Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
Deploy WinRM-HTTPS
Data collected on: 5/27/2023 12:58:25 PM
General
Details
Domainwindowspapst.de
Ownerdwp\Domain Admins
Created5/19/2023 1:21:34 PM
Modified5/21/2023 8:15:36 PM
User Revisions0 (AD), 0 (SYSVOL)
Computer Revisions42 (AD), 42 (SYSVOL)
Unique ID{EB3DFD45-595C-4CE4-AFAD-1027E6293381}
GPO StatusUser settings disabled
Links
LocationEnforcedLink StatusPath
Domain ControllersNoEnabledwindowspapst.de/Domain Controllers
ComputerNoEnabledwindowspapst.de/DWP/Computer

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
dwp\Domain AdminsEdit settings, delete, modify securityNo
dwp\Enterprise AdminsEdit settings, delete, modify securityNo
NT AUTHORITY\Authenticated UsersRead (from Security Filtering)No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Windows Firewall with Advanced Security
Global Settings
PolicySetting
Policy version2.31
Disable stateful FTPNot Configured
Disable stateful PPTPNot Configured
IPsec exemptNot Configured
IPsec through NATNot Configured
Preshared key encodingNot Configured
SA idle timeNot Configured
Strong CRL checkNot Configured
Inbound Rules
NameDescription
WinRM-HTTPS
This rule might contain some elements that cannot be interpreted by the current version of GPMC reporting module
EnabledTrue
ProgramAny
ActionAllow
SecurityRequire authentication
Authorized computers
Authorized users
Protocol6
Local port5986
Remote portAny
ICMP settingsAny
Local scopeAny
Remote scopeAny
ProfileDomain
Network interface typeAll
ServiceAll programs and services
Allow edge traversalFalse
Group
Connection Security Settings
Administrative Templates
Policy definitions (ADMX files) retrieved from the central store.
Windows Components/Windows Remote Management (WinRM)/WinRM Client
PolicySettingComment
Allow Basic authenticationDisabled
Allow CredSSP authenticationDisabled
Allow unencrypted trafficDisabled
Disallow Digest authenticationEnabled
Disallow Kerberos authenticationDisabled
Disallow Negotiate authenticationDisabled
Windows Components/Windows Remote Management (WinRM)/WinRM Service
PolicySettingComment
Allow Basic authenticationDisabled
Allow CredSSP authenticationDisabled
Allow unencrypted trafficDisabled
Disallow Kerberos authenticationDisabled
Disallow Negotiate authenticationDisabled
Turn On Compatibility HTTP ListenerDisabled
Preferences
Control Panel Settings
Scheduled Tasks
Scheduled Task (At least Windows 7) (Name: WinRM-HTTPS)
WinRM-HTTPS (Order: 1)
General
ActionUpdate
Task
Name WinRM-HTTPS
Author dwp\jw
Description
Run only when user is logged on S4U
UserId NT AUTHORITY\System
Run with highest privileges HighestAvailable
Hidden No
Configure for 1.2
Enabled Yes
Triggers
1. One time
Repeat task every 5 minutes for a duration of Indefinitely
Stop all running tasks at end of repetition duration No
Activate 5/19/2023 1:45:46 PMSynchronize across time zones No
Enabled Yes
Actions
1. Start a program
Program/script C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Arguments \\DWP\Netlogon\WinRMDeploy.ps1 -WinRMCertTemplateName "SHA256-WinRM-HTTPS"
Settings
Stop if the computer ceases to be idle No
Restart if the idle state resumes No
Start the task only if the computer is on AC power No
Stop if the computer switches to battery power No
Allow task to be run on demand Yes
Run task as soon as possible after a scheduled start is missed No
Stop task if it runs longer than 3 days
If the running task does not end when requested, force it to stop Yes
If the task is already running, then the following rule applies IgnoreNew
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
User Configuration (Disabled)
No settings defined.