
Group Policy InfrastructureSuccess143 Millisecond(s)1/1/2019 4:10:11 PMView Log
Group Policy RegistrySuccess172 Millisecond(s)1/1/2019 4:10:11 PMView Log
Internet Explorer ZonemappingSuccess (no data)0 Millisecond(s)1/1/2019 4:00:10 PMView Log
Microsoft Offline FilesSuccess (no data)0 Millisecond(s)1/1/2019 4:10:11 PMView Log
RegistrySuccess109 Millisecond(s)1/1/2019 4:00:10 PMView Log
ScriptsSuccess31 Millisecond(s)1/1/2019 4:00:10 PMView Log
SecuritySuccess547 Millisecond(s)1/1/2019 4:00:10 PMView Log
Settings
Policies
Windows Settings
Scripts
Startup
NameParametersLast RunScript Order in GPOWinning GPO
installsnmp.ps1 Windows PowerShell scripts will run firstSNMP Configuration
Security Settings
Account Policies/Password Policy
PolicySettingWinning GPO
Enforce password history0 passwords rememberedDefault Domain Policy
Maximum password age0 daysDefault Domain Policy
Minimum password age0 daysDefault Domain Policy
Minimum password length0 charactersDefault Domain Policy
Password must meet complexity requirementsDisabledDefault Domain Policy
Store passwords using reversible encryptionDisabledDefault Domain Policy
Account Policies/Kerberos Policy
PolicySettingWinning GPO
Enforce user logon restrictionsEnabledDefault Domain Policy
Maximum lifetime for service ticket600 minutesDefault Domain Policy
Maximum lifetime for user ticket10 hoursDefault Domain Policy
Maximum lifetime for user ticket renewal7 daysDefault Domain Policy
Maximum tolerance for computer clock synchronization5 minutesDefault Domain Policy
Local Policies/User Rights Assignment
PolicySettingWinning GPO
Access this computer from the networkBackup Operators, Pre-Windows 2000 Compatible Access, ENTERPRISE DOMAIN CONTROLLERS, Authenticated Users, Administrators, EveryoneDefault Domain Controllers Policy
Add workstations to domainTRC1\M.Mousavi, TRC1\B.Bakhshiani, Authenticated UsersDefault Domain Controllers Policy
Adjust memory quotas for a processAdministrators, NETWORK SERVICE, LOCAL SERVICEDefault Domain Controllers Policy
Allow log on locallyPrint Operators, Server Operators, Account Operators, Backup Operators, AdministratorsDefault Domain Controllers Policy
Back up files and directoriesServer Operators, Backup Operators, AdministratorsDefault Domain Controllers Policy
Bypass traverse checkingPre-Windows 2000 Compatible Access, Authenticated Users, Administrators, NETWORK SERVICE, LOCAL SERVICE, EveryoneDefault Domain Controllers Policy
Change the system timeServer Operators, Administrators, LOCAL SERVICEDefault Domain Controllers Policy
Create a pagefileAdministratorsDefault Domain Controllers Policy
Debug programsAdministratorsDefault Domain Controllers Policy
Enable computer and user accounts to be trusted for delegationAdministratorsDefault Domain Controllers Policy
Force shutdown from a remote systemServer Operators, AdministratorsDefault Domain Controllers Policy
Generate security auditsNETWORK SERVICE, LOCAL SERVICEDefault Domain Controllers Policy
Increase scheduling priorityAdministratorsDefault Domain Controllers Policy
Load and unload device driversPrint Operators, AdministratorsDefault Domain Controllers Policy
Log on as a batch jobPerformance Log Users, Backup Operators, Administrators, IIS_IUSRSDefault Domain Controllers Policy
Manage auditing and security logS-1-5-21-3978916455-91412154-593840236-2559, Administrators, TRC1\Exchange ServersDefault Domain Controllers Policy
Modify firmware environment valuesAdministratorsDefault Domain Controllers Policy
Profile single processAdministratorsDefault Domain Controllers Policy
Profile system performanceAdministratorsDefault Domain Controllers Policy
Remove computer from docking stationAdministratorsDefault Domain Controllers Policy
Replace a process level tokenNETWORK SERVICE, LOCAL SERVICEDefault Domain Controllers Policy
Restore files and directoriesServer Operators, Backup Operators, AdministratorsDefault Domain Controllers Policy
Shut down the systemPrint Operators, Server Operators, Backup Operators, AdministratorsDefault Domain Controllers Policy
Take ownership of files or other objectsAdministratorsDefault Domain Controllers Policy
Local Policies/Security Options
Domain Controller
PolicySettingWinning GPO
Domain controller: LDAP server signing requirementsNoneDefault Domain Controllers Policy
Domain Member
PolicySettingWinning GPO
Domain member: Digitally encrypt or sign secure channel data (always)EnabledDefault Domain Controllers Policy
Microsoft Network Server
PolicySettingWinning GPO
Microsoft network server: Digitally sign communications (always)EnabledDefault Domain Controllers Policy
Microsoft network server: Digitally sign communications (if client agrees)EnabledDefault Domain Controllers Policy
Network Access
PolicySettingWinning GPO
Network access: Allow anonymous SID/Name translationDisabledDefault Domain Policy
Network Security
PolicySettingWinning GPO
Network security: Do not store LAN Manager hash value on next password changeEnabledDefault Domain Policy
Network security: Force logoff when logon hours expireDisabledDefault Domain Policy
Network security: LAN Manager authentication levelSend NTLMv2 response onlyDefault Domain Controllers Policy
Public Key Policies/Certificate Services Client - Auto-Enrollment Settings
PolicySettingWinning GPO
Automatic certificate managementEnabled[Default setting]
OptionSetting
Enroll new certificates, renew expired certificates, process pending certificate requests and remove revoked certificatesDisabled
Update and manage certificates that use certificate templates from Active DirectoryDisabled
Public Key Policies/Encrypting File System
Certificates
Issued ToIssued ByExpiration DateIntended PurposesWinning GPO
AdministratorAdministrator9/6/2013 3:08:22 PMFile RecoveryDefault Domain Policy

For additional information about individual settings, launch the Local Group Policy Object Editor.
Public Key Policies/Trusted Root Certification Authorities
Certificates
Issued ToIssued ByExpiration DateIntended PurposesWinning GPO
CLASS 2 KEYNECTIS CAClass 2 Primary CA7/6/2019 3:30:00 AM<All>Default Domain Policy
Class 2 Primary CAClass 2 Primary CA7/7/2019 3:29:59 AM<All>Default Domain Policy
ex.tehranraymand.comCLASS 2 KEYNECTIS CA7/12/2017 12:29:03 PMServer Authentication, Client AuthenticationDefault Domain Policy
ex.tehranraymand.comCLASS 2 KEYNECTIS CA6/20/2018 11:34:20 AMServer Authentication, Client AuthenticationDefault Domain Policy

For additional information about individual settings, launch the Local Group Policy Object Editor.
Administrative Templates
Policy definitions (ADMX files) retrieved from the local computer.
Network/DNS Client
PolicySettingWinning GPO
DNS serversEnabledUSBBlock
IP addresses:192.168.43.245
Network/Network Connections/Windows Firewall/Domain Profile
PolicySettingWinning GPO
Windows Firewall: Define inbound port exceptionsEnabledOpen TCP 4495
Define port exceptions:Source GPO
4495:TCP:*:Enabled:TwitchOpen TCP 4495
Specify the port to open or block.
Syntax:
<Port>:<Transport>:<Scope>:<Status>:<Name>
<Port> is a decimal port number
<Transport> is either "TCP" or "UDP"
<Scope> is either "*" (for all networks) or
a comma-separated list that contains
any number or combination of these:
IP addresses, such as 10.0.0.1
Subnet descriptions, such as 10.2.3.0/24
The string "localsubnet"
<Status> is either "enabled" or "disabled"
<Name> is a text string
Example:
The following definition string adds TCP port 80
to the port exceptions list and allows it to
receive messages from 10.0.0.1, 10.0.0.2, or any
system on the 10.3.4.x subnet:
80:TCP:10.0.0.1,10.0.0.2,10.3.4.0/24:enabled:Web service
Network/Offline Files
PolicySettingWinning GPO
Allow or Disallow use of the Offline Files featureDisabledDisable Offline File
Network/SNMP
PolicySettingWinning GPO
Specify communitiesEnabledSNMP Configuration
Communities
TRC1
System/Windows Time Service/Time Providers
PolicySettingWinning GPO
Configure Windows NTP ClientEnabledDefault Domain Policy
NtpServer192.168.43.251
TypeAllSync
CrossSiteSyncFlags2
ResolvePeerBackoffMinutes15
ResolvePeerBackoffMaxTimes7
SpecialPollInterval3600
EventLogFlags0
PolicySettingWinning GPO
Enable Windows NTP ClientEnabledDefault Domain Policy
Enable Windows NTP ServerEnabledLocal Group Policy
Preferences
Windows Settings
Registry
Registry item (Key path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\TimeZoneInformation, Value name: DynamicDaylightTimeDisabled)
The following settings have applied to this object. Within this category, settings nearest the top of the report are the prevailing settings when resolving conflicts.
DynamicDaylightTimeDisabled
Winning GPODefault Domain Policy
Result: Success
General
ActionUpdate
Properties
HiveHKEY_LOCAL_MACHINE
Key pathSYSTEM\CurrentControlSet\Control\TimeZoneInformation
Value nameDynamicDaylightTimeDisabled
Value typeREG_DWORD
Value data0x1 (1)
Group Policy Objects
Applied GPOs
Default Domain Controllers Policy [{6AC1786C-016F-11D2-945F-00C04fB984F9}]
Link Locationtrc.int/Domain Controllers
Extensions ConfiguredSecurity
EnforcedNo
DisabledNone
Security FiltersNT AUTHORITY\Authenticated Users
RevisionAD (16), SYSVOL (16)
WMI Filter 
Default Domain Policy [{31B2F340-016D-11D2-945F-00C04FB984F9}]
Link Locationtrc.int
Extensions Configured{B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A}
Group Policy Registry
Security
Internet Explorer Zonemapping
Registry
Group Policy Infrastructure
EnforcedYes
DisabledNone
Security FiltersNT AUTHORITY\Authenticated Users
TRC1\Clinet_Camputer
RevisionAD (191), SYSVOL (191)
WMI Filter 
Disable Offline File [{11CD91E6-F545-4A5F-8D03-8906576D078E}]
Link Locationtrc.int
Extensions ConfiguredMicrosoft Offline Files
Registry
EnforcedYes
DisabledNone
Security FiltersNT AUTHORITY\Authenticated Users
RevisionAD (2), SYSVOL (2)
WMI Filter 
Local Group Policy [LocalGPO]
Link LocationLocal
Extensions ConfiguredRegistry
EnforcedNo
DisabledNone
Security Filters 
RevisionAD (3), SYSVOL (3)
WMI Filter 
Open TCP 4495 [{89DA42D0-7597-4658-B38F-F242B1C30BC4}]
Link Locationtrc.int
Extensions ConfiguredRegistry
EnforcedNo
DisabledNone
Security FiltersNT AUTHORITY\Authenticated Users
RevisionAD (1), SYSVOL (1)
WMI Filter 
SNMP Configuration [{29477BF5-4C05-4D60-9043-4112B7E563A4}]
Link Locationtrc.int
Extensions ConfiguredScripts
Registry
EnforcedYes
DisabledNone
Security FiltersNT AUTHORITY\Authenticated Users
RevisionAD (18), SYSVOL (18)
WMI Filter 
USBBlock [{EF480BB9-2A9B-41F5-8820-357A006324A5}]
Link Locationtrc.int
Extensions ConfiguredRegistry
EnforcedYes
DisabledNone
Security FiltersEveryone
RevisionAD (37), SYSVOL (37)
WMI Filter 
Denied GPOs
NAP Client Settings [{588536B1-8EB4-43C5-B9CC-F070BC8A1F66}]
Link Locationtrc.int
Extensions Configured{B587E2B1-4D59-4E7E-AED9-22B9DF11D053}
Security
Registry
EnforcedYes
DisabledNone
Security FiltersTRC1\Domain Computers
TRC1\Domain Users
RevisionAD (19), SYSVOL (65535)
WMI Filter 
Reason DeniedAccess Denied (Security Filtering)
WSE Group Policy BranchCache Clients [{87FE3100-813B-47A7-8E8B-5144BDD66606}]
Link Locationtrc.int
Extensions ConfiguredRegistry
EnforcedNo
DisabledNone
Security FiltersTRC1\Domain Computers
RevisionAD (5), SYSVOL (65535)
WMI Filter 
Reason DeniedAccess Denied (Security Filtering)
WSE Group Policy BranchCache Content Server [{FB296BDE-B95C-4794-B90B-EB65DE71E8BE}]
Link Locationtrc.int
Extensions ConfiguredRegistry
EnforcedNo
DisabledNone
Security FiltersTRC1\SRV-CC01$
RevisionAD (2), SYSVOL (65535)
WMI Filter 
Reason DeniedAccess Denied (Security Filtering)
WMI Filters
NameValueReference GPO(s)
None
User Details
General
User nameTRC1\administrator
Domaintrc.int
Security Group Membership
show
Component Status
Component NameStatusTime TakenLast Process TimeEvent Log
Group Policy InfrastructureSuccess140 Millisecond(s)1/1/2019 4:05:18 PMView Log
RegistrySuccess63 Millisecond(s)1/1/2019 4:00:11 PMView Log
ScriptsSuccess16 Millisecond(s)1/1/2019 4:00:11 PMView Log
Software InstallationSuccess46 Millisecond(s)1/1/2019 4:00:11 PMView Log
Settings
Policies
Software Settings
Installed Applications
ManageEngine AssetExplorer Agent
Winning GPOManageEngineAssetExplorerAgent
Product Information
NameManageEngine AssetExplorer Agent
Version1.0
LanguageEnglish (United States)
Platformx86
Support URL
Deployment Information
GeneralSetting
Deployment typeAssigned
Deployment source\\dc01\MSIManageEngine\ManageEngineAssetExplorerAgent.msi
Installation user interface optionsBasic
Uninstall this application when it falls out of the scope of managementDisabled
Do not display this package in the Add/Remove Programs control panelDisabled
Install this application at logonEnabled

Advanced Deployment OptionsSetting
Ignore language when deploying this packageDisabled
Make this 32-bit X86 application available to Win64 computersEnabled
Include OLE class and product informationDisabled

Diagnostic InformationSetting
Product code{a8dae35f-bdf5-47d0-b588-409b6803e025}
Deployment Count0
Security
Permissions
TypeNamePermissionInherited
AllowTRC1\Domain AdminsFull controlNo
AllowNT AUTHORITY\Authenticated UsersReadNo
AllowNT AUTHORITY\SYSTEMFull controlNo
AllowTRC1\Domain AdminsRead, WriteYes
AllowTRC1\Enterprise AdminsRead, WriteYes
AllowNT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadYes
AllowNT AUTHORITY\Authenticated UsersReadYes
AllowNT AUTHORITY\SYSTEMRead, WriteYes
AllowCREATOR OWNERRead, WriteYes
Allow inheritable permissions from the parent to propagate to this object and all child objectsEnabled
Advanced
UpgradesSetting
Required upgrade for existing packagesDisabled
Packages that this package will upgradeGPO
None
Packages that will upgrade this packageGPO
None

Transforms
None
Cause
This application was applied due to the following conditions:
The application was assigned.
Its language matched the system language.
Windows Settings
Scripts
Logon
NameParametersLast RunScript Order in GPOWinning GPO
C:\Users\m.zeynali.TRC1\Desktop\snmp.bat Not configuredSNMP Configuration
Administrative Templates
Policy definitions (ADMX files) retrieved from the local computer.
Network/Network Connections
PolicySettingWinning GPO
Ability to Enable/Disable a LAN connectionDisabledUSBBlock
Enable Windows 2000 Network Connections settings for AdministratorsEnabledUSBBlock
Prohibit access to properties of a LAN connectionEnabledUSBBlock
Prohibit access to properties of components of a LAN connectionEnabledUSBBlock
Prohibit access to the New Connection WizardEnabledUSBBlock
Prohibit adding and removing components for a LAN or remote access connectionEnabledUSBBlock
Prohibit TCP/IP advanced configurationEnabledUSBBlock
System/Removable Storage Access
PolicySettingWinning GPO
All Removable Storage classes: Deny all accessEnabledUSBBlock
CD and DVD: Deny read accessEnabledUSBBlock
CD and DVD: Deny write accessEnabledUSBBlock
Removable Disks: Deny read accessEnabledUSBBlock
Removable Disks: Deny write accessEnabledUSBBlock
Tape Drives: Deny read accessEnabledUSBBlock
Tape Drives: Deny write accessEnabledUSBBlock
WPD Devices: Deny read accessEnabledUSBBlock
WPD Devices: Deny write accessEnabledUSBBlock
Group Policy Objects
Applied GPOs
Local Group Policy [LocalGPO]
Link LocationLocal
Extensions Configured{A2E30F80-D7DE-11D2-BBDE-00C04F86AE3B}
EnforcedNo
DisabledNone
Security Filters 
RevisionAD (7), SYSVOL (7)
WMI Filter 
ManageEngineAssetExplorerAgent [{742D1E53-F6EC-44CD-8B4E-F0E6778209C5}]
Link Locationtrc.int
Extensions ConfiguredSoftware Installation
EnforcedYes
DisabledNone
Security FiltersNT AUTHORITY\Authenticated Users
RevisionAD (3), SYSVOL (3)
WMI Filter 
SNMP Configuration [{29477BF5-4C05-4D60-9043-4112B7E563A4}]
Link Locationtrc.int
Extensions ConfiguredScripts
EnforcedYes
DisabledNone
Security FiltersNT AUTHORITY\Authenticated Users
RevisionAD (2), SYSVOL (2)
WMI Filter 
USBBlock [{EF480BB9-2A9B-41F5-8820-357A006324A5}]
Link Locationtrc.int
Extensions ConfiguredRegistry
EnforcedYes
DisabledNone
Security FiltersEveryone
RevisionAD (28), SYSVOL (28)
WMI Filter 
Denied GPOs
Default Domain Policy [{31B2F340-016D-11D2-945F-00C04FB984F9}]
Link Locationtrc.int
Extensions Configured{A2E30F80-D7DE-11D2-BBDE-00C04F86AE3B}
{4CFB60C1-FAA6-47F1-89AA-0B18730C9FD3}
Registry
EnforcedYes
DisabledNone
Security FiltersNT AUTHORITY\Authenticated Users
TRC1\Clinet_Camputer
RevisionAD (49), SYSVOL (65535)
WMI Filter 
Reason DeniedAccess Denied (Security Filtering)
WMI Filters
NameValueReference GPO(s)
None